Healthcare security applications
The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technology made it difficult or impossible to know who had been accessing sensitive areas like treatment rooms and medicine stores. Another source of insecurity was the keys and passes issued to employees and contractors. These often remain in circulation beyond their approved use period, if former employees and...
Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partners, like suppliers and vendors. Honeywell's customer, a global pharmaceutical company, realised that potential vulnerabilities like these might be in its partner ecosystem. Therefore, the pharmaceutical company wanted to get ahead of a potential breach so they trusted Honeywell to do a thorough assessment of its...
GX-MAX-DT35B Smart Care Medical Alarm comes with a brand-new case design. The battery level and the cellular signal strength will be indicated through the white bar on the top cover. The system supports VoLTE (voice over LTE), offering better quality of voice communication and calling experience. In addition, the current status of the system, for example, in learning mode or alarm reporting, will be also indicated through the LED backlight of the large Help button. Users can always be informed...
Overview: Due to the pandemic and Delta cases in Israel, the first hospital in Israel for treating coronavirus patients was established. The hospital needed to offer more beds and create more special wards for the infected patients. The head of the hospital requested for an advanced system that could monitor patients on-site or remotely to protect the doctors and nurses from cross-infection in the hospital. Non-contact communication Challenges: Lack of devices for contactless communicati...
Adelante Healthcare currently operates seven healthcare centres in Phoenix, Arizona, and offers a wide array of services to patients of all socio-economic levels. Challenges The lock and key system wasn’t at all adequate for securing the seven different facilities. The facilities and all the patient and healthcare data needed to be protected in a highly secure manner. With so many employees, there was no way to track who had keys and how many copies were out there difficult to keep t...
A local neighbourhood hospital, unfortunately, plagued by significant gang violence, recognised the inadequacy of its current security system. Committed to serving the community, the hospital staff also sought protection from potential aggression that patients may bring in, their friends or family members. Upgrading surveillance With territorial disputes, robberies, carjackings, and displays of force occurring daily, the hospital urgently needed to upgrade its surveillance and enhance its ale...
News
More than one million electric vehicles are registered in the U.S.—and they all have to plug in somewhere. As EV charging stations pop up across the country, one of the chief questions will be how charging station users are identified, authenticated, and connected with membership or payment systems. Radio-frequency identification cards and tokens and smartphone authentication apps have emerged as two viable options for EV charging authentication. Which is best? It may depend on the user base they plan to serve. User authentication for EV charging Most electric vehicle owners have a spot to plug in while at home, either in their own garage or carport or in a designated charging spot in a tenant parking garage. But electric vehicles also need spots to charge while owners are out and about. The EV charging market is broadly divided into two tiers: Level 2 charging stations, which operate at 208-240 V and use AC power. These stations will add 20-25 miles of range in about an hour of charging. The U.S. Department of Transportation listed more than 22,800 public Level 2 EV charging stations across the nation as of mid-2020. They are commonly found in public parking lots and garages, hotels, grocery stores, malls, and other commercial areas. They may also be installed in private parking garages and business parking lots for use by tenants, employees or fleet drivers. Collecting membership data Direct Current Fast Chargers (DCFS) are designed to charge an EV battery to about 80% in 20-30 minutes. There are currently about 15,000 DCFC stations across the U.S., but their numbers are expected to explode as more people start taking EVs on longer road trips. They are commonly found along major interstate highways. As the market evolves, user authentication requirements for EV charging stations are likely to vary by type, location, and user base. Some commercial locations may provide Level 2 EV charging as a free amenity to shoppers, guests or employees. If there is no charge for the service, there may be no need to authenticate users at all— people can simply park and plug at any available spot. However, there may be a benefit to collecting membership data (e.g., shopper reward club). Private charging stations Public, for-profit EV charging stations, like gas stations, need a method to collect payment for their services. In some cases (especially at roadside DCFS stations), users may simply pay for the minutes used with a credit card—just like at the gas station pump. However, many EV charging station users are already accustomed to identifying themselves with an RFID membership card or a smartphone app. Charging networks like ChargePoint and Blink enable members to access any EV charging station within their networks with a card or smartphone app, which connects to their membership, account, and payment information. Private charging stations—such as those offered to tenants, employees or fleet drivers—may not require payment but need to ensure that only authorised drivers are accessing power and taking up valuable parking spots. An RFID card or smartphone app can be used to identify authorised drivers and track charging behaviours. Moving forward, many EV charging stations may find that they need a mix of options for users, including membership cards, smartphone apps, and a credit card payment option for out-of-network drivers. Choosing between RFID and smartphone apps In the long run, the answer may be ‘both.’ RFID cards are economical and easy to issue When user identification and authentication are desirable, which is the better option: RFID cards or smartphone authentication? Both have their uses in the EV charging market. In the long run, the answer may be ‘both.’ RFID cards are economical and easy to issue. And for some users bases, they may not have to issue a new card at all—they can take advantage of an RFID card they already carry. In many cases, it is possible to leverage existing employee IDs and membership cards for access to privately controlled EV charging stations. RFID membership cards may be a good bet for: Fleet drivers who already carry an RFID card for vehicle access. Employee parking lots and garages where people already use a card for entry. EV charging parking spots at gyms or other locations where users want to limit charging access to active members. EV charging stations Most consumers would prefer not to have to carry a physical membership card for every retail outlet On the other hand, public charging stations may find that consumers would prefer to use a smartphone app rather than receive another membership card to carry in a physical wallet. Many consumers prefer to carry only their phone and one or two essential cards (such as a driver’s licence and a single credit or debit card). As more retailers enable consumers to pay via a digital wallet app on their smartphones, some don’t even carry a physical credit card anymore. Most consumers would prefer not to have to carry a physical membership card for every retail outlet they visit—and that includes EV charging stations. Smartphone apps for user authentication are simple to set up and highly secure. Instead of RFID, they typically use either Bluetooth® Low Energy (BLE) or Near-field Communication (NFC) protocols. Public charging stations For the user, the experience is almost identical to RFID authentication, except they wave a smartphone over the reader instead of a card. Apps have other user benefits, too. A custom app for EV charging can be configured to help users locate or reserve charging stations, check their balance and usage history, and change their payment options right on their phone. These features make smartphone authentication ideal for consumers These features make smartphone authentication ideal for consumers accessing a network of public charging stations. However, EV charging network managers should keep in mind that some users may still want a physical membership card. Smartphone-based authentication There are still some user populations, such as older consumers and those from lower income brackets, where smartphone ownership is not ubiquitous. If users are primarily using EV charging for a fleet vehicle, they may not want to download an application for work on their personal cell phone. Other users may find smartphone apps confusing or simply prefer to have a card for other reasons. The answer for both public EV charging networks and private charging station owners is to have an RFID reader that is capable of both card-based and smartphone-based authentication. This will provide maximum flexibility as user preferences change. Finding the right RFID reader for EV charging The ELATEC TWN4 MultiTech family of readers is ideal for authentication at EV charging stations The best RFID reader for EV charging is one that is flexible enough to meet the needs of all user populations and evolve as requirements change. The ELATEC TWN4 MultiTech family of readers is ideal for authentication at EV charging stations. The readers support 60+ RFID transponder technologies along with BLE and NFC smartphone authentication. This means that one reader can support all common technologies already in use across the entire user base—both nationally and internationally. This capability becomes important for applications where users want to enable drivers to use an existing RFID card (such as their employee or fleet ID card or an access card for a tenant parking garage) for access to charging locations. It also provides more flexibility as technologies or preferences change in the future. Supporting advanced encryption TWN4 MultiTech supports advanced encryption and security configurations for highly secure transactions between the card or smartphone and the reader. This is important for EV charging applications tied to payment or employee/driver identification. ELATEC readers are mobile-ready. The ELATEC Mobile Badge BLE NFC App offers simple and effective components for building or extending a mobile application for EV charging networks. Non-managed mobile credentialing using the ELATEC app is free. TWN4 MultiTech readers also work with multiple existing third-party managed credential systems, such as KleverKey, Safetrust, and Transact. The TWN4 MultiTech is easy to customise with the powerful Software Development Kit (DevPack) and App Blaster and Director utilities. Readers can be easily configured to support custom functionality (such as LED light flashing sequences or sounds for user feedback) and integration with backend software for easier member management. The DevPack tools make the TWN4 family the most powerful, versatile, and sustainable readers on the market. Hardware communication interfaces As electric vehicles move from niche to mainstream, EV charging infrastructure will need to grow and evolve to accommodate millions more drivers—both in the consumer market and in commercial fleets. With TWN4 MultiTech, EV charging station managers will be ready. Interested in learning more about technical considerations for RFID? Download 11 Considerations for Embedded System RFID Readers for additional advice, including operating power and consumption requirements, antenna placement, hardware communication interfaces, and more.
Scenario: One needs to install a camera in the lobby of a building to capture the entrance area. Problem: The area has a lot of windows which overexposes the image, making it difficult to capture the people coming in and out of the premises. Solution: A security camera with a good Wide Dynamic Range (WDR). What WDR does? Dynamic range refers to the ratio between the largest and smallest measurable quantities of something. In the case of video surveillance, the dynamic range measures the ratio between the lightest and darkest elements of the image. WDR technology is great for high contrast scenes, balancing the brightness and shaded areas simultaneously so an image neither appears blown out or too dark. IHS defines WDR at 60 dB or greater, though it’s not uncommon to see WDR cameras with capabilities of 120 dB or more Decibels (dB) are the value with which dynamic range is measured. IHS defines WDR at 60 dB or greater, though it’s not uncommon to see WDR cameras with capabilities of 120 dB or more. However, keep in mind that each manufacturer has its own method of determining a camera’s dB. Therefore, when comparing product datasheets, it is possible that a camera with a lower ratio outperforms a competitor with a higher dB ratio. How WDR works? Security cameras with WDR technology (e.g. Dahua HDCVI 6.0 PLUS) are using either Digital WDR (DWDR) or True WDR. True WDR uses image sensors and a Digital Signal Processor (DSP) to provide even illumination to all areas of an image. A True WDR-enabled video surveillance camera has sensors that take two scans of each video frame. The first, at low speed (to capture more light), shows the image in normal light conditions. The second scan is taken at high speed to capture less light overall and get an image with strong light in the background. The DSP combines the two scans to form a single, balanced, well-illuminated image. DWDR uses algorithms instead of sensors to digitally brighten too-dark areas and dim too-bright areas. DWDR relies on the DSP chip instead of the image sensor to provide WDR. It adjusts each individual pixel of the image and calculates exposure accordingly. This technique has some limitations: the intense manipulation of pixels leads to the overall image being grainier. On the other hand, DWDR doesn’t need costly image sensors, so DWDR can be a more economical option when WDR is a necessity. When one doesn’t have WDR? Backlight Compensation (BLC) brightens the image so one can see darker details better There are two options for improving the exposure of an image without using WDR. In a high-contrast scene with heavy, broad, backlighting, the camera will adjust to the average illumination, which will darken the image. If no WDR is available, Backlight Compensation (BLC) brightens the image so one can see darker details better. BLC is a legacy technique that uses DSPs to increase the level of exposure for the entire image. Rather than balancing brightness on overexposed and underexposed areas of an image like WDR does, it brightens the entire image. Highlight Compensation (HLC) is a technology where image sensors detect strong light within the image and reduce exposure on those areas to enhance the overall image quality. In a dimly lit scene with bright lighting caused by hot spots (e.g. headlights, street lights), the overall image may become too dark. If no WDR is available, use HLC. The camera automatically suppresses bright light sources, allowing proper exposure of adjacent areas. Conclusion Regardless of the dB value specified, image results will vary depending on the complexity and amount of movement in a scene. To determine the best camera for an application, it is always best to test that it meets the needs and expectations of the customer.
A time attendance system can help to keep a close eye on an employee’s working hours, prevent time theft by accurately tracking and recording employees’ time and attendance. A biometric time attendance system allows employees to clock in quickly and easier compare to the standard system and eliminate “buddy punching” in advance to the traditional time card system. A complete biometric time attendance system includes both hardware and software. Include the electronic divide that scans an employee’s fingerprint or iris and software that stores all the data about time and shifts. Hardware and software can be purchased separately, but it’s best to find a vendor that provides both of them as a complete package. Price of the biometric software Small companies can purchase a basic system that includes hardware and software for about $1,000 to $1,500 Biometric time and attendance systems aren’t as expensive as one might think. Small companies can purchase a basic system that includes hardware and software for about $1,000 to $1,500. Some companies' solution, which works for companies with up to 50 employees, retails for $995 to $1,300. The price includes one fingerprint scanner and software that tracks arrivals and departures, calculates hours for payroll, and tracks vacation time and sick days. Large corporations with many hundreds or thousands of employees should expect to spend at least $10,000 on a biometric time and attendance system. For a complex system serving thousands of employees and multiple locations, the cost could rise as high as $100,000. In addition to a basic software and hardware package, one may need to purchase additional features, services, or accessories. Additional biometric scanners begin at about $1,000 to $1,300 each. Training begins at about $300 to $500 for smaller businesses and can run thousands for larger companies. Accessories like scanner covers, which protect the equipment when it is not in use, begin at about $30 to $50 each. CrossChex Cloud CrossChex Cloud's features include face recognition attendance, temperature, and mask identification Because there are so many options, it helps to talk to vendors about the products they provide. Some will charge an upfront fee for a set number of traditional software licenses; others will charge a monthly fee for web-hosted software. Although the market and advanced technology decrease the price of time and attendance system, some small companies or workshops still can’t afford extra spend besides salaries. Anviz introduces a new solution for those business owners - CrossChex Cloud. One can set up a new account and get only one hardware connected to be a lifetime free subscriber of CrossChex Cloud. Start at $500 only, one can get hardware that is suitable for CrossChex Cloud with advanced features includes: face recognition attendance, temperature, and mask identification, and get records of almost everything one wants to take control of.
Let's Talk Interactive (LTI), a leader in customisable, HIPAA-compliant telehealth software and hardware solutions, has launched the LTI Tempscreen, a safe, standalone check-in system providing health screening and identity verification. LTI Tempscreen The LTI Tempscreen allows workplaces to facilitate a safe environment for both employees and visitors and is ideal for post-pandemic access management. The touchscreen kiosk quickly verifies a user's identity, measures body temperature, and conducts a symptom screening questionnaire, freeing valuable staff time and reducing potentially unhealthy contacts. Using touchscreen tech "It's important for us as innovators to be promoting and normalising the use of this technology in facilities around the country," said Arthur Cooksey, CEO of LTI. The LTI Tempscreen is easily deployable as both a permanent or temporary solution "The LTI Tempscreen is easily deployable as both a permanent or temporary solution and shows that companies are committed to protecting their workers and visitors from current and future threats." Availability The LTI Tempscreen is available in three tiers: Base Tier, Base Tier Plus, and Premium Tier, all of which offer PHI/HIPAA compliance, identity verification, real-time alerts, basic reporting functions, and simply go or no-go temperature scanning. Base Tier The Base Tier is designed for healthcare workers and employees, offering basic reporting functionality and easy temperature screening plus verification capabilities. Users can use one token for identity verification and security (mobile phone, QR code, ID badge, etc.). Base Tier Plus Base Tier Plus offers a greater degree of flexibility and is designed to accommodate both healthcare workers and visitors. Base Tier Plus includes all the Base Tier features, including the use of multiple tokens for identity management and security, improved workflow management, the ability to print wristbands or badges for management and/or visitors, and enhanced real-time reporting. Premium Tier Premium Tier offers full functionality and is designed to be integrated with existing back-end systems like access control, payroll, time clock, electronic medical records, and payment systems.
STARC Systems, a manufacturer of temporary modular wall containment solutions used for occupied renovations and infection isolation unveiled FireblockWall™, the first modular reusable one-hour fire-rated temporary containment system. STARC will begin taking orders in June with deliveries starting in early summer. Product innovations to solve challenges "Our customers have been requesting a one-hour fire-rated containment solution," said Bruce Bickford, VP of Product Development at STARC Systems. "Facility managers have a tremendous responsibility during an occupied healthcare renovation project. If something goes wrong and the Joint Commission, State Inspector or Fire Marshal investigates, it falls on the facility manager to explain every detail. STARC uses customer feedback to inform our product innovations and solve their most challenging needs. FireblockWall™ relieves our customers from wondering if they're meeting the proper safety requirements." Benefits of FireblockWall™ Stops fires, keeping patients, staff, and visitors safe in healthcare environments. Fast installation with minimal labour, two labourers can install a 10' x 15' corner room in 90 minutes, which is an estimated 4 times faster than traditional drywall, plus no taping, mudding, sanding, painting or clean up. Designed to meet NFPA 101 or IBC code, a fire-rated wall must be constructed from the floor to the deck above. With its perimeter tracks, specially designed panels including pre-designed negative air panels and doors, and supporting components, FireblockWall meets the requirements of a one-hour fire-rated listed assembly when installed to spec. Superior noise-blocking, with an STC rating of 40, is 65% quieter than any other temporary containment system. Exceeds ICRA Class IV (infection control),ASTM E119 and ASTM E84 requirements. Cost-effective, the panels are durable and can be used job after job, it typically pays for itself after just 3-5 uses and generates ongoing cost savings. Lower carbon footprint, the sleek, reusable walls save on the waste and debris normally created by building and tearing down drywall. Easy air management, includes a negative air panel to discharge air keeping dangerous dust off the ground, and automatically closes the damper when temperatures exceed 165 degrees. Also includes an air monitor panel that's compatible with all common manometers and has a 2" rated pass-through for wiring. Durable, reusable containment solution These panels offer a safer, more secure worksite, but they also provide us with a professional-looking solution "After making the switch from traditional containment methods such as poly and sheetrock to STARC's FireblockWall™ panels, our team noticed a drastic difference in the time we spend setting up containment in the field," said Adam Bouffard, Construction Supervisor, Hebert Construction. "Not only do these panels offer a safer, more secure worksite, but they also provide us with a professional-looking, durable, reusable containment solution for use on future projects." How it works With FireblockWall™ a one-hour fire-rated solution can be quickly installed in 4 easy steps: Step 1: Mark a centerline and mount the pre-drilled telescoping perimeter tracks. Tracks can easily be customized to length. Step 2: Place the FireblockWall™ panels using a lift & drop connection (no tools required). Step 3: Fill track to panel gaps with fire-rated insulation. Step 4: Place track covers to finish. Fire-rated corners, doors, and accessories are available when the project requires it, including handle sets with multiple lock options depending on the level of security needed. First reusable one-hour fire-rated solution "STARC is committed to delivering value beyond our customers' expectations while addressing long-standing containment challenges in the most sensitive of occupied healthcare environments," said Chris Vickers, President, and CEO of STARC Systems. "We set the standard for temporary modular containment with RealWall™and LiteBarrier™ and now we're thrilled to raise the bar again by introducing FireblockWall™, the first and only reusable one-hour fire-rated solution."
RS2, a trusted provider of access control and identity management solutions, announced its strategy for delivering integrated solutions optimised for environments where advanced security and IoT data are required to provide security, operational efficiency, insight, and agility. It will offer bundled software solutions based on razberi servers and including the most recent release of Access It! Universal, to enable customers to achieve higher levels of resilience, management, and deployment across their infrastructures. Integrated security management Customers are increasingly seeking a standardised platform on which to deploy integrated IoT and security applications. RS2 is extending its relationships with leading technology partners, including razberi and Salient Systems to deliver consolidated solutions on a single server platform. By integrating RS2’s access control software and other applications on razberi’s proven server solutions, an organisation can reduce deployment risk, time to value, and integration cost. Out-of-the-box video surveillance The razberi bundled platforms deliver network optimisation, cybersecurity, and remote health monitoring The intuitive and simple-to-deploy bundled platforms deliver network optimisation, cybersecurity, and remote health monitoring. The razberi platform replaces traditional servers, storage devices, network switches, and camera power supplies with a single appliance designed for IP video recording. With embedded software from RS2, the solution is transformed into integrated security management that offers out-of-the-box video surveillance and access control functionality. Automation “The goal of these consolidated platforms is to automate the deployment and set-up process to enable users to get the most out of their system from day one without assistance from the IT department. Once a customer purchases a bundle, RS2 will do the rest,” said Tim Vahary, RS2 Product Manager. “For our dealers, this approach reduces installation time and saves on labour costs while allowing them to offer integrated capabilities to their customers. It goes right along with our service-first approach to innovation.”
Expert commentary
Changing customer needs can make specifying an alarm system that will continue to deliver in the long term a challenge. However, the latest modular alarm solutions provide the opportunity to build a more individualised system from the outset, as well as offering the ability to up-scale in the future without causing disruption. Martin Wilson, North EMEA Regional Director at Resideo, looks at how alarm specialists can use this style of solution to both benefit customers and build their own business opportunities. Holistic sense of home security In a survey of 1,000 homeowners undertaken by Resideo, the results revealed that, although deterring burglary was still a top priority, consumers were moving to a more holistic sense of home security, wanting to bring convenience, and property and life safety, into the mix. An alarm system no longer needs to function on one level, alerting only to a break-in taking place Indeed, an alarm system no longer needs to function on one level, alerting only to a break-in taking place. The latest modular alarm systems offer the flexibility to create a scalable security and life safety platform for homes and small businesses, as well as giving installers the ability to suggest future update options that can be added as and when budget or requirement allows. Valuable up-scales Finding an alarm that can be scaled over time has the obvious business benefit of ensuring it is easy to revisit and add to as customers naturally expand their existing security. With many modular designs connected via WiFi, this not only means installers can opt for the right mix of sensor options from the get-go but also that any additions can be connected to the panel and system with ease. Many control hubs have winning features in their own right. The ProSeries security panel by Resideo, for instance, has an intuitive touchscreen, easy-to-read, full-colour display to reduce false alarms, plus a built-in camera, speaker and microphone, intuitive icons and even five-day weather alerts. The ProSeries security panel by Resideo has an intuitive touchscreen Natural up-scale opportunities For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition For the installer, it has a plug-in power connection, trouble-shooting videos and end-user replaceable batteries to reduce unnecessary callouts. However, to build a scalable system, this needs to be coupled with the right, flexible solutions to tackle customer concerns. Taking the time to find out what is important to the end user is vital here and can lead to natural up-scale opportunities. For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition. Similarly, a panic button and even medical transmitters may be of benefit to others. All this, as well as other options, such as glass break detectors, door and window sensors and indoor and outdoor MotionViewers™, are available within the ProSeries range, and can be updated or added to an installation as needed or as a property grows with minimum disruption. Adding life safety The ability to propose an alarm system that can bring together alerts for different threats – for both the home and life – under one platform, also has real appeal. Indeed, in a survey of 1,000 homeowners undertaken on behalf of Resideo, a system’s ability to alert to the dangers presented by fire and CO was mentioned as an important part of the decision-making process by 41% of participants. For many, this increased awareness may stem from the many regulation updates regarding smoke and carbon monoxide (CO) alarms that took place in 2022. In Scotland, for instance, carbon monoxide detectors were required to be fitted in any room with a carbon-fuelled appliance in all homes, rented or owned. Social housing properties In England, smoke and carbon monoxide alarms were required in all social housing properties In England, from the 1st of October 2002, smoke and carbon monoxide alarms were required in all social housing properties, with carbon monoxide alarms now mandatory in the private rented sector. Wales followed suit in December for rented accommodation. The new guidance for England and Wales requires at least one smoke alarm to be installed on each storey of a property, to help alert to domestic fires more quickly, ensuring a quicker evacuation and reduced risk of fatality. For professionals, systems such as ProSeries, can be connected to a series of smoke and carbon monoxide detectors, in a ‘one-go-all-go’ setup that means the alarm will go off if one of these threats are identified. Smart and connected benefits The total Connect 2.0 app gives ProSeries end-users the ability to view and control the security platform remotely. The Resideo Pro app currently gives installers the ability to view the system and connect to the central monitoring system. The platform also supports home automation as it works with Zwave devices. The platform also supports home automation as it works with Z-wave devices. The platform also supports home automation as it works with Z-wave devices There are also extra benefits for alarm professionals too. The AlarmNet 360™platform on which ProSeries is configured gives greater insight to improve business operations, increase efficiency and deliver insights on accounts to identify additional upsell opportunities and ongoing services. Providing the ability to remotely diagnose brings valuable time-saving options and avoids unnecessary callouts. It also means the ProSeries panel and peripherals programming can be accessed anytime, anywhere, using the cloud, allowing ease of programming, troubleshooting and account management on the go. Needs and future possibilities Changing a complete alarm system to apply new functions is never going to feature highly with the end user, nor does it work where longevity and sustainability is concerned. Having the ability to build a modular system and add to this as needed, whether this is at a property or a small business, provides benefits for both customers and professionals when it comes to meeting immediate needs and future possibilities. Add connectivity and remote access to this and you have a platform that can help streamline business operations, putting professionals more in touch with customers, and helping to spot future opportunities.
The adoption of innovative and interconnected door hardware systems can help overcome the challenges associated with building security, explains Daniel May of Consort Architectural Hardware. The security of our built environment and the safety of its people is paramount throughout a building’s lifecycle. While these elements remain a primary focus at each touchpoint of a construction project, today’s design teams are sooner adopting modern access control systems to address this age-old challenge, but why? Modern access control Where systems were once rudimentary, modern access control has evolved into a revolutionary factor of building design, unlocking various benefits for its many users in the process. The Internet of Things (IoT) has enhanced building security as we know it, and as technology continues to advance, more options enter the market. Following more than a decade of innovation and integration, the access control market is projected to grow year on year, from £7.8 billion in 2023 to £11.8 billion by 2028. Modern user requirements have led to several operational and technological advancements Modern user requirements have led to several operational and technological advancements during this period, and decision makers and design teams alike can now choose from a versatile selection of options. Some door hardware products now utilise smart locks, cloud control and even biometrics for example, and most recently, there’s been a substantial change to the way access control systems operate, with focus moving towards end users and ease of use. Modern access control has evolved into a revolutionary factor of building design Smart door hardware From an operational perspective, interconnected access control systems gift users with an intuitive network that improves building security through the use of real-time status updates, while also providing them with the ability to grant instant access approval and denial at the touch of a button. Often, users can operate their building’s various access points through their mobile phone, which has led to improved flexibility and efficiency in most environments - whether at home or in a public access property. The security benefits also become clear when compared to the alternative of physical keys. If a traditional key is lost or stolen, the security of a building becomes at risk until it is found or replaced. Intuitive access control systems are designed to build upon the traditional lock and key methods. By seamlessly integrating smart door hardware into both new and retrofit projects, users can manage access points and improve security across the building - without stifling ease of access, stunting future scalability or unsettling the aesthetics. Users can operate their building’s various access points through their mobile phone Access control system The PSIA standard is one of the widely recognised and respected standards for access control products As many adopt Wi-Fi infrastructures, NFC technology and cloud services into their buildings, decision makers must also consider the need for better standards. While the introduction of IoT may advance security, performance and functionality, it can also introduce new risks which must be mitigated by adhering to both localised and international standards, such as ISO 27001 for example. The Physical Security Interoperability Alliance (PSIA) standard is one of the widely recognised and respected standards for access control products and provides comprehensive requirements for systems by focusing on interoperability, scalability, and functionality. While the introduction of IoT may advance security, it can also introduce new risks Providing comprehensive requirements This standard ensures that access control products from different manufacturers can seamlessly integrate and communicate with each other, allowing for greater flexibility and choice when designing a complete access control system. After all, a one size fits all access control solution simply doesn’t exist and decision makers would be remiss in not selecting a product that aligns with their building’s needs while meeting the required standards.
In the early stages of childhood education, kindergarten imparts foundational principles that shape future behaviour. Today, you can think about cloud computing in a similar manner: it has become a fundamental element in the architecture of modern technology. The cloud now plays a critical role in digital interaction, security, and infrastructure development. Far from being just another tool, the cloud is a cornerstone, providing essential support for the intricate network that supports today's digital ecosystem. Vomplex digital systems Much as kindergarten lessons lay the groundwork for cognitive development, the cloud offers base capabilities that are vital for constructing and operating complex digital systems. Recent advancements in cloud-based security — particularly in access control and video surveillance — emphasise the importance of cloud computing. It has been instrumental in unifying fragmented security systems, similar to how basic social principles taught in kindergarten help diverse children come together as a unit. The role of cloud computing in our technological world is multifaceted and continuously growing The role of cloud computing in our technological world is multifaceted and continuously growing. It has evolved into a space where innovation is cultivated and security commitments are maintained with vigilance. The fusion of artificial intelligence and analytics into cloud services signifies a concerted effort toward a future that is more cohesive, intelligent, and secure. Significant technological progress As we delve deeper into this topic, it will become evident that cloud computing, like the pivotal lessons of kindergarten, is indispensable. It quietly enables significant technological progress, mirroring the foundational principles taught in our formative years in both its essential nature and its growing influence. Play Fair: Technological Developments in Cloud-Based Security The past year has been a period of significant innovation in cloud-based access control and video surveillance. Cloud computing has evolved into a robust platform that fosters the creation of integrated security systems. These systems consolidate access control and video surveillance into a unified experience, demonstrating the cloud's potential to seamlessly combine disparate systems. Substantial industry progression The advent of edge computing has boosted bandwidth efficiency and accelerated data processing The incorporation of artificial intelligence and analytics into cloud services marks a substantial industry progression. This development provides businesses with advanced tools for in-depth analysis and intelligent decision-making, enabling them to not only gather comprehensive insights but also strengthen their security measures. The cloud has eased the transition to new technologies and emphasised a commitment to cybersecurity, with encryption protecting data integrity in transit and at rest. Simultaneously, the advent of edge computing has boosted bandwidth efficiency and accelerated data processing, highlighting a consistent drive to refine and adapt. The trend of integrating cloud security systems with other business platforms help create unified ecosystems, reflecting a broader narrative of security professionals’ pursuit of progress and enhancement. Potential future disruptions Wash Your Hands: Pandemic-Induced Transformation in Cloud Services As we all know, the COVID-19 pandemic necessitated a swift transition to remote operations, with cloud computing forming the backbone. i The urgent need for cloud solutions was apparent as businesses adopted remote collaboration tools, work-from-home policies, and virtual workspaces. This transition increased the demand for cloud services and prompted more adaptable and cost-effective pricing models. Recognising the critical role of cloud services, organisations enhanced their investment to safeguard operations against potential future disruptions. The pandemic fundamentally altered the perception and valuation of cloud computing, emphasising its critical role in sustaining business operations. Scaleable digital infrastructures The growing demand for SaaS has led integrators to create scaleable digital infrastructures Share Everything: Systems Integrators and the Adoption of Cloud Systems integrators have done much to realise the cloud’s potential. The growing demand for Software as a Service (SaaS) has led integrators to create scaleable digital infrastructures tailored to specific business needs.. The use of the cloud for data backup has improved efficiency and increased organisations’ ability to cope with disruptions. Although there has been a gradual shift among integrators toward cloud solutions, effectively marketing and supporting SaaS business models remains a challenge. But the possibility of continuous revenue streams through managed services is promoting broader adoption of cloud technologies. Cloud-based security solutions Live, Learn, Think: Enterprise-Level Cloud Adoption There is an increasing trend among large enterprises to adopt cloud-based security solutions. The shift toward VSaaS indicates a move towards subscription models that offer financial and scalability advantages. This transition is more than a mere operational change. Rather, it represents a commitment to the expansive potential for growth and innovation that the cloud offers. But let’s face it: the ‘cloud’ journey is accompanied by challenges, particularly concerning data security. Providers must deliver robust data protection measures to ensure the success of cloud-based security services, which depends not just on technological progress but also on fostering trust with clients. Addressing cybersecurity concerns The hybrid model offers a balanced solution for businesses looking to merge these two environments Baby Steps: Hybrid Cloud and On-Premises Infrastructure The hybrid model, which combines cloud with on-premises infrastructure, continues to be a strategic choice for many organisations. While the cloud provides flexibility and ease of access, on-premises solutions offer control over data security and comply with regulatory demands. The hybrid model offers a balanced solution for businesses looking to merge these two environments. Be Trustworthy: Cybersecurity Measures and Communication Transparent communication is key in addressing cybersecurity concerns with customers and partners. Companies that are transparent about their security protocols, including encryption and regular updates, build trust. Certifications such as SOC 2 Type II affirm a dedication to security, and proactive educational resources ensure that users are well-informed about best practices. Decision-making processes Cloud computing has become the cornerstone of modern security strategies Look: The Future Outlook for Cloud-Based Security Solutions Looking forward 5-10 years, cloud-based security solutions are expected to become even more central to organisational decision-making processes. The cloud is poised to become the hub for predictive decision-making, using AI algorithms and extensive data to proactively manage security risks. This vision of an intelligent, integrated approach to security, with the cloud enabling swift, collaborative responses to threats, is almost at hand. Cloud computing has become the cornerstone of modern security strategies, moving beyond its initial role as a digital transformation tool. As we look to the future, the cloud is set to redefine security paradigms and anchor a new era of intelligent, predictive security operations.
Security beat
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information, perhaps just a voice on the phone or a location on their screen. Providing critical information Today, there are literally millions of information sources available, ranging from connected buildings to vehicle telematics to live video streams to health information from wearable devices. In fact, there are 540 million connected devices, any one of which could provide critical information in an emergency. But how can those information sources be leveraged to improve emergency response? That’s the mission and value proposition of RapidSOS, an ‘intelligent safety platform’ company that connects 911 operators with the vast universe of information available to promote better and faster emergency response. Highly sophisticated operation The platform is integrated into every major public safety software system and first responder agency “RapidSOS fuses human and artificial intelligence to put critical information from any connected device directly into the existing systems and operating procedures of first responders across the United States,” says Michael Martin, CEO of RapidSOS. RapidSOS is widely used by first responders. The platform is integrated into every major public safety software system and first responder agency. There are more than 4,600 software integrations that serve more than 21,000 first responders and 911 agencies. In 2023, RapidSOS supported the lifesaving work of public safety across 171 million emergencies with 3.3 billion data payloads. The system is adaptable and configurable to support any agency, from a highly sophisticated operation in New York City to a local sheriff running their own 911 center. Intelligent analytics and reporting RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation, rich content pathways, redundant connection to caller phones, and access to millions of connected devices. In an emergency, Unite intelligently fuses data from among millions of sensor feeds into a unified picture of an incident, allowing public safety officials to view real-time location, health profile, telematics, alarm data, and more. RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation RapidSOS offers core modules that handle call, text, video, sensor, mapping, and administration tools, and that provide partner data from connected devices. Additional modules provide enhanced geographic information system (GIS) data, and automated translation and transcription. There is also a single sign-on (SSO) upgrade, intelligent analytics and reporting, and seamless integration into field responder applications. Field responder applications Consider how an emergency might unfold and how RapidSOS can help. In a car accident, data from a modern automobile telematics system can alert a 911 operator of the accident as it happens. Data from a passenger’s wearable device might provide information about their health and condition. A nearby video or traffic camera could fill in details of how the accident occurred. Useful information in an emergency might come from any one of thousands of sources, including public safety data, sensor feeds, enterprise security systems, smart phones, etc. In a train derailment, electronic access to the cargo manifest can identify which train cars contain hazardous materials and how to manage the specific type of hazmat. This information could save valuable time when responding to incidents like the Feb. 3, 2023, Norfolk Southern train derailment involving 38 cars in East Palestine, Ohio. Consider how an emergency might unfold and how RapidSOS can help Institutional security partners Norfolk Southern is one of the companies that provides information to first responders using RapidSOS; in effect, the company provides a direct digital link from their rail security operations to any first responder in the United States. Amazon’s global operations centers also interface with RapidSOS to provide critical information to first responders. Partnering with corporate security helps to better support the flow of data from institutional security partners and their solutions. Information can transform and guide emergency responses. For example, in a structure fire, real-time sensor feeds throughout a building can help 911 and first responders understand how the fire is progressing. Real-time security camera footage Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR Leading the way to providing video feeds from private camera systems to 911 operators is an agreement between Eagle Eye Networks and RapidSOS, which was announced in April 2024. The agreement allows an enterprise to opt-in to share real-time security camera footage from an Eagle Eye video stream during a live 911 call. Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR. “Security cameras are crucial in many locations, including schools, but previously those cameras could not be accessed by 911 during an emergency but were only used for investigation after an incident,” says Martin. Improving fire and life safety systems RapidSOS is also integrated with Honeywell’s Connected Life Safety Services (CLSS) system, a cloud platform that combines software and hardware to improve fire and life safety systems. Technology integrations between the two companies further modernise and digitise the public safety communications process to provide faster, more accurate communications with emergency centers (i.e., 911 agencies). RapidSOS technology securely transmits detailed data about an emergency CLSS provides real-time visibility and connectivity to help systems integrators and facilities managers make informed decisions and manage fire systems more efficiently. When combined with Honeywell's solutions, RapidSOS technology securely transmits detailed data about an emergency, such as the type of hazard, severity, and location within the impacted building, to emergency response centers. Video object detection Rapid SOS’s emerging Harmony artificial intelligence (AI) product serves as a ‘co-pilot’ for 911 operators, helping them manage the high volume of emergencies by making their response more efficient. Harmony pulls all the sensor feeds in an emergency and works to make only the most important information available in the hands of 911 and first responders. Harmony can take key insights from text and video data, use ‘sentiment analysis’ to determine the emotion tone of a message, and help 911 professionals using language translation, keyword alerts and video object detection. Harmony can help local agencies as they address a 25% average staffing shortage by providing additional support to 911 professionals while lessening the workload. Harmony is also working to help RapidSOS expand the ecosystem, stitching more data together and quickly making it more actionable than ever. Emergency response system RapidSOS also interfaces with Iamresponding, a comprehensive end-to-end emergency response system for first responders in the fire and other emergency sectors. Iamresponding’s field responder application is used by RapidSOS to get information out to first responders in the field. More than 650,000 first responders use RapidSOS’s field application RapidSOS’s recent acquisition of Iamresponding helps the company improve the connection with the last mile “in-the-field” piece of the puzzle, ensuring partners across computer-aided dispatch (CAD), integrated applications, mobile data terminals, body cameras and other responders have access to critical data. More than 650,000 first responders use RapidSOS’s field application. Enhancing emergency response RapidSOS’s Safety Pioneer Program formalises the important partnership between RapidSOS and public safety agencies. Participants in the program receive early access to new platform features, contribute to the platform roadmap, and drive feedback to enhance emergency response. “911 and first responders do incredible lifesaving work,” says Martin. “Everything we have done and built at RapidSOS is a direct result of the engagement, partnerships, inside advice and insight we have gotten from public safety. We have learned from them, developed new technologies and tested them.” Martin adds: “Companies have data and we now know how to make that data actionable into the hands of 911 and first responders to save lives. This is an exciting moment for us continuing our mission in partnership with public safety, and for technology and security companies to have a major hand in that.” {##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##}
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
Case studies
"We’ve tried other security devices for the solution before choosing the Anviz. The reason for switching to Anviz was because of its great reliability, stable and mature firmware, high user capacity, and biometric identification. Besides, we’ve been able to rely on their greatly experienced engineering team for solving problems and firmware customisations we’ve needed along the road to meet the ministry's high expectations. Anviz has become one of our Key security consultants for assuring a high quality and reliable service,” said Annel Rosalin, Manager at Comercializadora GaMart. The customer's challenge Since November 2022, the Ministry of Health has required all public and private healthcare facilities to set up a Security Plan to guarantee the security of people, property, and data in Mexico. In addition, under the influence of the COVID-19 pandemic, non-contact interaction in public places has gradually been extra important, especially in crowded places. Given the high stakes, many hospitals and personal care centres need to upgrade their security devices and software to respond to the new challenges. In order to reduce the risk of virus exposure and property, they expect to use touchless time attendance and access control terminals. Anviz solution for the healthcare industry Anviz has provided access control and time attendance system upgrade service for around 100 hospitals in three different states and personal care centres in Mexico. More than 140 Anviz FaceDeep3 were installed on the main entrance and exit of those healthcare facilities to manage the access authority staff, as well as protect the safety of assets and patients. CrossChex Cloud And managers in headquarter are using CrossChex Cloud to manage the nearly one thousand employees' attendance records in different regions. “Our goal is cutting cost on employee time and entrance management by 50%, and reducing traditional cards consumption by 15%, saving over 1 million dollars per year for the Ministry,” said Felix, Product Manager of Anviz. FaceDeep 3 FaceDeep 3 is the new AI-based face recognition terminal equipped with a dual-core Linux-based CPU and the BioNANO® deep learning algorithm. It supports up to 5,000 dynamic face database and rapidly recognise users within 2M (6.5 ft) in less than 0.3 seconds and customises alerts and a variety of reporting for no-mask wearing. AI-based liveness detection techniques Its AI-based liveness detection techniques make the clocking-in process in hospitals more accurate and fraud-resistant by repelling different kinds of attack vectors. Furthermore, it can be connected to Anvz CrossChex Cloud, a free cloud-based time and attendance management system without any software needed. Users can use it anywhere they have got the internet by using any internet browser. Benefits of Anviz FaceDeep 3 Faster recognition, more time-saving It reduces the waiting time for more than one thousand doctors and nurses during peak hours at Hospital's main entrance gates and the academy building entrance. Strengthened patient and employee safety It also helps maintain employees' and patients' healthy and companies' physical access control security as the touchless face recognition system lower infection risk and prevents unauthorised access. Smarter solution, easier management Hospital managers are using CrossChex cloud connecting between the devices and database to manage employee schedules and time clocks. It easily tracks and exports employee attendance report in seconds.
With 1,300 cameras recording 24/7 and more than 1,000 investigations to process per year, Massachusetts General Hospital’s security team was not able to keep up with the vast amounts of recorded video. Now, BriefCam Syndex Pro for fast video review, search and analysis, embedded within a Milestone XProtect video management software (VMS) platform is making efficient and effective video investigation possible. Unique challenges to security Massachusetts General Hospital’s (MGH) Police, Security and Outside Services Department provides some security services to many other Partners hospitals and facilities. Following its recent digital conversion, unified on the Milestone XProtect VMS platform, MGH’s security team was able to expand camera coverage by adding new Axis network cameras directly to the existing IP network. The hospital environment presents unique challenges to security, Michelman points out “The number of investigations we were doing was taking huge amounts of time in terms of reviewing video, and that was really a waste of time,” said Bonnie Michelman, MGH Executive Director of Police, Security and Outside Services and Consultant for Partners Healthcare. The hospital environment presents unique challenges to security, Michelman points out. MGH’s 17-acre urban campus, comprising 29 contiguous and 14 separate buildings (including underground and freestanding garage facilities), is complex. The security team must also take into account not only the main location, but also dozens of satellite facilities around the Boston area. Enterprise risk management “We can’t cover all of these facilities with security staff,” said Michelman. “We need to augment heavily with very good, state-of-the-art technology that allows us to combine our intelligence, labour, policies and procedures, in order to create a better holistic approach to enterprise risk management.” Charged with creating a safe environment, MGH’s security team at the same time is challenged by the clinical team’s needs for increased efficiency through lowering length of stay and moving patients through the hospital as quickly as possible. The 24-hour Emergency Room, with its anxious, highly volatile population presents challenges of its own. In addition, patient elopement and patient wandering – unauthorised departures from the medical facility, whether intentional or unintentional – pose liability threats that can be very damaging to a hospital. Providing customer satisfaction A unified system was required to balance the video surveillance needs of a busy hospital campus A unified system was required to balance the video surveillance needs of a busy hospital campus with remote satellite locations while upholding the highest level of security possible, maintaining operational flow, and providing customer satisfaction that includes expectations of privacy. Michelman, together with MGH Senior Manager, Systems and Technology Robert Leahy, decided on the Milestone XProtect VMS platform. Camera count was increased from 400 to 1,300, and standardised with Axis network cameras connected directly to the IP network. To deal with the marked increase in video data, MGH’s team chose BriefCam Syndex Pro, a powerful set of tools intended to reduce the time and effort needed to conduct video reviews, post-event video investigation and real-time video monitoring. The BriefCam solution ties in seamlessly with the Milestone video management solution, providing efficient workflow for investigators. Presenting video metadata According to Michelman, BriefCam has already proven invaluable. A two year long ROI examination of video surveillance use at MGH has shown a progressive rise in success rates with the use of video in incident investigations. According to Michelman, BriefCam has already proven invaluable “I see BriefCam as a very important part of our toolbox of excellent practices for protecting what is a very complex environment of tangible and intangible assets,” said Michelman. BriefCam Syndex Pro’s ability to present video metadata in graphic visualisation format, such as bar graphs, pie charts and the like, has opened up new realms of possibilities to extend the role of CCTV video beyond security into organisational efficiency and more informed, data-driven decision making. Better investigative focus “In the past, there might have been things that would have been a ‘nice to do,’ but we couldn’t do it because we didn’t have resources to watch many hours of video,” said Michelman. “Now we can manage the content and we can see trends, which in turn can drive redeployment of resources, and by extension, facilitate a better investigative focus and success.” BriefCam Syndex Pro embedded within Milestone XProtect VMS platform is helping MGH in its mission to effectively and efficiently protect and safeguard the hospital community. Michelman said: “We’re happy with these products, but it’s not just about the quality of the technology, it’s about the quality of the partnership. You know, it’s easy to sell a product, but to sustain it, service it, and be there after it is in is really very critical for us.”
Patient falls in nursing homes are a serious problem. In the United States, for example, around 1,800 elderly people living in nursing facilities die each year from injuries related to falls, according to the Nursing Home Abuse Center. Those who survive their injuries often have a reduced quality of life and suffer some form of permanent disability. Challenge Figures show that between 50% and 75% of nursing home residents suffer falls each year, twice the chances of falling compared to seniors who live in a regular residential community. It has been a prevalent challenge to detect falls quickly and effectively, especially when these occur in residents’ bedrooms. In the UK, the Care Quality Commission has recognised that the use of CCTV may be one of the best ways to ensure safety and quality of care. However, using video surveillance also brings into question issues such as privacy and data protection. This is where Dahua’s WizMind technologies come into play. Human-based AI Specific to health and social care are deep-learning algorithms to protect the privacy of the face and body WizMind embraces human-based AI for a whole host of applications across verticals such as retail, energy, finance, transportation, and, of course, health and social care. Specific to the health and social care sector are deep-learning algorithms to protect the privacy of the face and body in real-time, and stereo analysis, which combines dual-lens cameras with three-dimensional scene analysis to detect sudden physical movement, such as falls. Stereo Video Analysis The growth of AI applications has enabled the greater availability of 3D scene analysis solutions, enabling objects and people to be analysed in three dimensions. Dahua’s stereo analysis uses two lenses to capture separate images of the same scene. It then computes the “optical parallax” of spatial points in the two images, providing 3D information about the scene. Stereo vision mimics the depth of view that comes from humans having two eyes, known as binocular vision. Deep-learning algorithm Combined with a deep-learning algorithm, stereo analysis can recognise event patterns such as falls, and other movement-based behaviours such as people approaching, the detection of an abnormal number of people in an area, and violent behavior. In nursing homes, stereo analysis cameras can help staff monitor residents in case of emergency and respond to residents’ problems, such as tripping and falls. The cameras can view all three dimensions of subjects, and together with its deep-learning algorithm can immediately alert staff to any unusual or sudden movement, such as would be evident in a fall. Intelligent fall detection technology The staff can respond quickly to incidents, which may otherwise stay undiscovered for hours With cameras situated both in communal areas and in bedrooms, the staff can respond quickly to incidents, which may otherwise stay undiscovered for hours. An example of such a scenario is a nursing home in Singapore, which has a capacity of around 400 beds and is divided into 14 separate living environments, each designed to be a home-like living area. Dahua cameras like IPC-HDW8341X-BV-3D with intelligent fall detection technology were installed, including the provision of 167 stereo analysis cameras inside each bedroom. These trigger an alarm in the case of incidents such as a fall, allowing immediate response by staff. Other applications Not only does this enhance the well-being and safety of residents, but it also can reduce the nursing home’s labour costs. In addition, Stereo Analysis can also be applied in other application scenarios. An underground unmanned bicycle parking garage in Amsterdam, for instance, has installed Dahua behavior analysis cameras to detect abnormal events and prevent accidents, such as people tripping and falling or suspicious individuals wandering around the area. Privacy protection While monitoring their situation inside the nursing home, Dahua also adopts Privacy Protection 2.0 technology that features the masking of human faces and bodies to protect the residents’ privacy. It involves the restriction of what can be seen in video images and applies equally to live and recorded images. Digital masking takes place on the front-end device (e.g. network camera). Dahua’s Privacy Protection 2.0 provides real-time occlusion of the body and face and enables users to access recorded videos, without having to overlay faces with mosaic masks. Occlusion options The technology also allows for face and human attributes analysis, without breaching people’s privacy It also offers additional occlusion options, such as irregular polygons, mosaics, and coloured blocks, and allows code exporting based on specified targets, ensuring the privacy of subjects. Benefits include non-pixelated human targets, allowing for privacy and security in evidence collection. The technology also allows for face and human attributes analysis, without breaching people’s privacy, making it ideal for nursing homes. Conclusion Stereo video analysis and privacy protection come into their own in nursing homes and healthcare facilities. It allows the close monitoring of residents or patients to help ensure their well-being and safety, while at the same time protecting the privacy of often vulnerable individuals.
With 1,300 cameras recording 24/7 and more than 1,000 investigations to process per year, Massachusetts General Hospital’s security team was not able to keep up with the vast amounts of recorded video. Now, BriefCam Syndex Pro for fast video review, search and analysis, embedded within a Milestone XProtect video management software (VMS) platform is making efficient and effective video investigation possible. Existing IP network Massachusetts General Hospital’s (MGH) Police, Security and Outside Services Department provides some security services to many other Partners hospitals and facilities. Following its recent digital conversion, unified on the Milestone XProtect VMS platform, MGH’s security team was able to expand camera coverage by adding new Axis network cameras directly to the existing IP network. MGH’s security team was able to expand camera coverage by adding new Axis network cameras directly “The number of investigations we were doing was taking huge amounts of time in terms of reviewing video, and that was really a waste of time,” said Bonnie Michelman, MGH Executive Director of Police, Security and Outside Services and Consultant for Partners Healthcare. Enterprise risk management The hospital environment presents unique challenges to security, Michelman points out. MGH’s 17-acre urban campus, comprising 29 contiguous and 14 separate buildings (including underground and freestanding garage facilities), is complex. The security team must also take into account not only the main location, but also dozens of satellite facilities around the Boston area. “We can’t cover all of these facilities with security staff,” said Michelman. “We need to augment heavily with very good, state-of-the-art technology that allows us to combine our intelligence, labour, policies, and procedures, in order to create a better holistic approach to enterprise risk management.” Highly volatile population MGH’s security team at the same time is challenged by the clinical team’s need for increased efficiency Charged with creating a safe environment, MGH’s security team at the same time is challenged by the clinical team’s need for increased efficiency through lowering the length of stay and moving patients through the hospital as quickly as possible. The 24-hour Emergency Room, with its anxious, highly volatile population presents challenges of its own. In addition, patient elopement and patient wandering – unauthorised departures from the medical facility, whether intentional or unintentional – pose liability threats that can be very damaging to a hospital. Remote satellite locations A unified system was required to balance the video surveillance needs of a busy hospital campus with remote satellite locations while upholding the highest level of security possible, maintaining operational flow, and providing customer satisfaction that includes expectations of privacy. The BriefCam solution ties in seamlessly with the Milestone video management solution Michelman, together with MGH Senior Manager, Systems and Technology Robert Leahy, decided on the Milestone XProtect VMS platform. The camera count was increased from 400 to 1,300, and standardised with Axis network cameras connected directly to the IP network. To deal with the marked increase in video data, MGH’s team chose BriefCam Syndex Pro, a powerful set of tools intended to reduce the time and effort needed to conduct video reviews, post-event video investigation, and real-time video monitoring. The BriefCam solution ties in seamlessly with the Milestone video management solution, providing efficient workflow for investigators. Providing efficient workflow According to Michelman, BriefCam has already proven invaluable. A two-year-long ROI examination of video surveillance use at MGH has shown a progressive rise in success rates with the use of video in incident investigations. “I see BriefCam as a very important part of our toolbox of excellent practices for protecting what is a very complex environment of tangible and intangible assets,” said Michelman. BriefCam Syndex Pro’s ability to present video metadata in graphic visualisation format, such as bar graphs, pie charts, and the like, has opened up new realms of possibilities to extend the role of CCTV video beyond security into organisational efficiency and more informed, data-driven decision making. Safeguarding hospital community Now we can manage the content and we can see trends, which in turn can drive redeployment of resources" “In the past, there might have been things that would have been a ‘nice to do,’ but we couldn’t do it because we didn’t have resources to watch many hours of video,” said Michelman. “Now we can manage the content and we can see trends, which in turn can drive redeployment of resources, and by extension, facilitate a better investigative focus and success.” BriefCam Syndex Pro embedded within Milestone XProtect VMS platform is helping MGH in its mission to effectively and efficiently protect and safeguard the hospital community. Michelman said: “We’re happy with these products, but it’s not just about the quality of the technology, it’s about the quality of the partnership. You know, it’s easy to sell a product, but to sustain it, service it, and be there after it is in is really very critical for us.”
In addition to traditional security and monitoring functions, Milestone’s open platform video management system at Nemours Children’s Hospital is used to help deliver unique services across departments including radiology and cardiology, behavioural health and autism clinics, for aggression detection, medication tracking, and more. As one of the largest integrated children’s health systems in the U.S., Nemours Children’s Hospital is committed to keeping the highest quality care, even at home for the convenience of patients and their families. Health system services To achieve this, technology plays a large role in their health system services. With over 1,800 network cameras throughout the facilities both inside and out, Nemours has utilised network video for years. The video system has grown in size and sophistication, as the technical team at Nemours has built on the open platform of Milestone XProtect Corporate video management software (VMS) with impressive results. The Nemours Tactical Logistics Center (TLC) has 15 large wall monitors Milestone XProtect Corporate VMS, Smart Client, and Mobile Client • Recording and Archiving Servers from Lenovo and HP • Flexibility to expand the system and innovate with new integrations. The Nemours Tactical Logistics Center (TLC) has 15 large wall monitors and serves as mission control for the hospital video system. A fixed network camera in each patient room does not record ongoing video, but the TLC can use XProtect Screen Recorder to capture live video from the displays if needed. Medical records system When the video is being accessed by authorised personnel, a LED notification will flash, letting those in the room know that the camera is monitoring the child in real time. The video system is also integrated with Epic Monitor, the hospital’s electronic medical records system, allowing patients’ medical information to display on the screen. In addition, Nemours offers CareConnect, a 24/7/365 on-demand video-based, paediatric telehealth program, which provides family access to paediatricians through a smartphone, tablet, or computer. Nemours uses their video system in both traditional and non-traditional ways, including a range of such integrations. These help the hospital improve facility efficiency, lower operational costs and deliver a better patient experience. For example, in the perinatal department, ultrasound technicians have the ability to share videos of scans with remote professionals in real time. Additional ultrasound scans The video system also plays a vital role in mass casualty drills or actual emergencies While a diagnostic-level reading is still necessary, remote video offers a great level of efficiency for providers because they have the option to give guidance to technicians, enabling a more thorough service, and perhaps saving the patient from additional ultrasound scans. Also, with remote connectivity through the Milestone XProtect Smart Client, if providers are home or traveling, they can quickly check in on patients through mobile devices, easily ensuring continuity of care. This capability made a huge difference when the COVID-19 pandemic appeared. The video system also plays a vital role in mass casualty drills or actual emergencies, helping officials to make real-time decisions on routing traffic or patients to or from other hospitals. Providing care excellence And with XProtect Screen Recorder, local facilities can capture video from displays and rebroadcast it to hospital leadership for additional direction. It gives them the ability to assist remotely and call other rapid response teams if needed. Overall, the easy integrations and scalability of the Milestone video system have had a very positive impact on the hospital network, helping reshape how Nemours is able to provide care excellence. “The Milestone open platform allows me the flexibility to source and integrate third-party products and capabilities, enabling us to greatly expand and customise the tools and services that we provide to the organisation and our patients,” said Joe Summanen, Technical Architect, Nemours Children’s Hospital.
A hospital’s first priority is patient health and safety. Aperio® wireless technology provides the freedom to focus on those goals, offering the accountability, convenience, and security needed to operate effectively and efficiently. This innovative solution allows the hospital to manage many openings, protect employees, patients and visitors, ensure compliance, reduce costs, and protect valuable equipment and supplies. Here are just a few examples: Supply cabinets Monitor and control access to pharmaceuticals Enable pharmacists and nursing staff to access medications quickly using their ID badge Ensure regulatory compliance Reduce costs associated with shrink/diversion Equipment carts Monitor and control access to supply carts with medical equipment and controlled substances Enable nursing staff to access equipment and medications quickly using their ID badge Ensure regulatory compliance Reduce costs associated with shrinkage/diversion Staff lockers Allow hospital staff to access their belongings using their ID badge Provide convenience without sacrificing security Reduce hospital liability for lost belongings Pass-through cabinets for patient rooms Enable controlled access for pharmacists to disburse medication from the hallway using their ID badge Enable controlled access for nursing staff to dispense medication from within patient rooms using their ID badge Ensure regulatory compliance Reduce costs associated with shrink/diversion Reduce hospital liability In-room storage for patient valuables Allow patients to secure belongings in their rooms Reduce hospital liability for lost or missing items of patients and visitors Reduce costs of replacing lost items Reduce patient stress Nurses’ station Allows nursing staff to secure belongings at their respective station Provides convenience without sacrificing security Reduce hospital liability for lost or missing items of staff Clean and soiled utility room Monitor and control access to gowns, masks, scrubs, gloves, linens, etc. Reduce costs associated with shrink/diversion
Products
Round table discussion
Trust is the foundation of successful relationships between buyers and sellers in the security marketplace. Trust facilitates collaboration, reduces risk, improves decision-making, and ultimately drives business growth and profitability. Transactions often involve significant investments, and trust minimises the perceived risk for buyers, making them more likely to commit to a purchase. Our Expert Panellists weigh in on the subject of trust in response to this week’s Roundtable: A security end user asks: How trustworthy are integrators and/or manufacturers?
Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depends on our ability to use them responsibly and efficiently. Optimising our industry’s use of technology requires that the industry’s workforce have the needed skills to operate the latest equipment. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact the skillsets needed by security operators and officers?
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network expose an IP video system to the internet. This makes it a potential target for malicious cyberattacks. In the physical security industry, the elimination of port forwarding is seen as a basic and manageable precaution to shore up cybersecurity. We asked this week's Expert Panel Roundtable: What are the risks of port forwarding, and how can manufacturers and/or integrators mitigate those risks?
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download