Education security applications
Alamo Colleges in San Antonio, Texas supports more than 65,000 students and 7,000 staff. It's five campuses and smaller regional learning centres connect students and staff, expanding the reach of learning for the community. Colleges' challenge Alamo’s challenges included leveraging technology to support its high standards of safety and security as a priority for its campuses. They were tackling a technology gap among users across the diverse landscape of the larger S...
In Neuss, Düsseldorf, and Meerbusch, ISR (International School on the Rhine) offers an excellent international education from kindergarten to grade 12. The teachers at ISR prepare students for the world's most prestigious universities, placing great emphasis not only on academic excellence, but also on positive character development and the teaching of values. Since 2022, ISR has also been using the DeepHub whiteboard for this purpose. Test phase from 2022 "The modernisation...
As a provider of future-oriented business education, The Camp sought an access control solution as forward-thinking as their courses. Their campus site near Aix-en-Provence is diverse, with offices, event spaces, kitchens and two accommodation blocks totalling 170 units. The Camp must remain open around the clock, all week, while maintaining security for staff and visitors. Aperio wireless locks Meeting rooms, server rooms, living spaces and kitchens are secured with Aperio wireless locks Ap...
In 1899, the Texas Legislature authorised the formation of the Southwest Texas State Normal School, which opened in San Marcos four years later. At the time, the school’s mission was to prepare Texas public school teachers, but over the years, it has undergone several expansions and name changes to reflect its evolution into the major multi-purpose university Texas State has become. From its humble beginnings located in a single building, Texas State’s original San Marcos campus has...
Koning Willem I College in north-east Brabant, The Netherlands offers various educational and integration programmes. In total, around 18,000 students take 250 courses at its 16 locations. Modern educational institution A new location on Onderwijsboulevard in 's-Hertogenbosch was designed to be a model modern educational institution, including its access control. The imposing new building has modern rooms that provide opportunities for consultation, collaboration in small and larg...
Named one of Money magazine’s Best Colleges in America 2023, Fairfax-based Geoge Mason University (Mason) is the largest public research university in the Commonwealth of Virginia. Its 10,000 faculty and staff provide classes and support services across three regional campuses, an international branch campus in Songdo, South Korea, and five instructional sites. With more than 40,000 students hailing from all 50 states and 130 countries and a six-year graduation rate that is well above the...
News
Morse Watchmans, the industry pioneer in key control and asset management systems, reports a rising number of domestic universities installing the company’s flagship key control system, KeyWatcher® Touch, to facilitate heightened levels of security and safety on campus. KeyWatcher Touch systems Recently, Morse Watchmans reports new, multi-department deployments of its KeyWatcher Touch systems at Boise State University and Marquette University. Additional higher education facilities, including the University of Michigan, Ohio State University, Yale University, University of Texas, and University of California have recently expanded or upgraded their existing KeyWatcher Touch systems with many others having placed or plan to place orders for fulfillment in 2023. First-of-its-kind key control solution KeyWatcher Touch improves university security while reducing costs related to theft, loss, and re-keying" “We are witnessing universities across the country embrace our first-of-its-kind key control solution because it allows departments of all types to manage campus security in a specific, yet highly integrated manner across the campus enterprise,” said Tim Purpura, VP of Global Sales and Marketing, Morse Watchmans. “Moreover, KeyWatcher Touch improves university security while reducing costs related to theft, loss, and re-keying, assuring campus security and facilities teams alike that their security investment offers tangible ROI.” Scalable key control solution Because KeyWatcher Touch systems are infinitely scalable, it is possible for universities to start with one system and add on more as needed. In this way, key control and asset management solutions fit the needs of departments and universities now and into the future. Morse Watchman’s KeyWatcher® Touch electronic key cabinet is a scalable key control solution for organisations looking to secure, manage and track keys and other assets. KeyAnywhere technology With a 7” touchscreen and patented SmartKey system with industry-first KeyAnywhere technology, it is easy to withdraw and return a key securely to any key cabinet located within an enterprise. KeyWatcher® Touch also integrates with many brands of access control systems for a layered security approach.
More than one million electric vehicles are registered in the U.S.—and they all have to plug in somewhere. As EV charging stations pop up across the country, one of the chief questions will be how charging station users are identified, authenticated, and connected with membership or payment systems. Radio-frequency identification cards and tokens and smartphone authentication apps have emerged as two viable options for EV charging authentication. Which is best? It may depend on the user base they plan to serve. User authentication for EV charging Most electric vehicle owners have a spot to plug in while at home, either in their own garage or carport or in a designated charging spot in a tenant parking garage. But electric vehicles also need spots to charge while owners are out and about. The EV charging market is broadly divided into two tiers: Level 2 charging stations, which operate at 208-240 V and use AC power. These stations will add 20-25 miles of range in about an hour of charging. The U.S. Department of Transportation listed more than 22,800 public Level 2 EV charging stations across the nation as of mid-2020. They are commonly found in public parking lots and garages, hotels, grocery stores, malls, and other commercial areas. They may also be installed in private parking garages and business parking lots for use by tenants, employees or fleet drivers. Collecting membership data Direct Current Fast Chargers (DCFS) are designed to charge an EV battery to about 80% in 20-30 minutes. There are currently about 15,000 DCFC stations across the U.S., but their numbers are expected to explode as more people start taking EVs on longer road trips. They are commonly found along major interstate highways. As the market evolves, user authentication requirements for EV charging stations are likely to vary by type, location, and user base. Some commercial locations may provide Level 2 EV charging as a free amenity to shoppers, guests or employees. If there is no charge for the service, there may be no need to authenticate users at all— people can simply park and plug at any available spot. However, there may be a benefit to collecting membership data (e.g., shopper reward club). Private charging stations Public, for-profit EV charging stations, like gas stations, need a method to collect payment for their services. In some cases (especially at roadside DCFS stations), users may simply pay for the minutes used with a credit card—just like at the gas station pump. However, many EV charging station users are already accustomed to identifying themselves with an RFID membership card or a smartphone app. Charging networks like ChargePoint and Blink enable members to access any EV charging station within their networks with a card or smartphone app, which connects to their membership, account, and payment information. Private charging stations—such as those offered to tenants, employees or fleet drivers—may not require payment but need to ensure that only authorised drivers are accessing power and taking up valuable parking spots. An RFID card or smartphone app can be used to identify authorised drivers and track charging behaviours. Moving forward, many EV charging stations may find that they need a mix of options for users, including membership cards, smartphone apps, and a credit card payment option for out-of-network drivers. Choosing between RFID and smartphone apps In the long run, the answer may be ‘both.’ RFID cards are economical and easy to issue When user identification and authentication are desirable, which is the better option: RFID cards or smartphone authentication? Both have their uses in the EV charging market. In the long run, the answer may be ‘both.’ RFID cards are economical and easy to issue. And for some users bases, they may not have to issue a new card at all—they can take advantage of an RFID card they already carry. In many cases, it is possible to leverage existing employee IDs and membership cards for access to privately controlled EV charging stations. RFID membership cards may be a good bet for: Fleet drivers who already carry an RFID card for vehicle access. Employee parking lots and garages where people already use a card for entry. EV charging parking spots at gyms or other locations where users want to limit charging access to active members. EV charging stations Most consumers would prefer not to have to carry a physical membership card for every retail outlet On the other hand, public charging stations may find that consumers would prefer to use a smartphone app rather than receive another membership card to carry in a physical wallet. Many consumers prefer to carry only their phone and one or two essential cards (such as a driver’s licence and a single credit or debit card). As more retailers enable consumers to pay via a digital wallet app on their smartphones, some don’t even carry a physical credit card anymore. Most consumers would prefer not to have to carry a physical membership card for every retail outlet they visit—and that includes EV charging stations. Smartphone apps for user authentication are simple to set up and highly secure. Instead of RFID, they typically use either Bluetooth® Low Energy (BLE) or Near-field Communication (NFC) protocols. Public charging stations For the user, the experience is almost identical to RFID authentication, except they wave a smartphone over the reader instead of a card. Apps have other user benefits, too. A custom app for EV charging can be configured to help users locate or reserve charging stations, check their balance and usage history, and change their payment options right on their phone. These features make smartphone authentication ideal for consumers These features make smartphone authentication ideal for consumers accessing a network of public charging stations. However, EV charging network managers should keep in mind that some users may still want a physical membership card. Smartphone-based authentication There are still some user populations, such as older consumers and those from lower income brackets, where smartphone ownership is not ubiquitous. If users are primarily using EV charging for a fleet vehicle, they may not want to download an application for work on their personal cell phone. Other users may find smartphone apps confusing or simply prefer to have a card for other reasons. The answer for both public EV charging networks and private charging station owners is to have an RFID reader that is capable of both card-based and smartphone-based authentication. This will provide maximum flexibility as user preferences change. Finding the right RFID reader for EV charging The ELATEC TWN4 MultiTech family of readers is ideal for authentication at EV charging stations The best RFID reader for EV charging is one that is flexible enough to meet the needs of all user populations and evolve as requirements change. The ELATEC TWN4 MultiTech family of readers is ideal for authentication at EV charging stations. The readers support 60+ RFID transponder technologies along with BLE and NFC smartphone authentication. This means that one reader can support all common technologies already in use across the entire user base—both nationally and internationally. This capability becomes important for applications where users want to enable drivers to use an existing RFID card (such as their employee or fleet ID card or an access card for a tenant parking garage) for access to charging locations. It also provides more flexibility as technologies or preferences change in the future. Supporting advanced encryption TWN4 MultiTech supports advanced encryption and security configurations for highly secure transactions between the card or smartphone and the reader. This is important for EV charging applications tied to payment or employee/driver identification. ELATEC readers are mobile-ready. The ELATEC Mobile Badge BLE NFC App offers simple and effective components for building or extending a mobile application for EV charging networks. Non-managed mobile credentialing using the ELATEC app is free. TWN4 MultiTech readers also work with multiple existing third-party managed credential systems, such as KleverKey, Safetrust, and Transact. The TWN4 MultiTech is easy to customise with the powerful Software Development Kit (DevPack) and App Blaster and Director utilities. Readers can be easily configured to support custom functionality (such as LED light flashing sequences or sounds for user feedback) and integration with backend software for easier member management. The DevPack tools make the TWN4 family the most powerful, versatile, and sustainable readers on the market. Hardware communication interfaces As electric vehicles move from niche to mainstream, EV charging infrastructure will need to grow and evolve to accommodate millions more drivers—both in the consumer market and in commercial fleets. With TWN4 MultiTech, EV charging station managers will be ready. Interested in learning more about technical considerations for RFID? Download 11 Considerations for Embedded System RFID Readers for additional advice, including operating power and consumption requirements, antenna placement, hardware communication interfaces, and more.
Mul-T-Lock has worked closely with K.B.O Fire & Security to upgrade the security at Guildford College, in the United Kingdom (UK), creating a dedicated master key suite for the ultimate peace of mind of staff, pupils and visitors. Guildford College is the largest further and highest education college in the Surrey area, with approximately 3000 students and offers courses at all levels. Success rates are higher than national benchmarks with many students operating with the local community on a regular basis. Control and secure access for Guildford College K.B.O Fire & Security offered a number of innovative ideas to ensure complete security Controlled and secure access is a high priority for the Estates and Facilities team, who sought the advice of K.B.O Fire & Security to undertake a comprehensive security overview. K.B.O Fire & Security offered a number of innovative ideas to ensure complete security and a smooth operating system throughout the college site. Mul-T-Lock’s high security MTL400 patent protected solution The resulting master key suite was designed and installed using Mul-T-Lock’s high security MTL400 patent protected solution, which combines advanced technologies with enhanced key copy control and maximum resistance to all forms of lock manipulation. Sandra Searle, the Facilities Customer Services Manager at Guildford College, said “The college is committed to offering staff and students a vibrant, happy and nurturing learning environment. So that we can do this as safely as possible, we ensure the security systems, right from the entrance to the college and throughout the site, are all maintained to a high level.” Bespoke Mul-T-Lock master key suite system Sandra Searle adds, “K.B.O Fire & Security worked with us to produce a bespoke Mul-T-Lock master key suite that could enable total key management control. We are particularly impressed with the advanced protection capability as it means as a team, we can maintain a single key to open all doors as required and maintain differential access to rooms between staff, visitors and students.” With up to 90 cylinders installed in a scalable design, the master key suite system was installed quickly and efficiently, in order to ensure minimal disruption to learning timetables. Offering flexibility in access control With Guildford College, we like to consider ourselves as part of this team" Lance Harding of K.B.O Fire & Security stated, “With Guildford College, we like to consider ourselves as part of this team, where we can really understand the bespoke requirements. The benefit of working in this way is allowing for the flexibility of access, including accounting for the large number of part- and full-time students, alongside the wider community, who all use the facilities.” Lance Harding adds, “Here a master key system was the best choice and using Mul-T-Lock enabled total patented key control to keep the college, and all who attend safe and secure.” Mul-T-Lock and K.B.O Fire & Security partnership Tom Hyslop, the Regional Sales Manager at Mul-T-Lock, concluded by stating “By working with the college and K.B.O Fire & Security early in the specification process, the right level of protection could be designed into the master key suite, choosing MTL400 to make sure staff and students can work and learn in a safe and secure environment.” Tom Hyslop adds, “It also meant installation could be planned carefully around learning timetables. And now, staff can focus and maintain their high standards for the benefit of all who attend with total peace of mind security.”
A significant number of U.S. parents of school-aged children feel insecure about, and support increasing, security measures in their children's schools, according to a survey conducted by Oosto following the Uvalde school shooting earlier this month. Survey findings When asked if parents felt their children's schools were safe, more than 11% of respondents stated that their child’s school is either somewhat or very unsafe. Moreover, 18% of respondents have refrained from sending their child to school in the past year for fear of their safety, and 20% of respondents considered moving their child to another school, city, or country. In brief, 59.4% of respondents support additional security measures in place. Additional access control measures Thirty percent of the responders support better equipping and training teachers Of those that preferred a security measure, 38.6% of U.S. parents support access control at school entrances, 28.2% support CCTV and video surveillance, and 28.8% support the use of real-time video surveillance to detect potential threats. Thirty percent of the responders support better equipping and training teachers. The survey was based on survey results from two thousand U.S.-based parents (June 2022). Gun violence “There have been 265 mass shootings so far this year in the U.S. according to the Gun Violence Archive, and we simply return to the ‘old normal,’” said Avi Golan, CEO of vision AI technology leader, Oosto. “This has become a very personal issue for me and I’m tired of talk and social media debates that amount to no change. We’re starting to get sensible gun reform initiatives proposed, and that’s a good start, but we also need very tactical plans in place to help teachers and administrators better protect their schools.” Security technologies Let’s act now and at least have the technologies in place to help expedite a better response" In an opinion column recently published in SourceSecurity, Golan wrote, “There is no single technology that will prevent this type of tragedy." "But, let’s act now and at least have the technologies in place to help expedite a better response while we simultaneously debate the deeper questions about the nature of education, mental health, and guns in American society. We owe it to our children.” School Safety Emergency Summit Mr. Golan will be one of several panelists who will address the issue of school safety at the School Safety Emergency Summit. The Summit is being hosted by Carnegie Mellon University’s Biometrics Center and will be moderated by Ben Chapman – U.S. education reporter for The Wall Street Journal and will include distinguished panelists from the school security space including Guy Grace, Retired Director of Security for Littleton Public Schools, Colorado and Chairman of the Partner Alliance for Safer Schools (PASS); Michael Matranga, CEO of M6 Global security consultancy and former U.S. Secret Service agent; Bruce Montgomery, National SLED-FED Market Leader with Honeywell and 25-year law enforcement veteran; and Professor Shlomit Yanisky-Ravid, Yale Law School. Real-time security and safety alerts The summit will also include a 20-minute session with Prof. Marios Savvides, head of Carnegie Mellon University’s Biometrics Center. Prof. Savvides will review some of the latest developments in computer vision and artificial intelligence, and how these can provide security and safety alerts in real-time including early warning signs that can be identified through the help of Vision AI.
Interface Systems, a managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, announces two scholarship programmes to help provide financial support to college students pursuing STEM (Science, Technology, Engineering, and Mathematics)-oriented studies and careers. The ‘Tech for Good’ scholarship, which was launched in 2021, recognizes students who demonstrate a passion for using technology to solve real-world problems. Pursuing higher education This year as part of Interface’s Diversity, Equity, and Inclusion (DE&I) initiatives, the company is adding a new ‘Women in STEM’ scholarship that is open to women with a strong academic record who are pursuing higher education in science and technology. Students will need to be enrolled full-time in an accredited US university for the 2022-2023 academic year Students selected for these scholarships will receive the one-time US $5000 grant to help them continue their education. To be eligible for these scholarships, students will need to be enrolled full-time in an accredited US university for the 2022-2023 academic year, studying any technology-related course. Providing academic references This year, the deadline for submitting the application will be November 15th, 2022. Applications can be submitted online, and finalists will be expected to provide academic references. “We are proud to support students from diverse backgrounds on their path to becoming scientists, innovators, and engineers,” said Brent Duncan, CEO of Interface. “We look forward to ideas that demonstrate how technology can be applied to change social, environmental, and economic outcomes for the better.”
In a first of its kind initiative, Concept Smoke Screen is partnering with criminologists from the University of Lincoln to assess the impact of their systems on retail loss prevention and on crime in surrounding communities. The new partnership was born out of Concept’s ‘Connected’ campaign, which urges a radical rethink of the private security industry’s approach to crime prevention. A significant part of the Connected project focuses on collaboration between academia and industry to address structural-level causes of crime and approaches to tackling them. Security systems manufacturers We’re hugely excited about this new partnership and the insights it will provide for ourselves" This initial study, with the Criminology team of the School of Social and Political Sciences at the University of Lincoln, will also act as a pilot for further investigation into the way that security systems manufacturers and security users can work cooperatively with researchers to share data, providing insights into criminal trends and patterns which have not traditionally been available to either group. “We’re hugely excited about this new partnership and the insights it will provide for ourselves and our clients,” Concept MD Matt Gilmartin said. “We see it as both extremely valuable in itself, and as the first step in an ongoing collaboration with the University of Lincoln team.” Private security companies “Data is absolutely critical to intelligent crime prevention planning, and being able to assess that data in a wider, holistic context will allow us to make smarter choices about how and where our systems are deployed. And we’ll also be better able to advise Smoke Screen users about the broader social impact of these sorts of loss prevention measures.” Dr Sue Bond-Taylor, Senior Lecturer and Criminology Programme Leader in the School of Social and Political Sciences at the University of Lincoln, said: “The University of Lincoln Criminology team welcome this opportunity to support Concept’s ambition to become pioneers within the security industry. Their aim is to promote a more ethical and sustainable industry, in which private security companies can make a positive contribution to the communities in which they operate, and we are excited to help them achieve this vision.” Loss prevention strategies We expect to be able to produce precise and up-to-date estimates about the impact of loss prevention strategies" Dr. Nick Cowen will lead the quantitative data team on the project. “By pooling data from across multiple sites and multiple retailers, we expect to be able to produce precise and up-to-date estimates about the impact of loss prevention strategies, as well as where, when, and how the application of these strategies is likely to be most effective,” he said. “Additionally, because we will be establishing the broader social impact of effective loss prevention on the public’s experience of crime and disorder, we anticipate that this will help Concept’s clients substantiate and document their contributions to wider public values according to Environmental, Social and Corporate Governance criteria.” Security fogging technology This initial project has been made possible thanks to a productivity voucher from The Productivity Programme for Greater Lincolnshire, delivered by the University of Lincoln and funded by the European Regional Development Fund. Productivity vouchers provide micro, small and medium businesses with the academic capacity and technical expertise of the University to address a specific business need to drive forward a new idea, product, process or service. Concept Smoke Screen is an award-winning Lincolnshire-based electronic security system manufacturer, specialising in security fogging technology. The Smoke Screen range of products provides direct but harmless confrontation to criminal intrusion, while simultaneously defending high risk property.
Expert commentary
In the past, security and IT teams operated independently, but today collaboration is critical. Modern security systems rely on various devices and systems that are linked to internal and external networks. Without IT involvement, physical security can become a weak point for cybersecurity. Although these groups have made headway in partnering up to ensure the successful implementation of new solutions, often there’s still a disconnect. Differing skills, priorities, and unique ways of thinking have contributed to siloed ways of working. Unified security technologies Thankfully, solutions do exist to help improve coordination between teams and departments Other factors can also make collaboration more difficult. Budget limitations and staff turnover may result in a lack of specialised security training among operators, who don’t know which stakeholders to engage or when. Staff may be willing to collaborate, but do they know who should be alerted when there’s an event? If everyone is alerted to everything, those who don’t need that information will eventually start to tune out. Thankfully, solutions do exist to help improve coordination between teams and departments. Unified security technologies can enhance collaboration, streamline communication, and improve response times. This enables cross-functional teams to respond faster, make better decisions, and work together to enhance overall security. IT and physical security teams Physical security teams are experts at identifying and mitigating physical threats to the organisation. IT teams know the ins and outs of keeping systems and networks secure. Both roles and skill sets are critical to securing the enterprise, but siloed operations create barriers to effective collaboration. Because IT and physical security teams have different mandates, meeting the needs of both can be tricky. In some organisations, different departments or specialties also have their own reporting structure and may have different ways of working. Silos may even exist within departments. Overcoming challenges to collaboration Addressing these challenges is the first step toward improving collaboration For example, floor security, dispatchers, investigators, and loss prevention specialists may be used to operating independently in their day-to-day routines. They may not always share data or involve each other in decision-making. Pioneers of these departments are used to being in charge of their domains and may resist initiatives that appear to threaten this independence. Addressing these challenges is the first step toward improving collaboration. Organisations need effective tools to filter out the noise and ensure that the right people get the information that’s relevant to them every time. There are tools available to help teams collaborate effectively, stay accountable for completing tasks, and keep track of what’s been done while maintaining departmental goals and objectives. The right technology can help break down silos The first step to improve collaboration is to break down silos between your security systems. Choosing a unified security platform creates a solid foundation for cross-functional collaboration. It ensures that your physical security and IT teams are reading from the same database. Everyone can see potential risks across both digital systems and physical sites. Unified security solutions centralise monitoring, alarm management, and reporting in a single interface. This helps security teams manage incidents, run investigations, and oversee all security policies. Risks of real-time cybersecurity Data from security systems can be useful to analyse and improve operations and customer experience Within the same platform, IT experts can have a comprehensive view of real-time cybersecurity risks. They can also implement a single data protection and privacy strategy across all locations. Built-in cybersecurity tools help to standardise encryptions, multi-factor authentications, user privileges, and more across the enterprise. In many organisations, colleagues from other departments also find great value in having access to this information. Data from security systems can be useful to analyse and improve operations, customer experience, facilities management, and more. There are many ways to collaborate using a unified security system. Depending on your goals and operating procedures, you have different ways to go about it. The starting point is always to simply get everyone on the same page. Leveraging technology for more effective collaboration A unified security software platform can not only manage your video surveillance, access control, automatic licence plate recognition (ALPR), and other physical security systems, but also data from many other kinds of IoT devices and databases. The volume of data is immense, but thankfully these systems can offer ways to filter out the noise and keep operators focused on the most relevant data for their work. Being able to quickly gather, analyse, and share data with other team members can make or break an emergency response. In one case, an attack at a convention centre was thwarted after a team member monitoring social media mentions of an event noticed threats published online. When security operators were alerted, they were able to use video analytics to identify the suspect at the event. Using a unified security platform, the operators were able to send the camera view to other team members near the suspect. In the end, they were able to stop the attack through multi-departmental collaboration. Right security platform The right security platform can also help you drive more effective and proactive operational decision-making The right security platform can also help you drive more effective and proactive operational decision-making. When bringing datasets from disparate systems together, it's easier to discover relationships and make changes to business operations. For example, in a retail environment, combining access control, heat maps, and point of sale (POS) data can provide insights into customer activity. This kind of data may be used for things like loss prevention, but it can also be helpful to improve customer experience by improving traffic flow or directing staff toward the busiest areas of the store. The importance of automation One of the most important ways a unified security platform can optimise operations and encourage collaboration is to leverage automation to prioritise and triage alerts. This reduces false alarms and streamlines emergency responses. The reality today is that security operators aren’t always specialists. In K-12 school campuses, for example, the person monitoring the system is often an administrator or teacher. A non-specialist operator may be comfortable using the system in their day-to-day routine, but what about when the unexpected happens? If they don’t know what to do in an emergency, precious time may be wasted while they look up written instructions or call a colleague to help. Instead of keeping your SOPs in a paper binder, you can digitise them so that your security platform guides operators. They immediately have the steps to follow in an emergency. The system can even automatically alert internal or external stakeholders if certain conditions are met. Pros of automation Automation may also reduce false alarms. Nuisance alerts are a real problem for many organisations because they pull resources away from important tasks. When there are many false alarms, operators can also become desensitised to them, which slows response in a real emergency. Nuisance alerts are a real issue for many corps because they pull help away from vital tasks There are several ways that a unified security platform reduces false alarms. When data from multiple systems is brought into the same platform, a door-forced-open event can be cross-referenced with footage from nearby cameras or motion sensors. The system is programmed to do this automatically and issue a priority alert if there’s both a door forced open and motion detected in a restricted zone. Or, when a door open alert happens, the system can direct operators to first check nearby cameras and then decide whether or not to send a security guard to investigate. Every organisation is unique and automations will reflect that. Stadiums or public transit may want to automate notifications to stakeholders’ phones, change the message on a digital marquee, or broadcast a public announcement when there’s something to communicate. In a school context, perhaps there is a panic button under the front desk, which triggers a threat alert. When the button is pressed, all classroom doors are locked from the outside. Teachers can get a text message notification warning them about the threat, and local police are alerted instantly. Practical steps for building a collaborative security environment As exciting as it can be to explore the possibilities of new technologies, it’s important to have realistic expectations. Start with small steps and simplify as much as possible. Operators require time and training to adapt to new systems, and teams that have been working independently may need time to develop rapport and trust with each other. When adopting new technologies, a phased approach is often best to avoid overwhelming staff. If staff are resistant to change, focus on understanding their perspective: what are they trying to accomplish? What motivates them? What are they afraid of? Once you understand what’s driving their objections, you can come up with solutions to work through concerns. In today's rapidly evolving security landscape, fostering collaboration between physical security and IT teams is no longer a luxury—it's a necessity. By breaking down silos, leveraging integrated security technologies, and embracing data-driven decision-making, organisations can significantly enhance their operational efficiency and response capabilities.
Changing customer needs can make specifying an alarm system that will continue to deliver in the long term a challenge. However, the latest modular alarm solutions provide the opportunity to build a more individualised system from the outset, as well as offering the ability to up-scale in the future without causing disruption. Martin Wilson, North EMEA Regional Director at Resideo, looks at how alarm specialists can use this style of solution to both benefit customers and build their own business opportunities. Holistic sense of home security In a survey of 1,000 homeowners undertaken by Resideo, the results revealed that, although deterring burglary was still a top priority, consumers were moving to a more holistic sense of home security, wanting to bring convenience, and property and life safety, into the mix. An alarm system no longer needs to function on one level, alerting only to a break-in taking place Indeed, an alarm system no longer needs to function on one level, alerting only to a break-in taking place. The latest modular alarm systems offer the flexibility to create a scalable security and life safety platform for homes and small businesses, as well as giving installers the ability to suggest future update options that can be added as and when budget or requirement allows. Valuable up-scales Finding an alarm that can be scaled over time has the obvious business benefit of ensuring it is easy to revisit and add to as customers naturally expand their existing security. With many modular designs connected via WiFi, this not only means installers can opt for the right mix of sensor options from the get-go but also that any additions can be connected to the panel and system with ease. Many control hubs have winning features in their own right. The ProSeries security panel by Resideo, for instance, has an intuitive touchscreen, easy-to-read, full-colour display to reduce false alarms, plus a built-in camera, speaker and microphone, intuitive icons and even five-day weather alerts. The ProSeries security panel by Resideo has an intuitive touchscreen Natural up-scale opportunities For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition For the installer, it has a plug-in power connection, trouble-shooting videos and end-user replaceable batteries to reduce unnecessary callouts. However, to build a scalable system, this needs to be coupled with the right, flexible solutions to tackle customer concerns. Taking the time to find out what is important to the end user is vital here and can lead to natural up-scale opportunities. For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition. Similarly, a panic button and even medical transmitters may be of benefit to others. All this, as well as other options, such as glass break detectors, door and window sensors and indoor and outdoor MotionViewers™, are available within the ProSeries range, and can be updated or added to an installation as needed or as a property grows with minimum disruption. Adding life safety The ability to propose an alarm system that can bring together alerts for different threats – for both the home and life – under one platform, also has real appeal. Indeed, in a survey of 1,000 homeowners undertaken on behalf of Resideo, a system’s ability to alert to the dangers presented by fire and CO was mentioned as an important part of the decision-making process by 41% of participants. For many, this increased awareness may stem from the many regulation updates regarding smoke and carbon monoxide (CO) alarms that took place in 2022. In Scotland, for instance, carbon monoxide detectors were required to be fitted in any room with a carbon-fuelled appliance in all homes, rented or owned. Social housing properties In England, smoke and carbon monoxide alarms were required in all social housing properties In England, from the 1st of October 2002, smoke and carbon monoxide alarms were required in all social housing properties, with carbon monoxide alarms now mandatory in the private rented sector. Wales followed suit in December for rented accommodation. The new guidance for England and Wales requires at least one smoke alarm to be installed on each storey of a property, to help alert to domestic fires more quickly, ensuring a quicker evacuation and reduced risk of fatality. For professionals, systems such as ProSeries, can be connected to a series of smoke and carbon monoxide detectors, in a ‘one-go-all-go’ setup that means the alarm will go off if one of these threats are identified. Smart and connected benefits The total Connect 2.0 app gives ProSeries end-users the ability to view and control the security platform remotely. The Resideo Pro app currently gives installers the ability to view the system and connect to the central monitoring system. The platform also supports home automation as it works with Zwave devices. The platform also supports home automation as it works with Z-wave devices. The platform also supports home automation as it works with Z-wave devices There are also extra benefits for alarm professionals too. The AlarmNet 360™platform on which ProSeries is configured gives greater insight to improve business operations, increase efficiency and deliver insights on accounts to identify additional upsell opportunities and ongoing services. Providing the ability to remotely diagnose brings valuable time-saving options and avoids unnecessary callouts. It also means the ProSeries panel and peripherals programming can be accessed anytime, anywhere, using the cloud, allowing ease of programming, troubleshooting and account management on the go. Needs and future possibilities Changing a complete alarm system to apply new functions is never going to feature highly with the end user, nor does it work where longevity and sustainability is concerned. Having the ability to build a modular system and add to this as needed, whether this is at a property or a small business, provides benefits for both customers and professionals when it comes to meeting immediate needs and future possibilities. Add connectivity and remote access to this and you have a platform that can help streamline business operations, putting professionals more in touch with customers, and helping to spot future opportunities.
The adoption of innovative and interconnected door hardware systems can help overcome the challenges associated with building security, explains Daniel May of Consort Architectural Hardware. The security of our built environment and the safety of its people is paramount throughout a building’s lifecycle. While these elements remain a primary focus at each touchpoint of a construction project, today’s design teams are sooner adopting modern access control systems to address this age-old challenge, but why? Modern access control Where systems were once rudimentary, modern access control has evolved into a revolutionary factor of building design, unlocking various benefits for its many users in the process. The Internet of Things (IoT) has enhanced building security as we know it, and as technology continues to advance, more options enter the market. Following more than a decade of innovation and integration, the access control market is projected to grow year on year, from £7.8 billion in 2023 to £11.8 billion by 2028. Modern user requirements have led to several operational and technological advancements Modern user requirements have led to several operational and technological advancements during this period, and decision makers and design teams alike can now choose from a versatile selection of options. Some door hardware products now utilise smart locks, cloud control and even biometrics for example, and most recently, there’s been a substantial change to the way access control systems operate, with focus moving towards end users and ease of use. Modern access control has evolved into a revolutionary factor of building design Smart door hardware From an operational perspective, interconnected access control systems gift users with an intuitive network that improves building security through the use of real-time status updates, while also providing them with the ability to grant instant access approval and denial at the touch of a button. Often, users can operate their building’s various access points through their mobile phone, which has led to improved flexibility and efficiency in most environments - whether at home or in a public access property. The security benefits also become clear when compared to the alternative of physical keys. If a traditional key is lost or stolen, the security of a building becomes at risk until it is found or replaced. Intuitive access control systems are designed to build upon the traditional lock and key methods. By seamlessly integrating smart door hardware into both new and retrofit projects, users can manage access points and improve security across the building - without stifling ease of access, stunting future scalability or unsettling the aesthetics. Users can operate their building’s various access points through their mobile phone Access control system The PSIA standard is one of the widely recognised and respected standards for access control products As many adopt Wi-Fi infrastructures, NFC technology and cloud services into their buildings, decision makers must also consider the need for better standards. While the introduction of IoT may advance security, performance and functionality, it can also introduce new risks which must be mitigated by adhering to both localised and international standards, such as ISO 27001 for example. The Physical Security Interoperability Alliance (PSIA) standard is one of the widely recognised and respected standards for access control products and provides comprehensive requirements for systems by focusing on interoperability, scalability, and functionality. While the introduction of IoT may advance security, it can also introduce new risks Providing comprehensive requirements This standard ensures that access control products from different manufacturers can seamlessly integrate and communicate with each other, allowing for greater flexibility and choice when designing a complete access control system. After all, a one size fits all access control solution simply doesn’t exist and decision makers would be remiss in not selecting a product that aligns with their building’s needs while meeting the required standards.
Security beat
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information, perhaps just a voice on the phone or a location on their screen. Providing critical information Today, there are literally millions of information sources available, ranging from connected buildings to vehicle telematics to live video streams to health information from wearable devices. In fact, there are 540 million connected devices, any one of which could provide critical information in an emergency. But how can those information sources be leveraged to improve emergency response? That’s the mission and value proposition of RapidSOS, an ‘intelligent safety platform’ company that connects 911 operators with the vast universe of information available to promote better and faster emergency response. Highly sophisticated operation The platform is integrated into every major public safety software system and first responder agency “RapidSOS fuses human and artificial intelligence to put critical information from any connected device directly into the existing systems and operating procedures of first responders across the United States,” says Michael Martin, CEO of RapidSOS. RapidSOS is widely used by first responders. The platform is integrated into every major public safety software system and first responder agency. There are more than 4,600 software integrations that serve more than 21,000 first responders and 911 agencies. In 2023, RapidSOS supported the lifesaving work of public safety across 171 million emergencies with 3.3 billion data payloads. The system is adaptable and configurable to support any agency, from a highly sophisticated operation in New York City to a local sheriff running their own 911 center. Intelligent analytics and reporting RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation, rich content pathways, redundant connection to caller phones, and access to millions of connected devices. In an emergency, Unite intelligently fuses data from among millions of sensor feeds into a unified picture of an incident, allowing public safety officials to view real-time location, health profile, telematics, alarm data, and more. RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation RapidSOS offers core modules that handle call, text, video, sensor, mapping, and administration tools, and that provide partner data from connected devices. Additional modules provide enhanced geographic information system (GIS) data, and automated translation and transcription. There is also a single sign-on (SSO) upgrade, intelligent analytics and reporting, and seamless integration into field responder applications. Field responder applications Consider how an emergency might unfold and how RapidSOS can help. In a car accident, data from a modern automobile telematics system can alert a 911 operator of the accident as it happens. Data from a passenger’s wearable device might provide information about their health and condition. A nearby video or traffic camera could fill in details of how the accident occurred. Useful information in an emergency might come from any one of thousands of sources, including public safety data, sensor feeds, enterprise security systems, smart phones, etc. In a train derailment, electronic access to the cargo manifest can identify which train cars contain hazardous materials and how to manage the specific type of hazmat. This information could save valuable time when responding to incidents like the Feb. 3, 2023, Norfolk Southern train derailment involving 38 cars in East Palestine, Ohio. Consider how an emergency might unfold and how RapidSOS can help Institutional security partners Norfolk Southern is one of the companies that provides information to first responders using RapidSOS; in effect, the company provides a direct digital link from their rail security operations to any first responder in the United States. Amazon’s global operations centers also interface with RapidSOS to provide critical information to first responders. Partnering with corporate security helps to better support the flow of data from institutional security partners and their solutions. Information can transform and guide emergency responses. For example, in a structure fire, real-time sensor feeds throughout a building can help 911 and first responders understand how the fire is progressing. Real-time security camera footage Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR Leading the way to providing video feeds from private camera systems to 911 operators is an agreement between Eagle Eye Networks and RapidSOS, which was announced in April 2024. The agreement allows an enterprise to opt-in to share real-time security camera footage from an Eagle Eye video stream during a live 911 call. Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR. “Security cameras are crucial in many locations, including schools, but previously those cameras could not be accessed by 911 during an emergency but were only used for investigation after an incident,” says Martin. Improving fire and life safety systems RapidSOS is also integrated with Honeywell’s Connected Life Safety Services (CLSS) system, a cloud platform that combines software and hardware to improve fire and life safety systems. Technology integrations between the two companies further modernise and digitise the public safety communications process to provide faster, more accurate communications with emergency centers (i.e., 911 agencies). RapidSOS technology securely transmits detailed data about an emergency CLSS provides real-time visibility and connectivity to help systems integrators and facilities managers make informed decisions and manage fire systems more efficiently. When combined with Honeywell's solutions, RapidSOS technology securely transmits detailed data about an emergency, such as the type of hazard, severity, and location within the impacted building, to emergency response centers. Video object detection Rapid SOS’s emerging Harmony artificial intelligence (AI) product serves as a ‘co-pilot’ for 911 operators, helping them manage the high volume of emergencies by making their response more efficient. Harmony pulls all the sensor feeds in an emergency and works to make only the most important information available in the hands of 911 and first responders. Harmony can take key insights from text and video data, use ‘sentiment analysis’ to determine the emotion tone of a message, and help 911 professionals using language translation, keyword alerts and video object detection. Harmony can help local agencies as they address a 25% average staffing shortage by providing additional support to 911 professionals while lessening the workload. Harmony is also working to help RapidSOS expand the ecosystem, stitching more data together and quickly making it more actionable than ever. Emergency response system RapidSOS also interfaces with Iamresponding, a comprehensive end-to-end emergency response system for first responders in the fire and other emergency sectors. Iamresponding’s field responder application is used by RapidSOS to get information out to first responders in the field. More than 650,000 first responders use RapidSOS’s field application RapidSOS’s recent acquisition of Iamresponding helps the company improve the connection with the last mile “in-the-field” piece of the puzzle, ensuring partners across computer-aided dispatch (CAD), integrated applications, mobile data terminals, body cameras and other responders have access to critical data. More than 650,000 first responders use RapidSOS’s field application. Enhancing emergency response RapidSOS’s Safety Pioneer Program formalises the important partnership between RapidSOS and public safety agencies. Participants in the program receive early access to new platform features, contribute to the platform roadmap, and drive feedback to enhance emergency response. “911 and first responders do incredible lifesaving work,” says Martin. “Everything we have done and built at RapidSOS is a direct result of the engagement, partnerships, inside advice and insight we have gotten from public safety. We have learned from them, developed new technologies and tested them.” Martin adds: “Companies have data and we now know how to make that data actionable into the hands of 911 and first responders to save lives. This is an exciting moment for us continuing our mission in partnership with public safety, and for technology and security companies to have a major hand in that.” {##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##}
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
Case studies
When students come to study at the prestigious Les Roches Marbella campus in Spain, they are not just attending one of the world’s major hospitality business schools, they are also enveloped in extraordinary innovation and sophisticated living to mirror the exceptional experiences they are being prepared to facilitate in their future careers. Real-life training site The institution aims to serve up “academic rigor with a twist of innovation and entrepreneurship” to its 1,000+ students from all corners of the planet who collectively represent more than 80 nationalities. This real-life training site for elite hospitality professionals must offer an authentic, hands-on experience to its students — one that reflects the luxurious living and progressive comforts expected from high-end hospitality properties and their employees. Digital badge One particular aspect they sought to enrich was integrating “digital badge” access across the coastal Mediterranean To ensure Les Roches is always ahead of the curve and a model campus when it comes to exemplary learning based on cutting-edge technologies, administrators wanted to evolve its mobile ecosystem. One particular aspect they sought to enrich was integrating “digital badge” access across their coastal Mediterranean property in Spain. Project objective The project’s objective was to migrate to a mobile credentials-based system where a student’s plastic access card is replaced by a digital ID on a smartphone. This would serve as the verification for daily physical access and digital touchpoints (e.g., building access, vending machines, restaurant reservations, etc.). This effort would also allow the school to steer digital transformation and student efficiencies throughout its security and administrative functions. Catering to student experience “Everything here is about the student experience,” said Mano Soler, Director of Student Services and Operations at Les Roches Marbella. “It is our main driver and the reason we embrace and foster innovation because innovation makes our students’ lives easier and supports their well-being through secure technology. The students will eventually leave this campus and, in turn, take that know-how and excellence into the world with them.” Case study challenge The team wanted a mobile solution to fit specific campus requirements such as swift access For 10 years, Les Roches Marbella relied on an RFID (radio frequency identification) card-based system to identify and grant access to students. This was a fundamental tool that nearly 1,000 individuals needed to have with them at all times to validate themselves day in and day out. Supporting their quest for digital transformation, as part of the school’s Spark incubator programme, the leadership team wanted a mobile solution to fit specific campus requirements such as swiftly granting/removing accesses, avoiding disruption when students lose/forget cards, and accommodating a multi-system environment. Need for a mobile credentials-based system Management also wanted to drive improvements through back-office processes and procedures to save time and resources and enhance everyday life on campus through modern technology. One of the most pressing factors for this particular mobile initiative was to achieve higher efficiency around the school’s new student intake registration/check-in process each semester. Loading ID credentials individually onto RFID cards, then printing each of the 1,000+ cards, meant corrections along the way were inevitable. System re-adaptation Yet, the transition to mobile didn’t come without a series of obstacles and serious considerations. Each touchpoint where a card was to be replaced with smartphone technology required deep analysis and complex integration work, specifically involving seven to eight different brands whose products were already deployed throughout the premises (e.g., printers, vending machines, security technologies, door access, laundry facilities, parking garages and more). Les Roches required an access partner with solutions compatible with the many other products already in play within its existing infrastructure, and an ability to successfully address former system re-adaptation. iOS and Android support The mobile technology needed to support both Android and iOS phones, as well as physical card technology In addition, the mobile technology needed to support both Android and iOS phones, as well as physical card technology (the RFID ecosystem would remain intact for non-student purposes and serve as a migration path for other areas not yet mobile). The school wanted a single company to supply both the hardware and software elements. And, as a higher education establishment with upscale expectations and an outstanding reputation, the Les Roches decision-makers required a proven partner of this same ilk. HID solution To transform technologies and reach new degrees of onsite productivity and novel amenities, Les Roches Marbella selected HID for its unmatched mobile access portfolio. As a market pioneer in trusted identification and authentication, and with a network of partnerships that spans the globe, HID’s experts designed a system to meet each requirement from the school resulting in a tremendous collection of 40+ access points featuring mobile identification, app, portal, and reader technologies. Mobile components from HID The integration project was completed within an accelerated time frame to ensure it was in place before students set foot onto campus that fall. HID components that comprise this robust mobile ecosystem include HID OMNIKEY® readers and reader modules (OMNIKEY 5427, OMNIKEY 5127CK Mini, OMNIKEY 5127 Reader Core), HID Signo™ access control readers, HID Seos® mobile credentials, Aperio® locks from ASSA ABLOY and Aero™ X100 door modules. HID access technologies With a slight tap or wave of their smartphone, students interact easily with the mobile ecosystem and via the digital Seos credential to authenticate themselves as they move throughout the property each day. HID access technologies are embedded in: Parking garage systems Building entrances Vending machines Laundry facilities Printers Point-of-sale at restaurants/on-campus eateries Restaurant access control Class attendance tracking Dorm room door locks Mobile-first world “You cannot discount the value of mobile when it comes to today’s student populations,” said Soler. “It is their way of life. They were ‘born digital’ and they have an expectation when it comes to smart living, for them, it’s a mobile-first world. We get it. We embrace it. And, we intend to attract and retain students by offering them an unparalleled educational experience while here in Marbella.” Efficiencies and integration “We not only transformed our campus with epic mobile access technology but also drove important efficiencies and integration into everything we touched." "The value and inventiveness HIDexperts contributed to constructing this complicated mobile ecosystem is completely in line with our ongoing quest to ensure that innovation is at the heart of the Les RochesWay of Life," said Carlos Diez de la LastraGeneral Manager Les Roches Marbella. Results achieved HID credentials available via a smartphone make scaling individual access up and down significantly easier Tying back to one of the original reasons for this mobile initiative, registration check-ins are streamlined, and Les Roches Marbella has gained immediate improvements around this important event that takes place each semester. 100% of students use the mobile access system on campus. Students register digitally with the option to do so in-person, ahead of time, or remotely with no human interaction. HID credentials available via a smartphone make scaling individual access up and down significantly easier for IT, faculty, and students. A unique, homegrown handheld tool On a case-by-case basis, Les Roches Marbella is already finding ways to apply its in-house ingenuity to foster disruptive thinking. The school used 3D printers to design a customised case to house phones/tablets alongside HID access modules creating a unique, homegrown handheld tool that easily allows campus security personnel to check IDs as required. This safety support tool came about when there was no suitable offering available on the market to meet the school’s specific needs for security checkpoints. Automated student attendance tracking The flexibility and power of HID components enabled the team to re-imagine and invent an original Les Roches security product to, as always, improve the student experience. Many new use cases are in the works to fuel future “wins” across the premises. Automated student attendance tracking is already at the beginning of each class period and serves as another way to further support and protect students. Mini computers and readers were installed in each classroom so students could use their mobile ID (via their smartphone) to mark attendance. API-based interfaces, Aero door module When students go back to their dorm rooms any time, each door loc is integrated with the Aero door module All is handled by a web application running on the mini-computer that pushes and pulls data to/from the Les Roches Absences application in real time through API-based interfaces. And, when students go back to their dorm rooms any time, each door loc is integrated with the Aero door module, providing them with a seamless experience across the entire campus. Mobile authentication and verification “Our eyes are wide open to all the possibilities afforded by the marvelous world of mobile authentication and verification, and each week we come up with new ideas for the continued transformation we have in motion on our campus,” said Juan Luis Velasco, IT Manager at Les Roches Marbella. “Our students love this newfound convenience, and our staff members are reaping the benefits of this technology overhaul.” Best-in-class mobile access system Les Roches Marbella has a best-in-class mobile access system that squarely aligns with the school’s wider objective to be an example of innovation and excellence in global hospitality training both within its own brand family, as well as within the broader realm of higher education. Beyond elevating the student experience through the convenience of mobile IDs and strengthening security when it comes to student safety and mobile ID verification, Les Roches Marbella has an extremely efficient, flexible, and scalable solution that can grow with them as technologies evolve and digital trends continue to transform and connect us all to an international degree. Benefits of digital transformation “This is a story about the value of mobile and any size campus in any sector of education can benefit from the digital transformation angles when it comes to campus business,” said Velasco. “But the most rewarding aspect truly is connecting to our students in a way that’s important, convenient, and meaningful to them keeping them connected and secure via a device that’s already an extension of their existence.”
Dahua Technology Indonesia has donated a Dahua DeepHub Smart Interactive Board to the Faculty of Economics and Business (FEB) at Universitas Gadjah Mada (UGM), demonstrating the company’s commitment to supporting the advancement of education in Indonesia. The Country Director of Dahua Technology Indonesia, Royce Ouyang, expressed his gratitude for this charitable opportunity during the handover event held at the Alumni Hall of FEB UGM on March 14. Royce Ouyang said, "We are pleased to contribute to the development of education in Indonesia. We hope this 75” Dahua DeepHub Smart Interactive Whiteboard can enhance students' learning experience, enabling them to be more interactive and innovative in class and be in line with the latest developments abroad." Artillery of sophisticated features The 75” Dahua DeepHub Smart Interactive Whiteboard is a valuable cutting-edge device The 75” Dahua DeepHub Smart Interactive Whiteboard is a valuable cutting-edge device. Its package includes the smart interactive whiteboard, plug-in USB camera, 11th generation i5 processor 8GB+256GB, activated Windows 11 Pro, as well as a mobile stand and wireless screen sharing cable. This intelligent device is equipped with an artillery of sophisticated features, including a 4K screen, eight quick access buttons, fast charging, fast file sharing, the ability to switch between Android and Windows, a high-resolution camera, wireless screen sharing with various devices, and other advanced functions that enable smoother and more collaborative interaction in the classroom. Dahua DeepHub Smart Interactive Whiteboard The Dean of FEB UGM, Prof. Dr. Didi Achjari, M.Com., Ak., CA, expressed his appreciation for the generous donation, stating that the device will not only bring a more collaborative learning experience for their students, but also support various educational activities, research, and community service at FEB UGM. "We are committed to utilising it as best as possible to improve the quality of education in our environment," he said. "The support of advanced devices such as the Dahua DeepHub Smart Interactive Whiteboard facilitates FEB's academic community in adopting innovative teaching methods. Thus, it can improve student absorption and prepare them to face future challenges," said Gumilang Aryo Sahadewo, SE., M.A., Ph.D., Vice Dean of FEB UGM. He also stated that the use of the Dahua DeepHub Smart Interactive Whiteboard is expected to enhance the interaction between lecturers and students and facilitate collaboration in the learning process. Industrial sector and education In addition, this equipment can also support the development of innovative and technology-oriented curricula. "With this equipment, we hope that FEB UGM can continue to strengthen its existence as a pioneering educational centre that innovates and is competitive," he added. With the donation of Dahua DeepHub Smart Interactive Whiteboard to FEB Universitas Gadjah Mada, Dahua took a positive step towards strengthening the relationship between the industrial sector and education, empowering the youth of now and enabling a smarter society and better living.
Central Community College in Nebraska has multiple campuses and educational centres to serve approximately 90 different communities. CCC’s outdated lock-and-key system and access control technology weren’t meeting their security needs. On one campus alone there are 26 buildings with access control needs for students, staff, and vendors. The security team had to provide targeted scheduled access control for about 15 different user groups. Support and service “From past experience, we know that great technical support, customer service, and quick turnaround time are important," Ed Long, Physical Plant Director, Central Community, brivo.com. "We’re completely satisfied with Brivo, as it can scale to whatever and wherever we need. The learning curve was short and sweet.” Results The Brivo system allows CCC to continue to scale its access control across facilities. The system allows for creating and managing hundreds of groups with different access privileges. Dorms are locked 24/7 with controlled access to provide a high level of security for students. An extra measure of security is provided with limited-access holiday scheduling. The team can provide controlled access for vendors to come and go from different buildings. The system provides the confidence that CCC has an effective emergency plan in place.
In Neuss, Düsseldorf, and Meerbusch, ISR (International School on the Rhine) offers an excellent international education from kindergarten to grade 12. The teachers at ISR prepare students for the world's most prestigious universities, placing great emphasis not only on academic excellence but also on positive character development and the teaching of values. Since 2022, ISR has also been using the DeepHub whiteboard for this purpose. Test phase from 2022 "The modernisation of classrooms and the additional digitalisation of teaching methods are important concerns for us," explains Peter Soliman, Managing Partner of ISR. “Dahua's DeepHub whiteboard offers us versatile functionalities and the perfect solution for our needs.” Mohammed Aloof, Head of IT at ISR, adds, "We have already deployed the DeepHub whiteboards in some classrooms since 2022. The feedback we have received from teachers and our students has been extremely positive. Therefore, we have decided to install a more modern whiteboard in every classroom for even better learning conditions.” Improved visibility and interaction Students can read the text on the screen very well from all angles of the classroom The new whiteboards have significantly improved the visibility of the learning content. Students can read the text on the screen very well from all angles of the classroom. Due to the optimised brightness of the screen, classrooms no longer need to be darkened. "Being able to add handwritten information to documents on the whiteboard adds a lot of value for me," adds Bianca McLeod, a teacher at ISR and head of secondary education. Whiteboard function "The sensitivity here is just right. For example, I can also call up pre-made geometric shapes and use them for lessons. The whiteboard function allows me to save the pages afterward and call them up again at any time. The students can save the learning content by scanning a QR code." "Our teachers can also upload and use extensive materials and teaching aids on DeepHub, which is very practical and accommodates an increasingly paperless and thus environmentally friendly aspiration at ISR." DeepHub This two-way sharing system between DeepHub and the students' tablets is particularly practical Classroom interaction is also further encouraged with the DeepHub. For example, teachers encourage students to participate directly via the whiteboard and answer the quiz displayed on the DeepHub screen. This two-way sharing system between DeepHub and the students' tablets is particularly practical and allows for innovative and interactive teaching. More engaged and proactive "After almost a year of experience with DeepHub, I have noticed a positive change in my teaching," Ms McLeod points out. "The students have become more engaged and even more proactive. We are convinced that further upgrading of the screens will bring even more benefits!" Administration work is simplified The head of the IT department at ISR, Mr. Aloof, is also satisfied, "The Dahua DeepHub makes administration very easy." "A highly modern DeepHub device now replaces the old equipment, projector, speakers, microphone, countless cables, and much more. It makes the management work much easier." Clever all-in-one solution 4K 3840×2160 touch UHD display with a screen diagonal of 65 to 98 inches and a 178° viewing angle The DeepHub whiteboard ensures excellent presentation experiences and creative ideation by allowing participants to fully concentrate on the task at hand without having to worry about technical aspects. In doing so, its 4K 3840×2160 touch UHD display with a screen diagonal of 65 to 98 inches and a 178° viewing angle, combined with anti-glare technology, ensures a clear, more legible display, sharp images, and vivid colours. One-touch projection One-touch projection from up to four terminals via the USB wireless screen sharing dongle or eshare software simplifies collaborative presentations. In training situations and the classroom, knowledge can be conveyed intuitively and with fun in this way. At the same time, as part of a quality control process, other teachers, as well as academic coordinators, have the opportunity to participate in lessons from any location with internet access, even if they are not on-site, due to the interactive features. High-quality, interactive touchscreen The integrated camera (up to 5MP) and up to eight microphones enable powerful video conferencing The touch-active screen supports an optimal writing experience: Smooth writing works virtually in real-time with less than ten ms latency. Responses to touch and support for simultaneous writing vary depending on the application. The integrated camera (up to 5MP) and up to eight microphones enable powerful video conferencing. Due to its high audio and video quality, the Dahua interactive whiteboard is also suitable for seminars, business negotiations, and training. Compatibility Of course, comprehensive compatibility is also taken care of: the pre-installed Android and an optional Windows operating system enable the use of a wide range of productivity tools. This makes perfect sense, as dual operating systems offer a wide range of apps and software. The device is also compatible with popular third-party video conferencing software. Its competitive price and a three-year warranty ensure a high return on investment. In addition, the integrated Android as well as an optional Windows operating system ensure full compatibility with numerous teaching and learning programmes. Conclusion "ISR has many Dahua products in use. In the past, our security system, but now state-of-the-art interactive whiteboard technology in all classrooms. We are grateful for the support from a global pioneer in technology and IoT solutions," explains Peter Soliman. He concluded, "I am convinced that the new technology will add great value to ISR's students."
Founded in the early 1400s, the University of St Andrews is globally renowned and was recently ranked as the UK’s top university. It occupies around 150 separate buildings in and around the town of Fife, Scotland. Home to the St Andrews Prize for the Environment, it has many teams and departments that have won awards for sustainability, energy efficiency, and environmental action. The University’s vision is to be net zero by 2035. St Andrews will take out all avoidable greenhouse gases it releases into the atmosphere and compensate for emissions that are unavoidable. Committed to sustainability The university has a dedicated Environment Team, its own biomass power plant, and a socially responsible investment policy Challenge Matching access control technology to a university with an award-winning track record in energy efficiency To replace multiple different standalone access control technologies which had been installed at student halls at different times over the years, university accommodation managers sought a more suitable solution. Requirements for the university’s new access control system included: An energy-efficient access solution to match the university’s sustainability ethos. Electronic locks would integrate fully with both the university’s central system and their student ID card. The ability to manage and control the entire system, including doors in multiple buildings, from a single point and in real-time. Solution Aperio battery-powered locks save energy through installation, operation, and beyond Locks are wireless, so can be installed with little energy use and no need for a wired connection The university has installed Aperio wireless locks on around 1,693 student bedrooms. St Andrews takes its environmental footprint very seriously: These battery-powered, wire-free electronic locks are a natural fit for their accommodation. The entire Halls of Residence estate will run Aperio. The locking devices offer significant energy efficiency benefits. Locks are wireless, so can be installed with little energy use and no need for a wired connection to mains electricity. Energy efficiency They consume zero energy when idle and run on standard batteries, consuming little power in operation. Maintenance involves a change of battery every two years (approx.), nothing more. Through an entire life cycle, Aperio combines energy efficiency with cost-effectiveness. Streamlined process Online central management has improved access for all building users. Student ID is combined with a room entry credential, which saves issuing two cards. Staff and maintenance teams can have access rights issued or changed with a couple of clicks in the management system. The whole experience is streamlined. Results How Aperio matches the University of St Andrews’ sustainability ethos Install without drilling Upgrading a door with an Aperio wireless cylinder or escutcheon is simple, with no drilling or door hardware alterations required. Installers do not have to make multiple return journeys. Cut energy consumption Unlike traditional wired electronic locks, Aperio does not need a permanent, energy-hungry connection to mains electricity. A long-lasting standard battery powers all lock electronics. Environmentally conscious manufacturing ASSA ABLOY is committed to reducing its environmental footprint and helping mitigate climate change to meet the needs of future generations. 24/7 monitoring and reporting “Aperio interfaces with our central access control system, which gives us central management and control. We get 24/7 monitoring and reporting when required,” said Pauline Brown, Associate Chief Information Officer at the University of St Andrews.
In order to turn its auditorium into a multi-purpose venue, and to improve the general visual experience, Dubai's GEMS Modern Academy replaced their legacy projection system with a massive LED wall from Hikvision. The renovated auditorium has become a popular venue for students, staff, and the community. Challenge: Turning the school auditorium into a multi-purpose performance venue. With the numerous approaches to the entertainment available, and with audiences' surging demand for rich, high-quality content display and immersive sound and video. As a result, venues such as showrooms, studios, auditoriums, and lecture halls are dabbling in a host of new technologies and applications to achieve the ‘wow factor’ audiences are looking for. Visual display systems GEMS Modern Academy is one of these venues. Offering Curriculum to children from kindergarten to grade 12, GEMS is one of the top ten schools in Dubai. Its large auditorium holds 500 seats for school events and can be rented out for private events on weekends. Originally, the auditorium had a large projection screen on the stage to display presentations, images, and videos. However, every element in the environment could take away from the image quality, from sunlight coming in through windows to the whiteness of the screen, the distance from the projector, the age of the system, and more. Offering Curriculum to children from kindergarten to grade 12, GEMS is one of the top ten schools in Dubai Ritesh Dhanak, Head of the IT team at GEMS Modern Academy said, "The projector system was not good enough with the ambient lighting. In order to create a better experience in our auditorium, and to pave the way for it to become a community hub, we need to do a complete upgrade to our live audio, stage lighting and visual display systems.” Remarkably refined images To achieve this, Mr. Dhanak worked with Almoe AV Systems, a renowned distributor and solutions provider of professional audio visual & IT products in the UAE. Almoe helped the school to upgrade the auditorium's touch control systems, matrix switchers, stage lighting, and speaker systems. For the most crucial part of the solution – the visuals – they worked with Hikvision to install a new LED display. The solution: A massive Hikvision LED wall and movable LED side-walls. LED displays offer many advantages, including flexibility and modularity. Therefore, the school decided to install a massive LED screen at a width of 12.48 metres, a height of 4.86 metres, and a pixel pitch of 2.5 mm at the centre of the auditorium stage. The massive LED wall is made up of nine pieces of P2.5 Fine Pixel Pitch LED Display Units (DS-D4425FI-CAF). The wall delivers an outstanding colour gamut and contrast ratio to create remarkably refined images. Massive centre screen The two side-screens are used as backdrops, and can be easily removed when they are not needed For the setup, GEMS Modern Academy preferred to make the two sides of the screen removable to ensure flexibility on the stage, as well as to have multiple videos broadcasted on the screens simultaneously. Four smaller side-screens were designed to be 2 metres wide and 5 metres high, with a pixel pitch of 2.9 mm. They were installed on the two sides of the massive centre screen. Each side-wall was composed of four P2.9 Indoor Rental LED Displays (DS-D4429RI-CAF). The two side-screens are used as backdrops, and can be easily removed when they are not needed. The LED walls are managed using Hikvision’s Video Wall Controller (DS-C10S-S11T), which supports up to 3840 x 2160 resolution at 30 Hz from multiple signal sources (VGA, DVI, HDMI, SDI, YpbPr, DP, and HDBaseT). This enables the school faculty to easily manage multiple video and audio inputs and outputs. Excellent visual experience The benefits: Excellent visual experience for audiences makes the auditorium a popular venue for students, staff, and the community. Hikvision's LED wall has vastly improved the visual performance of lectures and events held at the auditorium. With an extremely bright and clear image displayed, the screen loses none of its sharpness, colour, or coherence, even when viewed at an angle or when the auditorium is brightly lit. The LED wall provides high-quality visuals, and is perfect for our large auditorium" "The LED wall provides high-quality visuals, and is perfect for our large auditorium," said Mr. Dhanak, adding "Unlike with the old system, we don't have to dim the lights in the auditorium during lectures, presentations, or live performance, and this allows students to take notes, remain more attentive and, for remote viewers joining via web conferencing, see the auditorium clearly." Ambient lighting conditions In the end, the video wall displays excellent visuals, adapts to ambient lighting conditions, and offers unique flexibility with the removable side-walls. As a result, Hikvision's LED display solution has turned the auditorium into a venue that fits all kinds of events. Since the LED screens have been installed, the school has hosted a large number of events at the auditorium, such as school lectures, stage plays, and musical performance. In addition, the venue has also been rented out for many private events such as public presentations and speeches. Impressively, the venue has also been used to host a TED Talk, one of the most popular lecture platforms in the world. Mr. Dhanak concluded, "With a large multi-purpose auditorium providing such excellent visual experience to the audience, events at GEMS Modern Academy are now on a different level and our auditorium is a much sought after event space in the community."
Products
Round table discussion
Trust is the foundation of successful relationships between buyers and sellers in the security marketplace. Trust facilitates collaboration, reduces risk, improves decision-making, and ultimately drives business growth and profitability. Transactions often involve significant investments, and trust minimises the perceived risk for buyers, making them more likely to commit to a purchase. Our Expert Panellists weigh in on the subject of trust in response to this week’s Roundtable: A security end user asks: How trustworthy are integrators and/or manufacturers?
Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depends on our ability to use them responsibly and efficiently. Optimising our industry’s use of technology requires that the industry’s workforce have the needed skills to operate the latest equipment. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact the skillsets needed by security operators and officers?
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network expose an IP video system to the internet. This makes it a potential target for malicious cyberattacks. In the physical security industry, the elimination of port forwarding is seen as a basic and manageable precaution to shore up cybersecurity. We asked this week's Expert Panel Roundtable: What are the risks of port forwarding, and how can manufacturers and/or integrators mitigate those risks?
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download