Visitor management systems
Ava Group (AVA), a provider of security risk management services and technology will be showcasing its portfolio of security solutions at Intersec Dubai 2019, stand S3-C48. Intersec Dubai features a rich selection of exhibitors in Security, Safety & Fire Protection, attracting visitors from the Middle East, Africa, the Indian subcontinent and well beyond. Ava Group will be presenting the latest exciting solutions from its technology division - which incorporates Future Fibre Technologies (F...
Data Management, Inc., owner of Visitor Pass Solutions, launches with a new name and confirmed focus, further planting their flag in the security industry. The company will now go by the name ‘THRESHOLD,’ a term evocative of their expertise in visitor management systems. With the new tagline, ‘the gateway to stronger security,’ the company emphasises its function as the first line of defence for their clients, as they manage the traffic entering and leaving their clients...
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no s...
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. eFusion security management The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud...
Pelco by Schneider Electric, the provider of video surveillance solutions, announces that it will be exhibiting solutions, services, and products in various segment applications at Intersec 2019 held in Dubai on January 20-22. As part of this presentation, Pelco will share a glimpse into a few soon-to-be released products and focus on how new technologies such as increased camera resolutions, cloud services, and analytics are shaping the future. Pelco will also feature significant updates to it...
Security and Safety Things GmbH (SAST) will be presenting innovative use cases for security cameras at CES 2019 from January 8 to 11, 2019. These are the first to be developed on the basis of SAST’s open IoT ecosystem for the security industry. The use cases show the potential of the ecosystem for restaurants, airports and events. Within the food services sector, restaurateurs can run multiple apps and solutions on the same camera, which allows the system to count visitors and personalise...
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud computing and mobile communications, VisitorPoint is being used at premises from hotels and campuses to corporate headquarters. It allows the whole process of visitor management to be streamlined in a way never previously possible. Diary management processes VisitorPoint is also ideal for busy reception teams who need to keep across who is entering their premises For example, it lets guests’ phones be used as access credentials, making it a perfect alternative to room keys in the hospitality sector. Compatibility of the VisitorPoint system with ASSA Abloy Hospitality products has proved to be particularly popular with hotels. VisitorPoint is also ideal for busy reception teams who need to keep across who is entering their premises. With the latest version of VisitorPoint, users can easily view pre-registered visitors in advance; manage and sign-in large groups in seconds; book meeting rooms; manage visitor car parking; and automate notifications and messaging. Now organisations can go even further in streamlining their people and diary management processes, thanks to integration with Outlook and Google calendars. Important additions A new VIP feature allows automatically tailored welcomes for specified guests and/or groups; and a QR Scan App allows visitors and VIPS to be immediately verified. In addition, a new, sleek self-service kiosk will be unveiled at the show, which is ideal for positioning in hotels and high-end corporate lobbies. Meanwhile, with its versatile, open-technology software eFusion is proving a practical alternative to costly or complex conventional PSIM solutions. It offers the advantages of a modular, building block approach and gives users the freedom to integrate, customise and adapt their security systems to meet both current needs and emerging risks. Ensuring compatibility with leading surveillance, intruder, access and fire detection systems, eFusion now supports more than 60 off-the-shelf integrations and several important additions are confirmed for the show. Security investments The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment" These latest integrations include IP intercom hardware from Jaquies; the mobile phone app GuardPoint; and the Metra locker system hardware. For users who want control and better value from their security investments, eFusion with its expanding choice of integrations is the ideal management platform, says Lee Copland, Managing Director, Maxxess EMEA. “The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment. Our technology is proving particularly popular because it gives users all the advantages of advanced PSIM without the associated cost or complexity.” eFusion can be easily scaled from one site to multiple sites globally and it can connect stand-alone systems for easy upgrades such as retro-fits with existing hardware. Allows security controllers Also on show, Ambit allows security controllers to communicate directly with both individuals and groups and to monitor the safety of everyone on site (or on multiple sites), for example employees, residents, visitors, or contractors. Now Ambit users will benefit from direct notification of a wide range of risks thanks to a new integration with the NC4 incident alert service. NC4 monitors risks and issues alerts in real time, covering potential threats ranging from terrorist incidents to weather events, from civil disruption to cyber-attacks. With this new integration, as N4C alerts arise they will be filtered by proximity/relevance and directly sent to Ambit users. Lone-worker monitoring Visitors to the Maxxess stand will also learn how Ambit’s latest life-saving technology comes with a choice of applications tailored to the user’s needs. For example, it can allow lone-worker monitoring; courtesy communications and remote escorting after-hours; panic alarm features; and individualised messaging during incidents. It can help security teams co-ordinate and work more effectively with emergency responders too as well as improving the efficiency of day to day operations It can help security teams co-ordinate and work more effectively with emergency responders too as well as improving the efficiency of day to day operations. With new customers and projects including Bluewater Island, TAJ Hotel & Residences JLT Dubai, TAJ Hotel & Palace on Palm Jumeirah, the Emirates Nuclear Energy Corporation, Emirates Flight Catering Extension, the Jewel of the Creek and Yahsat, 2019 will be an exciting year of growth for Maxxess in the Middle East. Better optimised workforces “We are well positioned to further capitalise on major infrastructure projects across the region such as hotels and leisure. The demand for increased operational efficiencies across the MENA region has seen many organisations look to automate tasks and at the same time mitigate against the potential for human error. This is evident in the demand we’re seeing for streamlined visitor management, the elimination of keys and better optimised workforces across security and facilities management functions.” “And as real-world applications for artificial intelligence become a reality, we are continuing to collaborate with our world leading video surveillance partners to bring these advanced analytics into the eFusion platform. Meanwhile, we will continue to support our customers in complying with revised fire and safety codes and new security regulations.”
Johnson Controls announces that it has partnered with Civic Technologies, the global digital identity leader. Johnson Controls will integrate the Civic Secure ID Platform (SIP) with C-CURE 9000 Security and Event Management Systems from Software House to provide visitor management with greater data privacy and protection, enabling building visitors to securely present their verifiable identity using the Civic App. This partnership will enable properties secured by C-CURE 9000 a more convenient and secure solution for processing visitors at point of reception and ensure Johnson Controls remains a leader in secure access technology with innovative digital identity solutions. Offering solutions We’re looking forward to integrating Civic as a part of our access management technology" “Lack of user-controlled identity information and decentralised verification using current methods is an ongoing challenge in the identity access management industry,” said George Martinez, director of Cloud Services at Johnson Controls. He further added, “The ability to digitally verify the identity of people coming in and out of C-CURE 9000 secured buildings, without needing to collect and store excess personal information, offers incredible compliance and security benefits. We’re looking forward to integrating Civic as a part of our access management technology and to offering solutions that help our customers and the guests that use and visit their facilities.” The Johnson Controls and Civic partnership will simplify and streamline the proof of identity process for managing visitors in building lobbies. Visitor identity verification with the Civic App will initially be deployed in three New York locations, with an expected volume of over 20,000 visitors per month. Manage sensitive data The Civic integration provides data privacy with the benefits of blockchain-powered security Visitors typically have to sign in with the receptionist and provide information, usually a physical ID and contact information, to check in for their visit and receive temporary access to the building. By integrating Civic for authentication and Know Your Customer, when visitors walk into a building, they will be able to scan a QR code on the C-CURE 9000 check-in kiosk with their Civic App without needing to dig out a physical ID or enter personal information into a form. Integrating the Civic App provides benefits beyond a simplified visitor management process. For visitors, the Civic integration provides data privacy with the benefits of blockchain-powered security. Using the Civic Secure ID platform, user information is always stored locally on a user’s mobile device and is protected by biometrics. This also means that properties secured by C-CURE 9000 are able to securely verify the identity of users without any requirements to store or manage sensitive personal data that attracts hackers. Secure access management Civic enables guest and employees to prove who they are with a mobile device" “Today, we all carry various items to identify ourselves, from government-issued IDs to fobs that grant us building access. By integrating the Civic App, anyone who needs to visit a C-CURE 9000 secured building will have the opportunity to identify themselves with their Civic App,” said Vinny Lingham, Civic co-founder & CEO. “Civic enables guest and employees to prove who they are with a mobile device, rather than requiring them to show an ID document, sign a visitor logbook and stand in line to check in/out of a facility. We’re looking forward to working with Johnson Controls to bring blockchain-powered identity verification to enable secure access management for Johnson Controls customers’ sites and with their guests across the U.S.” The way we prove who we are is changing. The partnership between Johnson Control and Civic is the perfect example of how this transformation is taking place. In the future, it will not be necessary to carry and surrender a personal document to prove identity when this can all be seamlessly managed from a mobile app that offers the additional benefits of allowing users to control how their personal information is shared.
Boon Edam Inc., global manufacturer of security entrances and architectural revolving doors, is proud to announce the opening of a full-service Technology and Training Center in San Jose, CA. This is the second US-based location for the company outside of its headquarters in Lillington, NC; the first location, opened in 2015, is in mid-town Manhattan at 1140 Broadway Avenue in New York City. The address of the new Silicon Valley center is 2161 O’Toole Ave San Jose, CA. Boon Edam’s Technology & Training Center Opening a Boon Edam showroom on the West Coast enables more security professionals and architects to get hands-on with the company’s wide array of security entrance solutions. The new Center has the following Boon Edam products available for demonstration: Tourlock 180+90 – The top-selling security revolving door in the Americas renowned for preventing tailgating and piggybacking. Circlelock mantrap portals – combining piggybacking prevention with 2-factor authentication for sensitive interior locations. Turnlock 100 - full-height turnstile used as a deterrent at the perimeter fence line. Lifeline Swing and Slide - optical turnstiles with swinging and sliding barriers that combine tailgating detection with sleek design for supervised lobby applications. Each product is integrated with the latest access control and biometric authentication technologies, as well as VMS, IP cameras and visitor management systems. Visitors to the Center can see how different solutions work together to provide various levels of protection from unauthorised entry into facilities as well as witness the ease of authentication, monitoring and traffic flow. A sample of the technology solution partners featured in the Center are: Access Control: Lenel, Software House, AMAG, Honeywell, Hexicurity Secure Communications: Enclave VMS: AMAG, Genetec Card Readers: Essex, HID Biometric Readers: IrisID, Stonelock, MorphoWave The San Jose Technology and Training Center will also host complimentary technical training sessions monthly for local reseller partners IP Cameras: Bosch NVR Servers: BCDVideo Visitor Management: Soloinsight Hardware: LifeSafety Power Technical training on entrance solutions The San Jose Technology and Training Center will also host complimentary technical training sessions monthly for local reseller partners. Each training session will provide intensive, hands-on instruction about installation, service and maintenance for the company’s security entrance products “We’ve experienced tremendous growth in security entrance orders over the past 5 years to large, multinational companies, many of which are based on the West Coast,” said Greg Schreiber, Senior Vice President of Sales, Boon Edam. “Today we’re investing in that success to give these customers the opportunity for hands-on demonstrations and technical training of entry solutions. We’re excited to finally bring this high level of service to the West Coast.”
Maxxess Systems introduces new enterprise software that combines security, communications, business intelligence and data integration into a single, easy-to-use platform called Maxxess InSite. Maxxess InSite, unified interface platform Maxxess InSite sets a new benchmark for security and business intelligence software platforms by every standard of measure" Nothing operates, functions or looks like Maxxess InSite. It combines systems intelligence and human intelligence to detect and respond to unfolding events in real-time – all of which is queued, organised and displayed on a highly-intuitive user interface. In doing so, Maxxess InSite truly enables early action, allowing IT, Operational Technology and Physical Security departments within organisations to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. This new system is uniquely categorised as an Awareness and Response Coordination System. “Maxxess InSite sets a new benchmark for security and business intelligence software platforms by every standard of measure,” said Nancy Islas, President of Maxxess Systems. “It goes beyond basic detection and control. It empowers total awareness and provides users with unprecedented capabilities to help prevent incidents from happening. It also coordinates the activities of first responders and the people they are assisting from the moment a threatening event is detected. And best of all, is the simplicity of Maxxess InSite’s operation.” Security and business intelligence software Maxxess Insite is a single system that harnesses the power of myriad system technologies Maxxess InSite features an open-architecture framework to accommodate virtually any security or business intelligence application with comprehensive functionality – from automated responses with database integration to mobile alert notifications with two-way communications. Hardware and software solutions from more than 50 different leading manufacturers are already integrated into Maxxess InSite, providing more combined capabilities and functionality than any other cross-platform solution available. This allows Maxxess InSite to be configured for virtually all applications, employing any combination of software modules and hardware to deliver each user with a highly customised solution and unparalleled efficiency. Myriad system technologies Maxxess Insite is a single system that harnesses the power of myriad system technologies, effectively expanding their collective capabilities while also making human interaction more intuitive. It meshes the capabilities of the following systems and technologies, and more: video surveillance, access control, GPS/IPS location technologies, intrusion detection, fire safety systems, perimeter detection/protection, HVAC/building management, smart phones and tablets, ID/credential badging, two-way communications, guard tour, visitor management, time and attendance, license plate recognition, hotkey emergency notification, reporting/forensics, wireless sensors, elevator/escalator control and database integration. Kevin Daly, CEO of Maxxess Systems, added, “The beauty of the product is that even with these diverse integrations and functions, the system is very user friendly. Simplicity of use is truly the system’s ultimate sophistication.”
HID Global, a worldwide provider of trusted identity solutions, announced a new ID card retransfer printer with breakthrough speed. The HID FARGO HDP6600 High Definition Printer/Encoder reduces the time it takes to print the first ID card by half while doubling overall throughput as compared to many alternatives. This new printer is designed to save customers time, money and energy. The HID FARGO HDP6600 printer is the company’s sixth-generation retransfer printer under HID’s FARGO brand, the most trusted name in ID card printers. HID Global has completely re-engineered the retransfer printing concept and redesigned the printer from the ground up to accelerate high-volume, high-quality printing, lower the printing cost per card and deliver best-in-class energy efficiency–all with HID’s well-known industry-leading reliability. As a result, the new printer is easier to service, less expensive to operate and more flexible across a wider range of applications. For large projects, utilising the new printers can save users thousands of dollars in annual energy costs Breakthrough card throughput speeds HID has achieved breakthrough card throughput speeds by combining patent-pending iON ‘instant on’ technology with other advancements to enable simultaneous film printing and card retransfer processes. This unique approach reduces the time it takes to print the first card to an industry-low 60 seconds, cutting average annual wait times by up to 20 hours for printed and laminated cards while enabling overall throughput of up to 230 cards per hour. The approach also eliminates the need for continuous transfer roller heating, improving reliability while cutting energy usage. For large projects, utilising the new printers can save users thousands of dollars in annual energy costs. Optimal image and colour quality “With the HID FARGO HDP6600 printer, HID Global has redefined retransfer technology innovation,” said Craig Sandness, Vice President and Managing Director for Secure Issuance with HID Global. “We looked at this well-established product category with new eyes to deliver the features and capabilities that are in highest demand from government, enterprise and higher education customers. The HID FARGO HDP6600 is not only breathtakingly fast and efficient, but it represents a whole new way to think about retransfer printing.” The HDP6600 printer’s true 600 DPI resolution and precision colour panel registration enable sharper textAnother benefit of the new HID FARGO printer is the image and colour quality on each ID card. The HDP6600 printer’s true 600 DPI resolution and precision colour panel registration enable sharper text, crisper barcode edges and more vibrant colours than possible with other products that use dithering techniques that can only approximate this image quality. Field-upgradable with optional modules The printer uses a multi-tasking architecture supported by a full gigabyte of memory to help enable its faster card throughput speeds and has been designed so that the card path and film and ribbon drawer assemblies are easier to access and service. The HDP6600 is field-upgradable with optional modules including a card flattener, dual-side flipper, and choice of magnetic, contact and contactless encoders plus a programmer option for encoding physical access control system data.
Feenics Inc., a provider of the access control as a service (ACaaS) Keep by Feenics cloud-hosted platform, continues to expand its reach globally, adding an office and representative in Beirut, Lebanon. Nancy Abou Eid, who holds a Master’s Degree in Computer Science and a Bachelor’s Degree in Software Engineering will lead the new Middle East location in Beirut and target additional growing areas including Dubai and Abu Dhabi in the United Arab Emirates. Educating resellers about Keep With the addition of this office, Feenics now has an established presence in North America, Latin America and the Middle EastAbou Eid was one of the first employees of Feenics and an architect of the original Keep by Feenics solution. Her focus will be on educating value-added resellers, consultants and users on the advantages of the scalability, flexibility and advanced security available in the cloud-based ACaaS solution. With the addition of this office, Feenics now has an established presence in North America, Latin America and the Middle East. “I’m excited to be an integral part of the Feenics team again,” Abou Eid said. “The Keep solution has progressed dramatically since the company’s start up in 2010, as has acceptance of the cloud for safe and secure access control management. It’s where the future is going and the Middle East region is receptive and open to the advantages of cloud computing.” As the cloud has become a more comfortable environment for North American users and with many of those customers managing global locations, Feenics can now more fully support additional customers in the Middle East. Expanding footprint to support customers Abou Eid will handle sales and regional technical support for Feenics from the Beirut office“We have many global customers and that requires us to expand our footprint,” said Sam Shalaby, Chief Executive Officer of Feenics. “Nancy hit the ground running and she’s out to make things happen. She was one of our engineers and we had kept the lines of communication open, so when the opportunity presented itself, she was perfect for the role. “Being successful is about having the right people so you can expand properly. It was an easy transition and opportunity for us to open an office in the Middle East. The location will be a natural extension of our efforts in our home office.” Abou Eid will handle sales and regional technical support for Feenics from the Beirut office, which is also staffed with two technicians and a software engineer. Low cost advanced security solution Keep V3 provides extreme scalability, unprecedented flexibility and advanced security in a cloud-based ACaaS solutionFeenics most recently was recognised with two prestigious security industry awards for innovation: 2017 Security Industry Association New Product of the Year and 2017 Most Valuable Product from Security Sales and Integration magazine, both for the latest Keep by Feenics Enterprise V3. Keep V3 provides extreme scalability, unprecedented flexibility and advanced security in a cloud-based ACaaS solution. It integrates native visitor management and a RESTful API that allows systems installers simple integration of a wide array of complementary systems and open hardware devices, generating new revenue streams while creating a path for customers to lower their total cost of system ownership. Keep by Feenics gives users the choice of on-site servers or offsite cloud deployment, hosted by the public cloud Amazon Web Services. Keep significantly minimises costs through simple, maintenance-free and automatic upgrades, patches, disaster recovery and back up.
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security industry experts The Partner Alliance for Safer Schools (PASS) is one of the organisations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organisations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritise Safe school environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organisations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts Some of these organisations recognise their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilise, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack of consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings.A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right protection equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive security plan Quantifying and mitigating risk are the jobs of security professionals and school administrators A risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay adversarial behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorised visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security (Figure 1) . It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety and security components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2 Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.
Surveillance systems can track the locations of mobile phone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travellers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when travelling. When travelling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats. To elaborate on expert security tips, strategies and advice for traveling this summer, we presented several questions to The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy. Chris Duvall, Senior Director at The Chertoff Group, offers insights into cybersecurity concerns, physical security precautions, and recommends digital resources/apps for consumers while traveling. Q: How are security risks – physical and digital – changing? Why are threats greater today than five years ago? The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing Duvall: The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing. The scope, severity and complexity of physical and cyber risks are increasing and becoming more dangerous and destructive. This is especially true for those travelling outside the U.S. On the physical side, threat actors are actively seeking “soft targets” – public events, social settings, mass audience venues, etc. – to communicate their message, sow chaos and inflict catastrophic harm. On the digital or cyber side, we have seen a shift from “thrill hacking,” to an increase of “hacking as a business” (through credential compromise and ransomware), to an increase in “hacking for harm” - with the rise of “nuke ware” and ransomware without a clear financial motivation. Q. What specific precautions should a traveller take to protect their calls, texts and data streams from being spied on? Duvall: When travelling abroad, we recommend to our clients that their personnel and executives should practice good internet and social media hygiene. Some best practices include: Avoid using public Wi-Fi services—unless you use private VPN service for encryption Increase the privacy setting on your technical devices Disable location identifiers on apps Create a new (unlinked) email for internet correspondence Consider purchasing international MyFi devices to decrease the risk of getting your personal identification information (PII) or protected healthcare information (PHI) stolen Use temporary (i.e. burner) phones to protect your data and your contacts Q. What cybersecurity concerns are likely to impact travellers? Are the threats greater outside the United States or in any specific parts of the world? Significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs Duvall: The international cybersecurity landscape has grown increasingly dynamic, with threats posed by government authorities (in some countries), terrorists, insurgents, and criminals, requiring travelers to be proactive and vigilant. U.S. citizens, particularly executives of U.S.-based technology companies, must be aware that they are considered high-value targets for nation-state intelligence services and criminally-motivated bad actors. Many countries will go to great lengths and expense to acquire and exploit proprietary information from U.S.-based companies, and views U.S. executives visiting the country as “soft” targets of opportunity. As such, significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs. The tactics, techniques and procedures (TTPs) utilised by bad actors are often covert and nearly undetectable by the affected person. Threat actors routinely access, monitor and utilise Wi-Fi networks at hotels and in public spaces to compromise target devices. Other targeting methods include luggage searches, extensive questioning, and unnecessary inspection and downloading of information from personal electronic devices. There are numerous, high-risk countries for which the U.S. Government warns travellers to be wary of mobile malware, mobile device privacy attacks and hot spots for mobile botnets. The U.S. Department of State has the most recent and up-to-date list. For example, the U.S. Government has investigated numerous incidents in which U.S. travellers’ PEDs (personal and company devices) have been compromised by Russian authorities while transiting Russian airports, left unattended in public spaces and in travellers’ hotel rooms. When travelling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws Q: What physical security precautions should a traveller take? Duvall: Here are some useful precautions: When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws. Protect your personal information and travel itinerary as much as possible. Limit the amount of jewelry worn, cash, credit cards and electronic devices carried while traveling. Avoid staying on the ground floor of a hotel. Consider choosing a room on the 2nd through 7th floors as these rooms may be more difficult to break into than those on the ground level, but still able to be accessed by fire/emergency response equipment. Never answer your hotel room door for anyone until you’ve determined who they are, why they are at your door, and if it is necessary for you to open the door to interact with them. Carry a rubber door stop/wedge with you to install on the room side of the door before you go to bed. Vary your patterns and routines when venturing out in to a new location, do not become predictable. Politely decline offers of food or drink from strangers (If you do accept beverages, ensure that they are in sealed containers and that there is no evidence of tampering). Never discuss your itinerary, personal, business or other sensitive information where others can hear you. Q: How can companies be proactive in protecting their business travellers? Companies should educate their employees on the importance of maintaining good internet hygiene while travelling abroad Duvall: When travelling on business, companies should provide their employees with clean computers and cell phones before departure. Upon return, the company should immediately wipe the computer clean to prevent any malicious threats from penetrating the company’s internal, cyber-infrastructure. Additionally, companies should educate their employees on the importance of maintaining good internet hygiene and recommend their employees disconnect from social media platforms while travelling abroad. Some general tips to recommend to your employees when travelling abroad include: Register in the Smart Traveler Enrollment Program (https://step.state.gov/step/) Visit Travel.State.Gov to view travel related information specific to the country or countries you’re visiting, including local US Embassy or Consulate contact information, as well as current travel advisories and alerts. Always leave a copy of your transportation and hotel itinerary and driver’s license (or passport if travelling internationally) with a family member or trusted friend. Always use a baggage tag with a protective cover Avoid using public Wi-Fi services Q: What digital resources and/or apps might a traveller benefit from (and how)? Duvall: The Chertoff Group recommends researching the below travel-related apps before departing on a trip: TravWell: This app provides destination-specific vaccine recommendations, a checklist of what you need to do to prepare for travel, and a customisable healthy travel packing list. The app can store travel documents, keep records of medications and immunisations, and set reminders to get vaccine booster doses or take medicines. My TSA: This app provides real-time updates on airport delays. It includes how long security lines are at various airports; information about what you can and cannot bring onto an airplane; and a frequently-asked question list, including new advanced imaging technology. Border Wait Time: The app provides estimated wait times and open-lane status at land ports of entry, which may be particularly helpful when in an area with multiple crossings. Mobile Pass: The Mobile Passport app speeds you through U.S. Customs and Border Protection at (1) cruise port and (24) airports Q: As a security expert, what’s your best advice for travellers? Duvall: At the end of the day, travel security is not rocket science. Simply put, travellers need to: Be aware and situationally alert at all times. Be aware and situationally alert to the location of your luggage and carry-ons at all times. Don’t access unknown, unsecured or public Wi-Fi if at all possible. Turn off “auto connect” features and institute stringent privacy controls as much as possible. Try to “blend in” – you don’t have to try to look like a local but travellers should avoid gaudy and expensive attire wherever possible. Use your common sense – if an offer, invitation or opportunity seems to good to be true... it probably is.
Today’s security professionals are tasked with protecting the entirety of a facility or campus from every possible threat. It’s a big task, given the range of solutions available; from cybersecurity to prevent hacking, to video surveillance to monitor the goings-on within the facility, to the physical security of the building itself. For most businesses and schools, keeping the entrances and exits to a building secure is an extremely high priority—when an individual cannot get into the building they will have a harder time causing trouble for those within it. With quantum leaps happening in security technology, architectural revolving doors may not always be top-of-mind when designing a new security system from scratch. However, with recent technological advances in the last decade, and considering that they occupy less floor space and are extremely good at reducing unwanted air infiltration into an interior, it is definitely time to examine how they can participate in a complete physical security plan as well. A well-known financial company in the Midwest of America was the target of a protest, against their financing of a controversial initiative Restricted access for business continuity The exterior door to a building or premises, often a public entrance during business hours, is typically the first line of defence against unwanted persons or activity making its way into an organisation. If lobby or security staff sense trouble outside (distress, fights, weapons, protests, etc.), they need a quick and effective way to block anyone from entering the building and creating danger for those inside. Should this type of incident make its way into a building, it creates a number of risks, including the expenditure of unnecessary resources, loss of productivity, violence, and liability for the business. For example, recently a well-known financial company in the Midwest was the target of a protest against their financing of a controversial initiative. A large crowd gathered outside on the street, pushed inside the building, and took over the interior lobby. The protesters not only disrupted the retail banking business at the lobby level, but also attempted to block employees from going to work on the upper floors. The protest lasted hours, making it difficult to do business, and was stressful for employees. In addition, the news cycle around the protest created an image problem for upper management and the overall brand. Revolving doors for access control Thanks to technology employing electricity, today’s manual revolving doors can potentially save lives Beyond the immediate risks of theft and violence, crime has numerous intangible effects on employees, residents or students that can have a more profound and lasting impact. These include physical pain and suffering, along with a feeling of anxiety, stress, and uncertainty around future security. According to a survey conducted by Workplace Options in 2015, 53% of American workers have experienced a traumatic event while at work—with workplace violence or criminal activity listed as one of the top four events that cause trauma. Revolving doors can be a reliable solution for providing this necessary security. They are often deployed in buildings where public use is needed during the day, but controlled access is required in the evening—for example, banks, museums, commercial buildings, condominiums, libraries, dorms, recreational centres, and more. Thanks to technology employing electricity, today’s manual revolving doors are more capable than ever before and can potentially save lives or buy the time necessary to alert security staff or notify law enforcement to deal with a dangerous situation in time to prevent harm, stress, or liability. Secure access can be made possible via an access control device mounted on the outside of the door Enhanced security with electronic lock control The following security features are now available for manual revolving doors being deployed in buildings right now: Emergency security lockdown: Facility or reception staff can electronically lock the door in place, regardless of position, at the push of a remotely located button. In the event of an immediate security threat outside the entrance (weapons, protests, drunk and disorderly conduct, etc.), access to a lobby or entrance can be instantly denied, and those within protected. Remote locking: In an earlier time, the manual pushing of a pin was required to lock a revolving door’s wing into the ceiling or the floor. Today, you can lock a manual revolving door by using a remote pushbutton, or, an access control system can lock the door automatically at a specific time of day. If anyone is still in transit during the lock command, the door will allow them to exit before locking. Once the door is locked, staff can easily unlock it with the same remote mechanism if there is an authorised visitor. Access control integration: Integration with access control systems gives manual revolving doors even more capabilities. Secure access can be made possible via an access control device such as a keycard reader, mounted on the outside of the door. Upon valid authorisation, the door will unlock and the user can push to enter the facility. Once all compartments are clear, the door finishes rotating by positioning its door wings at the end posts of the throat opening and relocks. If tailgating is a concern, your revolving doors should be the first of several layers of physical security Efficient incident management Consider the usage of these features for a building such as a downtown high-rise condominium. During the day or night, residents can enter by showing credentials outside the door to the access control system. Any deliveries would have to stand outside, ring the doorbell and wait for reception to unlock the door and let them in. If anything threatening occurs during rotation, reception staff can immediately lock the doors to keep trouble out and call for help. At a high-rise office building, it can work differently. The door can be unlocked during the day for public entry with guards keeping a watchful eye outside, ready to lock the doors instantly if trouble happens outside. The access control system can lock the doors at 5pm until 7am the next morning, requiring employees or cleaning crew to present their credentials to enter. Access control integration It should be noted that standard revolving doors are not equipped to detect or prevent tailgating (an unauthorised person following an authorised person through an entrance). They should not be confused with a security revolving door, which is intended for individuals trained to use these doors at employee-only entrances. With this in mind, consider that with access control integration, a standard revolving door will unlock when presented with an authorised credential, but will continue to rotate as long as anyone is inside the door to prevent entrapment. Tailgating is still a possibility with these entrances, so if this is a concern, your revolving doors should be the first of several layers of physical security including, potentially, additional turnstiles, guard staff, surveillance cameras, additional locking mechanisms for restricted areas, and so on. Ensuring compliance with code requirements To keep building interiors safe, standard revolving doors can be a simple, cost-effective and easy to implement Finally, modern code requirements for revolving doors are defined by a number of different agencies—ANSI, IBC, and NFPA. All require that a revolving door’s wings be able to collapse or ‘book fold’ to create a path of escape during a fire, and that a swinging or sliding door must be present within 10 feet of any revolving door, on the same building plane. To make sure this additional door isn’t a security weak point, the extra sliding or swinging door can be ‘exit only’, or locked to those trying to enter from outside the building, but unlocked to those trying to exit from inside the building. To keep building interiors safe, standard revolving doors can be a simple, cost-effective and easy to implement solution that helps prevent unwanted entry by those looking to do harm and create unwanted liability. Considering revolving doors can be a first step into securing the entrances and exits of your building, and protecting everyone and everything within.
ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., is the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. Here’s a quick rundown of integrator companies acquired by ADT: Protec, a Pacific Northwest commercial integrator (Aug. 2017); MSE Security, the USA’s 27th largest commercial integrator (Sept 2017); Gaston Security, founded in 1994 as a video surveillance integration company and whose services have since expanded to include intrusion, access control, and perimeter protection (Oct. 2017); Aronson Security Group (ASG), which delivers risk and security program consultants and offers advanced integration services, consulting and design engineers and a National Program Management team (March 2018); Acme Security Systems, among the largest privately held security systems integrators in the Bay Area, focusing on electronic security systems, access control, video networks and more (March 2018); Access Security Integration, a regional systems integrator specialising in design, delivery, installation and servicing of electronic security systems including enterprise-level access control, video and visitor management solutions, perimeter security and security operation command centers (Aug. 2018); In addition to their moves in the commercial integrator space, ADT has also sought to expand their presence in cybersecurity with the following two acquisitions: Datashield, specialising in Managed Detection and Response Services (Nov 2017); Secure Designs, Inc., specialising in design, implementation, monitoring, and managing network defense systems, including firewall services and intrusion prevention, to protect small business networks from a diverse and challenging set of global cyber threats (Aug. 2018). ADT has acquired more than a half-dozen security system integration firms in the last year or so For additional insights into ADT’s game plan and the strategy behind these acquisitions, we presented the following questions to Chris BenVau, ADT’s Senior Vice President of Enterprise Solutions. Q: ADT has been actively acquiring regional integrators this year – more than a half a dozen to date. Please describe the history of how ADT came to embrace a strategy of acquiring regional integrators as a route to growth? ADT's acquisition of Red Hawk is set to close in December, and brings premiere fire and life/safety solutions BenVau: Our acquisition strategy started at Protection 1 when we embarked on our journey to build out our commercial and national account business and add enhanced integration capabilities to our portfolio. The merger of Protection 1 and ADT brought that foundation to ADT which up to that point was primarily a residentially and SMB-focused company. After the merger, we set out to identify and acquire additional regional integrators that would continue to build on that foundation and deliver enhanced technical solutions, advanced technologies and an expanded service, install and support footprint. Through our acquisitions we now operate two Network Operations Centers and three Centers of Excellence. We are also unique in the industry with the number and variety of certifications, like Cisco and Meraki, our engineers hold which ultimately allows us to offer Managed Security as a Service. They have also enhanced our operational capabilities. Q: What criteria do you use to evaluate whether an integrator is a good “fit” for ADT? BenVau: First and foremost, we look at the culture of the companies. The companies that we target for acquisition must be metrics- and customer service-driven. Secondly, we look at the leadership teams. ADT view their acquisitions more like mergers and take a patient approach to integrating them into their business We have been fortunate in the fact the leadership of the companies we acquired remain with us today in key management and executive positions helping to drive continued growth within their organisations. We also evaluate their current customer base, unique solutions and their ability to complement and enhance our portfolio with the goal of becoming a leading full-service, enterprise commercial provider. Our acquisitions have bolstered our network capabilities, brought enterprise risk management services, and a broader solution set in high-end video and access control solutions. Our most recent acquisition – Red Hawk, set to close in December – brings us premiere fire and life/safety solutions. Q: What changes are typically needed after an integrator is acquired in order to adapt it to the ADT corporate model? BenVau: We view our acquisitions more like mergers and take a patient approach to integrating them into ADT while taking into account their culture. We want to ensure that we find the right positions for their people, embrace the right messaging and put the right processes in place. We acquire these companies because they are the best in their respective businesses and geographies and bring their knowledge and experience in markets or with solutions that we may not have had previous access to. ADT can support clients with their own in-house technicians which helps to ensure a consistent security program Q: How can regional integrators benefit from the ADT brand? Have your newly acquired integrators realised additional growth? BenVau: The companies we have acquired, generally, have exceeded expectations and surpassed initial goals. ADT brings expanded opportunities for these companies as well with our national footprint. Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver. These integrators help to deliver on that. In the past, the regional players may have had to rely on sub-contractors to service their larger clients. With ADT, we can now support those clients with our own in-house technicians which helps to ensure a consistent security program across multiple locations.Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver" Q: Are additional integrator acquisitions planned this year and into 2019? How much is enough and when will it end (or slow down significantly)? BenVau: We expect to close on our latest acquisition, Red Hawk, before the end of 2018. Red Hawk brings a national footprint focused on fire/life safety and security to ADT. While ADT already had a robust security offering, Red Hawk will contribute significantly to the fire side of the business. In addition, we will continue to evaluate the companies in the industry to determine if additional acquisitions make sense. Q: Do you expect greater consolidation of the integrator channel in the industry as a whole? Why is this a good time for consolidation? Is it a good M&A market for buyers like ADT? BenVau: We will continue to evaluate companies in the industry to determine if further acquisitions make sense. As for the industry, we can only speak for ourselves. Our focus is on investing in our field organisation, in particular our service technicians, engineers and project management teams" Q: What other trend(s) do you see in the industry that will impact ADT (on the commercial side) in the next year or so, and how? BenVau: In addition to their moves in the commercial integrator space, ADT has also sought to expand their presence in cybersecurity Networking is a big one. As we continue to drive integration of devices and services, from AI, “the cloud,” machine learning and even analytics, there will be more focus on the network they ride on. A deeper knowledge of network design, bandwidth impact, and system integration will be critical. As part of our acquisition strategy, we focused on talent to add to the team and have been able to add to our bench strength in this area. Q: Any other comments/insights you wish to share about ADT’s strategy, future, and role in the larger physical security marketplace? BenVau: Our focus is on investing in our field organisation, in particular our service technicians, engineers and project management teams. The cornerstone of our success lies in our ability to deliver outstanding customer support and service. It starts with sales and the ability to deliver security and life safety technologies, but it ends with a delighted customer who partners with us to help secure the things that matter most to them. Our recent acquisitions have more than doubled our commercial field operations teams and are key to establishing the ADT Commercial brand as a leading full-service provider of enterprise solutions to the marketplace.
The Global Security Exchange (GSX) seems smaller this year, which is not surprising given the absence on the show floor of several big companies such as Hikvision and ASSA ABLOY (although their subsidiary HID Global has a big booth). A trend affecting the number of companies exhibiting at GSX 2018, and other trade shows, is industry consolidation, which is impacting the show even beyond the fewer exhibitors this year in Las Vegas. GSX is the new branding for the trade show formerly known as ASIS. There was an impressive crowd of visitors waiting for the show floor to open Tuesday morning; the conference part of the program began on Monday. After the attendees filed through the doors, the foot traffic seemed brisk throughout the morning, and was somewhat steady until the end of the first day. Exhibitors as a whole seemed pleased with the first day and cautiously optimistic about the rest of the show. Acquisitions and consolidation HID Global announced on the first day that they will acquire Crossmatch - emphasising the impact of consolidation Emphasising the impact of consolidation on the industry as a whole, and on this show, was an announcement from HID Global on the first day that they will acquire Crossmatch, a biometric identify management and secure authentication solutions provider. It’s a comparatively large acquisition for the company specialising in trusted identity solutions. Just days earlier, another acquisition also seemed to confirm the trend when UTC Climate, Controls and Security — the owner of Lenel — announced an agreement to acquire S2 Security. The fruits of another recent acquisition was on display at the GSX 2018 hall, where Isonas took its place near the front entrance as part of the Allegion booth, just three months after the global security provider acquired the ‘pure IP access control company.’ Isonas is well positioned in two of the three fastest growing segments of the access control market — IP hardware, which is growing 41 percent per year globally, and access control as a service, or ‘cloud’ technology, which is also outpacing the overall access control market. Allegion also has the third fast-growing segment, wireless locks, covered with its Schlage brand. "New avenues of growth" The early days of new ownership is opening fresh opportunities for both organisations as Allegion seeks to leverage Isonas’ intellectual property and the smaller company finds new avenues of growth in the larger organisation, says Rob Lydic, Isonas Global Vice President of Sales. Motorola joined Avigilon in a higher profile role at their booth, emphasizing consolidation in the industry Lydic sees a likelihood of additional acquisitions in the near future in the security space, given the large amount of capital currently available to be deployed, and the large number of entrepreneurial companies looking to make the leap, as Isonas did, from a small booth at the back of the hall to front-and-center as part of a big industry player. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth. In addition to signage, ownership by Motorola is also impacting the Avigilon product offerings. For example, the Motorola Ally security incident management and communications system has been integrated with Avigilon’s analytics-based event detection, and is being positioned to serve the enterprise market. The system simplifies security operations with a single platform that allows access to critical data, including video and access control systems, directly from any web-enabled device. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth Avigilon is displaying Motorola Solutions’ CommandCenter Aware integrated with Avigilon’s systems for use with public safety applications to provide dispatchers and intelligence analysts with video feeds, incident details, alerts, data mapping and responder location. Avigilon has also integrated its AI-driven Appearance Search technology with its Access Control Manager system, so video searches can be performed based on a badge credential. The system can automatically pull up any information, whether video or events in the access control system, based on the badge information. It can also be used to search for lost badges, or to view where a person is located in the building. Avigilon introduced an AI appliance that allows existing cameras to be integrated with Appearance Search The company introduced an AI appliance that allows existing (non-Avigilon) cameras (up to 20 two-megapixel cameras) to be integrated with Appearance Search. Also, the next generation of analytics allows detection of more things, such objects a person may be holding, or detection based on what they are wearing. The growth of the cannabis market Although attendees at GSX are generally understood to be more end users than integrators, Joe Grillo, CEO of ACRE, the parent company of Vanderbilt Industries and ComNet, says he sees little difference in attendees at GSX compared to the ISC West show in the spring. “We see all our resellers here,” he says. Grillo noticed that Day One booth traffic was “not consistently busy, but steady.” Grillo says ACRE expects to be active again soon in the mergers and acquisitions market. The company has grown through six acquisitions since its founding, and has had one divestiture (when it sold Mercury Security to HID last fall). Since selling Mercury, ACRE has been ‘back in the buying mode,’ just looking for the right opportunity, says Grillo. New markets are a theme at GSX, and one of the biggest new opportunities is the cannabis industry. Marijuana has been legalised in dozens of U.S. states, and Canada is on the verge of legalising the drug. March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics March Networks is among the companies targeting the cannabis industry in a big way. Already across the U.S., March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics. The business intelligence solutions also aid compliance in the highly-regulated industry. March Networks provides radio frequency identification (RFID) tag to track plants throughout the channel, and tracking is integrated with video systems to provide correlated video views. A couple of exhibitors mentioned to me the need for commercial companies to deploy a comparable level of automation as their employees are accustomed to in the smart home environment. That suggests a need for things such as smartphone integration and voice commands. One exhibitor putting its toe in the water is Hanwha Techwin, which showed an Amazon Echo device used to control a video management system (VMS) with voice commands. Could the simple integration be a preview of the future of control rooms, where security officers merely talk to their equipment rather than operating controls? We’ll be talking to more companies (and maybe a few machines) on Day Two of the show, and will be reporting what we hear.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced visitor experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognised a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimetre wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding perimeter protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centres, sports centres, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat mitigation with soft target approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labour reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving security posture at event venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labour reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
Wilson James has appointed SmartTask as preferred technology partner and awarded it a deal for the supply of a mobile patrol and electronic smart form solution for a new security contract with National Museums. Under the agreement, the company will now roll out the SmartTask workforce management software to 10 sites including the Natural History Museum, V&A and Science & Industry Museum. This follows a successful trial that achieved significant time savings by removing paperwork and streamlining operational processes. The new partnership between Wilson James and SmartTask will replace an incumbent supplier agreement that no longer met the business and operational requirements of the security, construction logistics and business services provider. Identify potential benefits In particular, the retender process for the security contract with National Museums required a single provider of a highly-configurable mobile patrol and electronic smart form solution. An initial trial at the Natural History Museum focused on use of electronic forms via SmartTask-enabled smartphones to reduce administration and increase productivity of operational staff. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms It was designed to identify potential benefits based on the precise requirements of the customer as well as create a suite of seven SmartForms and reports that could deliver standardised data capture and analysis. This included confiscated items and vehicle check SmartForms, scenario testing and incident reporting. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms. Required monthly reports Confiscated items, following bag searches carried out at point of entry, historically required between 10-15 minutes to complete and during that time the security officer was away from the floor resulting in lost productivity. Following the adoption of SmartTask, reports can now be created automatically using highly-accurate data, while paper usage and printing requirements have been dramatically reduced. The time savings achieved at the Natural History Museum by the Wilson James team have led to higher productivity, greater capacity to carry out bag searches and increased visibility of security staff. Management time saving have also been realised in production of required monthly reports, as well as administration savings of 12-hours per week for the Security Duty Managers. Ease of deployment Don McCann, Technology Systems Consultant at Wilson James commented: “SmartTask provided significant support throughout the contract bid and contributed to the successful re-signing for a further five years.” SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system" “The solution is now fully operational at five locations – Natural History Museum, National Science & Media Museum, National Railway Museum, Science & Industry Museum and a Wandsworth storage site – with the Science Museum and V&A to follow shortly. SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system, ease of deployment and its suitability for the security sector.” Enhance customer satisfaction Paul Ridden, CEO of SmartTask said: “This latest agreement demonstrates our ability to work closely with our customers to develop advanced workforce management solutions that support business development, customer retention and quality service delivery. We are now partner of choice for a growing number of security organisations based on our proven track record helping to tackle some of the most common and difficult operational challenges they face.” SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
It took six years to remodel the interior of the ‘Palace of Culture’, a monument to socialism built in the 1960s under East German communist rule. Now Bosch is contributing intelligent solutions to make sure that visitors feel safe there, without detracting from its historic charm. It takes the right setting for culture to flourish. Various things are essential: an ambience in which visitors feel at ease, excellent acoustics, and flawless organisation. Now that the Palace of Culture has been completely renovated to ensure all of this, the city of Dresden boasts a new, modern venue for promoting the arts. Sophisticated security solutions The main auditorium seats 1,700 people, and the building as a whole can accommodate up to 2,800 A completely new, state-of-the-art auditorium is the heart of the building. It meets international standards with its striking architecture and top-notch acoustics, providing ideal conditions for the Dresden Philharmonic Orchestra and all kinds of other musicians to give concerts. There is also a new municipal library branch, emphasising the Palace of Culture’s new, open character. Spacious lobbies containing a restaurant and ticket sales link all of the facilities and rooms with one another. Many of the events held here in central Dresden are sold out. The main auditorium seats 1,700 people, and the building as a whole can accommodate up to 2,800. Crowds like these call for sophisticated security solutions that can be smoothly integrated into the overall design. Cleverly integrated components “We wanted a cost-effective overall solution that would do justice to the Palace of Culture and its unique architecture,” says Steffen Meyer, the building’s manager. “We published an invitation to bid for the project and of all the applications we received, Bosch convinced us that they were right for the job.” The building experts from Bosch implemented a customised solution for the Palace of Culture with a host of cleverly integrated components for fire protection, evacuation, access control, video surveillance and building management. The result is a harmonious overall system that meets the entire range of security needs. “As a public facility where people gather, we have to comply with very strict fire protection rules,” explains Meyer. Invisible smoke detectors “We also had to meet some special requirements.” Since the Palace of Culture has protected status as a historic landmark, the appearance of the walls, ceilings and floors may not be noticeably altered. Security staff can also tell whether anyone is still in the building, an important piece of information in case it is ever necessary to evacuate it Now virtually invisible smoke detectors preserve the ambience of the concert hall. Special calculations were even carried out to avoid impairing its acoustics. Advanced video technology automatically counts visitors to prevent the building’s capacity from being exceeded. Security staff can also tell whether anyone is still in the building, an important piece of information in case it is ever necessary to evacuate it. Building integration system In critical situations, special speakers powerful enough to be heard over the orchestra or even a rock concert are lowered from the ceiling to make sure that everyone hears important announcements. All of the individual components are networked via the Building Integration System from Bosch. It makes it easy for the well-trained security guards to monitor and control everything. And to ensure that everything functions reliably in the long term, experts from the Bosch centre in Dresden will regularly check and service the system. Meyer stresses that “we don’t want our culture fans to run any risks.”
Comelit has worked sensitively on site at Rathview Mental Health Facility, to supply door entry solutions to ensure a therapeutic and safe environment is created for the benefit of residents, staff and visitors. Comelit door entry solutions Situated on a rural greenfield site on the outskirts of Omagh, Rathview Mental Health Facility is a new c£2.8 million, 1169m² site that contains a twelve-bed Discharge Unit and a six-bed Recovery Unit, arranged around two central courtyards. With its innovative design, the unit aims to increase the range of community-based mental health services available in Northern Ireland. Owned by The Western Health and Social Care Trust and designed by award winning Todd Architects, Comelit worked sensitively with electrical consultants on site, WYG Belfast, from the tender process to project completion, understanding the full specification requirements from the entrance through staff stations and concierge resources. Healthcare security and safety Comelit was specified through evidence of its understanding of the site requirements, along with the system being IP based, hence highly flexible and configurable" Says Gary Hewitt, Consultant at Chubb NI Ltd, who worked on Rathview Mental Health Facility: “This was an incredibly sensitive works program, where the design of the building was not just important from an aesthetic perspective, but also to ensure a positive impact on the recovery process for residents; and for staff to operate in an environment where they feel safe and secure.” “Comelit was specified through experience and evidence of its understanding of requirements on site, together with the system being IP based, hence highly flexible and configurable. These elements came together to allow for residents to experience independence in a domestic environment, with autonomous access to their accommodation.” 316 Sense panels In total, Comelit was specified for the door entry systems for all four entrance points to the facility, and a total of four 316 Sense panels installed, along with two staff stations and a concierge unit. Each of the twelve apartments were fitted with a pull cord and emergency response button, cabled into Comelit’s Mini handsfree monitors. Designed to operate through Comelit’s innovative VIP system, it utilises the Security Systems Network and allows a priority call to the concierge in case of emergency. Patients, staff and visitors’ safety Mike Campbell, Business Development Manager at Comelit Group UK concluded: “Rathview is an important development in the context of provision of mental health facilities across Northern Ireland, where every part of the site is seen as potentially having therapeutic value. We have worked in partnership with the consultants on site to create a door entry solution that can ensure a balance of a welcoming, encouraging environment, whilst maintaining the safety and security of residents, visitors and staff.”
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announced Estill County Emergency Medical Services, located in Irvine, KY, is successfully using infinias access control from 3xLOGIC to improve security and give hard-working staff needed peace of mind to focus on their important work. Bates Security, Lexington, Kentucky, designed, installed, and oversees the system. Shelia Wise, in charge of accounting and training for Estill EMS, oversaw the process to upgrade security at the County’s EMS facility. “We were looking to secure a building that is in operation 24/7/365.” Working on behalf of the County EMS’s Board of Directors, Wise and her team assembled three bids and in the process got a real education on access control, what different systems can do, and what their real security needs were. Securing the medical room Our main goals were to secure our medical room, per DEA regulations, and to make our facility safe when staff are here"“Our main goals were to secure our medical room, per DEA regulations, and to make our facility safe when staff are here, but also when they need to clear out at a moment’s notice,” explained Wise. Ultimately, the Board of Directors choose inifinias access control because it met the wide-ranging needs of the County EMS. “We chose the best system for the price and the feature set,” said Wise. Installation was completed about two years ago and the infinias system manages a total of six doors at the main EMS building, two of which are internal, including the medical room where drugs are stored. Later, two more doors were added at a sub-station location. “A top concern is the medical room,” said Wise, “I have to be notified when someone is accessing that door. Now, I get an alert anytime someone is attempting to access that secure room anywhere I am, I don’t need to be onsite. Wise and other staff manage their eight doors from a single interface, by any computer with an Internet connection—anytime, anywhere. Access management for employees “It was important that I could easily operate the system software without help from anyone else. And Sean Moberly from Bates is always available for questions and any maintenance that’s needed. It’s a great feeling to know that when we’re away doing our jobs all our worldly possessions back at the facility are protected and we don’t have to worry,” said Wise. The infinias system manages access for all employees, some outside contractors, and the Chairman of the Board of DirectorsEstill County EMS has 35-40 employees and at any given time upwards to 15 people are at the main station on a daily basis. The infinias system manages access for all employees, some outside contractors, who do radio and computer maintenance, and the Chairman of the Board of Directors. Ms. Wise also grants temporary access to hospital staff who use the facility for training. User-friendly access control system As the main administrator, Ms. Wise has created five different sub-groups among all employees and visitors, providing each group with the access privileges they need to do their jobs, while ensuring that only a few individuals have full access to all doors and areas. “I think the system works really well. There was a short learning curve, but it’s quite user-friendly and we’ve not had any problems. From what I was told at our original meeting with Bates through operations today, we got exactly what we were told, and we’re very satisfied,” Wise concluded.
A concierge orders a taxi for an employee or takes his shirts to be cleaned, then greets a visitor and escorts her to an elevator. And these are just a few of countless possible examples of the NOVE office complex’s unique, multifaceted service culture. It attains the standard of security, efficiency and comfort of a five-star international hotel in a state-of-the-art facility where 1,300 people work for no fewer than eight different companies in the heart of Munich. The NOVE has even been honoured with platinum certification from LEED (‘Leadership in Energy and Environmental Design’, a program developed by the U.S. Green Building Council to encourage the construction of energy- and resource-efficient, healthy buildings). Completely integrated solution Tim Wiesener therefore went looking for a reliable and experienced partner, and found it in Bosch’s building experts “We wanted an office building that felt like a five-star designer hotel,” says Tim Wiesener, the CEO of Salvis Consulting AG. The company envisaged a high standard of security backed by smart networked solutions that blended smoothly and esthetically with the architecture and interior decorating. “We certainly didn’t want employees and other users of the building to feel bothered or overwhelmed by its technology.” Tim Wiesener therefore went looking for a reliable and experienced partner, and found it in Bosch’s building experts. “Bosch applies both experience and foresight to its projects, and its specialists immediately grasped our vision.” Video surveillance, access control and intrusion alarm systems, fire protection, visitor management: Bosch planned and implemented a completely integrated solution that harmonised with NOVE’s character and personality. Its leading-edge technology and software are distributed and networked across six stories, a 23-meter-high atrium, and a nine-floor tower. Manage video surveillance The concierges working shifts at the 24-hour reception play an important role in the overall concept, since they are also trained security experts. Among other things, monitors behind the counter let them keep a watchful eye on images from over a hundred surveillance cameras that can be remotely controlled, zoomed and pointed as required, all courtesy of the Bosch Building Integration System. The software lets them efficiently manage video surveillance as well as fire and intrusion alarms. Around-the-clock assistance is also available to the 300 or so visitors that enter the NOVE each day, aided by the dedicated BoVisit visitor management system. The software’s functionality includes announcing guests, printing name tags for them, and assigning them to employees. Thanks to a centralised solution, the concierges always know who is where inside the building. Visually integrating This is especially important in case a critical situation ever arises. At the press of a button, the system generates a vitally important overview of how many people need to be evacuated from each area. Not everything the concierges do is high-tech, of course; they are devoted to helping both tenants and visitors with a smile. “Our receptionists are efficient but not nameless. We combine security with personal service,” says Tim Wiesener. Tenants can naturally access the NOVE any time of the day or night Italian star architect Antonio Citterio designed the complex, which spans roughly 27,500 square meters of gross floor space. He paid especially great attention to visually integrating the security equipment so it wouldn’t stand out. “This called for a certain finesse,” explains Tim Wiesener. Networked solutions Tim Kosok, a sales representative with Bosch Energy and Building Solutions in Munich, worked hard to find out exactly what the customer wanted, explaining that “we painted installations the same color as the ceilings or walls and positioned them just right so they would be practically invisible. Even the door intercoms are designed to be inconspicuous.” Tenants can naturally access the NOVE any time of the day or night. Tim Wiesener is confident that everyone consistently feels safe there, thanks to the networked solutions. “Our collaboration for implementing the complex was excellent and collegial. We worked closely with the Bosch experts to create a solution that’s geared to people and their needs.”
Johnson Controls has announced that the Dr. P. Phillips YMCA has installed Software House’s C-CURE 9000 security and event management platform as part of a comprehensive visitor management system designed to increase security by verifying member identity and restricting access of non-members. Dr. P. Phillips’ YMCA, located in Doctor Phillips, Fla., is the largest of 27 facilities that are part of The YMCA of Central Florida. This single location serves 11,000 active members. The facility recently completed an $11 million renovation and expansion project, which also included an upgrade to the physical access control system to incorporate biometric technology to improve the member check-in process. Biometric fingerprint access The turnstiles help to manage the flow of visitors and identify when a person does not have membership privileges to gain accessThe comprehensive system integrates Software House C-CURE 9000 with biometric readers from iDentytech and swing glass optical turnstiles from Automatic Systems. Together, the systems manage the flow of visitors into the facility by enabling members to gain access using a biometric fingerprint reader instead of swiping an access control card. The turnstiles help manage the flow of visitors and identify when a person does not have membership privileges to gain access. Membership enrolment information resides in C-CURE 9000, which serves as the central component of the overall access control system. Johnson Controls' integration arm served as the systems integrator on the project. Accurate accounting of membership status “With the old system,” said Dan Humbert, director of IT for the YMCA of Central Florida, “the only way to tell which family centre membership someone held was by the colour of the barcode. With the C-CURE 9000 system that’s all automated. We can now capture the information on where they can work out directly in the system.” A major benefit of the new access control system and membership program is that it provides more accurate accounting of membership status. The system can flag out-of-date memberships, so when a person is denied access can be directed to the desk where they can pay on-site and be reinstated.