Visitor management systems
HID Global, a provider of trusted identity solutions, will showcase its latest physical access control and secure identity solutions at IFSEC London in Hall 7, stand IF 2130, June 18-20. For the first time in the UK, HID Global will present its recently launched biometric fingerprint reader for secure access control, and a new, game-changing augmented reality tool. The company will also highlight new integrations using HID’s cloud-based card issuance for streamlined enterprise deployments...
PAC & GDX, providers of access control and door entry solutions, are showcasing the range and depth of their innovative technology on Stand IF2930 at IFSEC International 2019. From a single door installation to a fully integrated network based system, the company’s extensive portfolio provides unbeatable reliability and robust functionality, at a price point that enables installation in a diverse range of residential and commercial buildings. In order to provide integrators and end us...
Videx, a manufacturer and supplier in access control and door entry kits, has added new features and functionality to its GSMPRO intercom system that provides users with much greater freedom and security. The GSMPRO, which is now expandable to an eight-door access control system, enables people to answer calls to their front door or gate from their mobile phone or landline, so they never have to miss that important visitor and are made aware of who has visited even when they are not there. The...
AMG, the ISO 9001:2015 approved UK manufacturer and provider of environmentally robust fibre, analogue, IP/ethernet, wireless & hybrid communication transmission solutions, is inviting visitors to IFSEC 2019 to see their latest range of transmission technologies, at stand number IF131. To be found on AMG partner stand, ICAD, who provide world-class technology services for facilities, AMG will be exhibiting models representing their latest industrial switches with up to 90W PoE capability an...
Advancis is a pioneer in the PSIM industry and helps protect critical infrastructure and high security sites around the globe with its leading-edge control room solution. This year at IFSEC, Southwest Microwave and TKH Security will be exhibiting in partnership with Advancis on its stand as part of the Advancis community of technology partners. For security system buyers and decision makers IFSEC International in London is an important event in the calendar with over 27,000 international visito...
Facial recognition has seen huge breakthroughs since the U.S. National Institute of Standards and Technology (NIST) first began testing in 2010. Accuracy has seen massive gains, especially from 2013-2018. In the 2018 test, the most accurate algorithm was 20 times more accurate than the 2013 equivalent. Essentially, 95 percent of the matches that failed in 2013 now yield correct results. Compare that to 2010-2013, when the most accurate algorithm reduced its error rate by 30 percent. This reduc...
As the track cools from the Indy 500, the director of security for Indianapolis Motor Speedway events will speak as part of a panel at the Closing Keynote Luncheon at ESX on June 6 in Indianapolis. In this session, three carefully selected panellists will discuss ways to implement better strategies that help reduce violent crimes against employees, students, visitors and customers. To most effectively explore possible solutions, ESX will include panellists from diverse backgrounds who have handled security issues with unique requirements in many locations. Creating security platforms Ted Fries, Director of Safety & Security for Hulman Motorsports, is responsible for oversight of security and safety at Indianapolis Motor Speedway events. Fries will speak from his expertise as a 29-year veteran of the Indianapolis Metropolitan Police Department and overseer of security for one of the biggest racing events in the world. Mindy Pretzman will take the stage to bring her perspective as a command and control supervisor Mindy Pretzman, Assistant to the Special Agent in Charge of the United States Secret Service, will take the stage to bring her perspective as a command and control supervisor over the White House Complex. Her previous accomplishments include leading the transition of security operations between administrations and creating security platforms for First Lady Melania Trump. Security professionals Louis Dekmar, LaGrange Police Department Chief of Police, will bring his insight as a 41-year veteran of law enforcement in Georgia. Dekmar has served as Chief of Police for more than 26 years, and is Past-President of the International Association of Chiefs of Police and Past President and Chair of the Commission on Accreditation for Law Enforcement Agencies. These accomplished security professionals will take the stage on Thursday, June 6 for the Closing Keynote Luncheon. Attendees will enjoy a catered meal as they finish the week in Indy with this engaging discussion. During the luncheon, the Electronic Security Association will award the ESA Youth Scholarship to the college-bound child of a first responder. The Monitoring Association will present the Public Sector Award. The Security Industry Alarm Coalition will present the Police Dispatch Quality Award.
After the Innovation Summits in Athens and Langmeil and the company’s attendance at the ISC West in Las Vegas, where MOBOTIX presented the latest research and R&D successes and trends to customers and partners, ‘Spring Splash’ marks the market launch of the latest innovations. MOBOTIX is demonstrating the company’s innovative strength to both its partners and customers. “We want to exploit the potential of MOBOTIX technology and DNA and focus on quality from Germany and cybersecurity,” said MOBOTIX CEO Thomas Lausten at the various launches. MOBOTIX also sees good opportunities and growth potential for video surveillance outside the traditional security sector: “We focus our research and development activities on continuously opening up new markets for MOBOTIX – whether in production monitoring, customer behaviour in retail stores, in the health care sector or in logistics – in close co-operation with our technology partners,” explains Lausten. ONVIF-compliant MxManagementCenter The Spring Splash event sees the launch of version 2.1 of the MxManagementCenter, which is ONVIF-compliantMOBOTIX works on regularly optimising and expanding its range of products and solutions in order to develop market-driven and future-oriented innovations and to ensure the greatest possible cybersecurity for these innovations in Langmeil, Germany. Together with the R&D colleagues of the technology partners, such as Konica Minolta, new solutions for vertical markets were developed and brought to marketability: The Spring Splash event sees the launch of version 2.1 of the MxManagementCenter, which is ONVIF-compliant like all MOBOTIX IoT and MOVE camera models. This means it complies with the worldwide open standard for IP-based security products. MOBOTIX offers its customers a simple and scalable total solution for video-supported search for a variety of applications with its new Smart Data license, regardless of the industry. Real-time secure transmission of data The MOBOTIX Smart Data solution enables the combination of almost any multi-layered data source, such as cash register or car license plate detection systems, using the video data from MOBOTIX IoT cameras. All data can be securely encrypted and transmitted in real time, and the results can be analysed onsite or via an Internet connection from any MxMC workstation worldwide. “Our Smart Data solution is a valuable tool, especially for our solution and technology partners, for integrating their technological developments into our MxManagementCenter,” continues Lausten. MxBell 2.1, the MOBOTIX app, is the mobile remote station for MOBOTIX IP video Door Stations and IoT cameras There will be a firmware release going online for the MxThinClient, which will enable an IP video interface to display live images from all MOBOTIX IoT and MOVE camera models and Door Stations on a monitor/TV set. Both the stability and access security of the MOBOTIX system are increased thanks to the option of direct displaying camera images without the need for operating software or even a PC workstation. MxBell 2.1 app for IP video Door Stations MxBell 2.1, the MOBOTIX app, is the mobile remote station for MOBOTIX IP video Door Stations and IoT cameras. The app’s interface underwent a facelift to improve user-friendliness and now sends push notifications for all Door Stations and camera events. Especially valuable for the user is the visitor and event documentation, which makes it possible to track events quickly and easily at any time and from anywhere. The system release Mx-V188.8.131.52 for all Mx6 x16/x26 cameras reduces bandwidth and storage requirements by 25% thanks to 3D noise reduction, among other things. In addition to data security, data economy is indispensable in the world of the IoT and is therefore of utmost importance for MOBOTIX in the interests of its customers.
Limitless Security, a provider of security solutions for the housebuilding and construction industries, has launched the VIDAR detector. This standalone, wire-free security system combines motion detection with integrated image verification to help reduce the cost of break-ins, theft and vandalism. VIDAR is a key part of Limitless Security’s new fixed cost, fully managed service which takes away the headaches and hassles involved in installing, managing and maintaining security equipment on building sites. According to Adam Lees, Managing Director of Limitless Security: “Developed as a result of more than 30 years’ experience, VIDAR is an integrated, technology-led security solution that detects intruders and captures images for visual verification around the clock. It provides building sites with unparalleled flexibility in terms of deployment as it does not need to be connected to an external power supply, control panel, telephone line or internet service.” Clear images of intruders during day/night VIDAR works in colour during the day and black & white at night using four high powered infrared spotlightsVIDAR uses a high-quality CMOS camera with automatic exposure, colour encoding and focus to capture images that clearly show when intruders are onsite. It works in colour during the day and black & white at night using four high powered infrared spotlights. Operating in conjunction with a PIR that uses a highly directional Fresnel lens, VIDAR has a day/night range of up to 30 metres – over double the distance of other market-leading solutions. When the PIR sensor detects motion, VIDAR’s embedded SIM automatically transmits images to a Monitoring Centre for visual verification before an agreed response plan is implemented. Limitless Security installs VIDAR after completing a risk assessment and configures the units to auto-arm and disarm at times and days required by individual sites. Unique SmartArm technology is used to scan target locations for any activity at pre-set arming times. VIDAR will only arm itself when no movement has been detected for a continuous period configurable from 15-60 minutes to minimise false alarms and unnecessary call-outs. It can also be used in ‘Gate’ mode to monitor the routine entry and exit of people and vehicles at building sites. SIA-licensed security guarding service Our managed solution includes detection, monitoring and response using a SIA-licensed security guarding service" “Our managed solution includes detection, monitoring and response using a SIA-licensed security guarding service. It covers everything from risk assessment, the supply, installation and management of all equipment and site security signage through to documentation of any events for evidential purposes and the provision of information to responding agencies,” continued Lees. “Importantly, we are focussed on providing a complete security solution for a single, fixed monthly cost to make budgeting easier and eliminate any unexpected additional charges.” VIDAR is IP65 rated with dimensions of 240mm (h) x 120mm (w) x 60mm (d). Each unit weighs 0.62Kg excluding batteries.
Fermax is delighted to announce that following the success of its stand at ELEX, Alexander Palace and Elex Manchester in March, it will be present at ELEX Professional Electrician shows throughout 2019. With over 20 years of providing Door Entry and Access Control solutions to the electrical sector in the UK, ELEX provides the perfect venue for Fermax to showcase its latest developments designed for the Electrical Sector including the DUOX 2 Wire Kit range and the WAY-Fi Door Entry kit, which allows for mobile phone connectivity with the Door Entry System. WAY-FI, a Plug&Play Door Entry Kit ELEX 2019 Forthcoming venues include: Harrogate - YEC Centre, 23rd & 24th May Coventry - Ricoh Stadium, 19th & 20th September Surrey - Sandown Park, 7th & 8th of November Unlike many DIY solutions launched in the mass market the Fermax WAY-FI kit is designed for the professional installer. Feature rich with a stylish flat screen, touch capacitive monitor the WAY-FI kit enables residents to control door access through their mobile phone as well as viewing images of previous visitors. The kit provides the complete solution with all essential components in a box: Panel, Monitor and Power Supply Unit. DUOX 2 wires system for a cost-effective upgrade The DUOX 2 Wire system range is the ideal solution for new installations or retrofit projects. Compatible with most types of cable including old intruder or BT cable the system only requires 2 cores to function, enabling quick cost-effective upgrade of old systems without the high cost of re-cabling. Able to cope with long cable runs well beyond the typical limits of 100 to 150 metres, 2 wire DUOX is also excellent for barrier and gate applications.
Audio over IP pioneer Barix is highly regarded for the reliability, flexibility and cost-effectiveness of its IP-based paging and intercom solutions. Building on this rich history, the company announced Paging Cloud, an innovative software-as-a-service (SaaS) solution that brings paging into the smartphone-enabled mobile era. Integrating easily with almost all existing paging and public address systems, Paging Cloud records paging messages and sends them directly to registered smartphones, enabling visitors in environments such as schools, museums and airports to hear announcements or emergency information on their own mobile devices. Barix will debut Paging Cloud in booth 5457 at the upcoming InfoComm 2019 exhibition in Orlando, Florida, taking place June 12-14. Delivering emergency alerts Paging Cloud is ideal for delivering emergency alerts and event updates to visitors in public spacesPaging Cloud customers can page directly to mobile phones through their existing in-venue paging solutions, enabling them to reliably reach people who might not clearly hear the announcements over the facility’s public address (PA) system. Paging Cloud is ideal for delivering emergency alerts and event updates to visitors in public spaces; school students and teachers wherever they are on campus; and even volunteer firefighters at their homes. It also provides an easy solution for delivering less-critical pages such as conference session start time reminders or informing parents at home of school schedule updates caused by weather. Pages as voice recordings on smartphones “Particularly in emergency situations, it is critical to make sure that everyone gets the message, but background noise or gaps in speaker coverage can cause people to miss PA announcements,” said Reto Brader, CEO, Barix. “By extending the paging to mobile phones, all subscribed end-users will receive all pages made by local staff as voice recordings on their smartphone wherever they are, and can listen to them as many times as necessary to understand the information. For example, no matter where a visitor is within a sprawling zoo, you can reach him or her with an alert about an escaped animal and instruct them to proceed to the nearest exit.” Paging Cloud is a complete solution consisting of a hardware device for receiving and sending pages; a pay-for-use cloud service for receipt confirmation logging, system monitoring, and subscriber and device management; and free end-user mobile apps for Android and iOS devices. Simple integration with paging and PA solutions Paging Cloud works seamlessly with both Barix’s and other vendors’ paging and PA solutionsIntegration with existing paging and public address solutions is as simple as connecting audio from the current system to the analogue input of the Paging Cloud hardware, allowing customers to extend their pages to mobile phones without changing their workflows, retraining their staff or replacing their equipment. Paging Cloud works seamlessly with both Barix’s and other vendors’ paging and PA solutions. Ideal for visitor notification, Paging Cloud makes it easy to reach variable recipient groups. An unlimited number of end-users can download the Paging Cloud app from their device’s application store or via QR code, then self-subscribe to the venue’s paging system using another QR code. Operation without the app is also possible using SMS to distribute paging messages. “Paging Cloud is simple to use for both administrators and recipients,” said Brader. “Combined with its ease of integration and affordability, any venue can ensure its visitors never miss an announcement again.”
Matrix, a manufacturer and provider of Telecom and Security Solutions, to showcase its solutions at Indelex Smart Home Expo in collaboration with PowerTech Electronics. Matrix will be showcasing an enterprise-grade IP video surveillance solution designed, engineered and built specifically for growing multi-location organisations. The entire solution focuses on automating processes, easy integration with access control and enhancing efficiency of organisations. They will also be showcasing a range of audio compatible and compact Professional and Project Series IP cameras powered by SONY STARVIS series sensors with Exmor technology. This gives the cameras an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimisation and many other features. We will also be showcasing our PTZ Cameras for 360° security. Showcasing Extreme series of NVRs These latest NVRs are backed with an intelligent software that helps detect threats and send instant notificationsFurthermore, they will be displaying their new Extreme series of Network Video Recorder (NVRX) at the event. This NVR is equipped with 4K decoding capacity and characteristics like Cascading (up to 20 NVRs), Camera-wise Recording Retention and Database Level Integration. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for real-time security. In the event, Matrix will showcase futuristic technologies from the security domain. Matrix Access Control and Time-Attendance domain will showcase its newly launched Face Recognition technology for authentication through IP Cameras/Tablet/Mobile. The technology enables contactless authentication with precise and accurate authentication. Apart from this, they will display their high-end cloud-based Time-Attendance and Access Control solution. Mobile based access control solution Mobile being the next generation technology in the security domain, they will showcase mobile based access control solution whereby user can either scan QR code or just twist his/her phone for authentication. User can mark attendance automatically using GPS or Wi-Fi through mobile application. Thus, Matrix being the front face in innovation, they are going to show some extraordinary biometric door controllers useful for applications in Time-Attendance, Access Control, Visitor Management, Cafeteria Management and many more. Furthermore, access control being the prime requirement in terms of security, Matrix will present its Standalone Access Control solution with License Free Environment, whereby a single panel can handle up to 255 doors and 25,000 users. Get a glimpse into the cutting-edge Matrix biometric solutions with multiple credentials such as face, fingerprint, palm vein, RF card and PIN options. Unified Communication Platform Matrix will highlight ETERNITY NENX, their newly launched Unified Communication Platform for SOHO and SMBAt the event, Matrix will highlight ETERNITY NENX, their newly launched Unified Communication Platform for SOHO and SMB. Increasing number of small and medium organisations are migrating to leverage benefits of IP. For such applications, Matrix ETERNITY NENX is a perfect fit. Matrix Telecom domain will also be showcasing its comprehensive telecom solutions which includes IP-PBX, Communication Endpoints, Media Gateways, Mobile Application and much more. Along with that, Matrix Hospitality solution, which is specifically designed to enhance guest experience at hotels, will also be one of the major highlights. Hotel staff can enhance guest experience and improve staff productivity with hospitality features, front desk, PMS integration, staff mobility extensions and voicemail with personalised greetings. “With a portfolio of innovative Security and Telecom products, Matrix can cater a wide spectrum of industries. We are looking forward to meeting our existing and prospect end customers at Indelex Smart Home Expo,” said Jatin Desai, Marketing Manager.
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security industry experts The Partner Alliance for Safer Schools (PASS) is one of the organisations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organisations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritise Safe school environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organisations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts Some of these organisations recognise their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilise, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack of consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings.A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right protection equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive security plan Quantifying and mitigating risk are the jobs of security professionals and school administrators A risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay adversarial behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorised visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security (Figure 1) . It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety and security components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2 Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.
Surveillance systems can track the locations of mobile phone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travellers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when travelling. When travelling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats. To elaborate on expert security tips, strategies and advice for traveling this summer, we presented several questions to The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy. Chris Duvall, Senior Director at The Chertoff Group, offers insights into cybersecurity concerns, physical security precautions, and recommends digital resources/apps for consumers while traveling. Q: How are security risks – physical and digital – changing? Why are threats greater today than five years ago? The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing Duvall: The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing. The scope, severity and complexity of physical and cyber risks are increasing and becoming more dangerous and destructive. This is especially true for those travelling outside the U.S. On the physical side, threat actors are actively seeking “soft targets” – public events, social settings, mass audience venues, etc. – to communicate their message, sow chaos and inflict catastrophic harm. On the digital or cyber side, we have seen a shift from “thrill hacking,” to an increase of “hacking as a business” (through credential compromise and ransomware), to an increase in “hacking for harm” - with the rise of “nuke ware” and ransomware without a clear financial motivation. Q. What specific precautions should a traveller take to protect their calls, texts and data streams from being spied on? Duvall: When travelling abroad, we recommend to our clients that their personnel and executives should practice good internet and social media hygiene. Some best practices include: Avoid using public Wi-Fi services—unless you use private VPN service for encryption Increase the privacy setting on your technical devices Disable location identifiers on apps Create a new (unlinked) email for internet correspondence Consider purchasing international MyFi devices to decrease the risk of getting your personal identification information (PII) or protected healthcare information (PHI) stolen Use temporary (i.e. burner) phones to protect your data and your contacts Q. What cybersecurity concerns are likely to impact travellers? Are the threats greater outside the United States or in any specific parts of the world? Significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs Duvall: The international cybersecurity landscape has grown increasingly dynamic, with threats posed by government authorities (in some countries), terrorists, insurgents, and criminals, requiring travelers to be proactive and vigilant. U.S. citizens, particularly executives of U.S.-based technology companies, must be aware that they are considered high-value targets for nation-state intelligence services and criminally-motivated bad actors. Many countries will go to great lengths and expense to acquire and exploit proprietary information from U.S.-based companies, and views U.S. executives visiting the country as “soft” targets of opportunity. As such, significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs. The tactics, techniques and procedures (TTPs) utilised by bad actors are often covert and nearly undetectable by the affected person. Threat actors routinely access, monitor and utilise Wi-Fi networks at hotels and in public spaces to compromise target devices. Other targeting methods include luggage searches, extensive questioning, and unnecessary inspection and downloading of information from personal electronic devices. There are numerous, high-risk countries for which the U.S. Government warns travellers to be wary of mobile malware, mobile device privacy attacks and hot spots for mobile botnets. The U.S. Department of State has the most recent and up-to-date list. For example, the U.S. Government has investigated numerous incidents in which U.S. travellers’ PEDs (personal and company devices) have been compromised by Russian authorities while transiting Russian airports, left unattended in public spaces and in travellers’ hotel rooms. When travelling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws Q: What physical security precautions should a traveller take? Duvall: Here are some useful precautions: When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws. Protect your personal information and travel itinerary as much as possible. Limit the amount of jewelry worn, cash, credit cards and electronic devices carried while traveling. Avoid staying on the ground floor of a hotel. Consider choosing a room on the 2nd through 7th floors as these rooms may be more difficult to break into than those on the ground level, but still able to be accessed by fire/emergency response equipment. Never answer your hotel room door for anyone until you’ve determined who they are, why they are at your door, and if it is necessary for you to open the door to interact with them. Carry a rubber door stop/wedge with you to install on the room side of the door before you go to bed. Vary your patterns and routines when venturing out in to a new location, do not become predictable. Politely decline offers of food or drink from strangers (If you do accept beverages, ensure that they are in sealed containers and that there is no evidence of tampering). Never discuss your itinerary, personal, business or other sensitive information where others can hear you. Q: How can companies be proactive in protecting their business travellers? Companies should educate their employees on the importance of maintaining good internet hygiene while travelling abroad Duvall: When travelling on business, companies should provide their employees with clean computers and cell phones before departure. Upon return, the company should immediately wipe the computer clean to prevent any malicious threats from penetrating the company’s internal, cyber-infrastructure. Additionally, companies should educate their employees on the importance of maintaining good internet hygiene and recommend their employees disconnect from social media platforms while travelling abroad. Some general tips to recommend to your employees when travelling abroad include: Register in the Smart Traveler Enrollment Program (https://step.state.gov/step/) Visit Travel.State.Gov to view travel related information specific to the country or countries you’re visiting, including local US Embassy or Consulate contact information, as well as current travel advisories and alerts. Always leave a copy of your transportation and hotel itinerary and driver’s license (or passport if travelling internationally) with a family member or trusted friend. Always use a baggage tag with a protective cover Avoid using public Wi-Fi services Q: What digital resources and/or apps might a traveller benefit from (and how)? Duvall: The Chertoff Group recommends researching the below travel-related apps before departing on a trip: TravWell: This app provides destination-specific vaccine recommendations, a checklist of what you need to do to prepare for travel, and a customisable healthy travel packing list. The app can store travel documents, keep records of medications and immunisations, and set reminders to get vaccine booster doses or take medicines. My TSA: This app provides real-time updates on airport delays. It includes how long security lines are at various airports; information about what you can and cannot bring onto an airplane; and a frequently-asked question list, including new advanced imaging technology. Border Wait Time: The app provides estimated wait times and open-lane status at land ports of entry, which may be particularly helpful when in an area with multiple crossings. Mobile Pass: The Mobile Passport app speeds you through U.S. Customs and Border Protection at (1) cruise port and (24) airports Q: As a security expert, what’s your best advice for travellers? Duvall: At the end of the day, travel security is not rocket science. Simply put, travellers need to: Be aware and situationally alert at all times. Be aware and situationally alert to the location of your luggage and carry-ons at all times. Don’t access unknown, unsecured or public Wi-Fi if at all possible. Turn off “auto connect” features and institute stringent privacy controls as much as possible. Try to “blend in” – you don’t have to try to look like a local but travellers should avoid gaudy and expensive attire wherever possible. Use your common sense – if an offer, invitation or opportunity seems to good to be true... it probably is.
Today’s security professionals are tasked with protecting the entirety of a facility or campus from every possible threat. It’s a big task, given the range of solutions available; from cybersecurity to prevent hacking, to video surveillance to monitor the goings-on within the facility, to the physical security of the building itself. For most businesses and schools, keeping the entrances and exits to a building secure is an extremely high priority—when an individual cannot get into the building they will have a harder time causing trouble for those within it. With quantum leaps happening in security technology, architectural revolving doors may not always be top-of-mind when designing a new security system from scratch. However, with recent technological advances in the last decade, and considering that they occupy less floor space and are extremely good at reducing unwanted air infiltration into an interior, it is definitely time to examine how they can participate in a complete physical security plan as well. A well-known financial company in the Midwest of America was the target of a protest, against their financing of a controversial initiative Restricted access for business continuity The exterior door to a building or premises, often a public entrance during business hours, is typically the first line of defence against unwanted persons or activity making its way into an organisation. If lobby or security staff sense trouble outside (distress, fights, weapons, protests, etc.), they need a quick and effective way to block anyone from entering the building and creating danger for those inside. Should this type of incident make its way into a building, it creates a number of risks, including the expenditure of unnecessary resources, loss of productivity, violence, and liability for the business. For example, recently a well-known financial company in the Midwest was the target of a protest against their financing of a controversial initiative. A large crowd gathered outside on the street, pushed inside the building, and took over the interior lobby. The protesters not only disrupted the retail banking business at the lobby level, but also attempted to block employees from going to work on the upper floors. The protest lasted hours, making it difficult to do business, and was stressful for employees. In addition, the news cycle around the protest created an image problem for upper management and the overall brand. Revolving doors for access control Thanks to technology employing electricity, today’s manual revolving doors can potentially save lives Beyond the immediate risks of theft and violence, crime has numerous intangible effects on employees, residents or students that can have a more profound and lasting impact. These include physical pain and suffering, along with a feeling of anxiety, stress, and uncertainty around future security. According to a survey conducted by Workplace Options in 2015, 53% of American workers have experienced a traumatic event while at work—with workplace violence or criminal activity listed as one of the top four events that cause trauma. Revolving doors can be a reliable solution for providing this necessary security. They are often deployed in buildings where public use is needed during the day, but controlled access is required in the evening—for example, banks, museums, commercial buildings, condominiums, libraries, dorms, recreational centres, and more. Thanks to technology employing electricity, today’s manual revolving doors are more capable than ever before and can potentially save lives or buy the time necessary to alert security staff or notify law enforcement to deal with a dangerous situation in time to prevent harm, stress, or liability. Secure access can be made possible via an access control device mounted on the outside of the door Enhanced security with electronic lock control The following security features are now available for manual revolving doors being deployed in buildings right now: Emergency security lockdown: Facility or reception staff can electronically lock the door in place, regardless of position, at the push of a remotely located button. In the event of an immediate security threat outside the entrance (weapons, protests, drunk and disorderly conduct, etc.), access to a lobby or entrance can be instantly denied, and those within protected. Remote locking: In an earlier time, the manual pushing of a pin was required to lock a revolving door’s wing into the ceiling or the floor. Today, you can lock a manual revolving door by using a remote pushbutton, or, an access control system can lock the door automatically at a specific time of day. If anyone is still in transit during the lock command, the door will allow them to exit before locking. Once the door is locked, staff can easily unlock it with the same remote mechanism if there is an authorised visitor. Access control integration: Integration with access control systems gives manual revolving doors even more capabilities. Secure access can be made possible via an access control device such as a keycard reader, mounted on the outside of the door. Upon valid authorisation, the door will unlock and the user can push to enter the facility. Once all compartments are clear, the door finishes rotating by positioning its door wings at the end posts of the throat opening and relocks. If tailgating is a concern, your revolving doors should be the first of several layers of physical security Efficient incident management Consider the usage of these features for a building such as a downtown high-rise condominium. During the day or night, residents can enter by showing credentials outside the door to the access control system. Any deliveries would have to stand outside, ring the doorbell and wait for reception to unlock the door and let them in. If anything threatening occurs during rotation, reception staff can immediately lock the doors to keep trouble out and call for help. At a high-rise office building, it can work differently. The door can be unlocked during the day for public entry with guards keeping a watchful eye outside, ready to lock the doors instantly if trouble happens outside. The access control system can lock the doors at 5pm until 7am the next morning, requiring employees or cleaning crew to present their credentials to enter. Access control integration It should be noted that standard revolving doors are not equipped to detect or prevent tailgating (an unauthorised person following an authorised person through an entrance). They should not be confused with a security revolving door, which is intended for individuals trained to use these doors at employee-only entrances. With this in mind, consider that with access control integration, a standard revolving door will unlock when presented with an authorised credential, but will continue to rotate as long as anyone is inside the door to prevent entrapment. Tailgating is still a possibility with these entrances, so if this is a concern, your revolving doors should be the first of several layers of physical security including, potentially, additional turnstiles, guard staff, surveillance cameras, additional locking mechanisms for restricted areas, and so on. Ensuring compliance with code requirements To keep building interiors safe, standard revolving doors can be a simple, cost-effective and easy to implement Finally, modern code requirements for revolving doors are defined by a number of different agencies—ANSI, IBC, and NFPA. All require that a revolving door’s wings be able to collapse or ‘book fold’ to create a path of escape during a fire, and that a swinging or sliding door must be present within 10 feet of any revolving door, on the same building plane. To make sure this additional door isn’t a security weak point, the extra sliding or swinging door can be ‘exit only’, or locked to those trying to enter from outside the building, but unlocked to those trying to exit from inside the building. To keep building interiors safe, standard revolving doors can be a simple, cost-effective and easy to implement solution that helps prevent unwanted entry by those looking to do harm and create unwanted liability. Considering revolving doors can be a first step into securing the entrances and exits of your building, and protecting everyone and everything within.
Attendance has been growing steadily year-over-year for ISC West, and the 2018 show exceeded 30,000 total industry visitors for the first time. So it’s safe to expect ISC West 2019, April 10-12 at the Sands Expo in Las Vegas, will be bigger than ever. Preregistration for the 2019 show is on track to bring even more visitors than last year. “This is a show for everyone, for converged security,” says Mary Beth Shaughnessy, Event Director for Reed Exhibitions. “We bring a lot of different verticals together with IT and network security, physical security and robots and drones. It’s one-stop shopping and the number one security show in North America.” Identifying buying influencers The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show. The ISC West Executive’s Club is a ‘top buyer program’ created to welcome high-level buying influencers who have current projects in the pipeline. The program works throughout the year, networking, researching and identifying buying influencers among end users, integrators, dealers/installers and consultants who are working on current projects. Approximately 1,300 attendees are participating in the program this year. An Executive’s Club member might be an integrator working with several large projects or represent a school system that is building a new campus or retrofitting their systems. During the trade show, these guests get the VIP treatment with a variety of benefits, including a lounge, cocktail receptions, and continental breakfasts. Personalised matchmaking programs ISC West also provides personalised matchmaking programs to bring together these buyers with companies that can meet their needs. The Executive Club members are also led on guided exhibit hall tours, based on product interest, that highlight new and innovative solutions. The program also contributes to ISC West’s goal to grow its end user audience. In this case, it is a group of eager buyers with immediate needs. Another growing aspect of ISC West is its role shaping exhibiting companies’ technology roadmaps, in particular the timing of new product releases. Many new products and technologies are announced at ISC West, and attendees are conditioned to attend the show to see what’s new in the marketplace. “Vendors try and work to get whatever solutions they are promoting together in time for ISC West,” says Shaughnessy. “Vendors know that attendees have fresh budgets and new initiatives early in the year.” Network security products ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11 ISC West showcases the latest products, services, and technology including access control, video surveillance, disaster recovery, IT security products, network security products, wireless security products, and thousands more helping ensure safety by giving attendees the right tools and defenses to protect against security risks. In addition to the exhibition, ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11. SIA Education@ISC will kick off the day before the start of the exhibition. The comprehensive program includes 85+ accredited sessions covering a range of industry topics aimed at providing the critical knowledge attendees need to protect and defend against developing threats in today's security landscape.
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no searching in a bag or purse for the card). And there’s no personal identification number (PIN) code to remember; no “intrusive” biometric element that can concern some users. James Segil, President and Co-Founder of Openpath, says the simplified process “uses fewer thought cycles.” Reliability of the system comes from Openpath’s SurePath triple-connect technology “We wanted to make mobile access control that people want to use and can use safely and with ease,” he says. “We wanted to make using a smart phone for access control easier and more reliable than using a keycard.” Simplified user operation In the simplified scenario, the mobile credential resides on a smart phone that can remain tucked away in the user’s purse or pocket. The credential remains active without the user needing to open an app. The wave of the hand signals intent, which causes the button to light up, activate and the door is ready to open. Segil says the simplicity of operation has contributed to the system seeing an unheard-of 94% adoption rate among users. Reliability of the system comes from Openpath’s SurePath triple-connect technology. The smart phone credential is delivered using Bluetooth, WiFi or LTE (cellular) – whichever signal reaches the reader first enables the door to be opened. So even if a company’s WiFi is down or Bluetooth proves unreliable, there is still a third option. Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems Seamless cloud integration Segil is a serial entrepreneur who has had experiences as a frustrated user, dealing with many different offices, people and access control deployments over the years – subletting office space, changing PIN codes, dealing with 10 different offices using 10 different cards. Based on that experience, Openpath’s founders saw a need for a more user-centric approach to access control, and a chance to improve the office experience to be more aligned with employees’ experiences in their smart homes. Segil says he also saw “significant lethargy” among incumbent players in the access control space, and a market in which mobile and cloud technologies had still not taken hold. In addition to a simplified user experience built around mobile credentialing, Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems. The “elegant” readers, including a flush-mounted version, fit in well with high-end office environments. The company launched in May 2018. Openpath has been signing up national and regional channel partners all across the U.S. Openpath is focused on the commercial real estate market, where they have already seen significant adoptions, especially among mid-sized companies. Larger deployments as part of new construction are in the pipeline. National system integration In the past six months since its launch, Openpath has been signing up national and regional channel partners all across the U.S. and now has a nationwide footprint and is able to service customers all over the U.S. They are not yet disclosing any specifics about the number of partners they have signed up and who they are. “I can share that we have a number of large national system integration and security brands on board as channel partners and many more regional and local system integrators,” says Segil. They are looking for additional integrator partners. “There is a cohort of folks out there who say ‘I get it,’ and I want to offer it to my customers,” says Segil. The cloud element of the system can provide recurring monthly revenue (RMR). Openpath’s system offers flexibility in terms of meeting each customer’s security needs. In addition to the “super convenient” scenario described above, the system can also be configured to be “super secure,” using two-factor authentication and other measures, says Segil. There are multiple “flavors” between the two extremes. It can also be integrated with elevators to enable the buttons on allowed floors. Integration with existing systems Cloud software simplifies operation for both tenants and landlords. The system is backwards-compatible to existing systems and can be used to retrofit and mobile-enable a legacy system, providing the benefits of mobile features and cloud operation to multiple sites. The software can interface with enterprise applications such as Active Directory, and an application programming interface (API) facilitates integration with other systems and building components. It operates with marketing automation platforms such as Flack and visitor management systems such as Envoy. The system is backwards-compatible, providing the benefits of mobile features and cloud operation to multiple sites Open standards make the system easy to install in new or existing buildings using RS485, or Cat 5 or Cat 6 wiring, whatever is in place. Retrofit installations can use existing panels, servers, software, etc., or they can be replaced. The Openpath panel is installed right next to an existing panel in a retrofit and preserves all legacy integrations of the previous system. Access credentials compatibility In its simplest configuration, the Openpath system consists of single or four-door panels wired using standard ports, Wiegand ports and REX ports, each connected to software in the cloud. Each panel works offline if the internet connection is down. Various key fobs, cards and other credentials are available in addition to mobile credentials. Openpath was one of the new exhibitors at last fall’s GSX show in Las Vegas, occupying a large-sized booth for a startup company. The “beautiful” hardware drew a lot of attention, says Segil. “The channel loves us, and we signed a lot of people,” he adds. “We were excited by the response.”
ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., is the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. Here’s a quick rundown of integrator companies acquired by ADT: Protec, a Pacific Northwest commercial integrator (Aug. 2017); MSE Security, the USA’s 27th largest commercial integrator (Sept 2017); Gaston Security, founded in 1994 as a video surveillance integration company and whose services have since expanded to include intrusion, access control, and perimeter protection (Oct. 2017); Aronson Security Group (ASG), which delivers risk and security program consultants and offers advanced integration services, consulting and design engineers and a National Program Management team (March 2018); Acme Security Systems, among the largest privately held security systems integrators in the Bay Area, focusing on electronic security systems, access control, video networks and more (March 2018); Access Security Integration, a regional systems integrator specialising in design, delivery, installation and servicing of electronic security systems including enterprise-level access control, video and visitor management solutions, perimeter security and security operation command centers (Aug. 2018); In addition to their moves in the commercial integrator space, ADT has also sought to expand their presence in cybersecurity with the following two acquisitions: Datashield, specialising in Managed Detection and Response Services (Nov 2017); Secure Designs, Inc., specialising in design, implementation, monitoring, and managing network defense systems, including firewall services and intrusion prevention, to protect small business networks from a diverse and challenging set of global cyber threats (Aug. 2018). ADT has acquired more than a half-dozen security system integration firms in the last year or so For additional insights into ADT’s game plan and the strategy behind these acquisitions, we presented the following questions to Chris BenVau, ADT’s Senior Vice President of Enterprise Solutions. Q: ADT has been actively acquiring regional integrators this year – more than a half a dozen to date. Please describe the history of how ADT came to embrace a strategy of acquiring regional integrators as a route to growth? ADT's acquisition of Red Hawk is set to close in December, and brings premiere fire and life/safety solutions BenVau: Our acquisition strategy started at Protection 1 when we embarked on our journey to build out our commercial and national account business and add enhanced integration capabilities to our portfolio. The merger of Protection 1 and ADT brought that foundation to ADT which up to that point was primarily a residentially and SMB-focused company. After the merger, we set out to identify and acquire additional regional integrators that would continue to build on that foundation and deliver enhanced technical solutions, advanced technologies and an expanded service, install and support footprint. Through our acquisitions we now operate two Network Operations Centers and three Centers of Excellence. We are also unique in the industry with the number and variety of certifications, like Cisco and Meraki, our engineers hold which ultimately allows us to offer Managed Security as a Service. They have also enhanced our operational capabilities. Q: What criteria do you use to evaluate whether an integrator is a good “fit” for ADT? BenVau: First and foremost, we look at the culture of the companies. The companies that we target for acquisition must be metrics- and customer service-driven. Secondly, we look at the leadership teams. ADT view their acquisitions more like mergers and take a patient approach to integrating them into their business We have been fortunate in the fact the leadership of the companies we acquired remain with us today in key management and executive positions helping to drive continued growth within their organisations. We also evaluate their current customer base, unique solutions and their ability to complement and enhance our portfolio with the goal of becoming a leading full-service, enterprise commercial provider. Our acquisitions have bolstered our network capabilities, brought enterprise risk management services, and a broader solution set in high-end video and access control solutions. Our most recent acquisition – Red Hawk, set to close in December – brings us premiere fire and life/safety solutions. Q: What changes are typically needed after an integrator is acquired in order to adapt it to the ADT corporate model? BenVau: We view our acquisitions more like mergers and take a patient approach to integrating them into ADT while taking into account their culture. We want to ensure that we find the right positions for their people, embrace the right messaging and put the right processes in place. We acquire these companies because they are the best in their respective businesses and geographies and bring their knowledge and experience in markets or with solutions that we may not have had previous access to. ADT can support clients with their own in-house technicians which helps to ensure a consistent security program Q: How can regional integrators benefit from the ADT brand? Have your newly acquired integrators realised additional growth? BenVau: The companies we have acquired, generally, have exceeded expectations and surpassed initial goals. ADT brings expanded opportunities for these companies as well with our national footprint. Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver. These integrators help to deliver on that. In the past, the regional players may have had to rely on sub-contractors to service their larger clients. With ADT, we can now support those clients with our own in-house technicians which helps to ensure a consistent security program across multiple locations.Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver" Q: Are additional integrator acquisitions planned this year and into 2019? How much is enough and when will it end (or slow down significantly)? BenVau: We expect to close on our latest acquisition, Red Hawk, before the end of 2018. Red Hawk brings a national footprint focused on fire/life safety and security to ADT. While ADT already had a robust security offering, Red Hawk will contribute significantly to the fire side of the business. In addition, we will continue to evaluate the companies in the industry to determine if additional acquisitions make sense. Q: Do you expect greater consolidation of the integrator channel in the industry as a whole? Why is this a good time for consolidation? Is it a good M&A market for buyers like ADT? BenVau: We will continue to evaluate companies in the industry to determine if further acquisitions make sense. As for the industry, we can only speak for ourselves. Our focus is on investing in our field organisation, in particular our service technicians, engineers and project management teams" Q: What other trend(s) do you see in the industry that will impact ADT (on the commercial side) in the next year or so, and how? BenVau: In addition to their moves in the commercial integrator space, ADT has also sought to expand their presence in cybersecurity Networking is a big one. As we continue to drive integration of devices and services, from AI, “the cloud,” machine learning and even analytics, there will be more focus on the network they ride on. A deeper knowledge of network design, bandwidth impact, and system integration will be critical. As part of our acquisition strategy, we focused on talent to add to the team and have been able to add to our bench strength in this area. Q: Any other comments/insights you wish to share about ADT’s strategy, future, and role in the larger physical security marketplace? BenVau: Our focus is on investing in our field organisation, in particular our service technicians, engineers and project management teams. The cornerstone of our success lies in our ability to deliver outstanding customer support and service. It starts with sales and the ability to deliver security and life safety technologies, but it ends with a delighted customer who partners with us to help secure the things that matter most to them. Our recent acquisitions have more than doubled our commercial field operations teams and are key to establishing the ADT Commercial brand as a leading full-service provider of enterprise solutions to the marketplace.
South Africa’s Athlone Campus is home to the Western Cape College of Nursing, a sprawling complex of lecture halls, administration blocks and four hostels that house around 2000 nursing students. Gallagher Command Centre was chosen as the most effective system to manage access to the hostels and keep the students safe. The nursing college had no method of limiting access to its hostels. People came and went as they liked, there was no record of who was on site and it was difficult to enforce visitor hours. Theft was a problem and reported cases of sexual assault had become a major concern. Access needed to be more secure. Access control system for authorised entry Biometric fingerprint readers were mounted on turnstiles at each of the hostel entrances and exits to manage general accessSafety and security are essential to providing a healthy living and learning environment for students. Athlone Campus partnered with local security solutions provider, FS Systems, to install access control and video surveillance in its hostels. Gallagher Command Centre was chosen to manage the access control system, monitoring access points and allowing only authorised students, staff and visitors to enter the hostel buildings. Biometric fingerprint readers were mounted on full-height turnstiles at each of the hostel entrances and exits to manage general access. Fingerprint readers prevent unauthorised entry from people using lost or loaned cards, and the anti-passback measures built into Command Centre means students can’t ‘pass in’ a visitor or bypass the system, as it recognises and records that someone has tried to enter twice. Integrated visitor management system Gallagher’s integrated visitor management system now monitors visitors and allows the college to control visiting hours. Visitors to the college hostels must register at reception and have their fingerprint captured by the visitor management system. They are then granted access to only the hostel they are visiting. In the evening, the system generates an alarm and reports on visitors still on site – allowing security to ask people to leave and prevent further visitors from entering. The general feeling from students and staff is that they are more secure" Jason Adams, Cost and Estimating Manager for FS Systems says, “The general feeling from students and staff is that they are more secure knowing that everyone entering the facility has gone through some sort of screening or registration process at the security office. The presence of physical security barriers (full-height turnstiles) is reassuring, in that not just any person can gain entry without the necessary authorisation.” Installation of video surveillance solution Alongside access control, the college installed a comprehensive video surveillance solution to reduce incidents of violence, vandalism and crime. The entire video management system is seamlessly integrated with Command Centre, creating one easily managed security solution to track student, staff and visitor movements and ensure that when an incident does occur, security staff are quickly informed and able to respond effectively. “It’s essential for the system to be user-friendly and easy to operate and manage,” says Jason. “The detailed maps that appear onscreen with Gallagher Command Centre clearly indicate the location of alarms and give security staff the ability to respond more quickly to emergencies.” Using Gallagher Command Centre, the nursing college now has a powerful and versatile security system that meets the unique needs of its site. Reduction in criminal activity The college has achieved significant cost savings through the prevention of vandalismThe system provides a reliable way to clearly capture data to monitor students, staff and visitors, lower criminal activity and improve onsite safety. In particular, security personnel can easily find the right information for quick incident resolution, which has led to improved processes, procedures and convictions when necessary. The college has also achieved significant cost savings through the prevention of vandalism and a significant reduction in reported cases of theft. The combination of the new access control system and an increase in physical security barriers means they have also been able to decrease the number of security guards patrolling the facility, reducing overhead costs. Customising and generating reports for college management is also a straightforward task, saving time and money. Most importantly, Gallagher’s security solution has given Western Cape College of Nursing control of who is on site and when – allowing its students to be safe, secure and focussed on learning.
Ports of Jersey operate the island’s busy harbours and airports, providing high-quality services and facilities to enrich the experiences and journeys of their customers, with Jersey Marinas offering 1,000 berths across three award-winning locations close to the vibrant waterfront at St Helier. At very busy times of the year, such as the annual Jersey Regatta, the sheer volume of visitor traffic arriving from both land and sea can present serious problems. With particular challenges arising from managing car parking, and the issuance of port entry digital keys for boats harbouring. Smart access control solution Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbour Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbour. The system needed to be intelligent enough to manage complex bookings for use by berth and mooring holders dropping off and loading gear onto boats, before parking elsewhere long-term. The existing solution was no longer cost effective, and was open to abuse by some users. In addition, Ports of Jersey also required an upgrade to the out of date Jersey Marinas security gate access control system. At peak times this system needed to be able to cope with rapid, high capacity issuance of smart cards to vessel owners and boat crews wishing to access the marina and marina hospitality faculties. Smart installation SALTO partner JMH Technology was asked to provide a new car park access control solution and resolve the looming problem of needing to issue 1,000 cards, at a cost of over £100,000. A replacement car park access control system was installed based on new technology smart cards and 2,000 cards issued. This project was highly cost-effective with installation and card issuance totalling less than just card issuance on the previous system. Future savings also assured thanks to a choice of more cost-effective cards. Abuse of short-term parking has been cut, and the experience for visitors is improved. JMH Technology is in the process of adding more reader-controlled doors To drive yet more efficiency and further reduce overheads the system has subsequently been updated at both St Helier and Albert Pier car park, with smart installation of the latest SALTO access control technology. The upgrade continues, and JMH Technology is in the process of adding more reader-controlled doors and smart handles across the facility. Security assessment A full security assessment was carried out at Jersey Marinas, and a decision taken to replace all of the expensive and temperamental mechanical code locks with a full online access control system. By engineering a bespoke solution that integrated a SALTO kiosk system with a touch screen unit interface, Jersey Marinas staff are now able to allocate more than 500 cards during the high-tide window. With extra capacity on tap when they need it to cope with high demand at peak times, and valuable cost savings made. The SALTO system provided is technically robust and cost-effective to expand. As a partitioned system Ports of Jersey now have a global overview, with each department able to see the section relevant to them. This enables micro management of cost savings across equipment and cards and allows staff to get permissioned access to all necessary parts of the Ports infrastructure without delay.
Responsible for the safety and security of a huge number of public facilities, including leisure centres, libraries and event spaces, local authorities are increasingly looking for ways to improve security, while also streamlining the security management process. With multiple requirements from a legislative, insurance and public safety perspective, local authorities need a simple and effective solution that provides flexibility through advanced technology. Security must be closely monitored and access restricted where necessary, while at the same time enabling easy access to public areas. Electronic key technology Advanced software suites can provide access to all operations performed by users Through innovative electronic key technology, local authorities can simply and cost-effectively replace existing mechanical locks, with a solution that provides integrated intelligence in the key, with permissions stored within it. If your key has authorisation for that lock, it will open. If you don’t, you won’t be allowed to enter and all of the activity carried out by your key will be recorded. With high volumes of people entering and exiting local authority facilities, it is important to be able to trace who has been where, when and for how long. Advanced software suites can provide access to all operations performed by users, including a complete audit trail. This information is often used by local authorities for audits, improvements or compliance. Utilising the latest contactless technology further enhances the electronic key solution, enabling multiple access options and deeper levels of access rights. Manage access operations The most innovative system is compatible with badges and cards, and the keys are equipped with a radio-frequency identification (RFID) module. Combining the solutions enables local authorities to manage access operations in great detail, with access rights granted depending on specific conditions. For example, the members of an orchestra may only be able to access the music conservatory, using their membership card or badge, if a music professor has already entered the premises using his electronic key. Permissions can be added or updated from a computer or, even more conveniently, using an app on a smartphone at any time, which will update your key's permissions via Bluetooth. This allows shortened validity periods, constrains movements to be in line with local authority access policies and removes travel and fixed authoriser costs. Public safety and security Saint-Avertin's access points are now managed by the new LOCKEN solution In turn, this delivers increased flexibility and higher levels of security. With public safety and security high on the government’s agenda, local authorities are increasingly required to adopt the most technologically advanced access control solutions and LOCKEN, the leader in cable free access control solutions is on hand to help with their solution based on advanced software LOCKEN Smart Access. Equipped with LOCKEN electronic cylinders since 2010, Saint-Avertin's access points are now managed by the new LOCKEN solution. More efficient and communicative, this makes it possible to adapt to even more varied types of access. Laurent Lacour, head of the municipal police, highlighted the benefits of this decision: “It is a very positive step for us. Firstly, because the new contactless key is much faster than the previous one. It is impressive and very important for our day-to-day work: as soon as the key is entered into the lock, the cylinder opens. It opens regardless of whether any dust or foreign bodies have built up." New-generation keys “Above all, the MyLocken app significantly enhances the system’s security by allowing rights to be allocated anywhere and at any time.” Christophe Fort, deputy head of the police, added: “The new-generation keys offer another vital advantage for our town. The system is compatible with the use of badges and the keys are equipped with an RFID module, which acts as a badge.” While an electronic key cannot be given to every member of a sports association, it is possible to give the members a badge. This means that, eventually, several thousand people will have access to the facilities while respecting the security of the premises as a whole. Access control solution Combining the solutions does not stop the management system from remaining perfectly effective" “Combining the solutions does not stop the management system from remaining perfectly effective. On the one hand, because the program manages access operations in great detail. And on the other, the badge reader specific to a building is only triggered if access to the site has previously been unlocked by an electronic key belonging to a manager. For example, the members of a swimming association will only be able to access the building if a swimming pool manager is already on the premises.” The future prospects mentioned by the two police officials - installation in a new gymnasium, fitting electronic padlocks to the mobile barriers around the château, etc.- demonstrate the extent to which the solution meets the municipality's needs across the board. Saint-Avertin, is a dynamic town with a population of 15,000, which forms part of the university town of Tours, twenty times larger. LOCKEN hopes to extend its access control solution to other areas of this historic city.
Evelina has had many different brands of door entry system, as is often the case with NHS Hospitals spread across the UK. Managers at Evelina wished to have a standardised system across the wards in order to improve operating efficiency and reduce maintenance costs. Upgrades needed to be quick problem free and cost-effective. Each independent ward utilises a self-contained door entry system to control security critical access to their busy nursing area. The Maternity Ward provides a good example of a security critical area that requires an intuitive and cost-effective system to control access with the ability of a ward receptionist to permit entry and exit via an audio-video communication link. User-friendly features Fermax Area Manager Andy Saxton worked closely with Evelina’s nominated installation company to ensure that the Fermax system design using DUOX and VEO met the hospital’s needs. Based on 2 wires with aesthetically pleasing profiles and user-friendly features and functionality the Fermax DUOX system with VEO video monitors was a perfect match for the hospitals requirements. Purely digital in nature, the DUOX 2 wire system functions perfectly using most types of cable which meant that it could be retro-fitted onto the existing system infrastructure, thereby avoiding the excessive costs of re-cabling. Equipped with the Photocaller function which allows for the time and date stamping of visitors, the Fermax DUOX VEO monitor delivered the ideal solution.
The client is a prestigious purpose-built skin, laser and cosmetic surgery clinic based in central Birmingham. In 2018, they relocated to a Georgian building following an expansion of the practice to welcome new professional associates and provide a greater range of patient services. Their upgraded and refurbished building includes a larger operating room with dedicated recovery areas, treatments rooms, consultation rooms and waiting areas. At this clinic, plastic, reconstructive and aesthetic experts carry out surgical and non-surgical procedures for the face and body as well as cosmetic dentistry, IV nutritional therapy and advanced spa treatments. IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham As well as a team of renowned doctors and practitioners and their administration team, the new premise is also accessed by numerous patients and their families visiting the clinic for pre-treatment and post-treatment consultations, as well as for the procedures themselves. Access control and intruder detection system In their new premises, the practice required an access control and intruder detection system that delivered: Hassle-free access for staff with various levels of authority, from surgeons to administrators, for e.g. restricted access to consultation/treatment rooms and post-procedure recovery areas Limited access to patient information, drugs, high value surgical equipment and other high-risk assets Simple and reliable off-site management by permitted personnel, at any time and via their own computer, tablet or smartphone A secure yet serene and private experience for patients and visitors, for e.g. easy entry and exit for visitors to/from the main reception area Safety of staff and visitors IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham. With nearly 100 years of combined experience installing security systems, the IGNIS team delivers on its reputation for quality of service, knowledge, reliability and honesty. An integrated system gives the client reassurance, simplicity and ease of use IGNIS works with integrated access control and intruder detection manufacturer Inner Range to deliver a cost effective, reliable service every time, with safety of staff, customers and visitors of paramount importance. Inner Range provided Inception, the core access control and intruder detection system used by IGNIS Fire Protection Services on this site. Inception was the perfect choice for this customer because it hangs off the same infrastructure with a single user interface. An integrated system gives the client reassurance, simplicity and ease of use. Offers smart building management A pioneer of integrated access control and intruder detection systems, Inner Range has been a pioneer in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Inner Range’s award-winning integrated security systems offer smart building management at local, national and global levels. Inception is Inner Range’s powerful yet affordable access control and intruder detection system, now featuring a range of extra reporting functions, anti-pass back protocols and interlocking doors. The system provides this dynamic clinic with the integrated access control they need to run their business with the utmost efficiency, safety and security. Key features available with Inception: A web-based interface that can be controlled by authorised staff using existing smartphones, tablets or computers Various entry points starting at 2 or 4 doors and 16 users and can be expanded if required up to 32 doors and 512 users Universal inputs and outputs that can be used independently of each other, to directly control door locks and powered sirens modules Secured alarm communication is using 128Bit AES encryption to ensure data privacy Interactive Commissioning Checklist IGNIS installed the Inception system using its interactive Commissioning Checklist that ensures no steps are missedIGNIS installed the Inception system using its industry-first interactive Commissioning Checklist that ensures no steps are missed. That process includes core programming, custom automation, changing default credentials, backing up the database and downloading commissioning reports. Inception’s wireless adaptability not only gives users flexibility, it means technicians don’t need to find an IP address or connect to the user’s local network. They can also use an adaptor as a service tool to perform maintenance on site. Benefits for client: Peace of mind – 24/7/365 access and intruder detection solutions to keep patients, staff, visitors and assets safe and secure Convenience – the system can be controlled at all times via any mobile device No forgotten codes to interrupt the sensitive day to day running of the business or cause issues out of hours Value for money - no costly additional hardware and no need for a set on-site administrator or security guard Easy access and security means reception and support staff can focus on other responsibilities such as patient care
Prama Hikvision partnered with the Sanjivani Group of Institutes to offer latest surveillance and security solutions. For the first time that Artificial Intelligence was offered, and enabled face recognition terminals in India’s education sector. Sanjivani Group of Institutes situated at Kopargaon, Ahmednagar is a premier institute for Engineering, Pharmacy, Nursing and Diploma in Ahmednagar District. Sanjivani took its names and inspiration from the famous epic of Ramayana where ‘Sanjivani buty’ was brought for revival of life. The Sanjivani Rural Education Society (SRES), was established by Honorable Shri. Shankarrao Genuji Kolhe in 1983, at Kopargaon, rural domain in Ahmednagar district of Maharashtra, India. Identify unauthorised person The entire campus of the Sanjivani Group of Institutes is spread out in more than 100 acres land As the educational scenario changed with time, SRES understood the need and added a number of courses under the umbrella of the Sanjivani Rural Education Society (SRES) and consequently it gave birth of the Sanjivani College of Pharmaceutical Education and Research, Sanjivani Senior and Junior College, Sanjivani Academy, a CBSE school and Sanjivani International school. The entire campus of the Sanjivani Group of Institutes is spread out in more than 100 acres land. There are different departments in various buildings, playgrounds, hostels and staff quarters. Due to vast area and huge numbers of students, it’s very difficult for management to identify unauthorised person inside the campus. In the past, many instances of bullying, robbery, theft, ragging and pick-pocketing were reported. Up-to-date surveillance solution With the expansion of the Sanjivani Group, there were many challenges faced by students and staff in terms of safety and security. “Consequently, we took our first step towards it by installing Hikvision IP CCTV surveillance in all our campus areas for monitoring. The clarity and the quality of the camera is appreciable and satisfying,” said Amit N Kolhe, Managing Trustee, Sanjivani Rural Education Society (SRES). He further added, “Presently the security technology has changed a lot. While understanding the need of safety and security of the students, we decided to go for an up-to-date surveillance solution. We contacted Prama Hikvision team and their system integration partner Om Agency for an advanced solution. After understanding our requirements, they introduced some of the latest technologies related to security surveillance.” Facial recognition devices The same software can be used by seamless integration for time attendance, access control and surveillance" He further elaborated, “After this we finalised the key areas by conducting the security survey in the campus. We got many advanced solutions implemented with help of SI partner and Prama Hikvision team. The solutions included, ANPR cameras for number plate recognition of cars and bikes at entry and exit gates, facial recognition devices for time attendance and access control of students & staff members.” “The advantage of Hikvision security and surveillance products is that things can be monitored through a single software platform, i.e. IVMS 5200E, which comes as all in one software. The same software can be used by seamless integration for time attendance, access control and surveillance,” concluded Amit N. Kolhe. Access control systems By visiting Sanjivani Group of Institutes along with System Integration Partner Om agency, the following solutions based on the latest technology and products were adopted: Automatic Number Plate Recognition (ANPR) cameras Tripod turnstile integrated with face recognition panels HD IP cameras A broadcasting solution for the seminar rooms Face recognition based access control systems Hikvision solutions delivered results: ANPR Cameras helped the institute to identify unauthorised vehicles at entry gates, through which they stopped many outsiders in getting entry into campus area. Face recognition panels and access control panels helped institute in getting entry and exit record of students as well as visitors. Through the large number of cameras installed at various locations, the management is able to keep an eye on the entire campus. One-stop solution We are proud to execute this project with support of Prama Hikvision" “Implementing IP Surveillance project for Sanjivani Group of Institutes, Kopargaon was a great learning experience. We have built a strong relationship with Prama Hikvision over the past 10 years. They work with vendor partners to deliver solutions that suit the requirements. The efficient professionals and quality of service is appreciated.” said Mr. Hemant Rokade – Director Sales, OM Agency. “We are proud to execute this project with support of Prama Hikvision. It was a huge challenge to execute the project of such gigantic proportions. While implementing the project, Prama Hikvision helped us through the project at every step. We appreciate the level of details and accountability, which Prama Hikvision has demonstrated in this project. This reaffirms our faith that Hikvision is the one stop solution for all security and surveillance solutions,” said Mr. Pravin Rokade – Director Operations, OM Agency.
Round table discussion
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
Enterprise customers provide a large, and very lucrative, business opportunity for the physical security market. These customers include big global companies with plenty of revenue to spend and employees and facilities to protect. As a group, enterprise customers also tend to be a demanding lot, requiring systems that are large, scalable, that can operate across a wide geographic area, and that provide top-notch system performance. Enterprise customers set the standards of performance for the entire market, and they challenge manufacturers to up their game. We asked this week’s Expert Panel Roundtable to reflect on the industry’s biggest customers: What are the security challenges of the enterprise market?