School security
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation announced that its AI gun detection and intelligent situational awareness solution has been deployed by Florida SouthWestern State College (FSW) to mitigate gun-related violence. Protecting FSW campuses ZeroEyes has been implemented across all four FSW campuses, protecting 16,000 students and nearly 1,000 faculty and staff. First establishe...
WHAT: Allied Universal®, North America’s pioneering security and facility services company, is filling 200 event staff positions for the Denver Metro and Colorado Springs area. The positions are responsible for collecting tickets; welcoming and ushering guests; directing foot traffic; ensuring the cleanliness, operational efficiency and maintenance of designated areas; and providing superior customer service. Veterans are encouraged to apply Flexible schedules Competitive, weekly...
Robotic Assistance Devices, Inc., a subsidiary of Artificial Intelligence Technology Solutions, Inc., is pleased to announce that ZeroNow has welcomed RAD as an Industry Partner in its quest to bring the number of victims of school violence to zero. RAD delivers cost-effective artificial intelligence-based security solutions that can help schools improve safety and efficiency. RAD technology augments the capabilities of staff to provide higher levels of situational awareness at a low cost,...
On June 26, 2024, high school and college students led the movement to protect their local communities as they showcased their ideas to prevent targeted violence and terrorism during the Invent2Prevent (I2P) Spring 2024 competition finals. Preventing targeted violence Sponsored by the U.S. Department of Homeland Security’s (DHS) Centre for Prevention programmes and Partnerships (CP3), I2P empowers youth to play a pivotal role in preventing targeted violence and creating more resili...
SARGENT, an ASSA ABLOY Group brand known for innovative door lock and hardware solutions, is excited to announce the latest evolution of its 10X Line bored locks now featuring visual status indicators. Designed to provide clear, instantaneous confirmation of a door's locked or unlocked status, these highly visible status indicators enhance users’ security and safety across a wide range of applications. New dimension of interaction "Our new SARGENT 10X Line bored locks with visual status...
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation announced that its AI gun detection and intelligent situational awareness platform has been deployed at Bradley-Bourbonnais Community High School (BBCHS) to mitigate gun-related violence. BBCHS Located in Kankakee County, Illinois, BBCHS educates approximately 1,900 students from Bradley, Bourbonnais, and St. George school districts. The ex...
News
Digitalisation is reshaping the way individuals live and work. Buildings should be at the centre of this change, streamlining daily interactions with homes, offices, and other workplaces, moving into and around them seamlessly. Everyone who uses a site also needs confidence in its security and safety, not just its efficiency and usability. Connected digital access In addition, connected digital access is a fundamental block in constructing more intelligent buildings. As analysts Omdia note, “access control equipment continues to play a crucial role in leading end users to consider a transition to interconnected smart building system architectures.” Future-oriented strategy Switching mechanical for digital access can help organisations of every size and type to work smarter, collaborate better Switching mechanical for digital access, then, can be essential to a future-oriented strategy. It can help organisations of every size and type to work smarter, collaborate better, and maximise the productivity of their existing assets. “The building has an increasingly digital future,” says David Moser, SVP and Head of Digital Access Solutions at ASSA ABLOY Opening Solutions EMEIA. ”So it’s crucial for all kinds of organisations to make their access ready for what’s ahead.” 5 strategic factors impacting the switch to digital access But which major factors should be incorporated into the decision-making process for a switch to digital? The following five are critical to ensure an organisation lands on the best solution for them: Security Security is sometimes considered a given. But in a world of emerging and evolving physical security threats, it should never be taken for granted. Building users and managers need the reassurance of a secure access system to go about their working day productively and with peace of mind. As security converges, moving beyond traditional physical access and cyber ‘siloes’, the right digital access solution enables building management teams to define exactly who goes where, and when, across their site or sites. Reliability The reliability of any digital solution has both financial and security implications. Robust hardware and secure software ensure that access solutions require minimal maintenance, for example. At the specification stage, purchasers should also inquire about third-party certifications, including for green building schemes, whether for digital locks, electronic door closing solutions, or access provision compliance at sensitive locations where additional national and supra-national regulations may apply. Innovation Systems should embrace digital openness and customisability which in turn provide the flexibility Innovation in the choice of solution does not simply mean picking the access system with the widest range of features and functions. Choosing a digital solution manufacturer with a track record of innovation, however, gives organisations the confidence that their solution will always prepare them for what’s ahead – not just the ‘now’. Systems should embrace digital openness and customisability which in turn provide the flexibility that genuinely future-proofs access management. Convenience Convenience is about much more than just small-scale savings in time and effort. When employees, contractors, and temporary visitors can come-and-go with ease, operations for building and security managers are streamlined. Digitalising access provides a concrete ROI that a business can turn into a competitive advantage. For this reason, the most recent Wireless Access Control Report found the #1 factor driving the switch to mobile digital access was convenience. Sustainability Sustainability as an ethos should be embedded within any future-proof digital solution. Motives go beyond just altruism and corporate responsibility – though, of course, these are important. Incorporating sustainability into an access strategy can also directly benefit the bottom line. Both the business and the environment benefit from reducing power consumption by using innovations such as energy-harvesting technology, for example. The benefits of a digital access solution “At a new corporate headquarters for Canal+ near Paris, midsized Clockwise co-working spaces in the UK and northern Europe, and medical facilities in Dubai and Turkey, digitalisation of access has brought tangible everyday benefits,” adds David Moser. “There’s a proven digital solution suited to historic buildings, brand-new hotels, and education facilities of every size and type. Digital access comes with a real operations management ROI.” Cloud infrastructure Cloud infrastructure enables remote management of users and access from one convenient location “At one Danish school, Vejle Friskole, digitalising access management reduced the time they were spending on it every week from 5 hours to just 5 minutes. The results can be instant… and quite dramatic!” Digitalising access instantly puts powerful tools in the hands of a building manager: Cloud infrastructure enables remote management of users and access from one convenient location; integrating intelligent sensors can help manage energy more effectively; credentials stored on a smartphone simplify and accelerate the process of issuing, amending and revoking access. Digital access for offices, universities, hospitals, and much more A vast range of digital functionality can be tailored to all kinds of applications. With real-time management, facility managers create audit trails or instantly change access rights for any door or user. In schools, real-time, online control enables rapid lockdown in an emergency. In hospitals, digital access shows who had access to drug stores or equipment. Self-service kiosks At the Flint Hotel in Austria, digital access software integrates with self-service kiosks: Guests check in from home, enter the reception with a PIN, and receive their keycard at the kiosk. At Munich’s historic Hofbräuhaus, digital devices work out of sight, securing doors and managing access without damaging the heritage interior. Wireless locks and mobile management Multi-residential housing in Barcelona, access apartments and common areas with a key stored securely Tenants at Becorp, multi-residential housing in Barcelona, access apartments and common areas with a key stored securely on their smartphone. “Physical key management for any large development puts severe pressure on operational costs,” explains Becorp’s project engineer, Xavier Casals. “Choosing wireless locks and mobile management helps us to minimise them.” Digital transition “ASSA ABLOY can help you digitalise and truly future-proof access at almost any kind of site or building,” adds David Moser. “Our vast range of innovative, reliable, convenient solutions showcase the value of the digital transition and can be tailored to meet individual business needs and goals.” “We urge anyone thinking of making the switch from mechanical to digital access to speak to us first. We are happy to share our expertise to help you continue to thrive in a changing, digitalising world.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced it has achieved substantial growth in the state of Pennsylvania over the last year. The company has more than doubled its footprint in the state, hiring dozens of Pennsylvania veterans, technologists, and skilled employees for high-paying emerging technology jobs with a global impact. With concerns for public safety on the rise, ZeroEyes has experienced significant expansion, witnessing a remarkable 750% increase in enterprise customers and a 300% growth rate in commercial accounts across the state. In addition, the company saw a 698% increase in cameras on the platform, allowing ZeroEyes to proactively protect Pennsylvanians against gun-related threats. Philadelphia-area public university ZeroEyes has grown its public safety applications across several cities, real-time crime centres Key expansion was driven by a large Philadelphia-area public university, numerous public K-12 school districts across the state, several nonpublic schools, and a major Fortune 50 enterprise customer. Additionally, ZeroEyes has expanded its public safety applications across several municipalities, real-time crime centres, and law enforcement agencies. Correlating to high growth across the state, ZeroEyes recently expanded its Operations Centre (ZOC) at its Conshohocken headquarters, tripling the size and employee headcount. The 24/7/365 facility is the only of its kind staffed by former military and first responders based in the US and not farmed out to foreign soil. With tens of thousands of cameras on its platform, the ZOC is vital to managing and monitoring real-time firearm detection alerts and follow-on notifications for hundreds of enterprise customers around the world. U.S. military and law enforcement veterans ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school staff as quickly as three to five seconds from detection. “ZeroEyes is proud to call Pennsylvania home, and the commitment to protecting those in our own backyard along with communities across the nation is our top priority,” said Mike Lahiff, CEO of ZeroEyes. “Our fast-paced growth across the state reaffirms the need for cutting-edge solutions that protect citizens against gun-related threats.”
Durite will use the Road Transport Expo to demonstrate how AI and digital systems are improving road safety – and how this technology can help attract more young people into the industry. Durite, a pioneer in vehicle safety, lighting and auto electrical parts will be showcasing its popular Demo Van on Stand R45, Hall1 at the RTX in Stoneleigh on 4th-6th June. Durite Driver Status Monitoring The vehicle is equipped with a combination of the company's safety innovations, showcasing how Durite can help to support fleet compliance with standards such as the DVS Phase 2, FORS, and CLOCS. The technology on the vehicle includes Durite’s DVR kits, 4G live-streaming DVR and CCTV kits, AI and Progressive Safe Systems, innovative lighting and smart telematics tracking. Durite can help to support fleet keeping with norms such as the DVS Phase 2, FORS, and CLOCS Visitors will be able to explore the Innovation Corner of the stand, where Durite will feature its HD range of cameras and the new Durite Driver Status Monitoring system. This uses AI to detect dangers that drivers are facing daily, such as fatigue and distractions. It sounds like an alert to make the driver aware of hazards, helping to improve safety for both drivers and other road users. Durite’s ADAS technology The system can be combined with Durite’s ADAS technology, designed to monitor the vehicle and road environment around it to predict potential collisions. By warning the driver early, it allows the driver to react in good time and avoid accidents. John Nobbs, UK Sales Manager for Durite, said: “Our stand will reflect Durite’s ethos of harnessing technology to enhance road safety. The Innovation Corner will showcase pioneering edge tech that is bringing a new dimension to driver safety. Meanwhile, the demo van is a great way for fleet operators to really see how combining and integrating systems can help with compliance and reduce road risk.” Initiative to enhance recruitment Durite is taking part in the School of Thought Automotive’s program to highlight the opportunities Durite is taking part in the School of Thought Automotive’s program to highlight the opportunities that working in the automotive and fleet sector can offer the next generation. School of Thought Automotive is an industry initiative to enhance recruitment and retention of young people. It will bring year 11 students aged 15 and 16 from local schools and colleges to attend the opening day of the Expo, and on the Durite stand, they will be able to experience the challenges of driving an HGV using an interactive truck and logistics simulator game. “It is a great opportunity to promote and raise awareness of the steps that the industry is taking to make the road safer for everyone,” adds John Nobbs. Opportunities for growth and improvement Durite Marketing Manager, Veronique Vanoli, said: “As a significant supplier to the UK Transport industry, we feel a duty to help our sector recruit the next generation. The industry is constantly evolving, always bringing in new and improved technologies for vehicles and smarter ways to handle logistics. It's this ongoing flow of innovation that keeps things interesting and offers endless opportunities for growth and improvement. There are excellent career prospects and we’re proud to play our part in shaping the industry and helping inspire young people to join it.” Durite, a FORS associate, has been supplying vehicle cameras for more than 20 years and has provided more than 50,000 systems to operators throughout the UK. An extensive network of distributors and approved installers service the whole of the UK and Ireland.
Educational institutions are witnessing an ever-growing technology integration, be it interactive whiteboards or online learning platforms. Technology is reshaping how we teach and how students learn. Let’s zoom in on a different branch of technology used in education - video analytics. Imagine a tool that captures video and analyses captured footage using artificial intelligence (AI). Video analytics in K-12 education Video analytics in K-12 education can gain insights and identify patterns that could help school safety, security, and operations. By utilising AI, education video analytics systems can detect anomalies, monitor campus activities, and aid in incident investigations. This technology goes beyond watching recorded footage, it’s about leveraging technology to create safer, more efficient learning environments for students. This article dives deeper into AI video analytics in school security so users can decide whether it’s right for them. Understanding AI video analytics It’s like having an intelligent security assistant who watches over the school campus 24/7 Video analytics monitors, analyses, and manages massive amounts of video using modern algorithms and machine learning (ML). It’s like having an intelligent security assistant who watches over the school campus 24/7. Let’s look at the critical components of a video analytics system. Users have cameras which are the eyes of the operation, capturing all the action. Recognise, identify and understand Then, some sensors pick up additional data, such as motion or sound. But the real magic happens with AI-powered analytical software. Video analytics is the brain behind the cameras, helping them do more than record footage. With AI in the mix, video analytics becomes even more powerful. AI adds a layer of brain power by teaching the system to recognise patterns, identify objects, and understand human behaviour. Applications in K-12 Education The use of AI in education in conjunction with video analytics can create safer learning environments where students can thrive and succeed. Here is how AI video analytics can be used in K-12 education: Enhancing school security AI video analytics constantly monitor the school’s activities to ensure the safety of its students and staff AI video analytics constantly monitor the school’s activities to ensure the safety of its students and staff. It can flag anything out of the ordinary. For instance, someone lingering in a restricted area or a sudden change in lighting. It can even recognise faces or license plates, helping to track down missing students or identify unauthorised visitors. By constantly scanning the premises, AI video analytics is a proactive measure against potential threats. This approach helps maintain a secure environment for teaching and learning. Facilitating incident investigation In the unfortunate event of an incident, such as bullying, theft, or vandalism, AI-based video analytics can expedite and streamline the investigation process. Analysing video footage can provide vital insights into events, assisting authorities in resolving conflicts and responding to situations quickly. For example, AI video analytics can provide valuable insights into a physical altercation. It can help identify the participants, trace their activities, and give critical evidence for disciplinary action or legal procedures. AI video analytics speeds up the investigative process by quickly analysing large volumes of data, ensuring a thorough and correct reaction to accidents. Supporting conflict resolution AI video analytics offers objective, evidence-based insights into interpersonal disputes or disciplinary issues. By analysing video evidence, it is possible to uncover the root causes of conflicts. Video footage can also estimate the severity of situations and support constructive solutions. AI video analytics can detect patterns of behaviour, monitor interactions, and provide useful evidence For example, in cases of bullying or harassment, AI video analytics can detect patterns of behaviour, monitor interactions, and provide useful evidence for intervention or counseling. With their ability to recognise subtle cues and behaviours, these systems help institutions efficiently manage problems. As a result, it can promote a secure and inclusive learning environment for all students. Enabling emergency response AI video analytics ensures a timely and coordinated response during crises, such as fire drills or lockdowns. Monitoring crowd behaviour and identifying potential threats or bottlenecks enables authorities to assess the situation and apply relevant safety measures. For example, during a lockdown, AI video analytics may follow individual movements, detect security breaches, and offer real-time information to first responders. AI video analytics improves the effectiveness of emergency response systems by analysing complicated circumstances and providing actionable insights. 5 benefits for educators and administrators Video analytics in K-12 education benefits students, educators, and administrators alike. Here are five advantages to remember: Enhanced safety and security AI-powered security solutions add an extra layer of protection by continuously monitoring activity and detecting potential threats in real time. These systems operate as vigilant watchdogs, identifying unauthorised individuals and detecting aberrant behaviour patterns to prevent situations from escalating. Efficient resource allocation Administrators can make better resource allocation, scheduling, and facility management decisions AI video analytics optimises resource allocation by giving helpful information on campus operations and utilisation. Administrators can make better resource allocation, scheduling, and facility management decisions based on various metrics. These metrics include student movement, facility usage, and traffic patterns. This results in more efficient resource use, better logistical planning, and increased productivity. Data-driven decision-making AI video analytics helps institutions make data-driven decisions by analysing large volumes of data quickly and accurately. For instance, these systems can help customise instructional tactics, identify growth areas, and personalise student learning experiences. This is made possible by video analytics’ actionable insights into student behaviour, academic performance, and campus dynamics. Similarly, admins can utilise data analytics to evaluate policy efficacy, monitor key performance indicators (KPIs), and promote continuous improvement throughout the school ecosystem. Proactive intervention and support Educators can help children achieve academically and emotionally. Video analytics can help monitor student behaviour patterns, spot symptoms of discomfort or disengagement, and highlight possible problems early on. This proactive approach to student support creates a positive learning environment where all students feel appreciated and encouraged to achieve their full potential. Streamlined operations and workflow AI-powered security tools can automate routine tasks like visitor access and tracking school attendance AI video analytics improves operations by automating regular tasks and optimising workflow processes. AI-powered security tools can automate routine tasks like visitor access and tracking school attendance. Automation allows educational institutions to focus on more strategic objectives. As a result, it can lead to smoother operations and higher employee morale. Challenges and considerations Implementing AI video analytics in K-12 education comes with its challenges. Here are the potential hurdles and considerations of education video analytics: Privacy concerns: Schools must establish policies and procedures for data collection, storage, and usage. They must comply with relevant regulations such as the Family Educational Rights and Privacy Act (FERPA). Also, implementing data encryption and access controls can safeguard sensitive information. Resource constraints: Limited budgets and resources can pose challenges when adopting AI video analytics. Schools can overcome this by exploring cost-effective security technology solutions. They can also leverage open-source software and seek partnerships with technology providers. Training staff and educators on using AI tools effectively may also help. Technical limitations: Schools should conduct thorough testing and pilot programmes to identify and address technical hurdles early Technical challenges may arise, such as compatibility issues and system integration complexities. Schools should conduct thorough testing and pilot programmes to identify and address technical hurdles early. Work with experienced vendors or seek expert guidance to help mitigate these technical risks. Ethical use of AI: Schools must prioritise transparency, fairness, and accountability when implementing AI video analytics. Educating stakeholders on the ethical implications of AI technology and cultivating an ethical decision-making culture are critical steps in promoting responsible AI use in education. Unlocking school’s potential with AI solutions by BCD With its capabilities, AI video analytics can transform K-12 education. Unlock the school’s potential with BCD’s AI-ready solutions tailored to the unique needs of educational institutions. Since 1999, BCD has been at the forefront of purpose-built video storage solutions. It partners with globally known security pioneers to provide AI video surveillance systems. With their security technology and commitment to customer satisfaction, schools can create safer, more engaging learning environments for their students.
Cohesity, a pioneer in AI-powered data security and management, announced the appointment of Dr. Craig Martell as Chief Technology Officer. In this role, Dr. Martell will bring his deep industry expertise to shape the company's technical vision, incorporating current and evolving industry and customer trends to define and execute a strategic and impactful roadmap for the company’s future. Digital and AI plan growth Dr. Martell brings extensive industry and public sector experience and unprecedented expertise in artificial intelligence (AI) and machine learning, pioneering AI programs for top tech companies since 2013. Dr. Martell most recently served as the Chief Digital and Artificial Intelligence Officer (CDAO) for the U.S. Department of Defence (DoD). The CDAO office was created to elevate digital and AI strategy development and policy formulation In this role, he served as the senior official responsible for accelerating the adoption of data, analytics, digital solutions, and AI functions to generate decision advantage across the department - expertly guiding the DoD through a quickly-changing AI industry. With Dr. Martell as its first pioneer, the CDAO office was created to elevate digital and AI strategy development and policy formulation while ensuring the unity of mission and tighter integration for the department’s enterprise-wide data, AI, and cyber organisations. Prior senior roles of Martell Prior to joining the DoD, Dr. Martell held several senior roles at some of the most recognisable technology companies. At Lyft, he served as Head of Machine Learning, where he designed and built a state-of-the-art machine learning (ML) platform, allowing the Lyft engineering team to quickly create and ship ML models using large-scale, new, and ongoing statistical programs. From 2018 to 2020, Dr. Martell was Head of Machine Intelligence at Dropbox, responsible for all machine learning, including overall vision-setting, drawing from analytics as applied to ML, and clear, concise communication of ML strategy across the organisation. Martell’s proficiency in statistical codes and methods has been shown in his several patents Before then, he led a number of AI teams and market-moving initiatives at LinkedIn. Dr. Martell was also a tenured computer science professor at the Naval Postgraduate School specialising in natural language processing. Dr. Martell’s proficiency in statistical principles and methodologies has been demonstrated in his several patents, including a Hybrid Classification System in 2021 and System and Method for Encrypting Data in Pictorial Data in 2008. Cohesity’s AI-powered innovations “The speed and scale Cohesity has achieved over the last several years is a testament to the incredible technology platform the company has built at the junction of multi-cloud, security and AI for the future of data protection. My role will be to accelerate the innovation internally and the advocacy externally of Cohesity’s AI-powered innovations that are second to none,” said Dr. Martell. “I’m honoured to join Sanjay and the talented team he has put together as we accelerate the company’s course to advance AI and machine learning capabilities critical to addressing key challenges to enterprise data.” Cohesity’s AI roadmap “AI represents a massive competitive opportunity and advantage for Cohesity. Our launch of Cohesity Gaia – with its first-to-market, patent-pending innovations – was the first step in our strategy,” said Sanjay Poonen, president and CEO, Cohesity. “Attracting and hiring an industry pioneer of Craig’s calibre – someone who has been driving an agenda of responsible AI at the highest levels of both public and private sector organisations – rounds out our strong executive leadership team with expertise across security, multicloud, and AI. I expect that Craig’s experience and vision for Cohesity’s AI roadmap will accelerate our lead in this critical area of our business.”
A wider group of customers can now experience the benefits of Dicentis Hybrid Meetings with the latest rollout of this cloud-hosted end-to-end hybrid conference solution. The technology update is part of an ongoing mission of Bosch Building Technologies to meet the rapidly evolving needs of the modern professional conferencing environment. Hybrid meeting environment Dicentis Hybrid Meetings is a fully native end-to-end solution that ticks all the boxes for highly efficient, legally compliant meetings. It combines the best of both worlds with an efficient mix of on-site and remote participants, reflecting the future of conferencing in professional meeting environments. Dicentis Hybrid Meetings is a fully native end-to-end key that ticks all bins for highly efficient The seamless hybrid meeting environment provides everyone with equal participation options in a familiar, easy-to-use software interface to provide the perfect meeting experience. Regardless of their physical location, each participant is fully involved and enjoys the same speech priorities, voting rights, content sharing options and now also a language selection feature with the possibility to select from up to 31 interpretation languages. Secure and data-privacy-compliant This functionality helps to expand the applications where Dicentis Hybrid Meetings can be used. The language selection option allows remote participants for international meetings, inter-governmental gatherings and within multinational organisations to fully engage with the meeting as if they were physically in the room. Dicentis Hybrid Meetings offers specific functions for professional meeting environments such as councils, ministries, and international institutes, to ensure a complete and stable conference workflow. This is centrally controlled over a straightforward, intuitive interface for the chairperson. The solution, which benefits from cloud hosting by Bosch for customers' peace of mind, is secure and data-privacy compliant. Focus on security Dicentis Hybrid Meetings has given its penetration test from the decent usd HeroLab with flying colours The latest phase of the Dicentis Hybrid Meetings rollout has seen the high-security promise from Bosch Building Technologies, backed by industry-standard evaluation and certification. Following an intense period of testing, Dicentis Hybrid Meetings has passed its penetration test from the esteemed usd HeroLab with flying colours, demonstrating its cyber resilience. Receiving this penetration test certificate is living proof of the unwavering commitment to meet the highest standards. Expanded coverage Dicentis Hybrid Meetings is now more accessible to a wider range of customers. The language selection option allows for remote participants to select and listen to available simultaneous interpreter languages (up to 31), making it particularly useful for international meeting environments like conference centres, international institutes as well as rental companies serving multi-lingual meetings. In addition, the number of countries where Dicentis Hybrid Meetings is available has grown. The initial launch of Dicentis Hybrid Meetings focused on eight key European countries: Finland, the Netherlands, Belgium, France, Spain, Germany, the UK and Italy. This has expanded with a further 13 European countries: Portugal, Hungary, Greece, Austria, Switzerland, Denmark, Poland, Romania, Slovenia, Czech Republic, Latvia, Lithuania and Estonia. Preparations are underway to make the solution available in more regions. Training options are now available to support this broader base of potential customers. Online training is available via the Learning Management System from the Bosch Building Technologies Academy, while classroom training can be booked via local sales representatives.
Expert commentary
For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common K12 security pain points There’s no one-size-fits-all solution in school district security. School districts may have big plans to implement upgraded security systems but to set out on the right foot, pioneers must have a clear vision of their long-term strategy. When embarking on their security journey, education pioneers often wonder where to start and what exact steps are they need to be taking to identify and address weaknesses. Local K12 and government pioneers are promoting and mandating security assessments to uncover safety gaps on campuses and mitigate these risks with advanced technology solutions. Not only do assessments provide detailed, customisable roadmaps for district pioneers, but they also recommend technologies and funding opportunities to help close threat gaps. K12 school districts are mainly vulnerable to cyber-attacks due to the sensitive nature of student records In today’s climate, schools face a growing number of physical and digital security threats. From a cybersecurity standpoint, K12 school districts are particularly vulnerable to cyber-attacks due to the sensitive nature of student records. However, only one-third of these districts have adequate staffing to address threats effectively. In addition, according to a recent survey from Johnson Controls and Forrester Consulting, security decision-makers are having trouble receiving actionable insights. Nearly two-thirds of respondents said that they struggle to receive information from all necessary systems regarding their security threats. To gain more clarity into what school districts need in terms of security tools and threat mitigation, implementing system-wide monitoring and optimisation can be invaluable. This approach enhances equipment and operational efficiency, while providing necessary resources and expertise for critical patch updates across all systems, strengthening their overall security posture. Achieving a well-rounded security program In the past few years, AI technology has emerged as a trending solution and is generating considerable attention. While the allure of implementing cutting-edge technologies is undeniable, it’s important to recognise that a robust security program hinges on solid access control. Access control technology provides administrators with the means to oversee and regulate entry into facilities, serving as the foundation for basic physical security. The technology helps administrators and staff control access to multiple areas from web-enabled devices, even during lockdowns which is crucial in emergency situations. School district pioneers should utilise available digital risk assessment tools to uncover threat areas Once basic security controls are in place, school districts must address their next set of security pain points and identify which solutions meet their specific needs. This involves identifying and prioritising the highest need and most cost-effective investments that will have the greatest impact on enhancing security measures. To accurately determine which security solutions are needed for a specific environment, school district pioneers should utilise available digital risk assessment tools to uncover threat areas and determine levels of priority. By focusing on these priority areas, districts can allocate their resources and efforts where they are needed most, ensuring maximum effectiveness in mitigating risks and vulnerabilities. Securing funding before approaching deadlines A major challenge for school districts surrounding campus security is identifying and securing the necessary funding to implement solutions aligned with their goals. Leveraging available funding sources is critical, especially considering certain programs are approaching their deadline, like the Elementary and Secondary School Emergency Relief (ESSER) fund. Announced during the pandemic, ESSER is a funding program that has allocated nearly $190 billion in aid to U.S. public school districts to fund projects benefitting the well-being of occupants. Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024 Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024, when schools must attribute all of their funds to assigned contracts. Following this date, pioneers will need to complete all ESSER spending by January 2025 unless approved for an extension into March 2025. As ESSER wanes, school districts are acutely aware of the fiscal cliff in budgets through 2025. However, many states are ramping up grant funding to close the deficit gap. Administrators should become familiar with these grant opportunities at a local and state level. Get started on security plans The time for school district pioneers to act is now. While the safety and well-being of students and staff are always top priorities, it’s crucial to acknowledge that a lack of insight into necessary security upgrades and available funding options will leave districts behind the curve. Seizing the final months of ESSER funding presents an ideal window to address security pain points and build a safer future for K12 facilities. Looking beyond ESSER, pioneers must proactively seek out and leverage other funding avenues to help ensure the continuity of their security efforts and maintain a proactive stance in safeguarding healthy and safe educational environments.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritise prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis and prioritisation, and finally, development of mitigation measures.” Safety and security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analysing and prioritising mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements to physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorised individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritise improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders and non-profit organisations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organisations can offer valuable resources, training, and support programmes to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
GSX 2022 this week in Atlanta highlights the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Risk-based decisions “I really just do physical security.” That used to be a common phrase in the industry, but no more. In addition to ‘upskilling,’ security practitioners also need to speak the language of business and to insert the concepts of security into that language. Fast changes in security are challenging today’s professionals to keep up. The GSX education sessions seek to meet the need. Embracing ESRM includes a complete change in the thinking and approach to security Among the topics at the GSX conference is ESRM (Enterprise Security Risk Management), a security approach that focuses on risk-based decisions and partnerships with asset owners. It’s an approach that requires a holistic view of security risk. Embracing ESRM includes a complete change in the thinking and approach to security. Rather than seeking ‘approval’ for security decisions, security professionals identify risks and possible mitigation strategies and present them to management. Shaping access control Activity in the exhibit hall was brisk on the first day, which was heartening to those who attended a vastly downsized show last year in Orlando. At this show, there is even carpeting. Trends lead the lively discussions at GSX. In a presentation on the show floor Monday, manufacturer Brivo shared top trends that are shaping access control. The trends include: Hybrid work is here to stay. Some 60% of respondents to a Brivo survey said access control is extremely or very important to the hybrid work model. Providing immense value to an organisation, access data helps to manage occupancy and is part of the larger discussion of facility utilisation. Data analytics is ‘mission critical.’ Combining data from multiple sources, including access control, becomes powerful when leveraged using artificial intelligence (AI) and machine learning tools. Applications such as anomaly detection help companies improve operations. Some 65% of respondents to the Brivo survey say integrating access control with other technologies is an important trend. Keeping people healthy Other trends identified by Brivo include mobile credentialing and security centralisation (cloud) Other trends identified by Brivo include mobile credentialing and security centralisation (cloud). Among other exhibitors, Johnson Controls is focusing in their booth on solutions, not products, including the convergence of physical security into the digital space. The OpenBlue system is a digital platform that incorporates security, HVAC, fire/life safety, and building operations in a single platform that is the ‘nerve center’ of an organisation. Increasingly, the areas ‘security’ is responsible for are expanding. During the COVID pandemic, for example, security had to embrace a role in keeping people healthy (as well as safe). The challenges of the pandemic accelerated the OpenBlue portfolio as more security professionals expanded their role. Security operations centre “Moving into the digital space, and digitising what used to be a security operations center, enables us to increase automation and enable security operations to respond more quickly,” said Kenneth Poole, Johnson Controls’ Vice President, National Accounts, North America Building Solutions. Security directors are responsible for things they have never been responsible for before" “Surprisingly a lot of customers are being forced into new areas,” Poole added. “Security directors are responsible for things they have never been responsible for before.” Poole says he is encouraged by the willingness of ‘old school’ security directors to embrace the new reality. Azena’s approach to supplying edge-based camera applications on an ‘app store’ is gaining momentum. Several new applications are being announced at GSX, among the 110 apps on the Azena app store. Apps can be loaded onto Azena-enabled cameras manufactured by Bosch, Hanwha, Vivotek, BST, TopView, and Ability. Video management system Azena has simplified the integration of its app solutions, enabling developers to make only slight changes to an app and ensure it is compatible with the largest video management system (VMS) platforms, including Milestone, Genetec, and NX Witness. A wizard on the camera enables simplified mapping of data analytics to events in a VMS system. New applications in the Azena app store include video sensors to prevent ‘bed fall’ accidents in hospitals and healthcare facilities, incidents that can cost $35,000 on average and account for $34 billion in the United States in a year. The app identifies video signs of an imminent bed fall, such as excessive movement in bed. The analytics run inside the camera and the video feed doesn’t leave the device, so there are no privacy concerns. An Azena app is installed in a camera mounted on ‘Yellow,’ the ‘robot dog’ manufactured by Boston Dynamics Effectiveness of metal detectors Another new application is gun detection that can augment the effectiveness of metal detectors. Also, an Azena app is installed in a camera mounted on ‘Yellow,’ the ‘robot dog’ manufactured by Boston Dynamics and configured for security applications by Prosegur. An Azena app is installed in a Vivotek AI box on the back of the dog; it can detect fire, smoke, and moved luggage. Azena apps for flare and leak detection are becoming more popular in the oil and gas industries, and there are camera apps that can monitor tank levels. Cisco Meraki is introducing two new camera models at GSX, with 4K and 4MP options, a terabyte of storage for 4K, and 256Gb of storage for 4MP. Air quality sensors The cameras will allow most customers to record 30 to 90 days of video in the camera at the edge The cameras will allow most customers to record 30 to 90 days of video in the camera at the edge. Also at the show, they introduced a push button and air quality sensors that are easy to incorporate into a Cisco Meraki application. Cisco Meraki also offers a dashboard that is integrated with the rest of the product portfolio to enable users to view devices on the same interface and in the same ‘pane of glass.’ For physical security users, there is the Meraki Vision Portal, which enables physical security users to run a more effective investigation. Features include a floor plan view and the ability to switch among multiple cameras. Users can instantly search videos using ‘motion search’ to easily find an event in a video.
Case studies
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security Safety Act Designation, and Aegix Global, a Utah-based provider of industry-pioneering safety and personal protection resources technology, announced that they have successfully deployed ZeroEyes’ AI gun detection and situational awareness software in more than 200 Utah schools. ZeroEyes’ software has been integrated into the Aegix AIM active incident management platform since spring 2023. Schools and districts that have deployed the combined solution include American Leadership Academy, American Preparatory Academy, and the school districts of Cache County, Carbon, Grand, Juab, Layton City, North Summit, South Summit, Provo, Wasatch, and Waterford School Districts, among others. Aegix AIM platform Aegix AIM platform cuts via chaos to clear guesswork and delays, saving special time in a crisis The Aegix AIM (Active Incident Management) platform cuts through chaos to remove guesswork and delays, saving precious time in an emergency. The system allows individuals in schools, businesses, and other organisations to notify first responders and colleagues about a crisis with the touch of a button. In a worst-case scenario, such as an active shooter, teachers simply push a button in the app to let administrators and first responders know if they are “safe” or “unsafe.” Aegix AIM can be operated from a desktop, laptop or smartphone. “Incorporating ZeroEyes into our AIM solution to mitigate gun-related violence in Utah schools has provided an additional layer of protection for students and staff statewide,” said Chet Linton, CEO of Aegix. “We look forward to the continued success of our partnership.” ZeroEyes' AI gun detection ZeroEyes' AI gun detection and intelligent situational grasp software layers onto living digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and RTC staff as quickly as 3 to 5 seconds from detection. Partnership with Aegix “Amidst the national rise in gun violence, schools shouldn't have to compromise on safety due to financial constraints,” said Mike Lahiff, CEO of ZeroEyes. “We are extremely proud of our partnership with Aegix, which has enabled schools throughout Utah to afford our life-saving gun detection and situational awareness solution."
Metrasens, a recognised pioneer in advanced detection systems for security and safety applications, announced its selection by the Fort Worth Independent School District (FWISD) in bolstering safety measures for graduation ceremonies and extracurricular events. Serving nearly 75,000 students across 140 schools, FWISD conducted a meticulous internal assessment of various technologies, ultimately selecting Metrasens as the preferred solution. FWISD deployed six Metrasens Ultra systems during its 2024 graduation ceremonies. The deployments strengthened safety protocols while synergizing with existing security measures, underscoring the district's unwavering commitment to safety as evidenced by its comprehensive security and safety policies. Fort Worth ISD graduations "We are confident in our choice of Metrasens Ultra to elevate our extracurricular safety efforts," said Daniel Garcia, Safety & Security Executive Director at Fort Worth ISD. "With regards to Fort Worth ISD graduations and other ceremonies, it's paramount that students, faculty, and visiting families feel assured and confident as they come together to commemorate these special occasions." "As we open our facilities to families, it's essential to offer reassurance that Metrasens Ultra systems provide a completely safe solution for all members of our school community." Metrasens Ultra systems The passive nature of Metrasens Ultra systems adds an additional layer of safety for all Metrasens Ultra, renowned for its cutting-edge sensor technology, swiftly and accurately pinpointing potential threats such as concealed weapons, all without emitting any harmful radiation. Its versatility enables effortless transition between indoor and outdoor settings, while its portability ensures convenient setup and relocation between facilities, without necessitating physical contact. The passive nature of Metrasens Ultra systems adds an additional layer of safety for all, including individuals with medical implants or expectant mothers. Moreover, the systems' sleek design and portability seamlessly align with the steadfast commitment to ensuring the safety of all attendees. Advanced detection technology "We are honoured to have been chosen by Fort Worth ISD to implement our advanced detection technology at their extracurricular events," said Chris Arbeitman, Vice President of Market and Business Development at Metrasens. "The district's dedication to safety aligns perfectly with our mission to provide innovative solutions that meet the diverse security needs of our customers."
In 1899, the Texas Legislature authorised the formation of the Southwest Texas State Normal School, which opened in San Marcos four years later. At the time, the school’s mission was to prepare Texas public school teachers, but over the years, it has undergone several expansions and name changes to reflect its evolution into the major multi-purpose university Texas State has become. From its humble beginnings located in a single building, Texas State’s original San Marcos campus has grown to cover a 485-acre campus that is home to 267 buildings, as well as an additional 5,038 acres of recreational, instructional, farm and ranch land. The university added a second campus in Round Rock, which has grown from 15 temporary buildings to a 101-acre campus with state-of-the-art facilities. Electronic key control systems Texas State’s student population has kept pace with its physical expansion, growing from 303 in 1903 to more than 35,546 in 2013 – marking the 16th consecutive year of enrolment growth for the university. Texas State reviewed its security policies and chose the need to execute electronic key Anticipating major physical and population growth to continue into the future, Texas State reviewed its security policies and determined the necessity of implementing electronic key control systems in sensitive areas. Based on its size, the understanding was that as many as 85 of these systems could potentially be needed as part of this initiative. Aggressive construction campaign Texas State was faced with a particularly challenging growth-related issue in September 2013, as its freshman enrolment surged to more than 5,000. Like many universities, Texas State requires its freshmen to live on campus, which it sees as a tool for retention. That policy seems to be working, with approximately 80 percent of freshmen living on campus technically returning for the following semester. To accommodate the growing ranks of on-campus residents, the university has pursued an aggressive construction campaign, building a new residence hall complex every two years to house approximately 600 additional students with plans to break ground this fall on a third new housing complex. In all, Texas State spent more than $190 million on new or renovated buildings, with more construction planned into the foreseeable future. Update key management policies Maintenance staff members would often reach for the key to a particular building they needed to access With a large number of individuals requiring access to so many facilities, the university recognised that key management had the potential to become a high-risk issue and determined to become proactive in reducing that risk. Maintenance staff members would often reach for the key to a particular building they needed to access, only to find it was already checked out. They would then be forced to go through the time-consuming – and frustrating – process of determining who had the key last and tracking that person down to retrieve it. The decision was made to update key management policies and practices to make them more efficient and effective. “We’ve been especially happy with the KeyWatcher’s access and reporting capabilities, and the system’s reporting tools make reviewing events and issues incredibly simple,” Kyle Estes Associate Director of Housing for Facilities Services Texas State. Options for key management systems To combat these problems and increase the security and effectiveness of its key management, Texas State charged its University Police Department and other stakeholders with undertaking an extensive review of the available options for key management systems on the market. This exhaustive process involved gathering research from printed materials and online research, having discussions with current customers of the various vendors, and listening to on-site presentations from the companies under consideration. At the conclusion of its review of key control cabinets and systems, Texas State chose KeyWatcher Touch from Morse Watchmans. This exhaustive process involved gathering research from printed materials and online research The main factors that led Texas State to choose KeyWatcher Touch systems were its robust feature set and competitive pricing. The school was also impressed by Morse Watchmans’ receptiveness to its specific needs – a six-digit user ID, for example – and ability to implement changes quickly. Access to support was also a main consideration, so Texas State appreciated that the system was produced domestically by a company with a 130-year history. Enterprise management capability Of the KeyWatcher systems to be implemented, the largest number were to be deployed for Texas State’s Department of Housing and Residential Life, which provides housing and services to approximately 7,000 residents in 25 facilities. The department also operates a facilities service group consisting of 110 full-time employees and a staff of 170 building paraprofessionals. The department also operates a facilities service group consisting of 110 full-time employees Because of the personnel changes the department experiences on an annual basis, the system’s enterprise management capability has been a valuable feature, as have its robust reporting capabilities, says Kyle Estes, Texas State’s Associate Director of Housing Facilities Services. Having keys available in each residence hall for use by maintenance staff has made the department more efficient and reduced their liability; staff no longer need to carry multiple master keys across campus for different buildings. Centralised management features “Because the system automatically generates a log of who has each key, we’ve been able to establish much better employee accountability for key usage,” Estes says. “The ability to set a maximum duration that each key can be checked out and to receive alarms when that limit is exceeded has eliminated the problem of having keys unnecessarily checked out and as a result inaccessible when someone needs them.” Ease of use and centralised control parts fed by the system’s web capabilities All KeyWatcher Touch systems deployed at Texas State are connected to the university’s network and interface with its card access and email systems. The ease of use and centralised management features provided by the system’s network capabilities have streamlined the once cumbersome process of generating reports and reviewing incidents. One particular feature, the ability to access the system from anywhere, has made the system even more effective, Estes says. Earliest adopters of KeyWatcher Touch As one of the earliest adopters of KeyWatcher Touch, the Housing and Facilities Department served as a test case of sorts for the system. Based on the success the department has had, combined with its continued rapid growth and expansion, Texas State University’s 85-system implementation is ongoing. As more systems are added, expansion will be a consideration moving forward, but Estes doesn’t anticipate that being a problem. “We’ve found that expanding these systems is fairly easy and doesn’t involve time-consuming processes that could delay implementation of key management for particularly sensitive areas,” Estes says. “Overall, the system has been very reliable, and the support staff has been very responsive and regularly available to help resolve the very few minor issues we’ve encountered in a timely manner."
Koning Willem I College in north-east Brabant, The Netherlands offers various educational and integration programmes. In total, around 18,000 students take 250 courses at its 16 locations. Modern educational institution A new location on Onderwijsboulevard in 's-Hertogenbosch was designed to be a model modern educational institution, including its access control. The imposing new building has modern rooms that provide opportunities for consultation, collaboration in small and large groups, presentations, and individual work. Access to these spaces required a flexible and modern locking solution ideally with as few keys as possible. Employees and students must feel welcome and safe. Need for an easily integrated system Dependable security was needed for all kinds of valuable learning materials and sensitive information Dependable security was needed for all kinds of valuable learning materials and sensitive information. “Easy integration with the existing access control system without additional software,” was the goal, according to Alex te Pas, functional manager of facilities management information systems. Keyless access for improved security and management “Within our organisation, we want to phase out the use of keys,” he says. “Because when employees left, we noticed that people often forgot to turn in keys or tokens. In the event of an audit, we then have a problem." Wireless Aperio locks The college chose Aperio locks which are easy to integrate wirelessly with their existing Nedap AEOS access control system. No additional software is needed: wireless Aperio locks communicate via Aperio Hubs which handle secure, real-time communication between locks and the AEOS system. This way, college security staff have full control over access and can quickly revoke anyone’s access rights. Saves time and costs The ongoing cost of using these battery-powered locks is also much lower than for equivalent wired electronic locks Because Aperio devices run on batteries, rather than mains power, there was no need to make any major adjustments to the doors. This saves both time and cost during installation. The ongoing cost of using these battery-powered locks is also much lower than for equivalent wired electronic locks, which require an ‘always on’ connection to the power grid to maintain secure status. Aperio E100 Escutcheon The college chose the Aperio E100 Escutcheon to secure doors throughout the building. The E100 offers a convenient combination of free exit from the inside with automatic locking on closure from the outside. It comes in a variety of specifications to fit different door security levels or everyday usage, including a version with PINpad which adds another level of control. 2-factor authentication With the additional PIN code, the risk of unauthorised access via a found or stolen pass is minimised. “We wanted to provide our technical rooms with 2-factor authentication. So here we chose Aperio locks with PIN code capability,” adds te Pas. Extending an AEOS system with Aperio wireless devices Nedap’s versatile AEOS access control system integrates seamlessly with a broad range of Aperio Nedap’s versatile AEOS access control system integrates seamlessly with a broad range of Aperio devices. End-users can get even more out of an existing Nedap AEOS system by integrating Aperio cylinders, escutcheons, handles, and more, online and/or offline, giving security managers control over traffic to and through more areas at their premises. Multiple device support Nedap integration supports multiple devices from the Aperio range, including the award-winning wireless handle (H100), escutcheon (E100), cylinder (C100), and security lock (L100). Aperio devices are available for almost any interior or exterior door, including wooden and glass doors, as well as fire doors. Online integration with AEOS can use different interfaces (RS485 / IP), connecting lock and system via hubs that control up to 16 locks. AEOS software A full set of powerful functions and events is made available for any Aperio device within the AEOS interface, including door or battery status and tamper detection. AEOS software manages everything, eliminating unproductive tasks including any need to duplicate data entry saving time, and extending control without hassle for building users or administrators.
Named one of Money magazine’s Best Colleges in America 2023, Fairfax-based Geoge Mason University (Mason) is the largest public research university in the Commonwealth of Virginia. Its 10,000 faculty and staff provide classes and support services across three regional campuses, an international branch campus in Songdo, South Korea, and five instructional sites. With more than 40,000 students hailing from all 50 states and 130 countries and a six-year graduation rate that is well above the national average, Mason continues a rapid upward enrollment trajectory that saw headcount and credit hours increase by nearly 2 percent in Spring 2022 and Fall 2023 applications rise by 11 percent. R1 research university In addition to a heavy emphasis on diversity – U.S. News and World Report named it the state’s best public university for diversity and innovation – Mason is a pioneer in technology and research with 40 percent of its students majoring in STEM fields. It is also the youngest nationally ranked R1 research university, a top 10 public university for cybersecurity programmes, and a top 20 public university for five different engineering and education online programmes. University's challenge Providing an exceptional experience had to balance with the need to maintain public access to appropriate services Mason’s rapid growth requires it to embrace system-wide innovation, particularly when it comes to providing a safe, secure university environment for students, faculty, and staff. Providing an exceptional experience had to balance with the need to maintain public access to appropriate services, as well as the convenience of contactless entry and the ability to act quickly when credentials were lost, or stolen or the user’s status with the university changed. Goal “We have a very open campus. Most of our doors are unlocked from 7 AM until 11 PM and we have a public library, so we need to make sure access control isn’t in the way. On the other side, we need to make sure that if something does happen, we can react quickly to unfolding scenarios,” said Daniel W. Anthes, Director of Technology Services, at George Mason University. “The goal is to make it safe, easy, and seamless for people to navigate campus.” Case study Mason had already implemented a card-based access control solution featuring HID® Seos credentialling technology, HID OMNIKEY® chips, HID Asure ID card printing software, HID FARGO® printers, and HID Signo™ card readers. Photo identification cards were encoded with appropriate credentials allowing the holder to access everything from parking to residence and dining halls to facilities and services, including data centres, libraries, and shops by simply tapping or swiping. “Eventually, we reached the point that the switch to mobile credentialling was a straightforward next phase. This would make it easier for staff and students to get where they needed to be without having to fumble with a set of keys,” said Anthes. HID's solution HID Mobile Access lets any compatible mobile device – smartphones, tablets, or wearables – be used as a credential Mason again turned to HID and Atrium, deploying the HID Mobile Access® solution with Seos as the underlying credential technology. Atrium provisions and manages the lifecycle of the HID Mobile Access credentials. HID Mobile Access lets any compatible mobile device – smartphones, tablets, or wearables – be used as a credential to securely access doors, gates, networks, and more. It significantly increases convenience and boosts operational efficiency without compromising security. HID Mobile Access Because Mason had Signo readers already in place, deployment of HID Mobile Access required just a simple upgrade. Importantly, while mobile access eliminates the need for physical access cards, the highly versatile Signo readers support the widest range of credential technologies via native Bluetooth, Near Field Communication (NFC), and Apple Wallet – meaning those who choose to can continue using their physical ID cards until they are ready to transition to mobile access. Seamless integration “Once you get them using the technology, at that point the realisation hits that this phone access is awesome. Or you can use your Apple watch and never even pull your phone from your pocket. There are a lot of things you have to navigate when considering credentials." "Fortunately, the HIDand Atrium Campus partnership offers the complete solution, bundled together and working seamlessly in the way I expected. The seamlessness of the mobile credential and how quickly they can get where they need to be with their phone or wearable is cool to see in action,” said Anthes. Final results Mason’s more than 50,000 students, faculty, and staff can leverage mobile credentials at any campus In addition to access to approximately 7,000 doors across its campus locations, Mason’s more than 50,000 students, faculty, and staff can leverage mobile credentials at any campus cash register, printer, copy machine, and retail and recreational facility. Mobile access will increase the convenience factor exponentially for students, for example enabling express check-in for residence halls at the start 2024-25 school year which will let students bypass queues that in the past were hundreds deep and go straight to their dorm rooms. Mason Mobile ID Mason Mobile ID has also driven a significant drop in the issuance of temporary and replacement cards, saving both the university and students time, money, and frustration. Students can also easily switch credentials to a new wearable or mobile device, eliminating the need to have this done in person – a significant convenience when Apple released its iPhone 15 shortly after Mason transitioned to mobile access. Safety standpoint “We are only two months in, so there are a lot of benefits we have yet to see with Mason Mobile ID, but I’m excited about what we’ve already started noticing in terms of students engaging faster with their peers and community." "The police department also absolutely loves the wearables from a public safety standpoint, because they can get through the doors a whole lot faster than they could with the traditional cards or when they had to fumble with keys,” said Anthes. Operational efficiency Going forward, Mason is exploring expanding mobile access to shuttle buses, which would also allow them to track utilisation data, and for more special events access. “New technology like mobile access is how Mason improves operations, so if there is an opportunity, I will certainly push to have HID involved. There are a lot of things you have to navigate when considering credentials. Fortunately, the HID and Atrium Campus partnership offers the complete solution, bundled together and working seamlessly in the way I expected,” said Anthes.
When students come to study at the prestigious Les Roches Marbella campus in Spain, they are not just attending one of the world’s major hospitality business schools, they are also enveloped in extraordinary innovation and sophisticated living to mirror the exceptional experiences they are being prepared to facilitate in their future careers. Real-life training site The institution aims to serve up “academic rigor with a twist of innovation and entrepreneurship” to its 1,000+ students from all corners of the planet who collectively represent more than 80 nationalities. This real-life training site for elite hospitality professionals must offer an authentic, hands-on experience to its students — one that reflects the luxurious living and progressive comforts expected from high-end hospitality properties and their employees. Digital badge One particular aspect they sought to enrich was integrating “digital badge” access across the coastal Mediterranean To ensure Les Roches is always ahead of the curve and a model campus when it comes to exemplary learning based on cutting-edge technologies, administrators wanted to evolve its mobile ecosystem. One particular aspect they sought to enrich was integrating “digital badge” access across their coastal Mediterranean property in Spain. Project objective The project’s objective was to migrate to a mobile credentials-based system where a student’s plastic access card is replaced by a digital ID on a smartphone. This would serve as the verification for daily physical access and digital touchpoints (e.g., building access, vending machines, restaurant reservations, etc.). This effort would also allow the school to steer digital transformation and student efficiencies throughout its security and administrative functions. Catering to student experience “Everything here is about the student experience,” said Mano Soler, Director of Student Services and Operations at Les Roches Marbella. “It is our main driver and the reason we embrace and foster innovation because innovation makes our students’ lives easier and supports their well-being through secure technology. The students will eventually leave this campus and, in turn, take that know-how and excellence into the world with them.” Case study challenge The team wanted a mobile solution to fit specific campus requirements such as swift access For 10 years, Les Roches Marbella relied on an RFID (radio frequency identification) card-based system to identify and grant access to students. This was a fundamental tool that nearly 1,000 individuals needed to have with them at all times to validate themselves day in and day out. Supporting their quest for digital transformation, as part of the school’s Spark incubator programme, the leadership team wanted a mobile solution to fit specific campus requirements such as swiftly granting/removing accesses, avoiding disruption when students lose/forget cards, and accommodating a multi-system environment. Need for a mobile credentials-based system Management also wanted to drive improvements through back-office processes and procedures to save time and resources and enhance everyday life on campus through modern technology. One of the most pressing factors for this particular mobile initiative was to achieve higher efficiency around the school’s new student intake registration/check-in process each semester. Loading ID credentials individually onto RFID cards, then printing each of the 1,000+ cards, meant corrections along the way were inevitable. System re-adaptation Yet, the transition to mobile didn’t come without a series of obstacles and serious considerations. Each touchpoint where a card was to be replaced with smartphone technology required deep analysis and complex integration work, specifically involving seven to eight different brands whose products were already deployed throughout the premises (e.g., printers, vending machines, security technologies, door access, laundry facilities, parking garages and more). Les Roches required an access partner with solutions compatible with the many other products already in play within its existing infrastructure, and an ability to successfully address former system re-adaptation. iOS and Android support The mobile technology needed to support both Android and iOS phones, as well as physical card technology In addition, the mobile technology needed to support both Android and iOS phones, as well as physical card technology (the RFID ecosystem would remain intact for non-student purposes and serve as a migration path for other areas not yet mobile). The school wanted a single company to supply both the hardware and software elements. And, as a higher education establishment with upscale expectations and an outstanding reputation, the Les Roches decision-makers required a proven partner of this same ilk. HID solution To transform technologies and reach new degrees of onsite productivity and novel amenities, Les Roches Marbella selected HID for its unmatched mobile access portfolio. As a market pioneer in trusted identification and authentication, and with a network of partnerships that spans the globe, HID’s experts designed a system to meet each requirement from the school resulting in a tremendous collection of 40+ access points featuring mobile identification, app, portal, and reader technologies. Mobile components from HID The integration project was completed within an accelerated time frame to ensure it was in place before students set foot onto campus that fall. HID components that comprise this robust mobile ecosystem include HID OMNIKEY® readers and reader modules (OMNIKEY 5427, OMNIKEY 5127CK Mini, OMNIKEY 5127 Reader Core), HID Signo™ access control readers, HID Seos® mobile credentials, Aperio® locks from ASSA ABLOY and Aero™ X100 door modules. HID access technologies With a slight tap or wave of their smartphone, students interact easily with the mobile ecosystem and via the digital Seos credential to authenticate themselves as they move throughout the property each day. HID access technologies are embedded in: Parking garage systems Building entrances Vending machines Laundry facilities Printers Point-of-sale at restaurants/on-campus eateries Restaurant access control Class attendance tracking Dorm room door locks Mobile-first world “You cannot discount the value of mobile when it comes to today’s student populations,” said Soler. “It is their way of life. They were ‘born digital’ and they have an expectation when it comes to smart living, for them, it’s a mobile-first world. We get it. We embrace it. And, we intend to attract and retain students by offering them an unparalleled educational experience while here in Marbella.” Efficiencies and integration “We not only transformed our campus with epic mobile access technology but also drove important efficiencies and integration into everything we touched." "The value and inventiveness HIDexperts contributed to constructing this complicated mobile ecosystem is completely in line with our ongoing quest to ensure that innovation is at the heart of the Les RochesWay of Life," said Carlos Diez de la LastraGeneral Manager Les Roches Marbella. Results achieved HID credentials available via a smartphone make scaling individual access up and down significantly easier Tying back to one of the original reasons for this mobile initiative, registration check-ins are streamlined, and Les Roches Marbella has gained immediate improvements around this important event that takes place each semester. 100% of students use the mobile access system on campus. Students register digitally with the option to do so in-person, ahead of time, or remotely with no human interaction. HID credentials available via a smartphone make scaling individual access up and down significantly easier for IT, faculty, and students. A unique, homegrown handheld tool On a case-by-case basis, Les Roches Marbella is already finding ways to apply its in-house ingenuity to foster disruptive thinking. The school used 3D printers to design a customised case to house phones/tablets alongside HID access modules creating a unique, homegrown handheld tool that easily allows campus security personnel to check IDs as required. This safety support tool came about when there was no suitable offering available on the market to meet the school’s specific needs for security checkpoints. Automated student attendance tracking The flexibility and power of HID components enabled the team to re-imagine and invent an original Les Roches security product to, as always, improve the student experience. Many new use cases are in the works to fuel future “wins” across the premises. Automated student attendance tracking is already at the beginning of each class period and serves as another way to further support and protect students. Mini computers and readers were installed in each classroom so students could use their mobile ID (via their smartphone) to mark attendance. API-based interfaces, Aero door module When students go back to their dorm rooms any time, each door loc is integrated with the Aero door module All is handled by a web application running on the mini-computer that pushes and pulls data to/from the Les Roches Absences application in real time through API-based interfaces. And, when students go back to their dorm rooms any time, each door loc is integrated with the Aero door module, providing them with a seamless experience across the entire campus. Mobile authentication and verification “Our eyes are wide open to all the possibilities afforded by the marvelous world of mobile authentication and verification, and each week we come up with new ideas for the continued transformation we have in motion on our campus,” said Juan Luis Velasco, IT Manager at Les Roches Marbella. “Our students love this newfound convenience, and our staff members are reaping the benefits of this technology overhaul.” Best-in-class mobile access system Les Roches Marbella has a best-in-class mobile access system that squarely aligns with the school’s wider objective to be an example of innovation and excellence in global hospitality training both within its own brand family, as well as within the broader realm of higher education. Beyond elevating the student experience through the convenience of mobile IDs and strengthening security when it comes to student safety and mobile ID verification, Les Roches Marbella has an extremely efficient, flexible, and scalable solution that can grow with them as technologies evolve and digital trends continue to transform and connect us all to an international degree. Benefits of digital transformation “This is a story about the value of mobile and any size campus in any sector of education can benefit from the digital transformation angles when it comes to campus business,” said Velasco. “But the most rewarding aspect truly is connecting to our students in a way that’s important, convenient, and meaningful to them keeping them connected and secure via a device that’s already an extension of their existence.”
Round table discussion
Physical security is a large market overall, encompassing a range of diverse vertical markets, each with its own set of challenges and opportunities. The success of the security industry overall depends on the ability of companies and technologies to meet the specific needs of each vertical market. Some markets offer more lucrative opportunities than others. We asked this week’s Expert Panel Roundtable: Which vertical markets have the greatest potential for growth for physical security systems?
In the United States, they are called licence plate recognition (LPR) systems. In Europe, the more common term is automated licence number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle colour, type, make and model. We asked this week’s Expert Panel Roundtable: What's new with licence plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products
White papers
Access management in higher education
DownloadSchool security checklist
DownloadWhy SAAS Security Platform is more popular in American SMEs
DownloadSafeguard Students With New Techniques And Technology
DownloadAssessing safety readiness for education campuses
DownloadThe critical role of access control in K-12 school security
DownloadProtecting dormitory residents and assets
DownloadSchool security moves to the cloud
DownloadPhysical access control in higher education
Download6 questions to ask when choosing a security system
DownloadHow end-to-end video security solutions can help your organisation with social distancing
DownloadBuilding a safe ecosystem for visitors post COVID-19
DownloadSchooling the market on education security
DownloadModern, flexible access control secures HafenCity University
DownloadHow to keep students safe on campus
DownloadVideos
School security: Manufacturers & Suppliers
Honeywell GARD USB threat report 2024
DownloadThe role of artificial intelligence to transform video imaging
DownloadAccess control system planning phase 1
DownloadKey Findings from the 2024 Thales Cloud Security Study
DownloadFacial recognition
Download