Biometric Security
Fingerprint Cards AB (Fingerprints™) and IN Groupe through SPS brand, a pioneer in contactless and dual interface cards, announce the launch of its secure Component solution for contactless biometric payment cards, supporting global card manufacturers to scale up production of next-generation payment cards. Secure Component solution In line with consumer preferences for contactless, the global biometric payment card market is anticipated to rise at a considerable rate over the coming yea...
Espria, the pioneer in digital workspace solutions, will host its next Optimise IT 2024 panel discussion, discussing how IT solutions with integrated AI technologies are best suited to support businesses and operation teams in 2024 and beyond. IT panel discussion Throughout 2024, Espria has hosted discussions on various topics, covering themes such as business peace of mind and business readiness. These discussions have featured key spokespeople from some of their pioneering IT solutions partn...
Matrix, an entity in the Security and Telecom sector, has successfully concluded its participation at SAFE South Expo 2024 in Chennai. Leveraging over three decades of industry expertise, Matrix engaged with industry peers gathered valuable insights, and explored new avenues for collaboration. Technology-centric solutions Matrix remains steadfast in its commitment to delivering technology-centric solutions, prioritising customer satisfaction. This dedication is evident in creating cutti...
Gunnebo Entrance Control is proud to announce its membership in SteelZero, a global initiative uniting organisations to expedite the shift towards a net zero steel industry. By Joining SteelZero, a renowned pioneer in entrance control solutions has pledged to drive demand for low-emission steel, contribute to policy reviews, and foster collective action and knowledge sharing among peers. Low-emission steel Alongside over 40 other businesses that consume more than 10 million tonnes of steel an...
Matrix, a trailblazer in advanced security and telecom solutions, successfully participated in the Police Expo 2024, held on July 4th and 5th at Pragati Maidan, New Delhi. This esteemed event provided a platform for Matrix to unveil its latest innovations in IP Video Surveillance, Access Control, Time-Attendance, and Telecom Solutions to a diverse audience of industry professionals and stakeholders. Advanced security solutions During the Police Expo 2024, Matrix showcased a comprehensiv...
ODSecurity is thrilled to announce the successful installation of two Soter RS X-ray body scanners at the Cayman Islands Airport for the Customs and Border Control Service. These advanced scanners, developed by ODSecurity, are designed to detect contraband inside and outside the body using a very low X-ray dose, enhancing the airport's security measures. Effective and efficient installation The Customs and Border Control Service has expressed their satisfaction with the performance of ODSecur...
News
HID, a worldwide pioneer in trusted identity solutions, announces the availability of the new HID® Signo™ Mechanical Keypad Reader 40T, engineered to offer high performance in harsh and challenging environments where the weather is wet or cold and visibility is low. The new reader has a robust IP-65 rated construction meaning the electrical components are dustproof and watertight along with a traditional mechanical push button keypad to make it easy to use when wearing gloves or where some users of a building are visually impaired due to low light conditions. Mobile-ready features “As a high-performance reader with reliable features for harsh environments, it’s a great offering for customers who have a preference or specification for a traditional mechanical device,” says Spencer Marshall, HID’s Head of Europe. Spencer Marshall adds, “It also comes with all the security and mobile-ready features you’d expect from our signature range of Signo readers, providing customers with the utmost flexibility. Whether using the keypad, smartphones, fobs, or cards, users can gain fast and easy entry into buildings.” Key features of the Signo 40T reader The new Signo 40T Reader comes with the following key features: Digital wallet ready - Support for a wide range of credential technologies, including HID Mobile Access® via native Bluetooth® and near field communication (NFC) capability, the new reader supports credentials in Apple Wallet and Google Wallet. This means users get touchless entry without having the added step of opening additional apps. Enhanced security - Highly secure storage of cryptographic keys on certified secure element hardware, plus a new surface detection feature that enables the reader to automatically recalibrate and optimise read range performance, the new Signo 40T Reader is ideal for door applications requiring a wall switch mount. Easy connectivity - Out-of-the-box support for Open Supervised Device Protocol (OSDP) for secure bidirectional communication, the new Signo 40T Reader is designed to easily integrate and fit without requiring considerable time or unnecessary extra cost from installation engineers. The reader is designed to enable remote management, too. The new HID Signo Mechanical Keypad Reader 40T is available in Nordic countries, including Denmark, Finland, Iceland, Norway, and Sweden.
Ajax Systems, Europe’s largest security systems manufacturer, and Yale, the smart home security solutions provider, are expanding their partnership to 30 additional countries. This announcement builds on the initial partnership revealed earlier in 2024, which has already seen successful implementations in several countries. Originally rolled out in five European countries, the integration is currently available to users and businesses in many more markets. Countries that support the integration Albania, Austria, Belgium, Bosnia, Bulgaria, Croatia, Cyprus, Czechia, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Latvia, Lithuania, Luxembourg, Montenegro, Netherlands, North Macedonia, Poland, Romania, Serbia, Slovakia, Slovenia, Switzerland, Turkey, Ukraine, Norway (previously integrated), Sweden (previously integrated), Spain (previously integrated), Portugal (previously integrated), Italy (previously integrated). Linus® Smart Lock L2 The new smart lock is designed to adapt to most cylinders/locks and can be quickly mounted on the door To further enhance this offering, Yale has released a new model of its flagship smart lock that can also be controlled via Ajax apps, the Linus® Smart Lock L2. It features enhanced durability, quieter performance, and twice the speed of the previous generation of Linus® Smart Lock. The new smart lock is designed to adapt to most cylinders/locks and can be quickly mounted on the door with no modifications needed and removed without leaving any marks. With Linus® L2, consumers can easily lock/unlock their doors without needing to keep track of any keys and share virtual keys with friends, family, and trusted individuals for full control over their home access. Cloud-to-Cloud connection Overall, this partnership makes life easier for Ajax users, as they can manage and control their Yale Smart Locks directly from the Ajax app. Consumers can enjoy a Cloud-to-Cloud connection to guarantee smooth and secure communication with their Yale Smart Lock and Ajax system. With this integration, users can easily lock and unlock their Yale Smart Lock and see the lock status within the app. Advanced automation options Beyond automatic locking or unlocking, the integration offers advanced automation options. Users and security monitoring companies also receive instant notifications whenever there's a change in the status of the Yale smart lock and can respond accordingly. They can access a detailed event history log within the Ajax app.
HID, a worldwide pioneer in trusted identity and physical access control solutions, announces the 2024 State of Physical Access Control Report, identifying five key trends that are shaping the future of access control. Produced by IFSEC Global in partnership with HID, the report surveyed over 1,200 security professionals across the globe to paint a picture of an industry that has been going through considerable transformation. Conducted between November 2023 and January 2024, the survey reveals five trends, as follows: Mobile access and digital ID set to become ubiquitous While physical ID is still prevalent within the access control industry, there is no doubt that mobile access credentials and digital IDs are quickly gaining ground. According to this report, nearly two in five organisations (39%) now actively use mobile identities with respondents naming touchless/contactless solutions (48%) and mobile access (44%) as the two largest trends shaping the wider access control industry. Open standards driving the smart buildings phenomenon Open standards have become key drivers for more converged security solutions Open standards have become key drivers for more converged security solutions, where physical access control data is helping not just to decide who should be allowed into the building, but also how that building can best be used. As the report shows, almost half of organisations (48%) already have access control/badge scanning systems in place to monitor building usage throughout the day, at least to some extent. Additionally, 43% of respondents cited smart buildings and flexible workspaces being among the top three trends shaping the wider access control industry. Integration with other business functions was also listed by one in three respondents (32%) as another top trend. Sustainability becoming a greater influence on business decisions Sustainability plays a significant role in access control with nearly two-thirds (63%) of respondents citing that those with responsibility for sustainability have either some influence or are fully consulted when it comes to upgrading physical access control systems. The rise of artificial intelligence for analytics use cases The use of Artificial Intelligence capabilities in physical access control is becoming more common as AI technologies and expertise are developed. Asked if they are looking to incorporate AI/machine learning into their access control solutions, 38% of them stated they were (although the same percentage said they were unsure of the benefits). Only 23% said they didn’t have any plans to incorporate AI technologies. The growing role of biometrics – especially contactless solutions The biometrics market is growing at a rapid pace. By 2031 the worldwide market for biometrics is expected to reach $136.18 billion while the global facial recognition market alone is predicted to grow to $16.74 billion by 2030, up from $3.83 billion in 2020. That’s a CAGR of 16% from 2021 to 2030. All data cited in this press release are from the full report, which provides an in-depth analysis of what is driving the physical access control industry now and into the future.
IDEMIA Public Security North America, the pioneer secure identity solutions provider, in partnership with the New York State Department of Motor Vehicles has launched the next-generation of mobile ID. New York residents can now assert their identity securely and easily from their mobile phone by downloading the free app from either the Apple App Store or Google Play. State residents can use the app immediately to verify their identities directly from their mobile phones at TSA checkpoints at John F. Kennedy International Airport (JFK) and LaGuardia Airport (LGA), as well as 27 other participating airports around the country. Interactive identity solution This comprehensive and interactive identity solution can be used for identity verification both in-person and online by various government agencies, businesses, and organisations. Created with IDEMIA’s patented technologies, robust security features, and a focus on privacy and interoperability at the forefront, the New York Mobile ID (mID) app is designed to conform to the International Organization for Standardization (ISO) standard for the mobile driving license (ISO 18013-5). This provides a high level of assurance that mobile ID verifiers and relying parties of mobile ID can trust This provides a high level of assurance that mobile ID verifiers and relying parties of mobile ID can trust. The New York Department of Motor Vehicles (NY DMV) pushes on-demand credential updates to the app, ensuring verifiers have the most-up-to-date status, including real-time notification if an ID has been revoked or cancelled. Easy and contactless way The New York mID app provides an easy and contactless way for users to verify their identity while protecting their privacy and ensuring security. Mobile ID holders are the only ones who can access the Mobile ID by unlocking the app using their biometrics or their personal six-digit pin. Users must consent to sharing their information when using their Mobile ID, an improvement in consumer privacy compared to the physical credential. “Everything is on your cell phone these days, and now, your ID can be too. This is an exciting way to provide identification without having to dig through your wallet or purse to find your physical document. Rather than handing over your physical ID with lots of personal information, the Mobile ID gives you greater control over what personal data you share. We are proud of the product we built with our partners at IDEMIA and look forward to New Yorkers using it,” said Mark J.F. Schroeder, DMV Commissioner. Demonstrating collective commitment IDEMIA’s partnership with New York Department of Motor Vehicles is an example of iron sharpening iron" “IDEMIA’s partnership with New York Department of Motor Vehicles is an example of iron sharpening iron. Throughout the development and launch of New York’s mobile ID, leaders in the State challenged us to do more and make important improvements to our mID offering. Ultimately, the State of New York is launching a best-in-class solution to its citizens, something they should all be proud of.” “Together, we are demonstrating our collective commitment to expanding the use of mobile ID while implementing technologies that are convenient, secure, and equally accessible to all citizens. We’re excited for New York residents to be able to use this technology to verify their identities seamlessly and securely and for acceptors of mobile ID to gain important benefits as well,” said Donnie Scott, CEO of IDEMIA Public Security North America. Significant user experience The NY mID app was designed with IDEMIA’s most advanced features to improve usability for all residents. The NY DMV and IDEMIA teams collaborated to make significant user experience improvements including enhancements to screen reader compatibility, adjustable text and contrast, voice command, keyboard navigation, and much more. Arizona, Delaware, Iowa, and Mississippi are additional states that have rolled out IDEMIA’s Mobile ID technology, with more states to launch later this year.
Centrios, a new brand created within ASSA ABLOY to serve the small business market, announces their first shipment of hardware products to SECLOCK. Centrios is a cloud-based access control solution developed to radically simplify the needs of small and growing businesses. By connecting the Centrios mobile app with Centrios smart readers and locks, owners and managers can quickly and easily manage access for all employees and visitors in one place. Small and growing businesses The first shipment of Centrios product left Centrios HQ in Berlin, Connecticut on June 18th and is now available for ordering through SECLOCK. End-users that are looking to purchase or have Centrios product installed at their business can find local support on the Centrios Where to Buy Finder on centrios.com. Their channel partners also benefit from a solution that is easy to sell, is well supported Bryan Lieberman, General Manager for Centrios, shared that this shipment marks an important step forward in digital transformation for small and growing businesses. It offers small business owners improved connectivity, ease of access, quality, and versatility, enabling them to control access for employees or visitors across multiple physical sites with their phone, tablet or PC. Their channel partners also benefit from a solution that is easy to sell, is well supported, and helps them grow their business. Managing access schedules Echoing this sentiment, Justin Wormell, Executive Director of Strategic Accounts, SECLOCK, said, "Centrios offers a fresh approach to access control systems, providing new functionality and operating practices for the owners and managers of small businesses – something we get asked for all the time. We are honored to be the first to stock Centrios products and look forward to the opportunities it brings." The Centrios mobile app is designed to seamlessly integrate with Centrios smart readers and locks. The simple-to-use mobile app allows owners and managers to grant access to employees and trusted vendors, manage access schedules, view access history reports, and users can unlock openings with a touch of their phone. Users can find the Centrios mobile app on the Apple App Store or Google Play. Access control solution The new Centrios Smart Reader is IP65 weather resistant, FCC/IC certified, ADA compliant The Centrios Smart Reader enables users to unlock virtually any door with electrified hardware from the perimeter to the core of a small business. The Smart Reader is an optimal access control solution for storefronts, employee entrances, storerooms, gates, offices, automatic doors, and access control retrofits. The Smart Reader can be paired with other electronic access control systems, features Bluetooth mobile access and PIN code management which can be managed with the Centrios mobile app, and is easily installed and operated. The new Centrios Smart Reader is IP65 weather resistant, FCC/IC certified, ADA compliant, and operates in temperatures ranging from -40º to 140º F (-40º to 60º C). Access control components Centrios offers bundled kits to make purchasing convenient and hassle-free for small business owners. Each bundle includes a Smart Reader and various access control components depending on the type of hardware required. Examples of what can be selected include electric strikes from HES and Adams Rite, power supply from Securitron, no touch request to exit switch from Alarm Controls, and Securitron DPS. With technology from several new patents, the Centrios cylindrical lock is high performing, easy to install, and simple to use. It facilitates access via an optional mechanical key or Bluetooth mobile access, features privacy mode with an included door position sensor, and an LED for lock events and alarms. Configurable auto relock The Centrios cylindrical lock typically operates for an entire year on four AA batteries and includes exterior emergency 9VDC power backup and a configurable auto relock. Small businesses can choose from one of four lever designs and five finishes, including the very popular black suede, satin chrome, bronze, bright brass, and satin nickel. The Centrios cylindrical lock is ANSI/BHMA A156.2 Grade 1 compliant, features UL10C 3-hour fire rating, is IP57 weather resistant, FCC/IC certified, ADA compliant, and operates in temperatures ranging from -40º to 140º F (-40º to 60º C).
Westminster Security Group, a renowned name in private security, announces a strategic investment in Tratix, an innovative technology company based in Tel Aviv. Tratix, founded and led by seasoned entrepreneur - Sharon Rashty, specialises in cutting-edge solutions to help prevent cargo theft. With a distinguished background in Israeli Intelligence services and building early-stage startups, Sharon Rashty brings a wealth of experience to Tratix. Her expertise in tailing detection, counter-surveillance, and criminal behaviour profiling drives innovation in security solutions, safeguarding supply chains, and protecting valuable assets. Tailing Detection System Adopted by industry pioneers, Tratix ensures that cargo receives unparalleled protection Tratix emerges as a beacon of innovation in the realm of logistics and transportation, addressing the escalating threat of cargo theft globally with its groundbreaking technology. The company's flagship solution, the Tailing Detection System, offers a proactive approach to prevent theft incidents before they occur. Amidst dynamic criminal tactics, Tratix emerges as a beacon of innovation, with the Tailing Detection System representing more than just a solution – it embodies a steadfast commitment to securing cargo and fortifying supply chains. Adopted by industry pioneers, Tratix ensures that cargo receives unparalleled protection. Close protection setting John Moore, CEO of Westminster Security Group, said, "As pioneers in the security industry we are always thinking outside of the box and ahead of the curve. Cargo theft is a massive problem globally with vehicles being easy targets and often sitting ducks, Tratix solves this." He adds, "It also has other potential uses such as protecting cash and valuables in transit (CViT) vehicles, anti-stalking, and within a personal close protection setting. We are excited to be working with Sharon to develop this technology, utilising our experience, and expertise to help prevent cargo theft, and help recover it, should the unfortunate happen." Advancing cutting-edge technologies Tratix CEO, Sharon Rashty, said: "I'm thrilled about our partnership with Westminster Security Group. This investment accelerates our journey to revolutionise logistics security. With our Tailing Detection System, we're committed to staying ahead of threats and safeguarding supply chains. Together, we'll redefine industry standards for security solutions." Westminster Security Group's investment in Tratix underscores its commitment to advancing cutting-edge technologies in the realm of security. Together, they aim to revolutionise cargo theft prevention and safeguard supply chains globally.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognise the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorised access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organisation in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organisations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
With the rise of organised retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing the economic pressures that impact profitability and consumer demand. RFID technology The key lies in identifying effective solutions to counter the current surge in ORC, enabling retailers to secure their vulnerable staff and protect inventory for paying customers. Technology plays a crucial role in supporting brands on this mission, with RFID technology continuing to be a valuable solution. It aids retailers in gaining better control over retail crime, leveraging inventory data. The ongoing surge in retail crime Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector Seen as a global issue, the British Retail Consortium recently reported that incidents of theft have increased by 27% across 10 of the largest cities in the UK, with some cities reporting up to a 68% increase. In the US, retailer Target reported an inventory loss of $500 million for 2023, amounting to a 100-basis point hit to gross margins in 2023. The current surge in theft is not attributed to a singular cause. Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector. Lack of preventive measures A significant contributing factor is the lack of sufficient preventive measures by law enforcement, which in some cases has led to a rise in more severe incidents. However, the implementation of technologies like RFID allows retailers to efficiently build cases against criminals, putting them in a stronger position when it comes to reporting thefts. Not all retail crimes are orchestrated by large entities or executed through sophisticated methods. Some stores have seen a reduction in staff numbers and, as a result, there are fewer people on the shop floor, making it easier for shoplifters to carry out their activities unnoticed. The true impact of retail crime Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey The impact of retail crime on businesses extends beyond financial and economic consequences; it has also led to a surge in violence against retail staff, an ongoing trend elevated by the pandemic. Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey conducted by the National Retail Federation. This escalation in violence not only results in immediate repercussions but also contributes to long-term mental health issues for staff, fostering an atmosphere of insecurity that has compelled some retailers to close their physical stores. Policy implementation Given the challenge of staff retention across various businesses, addressing retail crime becomes an even more urgent matter. Additionally, retailers are wary of their employees facing potential danger and the prospect of legal action. Consequently, many have implemented policies prohibiting employees from actively intervening when confronted with shoplifters. Privacy concerns with facial recognition Retail crime also affects customers, as businesses seek to offset losses by raising prices Retail crime also affects customers, as businesses seek to offset losses by raising prices, further burdening financially strained consumers. The presence of visible security systems not only makes stores more hostile but also diminishes the overall customer experience. While facial recognition technology is considered a potential solution, privacy concerns have emerged in its various applications. Today’s problems, yesterday’s solutions Retailers are resorting to historic measures such as steel cables, physical monitoring, or plastic screens to resolve customer issues. However, the reality is that these solutions are unfit for solving the problem, causing friction for both customers and staff. Digital solutions The newer approach involves equipping retail staff with body cams and providing new training The newer approach involves equipping retail staff with body cams and providing new training to deter shoplifters. Some stores are even offering the police discounted food and beverages to encourage their presence. The responsibility lies with management teams to seek effective solutions. In an era dominated by data and technology, retailers must shift their focus from traditional security methods to digital solutions that align with the challenges of today’s society and modern retail environments. Shrinkage When discussing theft or organised retail crime, retailers commonly use the term "shrinkage," referring to not only theft but the broader issue of lost inventory. Additional drivers of shrinkage include damage, fraud, and internal theft. A significant problem arises as losses are often based on guesswork and estimates rather than concrete numbers. Retailers may lack a comprehensive understanding of their inventories, further increasing the issue of shrinkage. Combating shrinkage Utilising RFID technology notably helps in boosting inventory accuracy Some retailers still struggle with limited knowledge of the whereabouts of items, a challenge heightened by the issue of shrinkage. Utilising RFID technology notably helps in boosting inventory accuracy. This enhancement enables retailers to obtain a clearer understanding of their inventory and the precise locations of items. Comprehensive strategy Changes in the in-store experience have highlighted the relevance of RFID, especially as self-service checkouts encounter double the shrinkage levels compared to traditional checkout stores. To combat retail theft effectively, a comprehensive strategy should involve the integration of labels, deactivation, electronic article surveillance, and data analytics. This combination works synergistically to reduce shrinkage and enhance product availability. Retail data analytics platforms RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors Linking hardware to an underlying data analytics platform empowers retailers to make more informed decisions. Retail data analytics platforms delve into alarms, deactivations, and visitor metrics, providing a deeper understanding of theft patterns. RFID technology drives efficiency by pinpointing frequently stolen items, allowing for the identification of theft patterns. In instances of flash mobs in major metropolitan areas, RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors and incoming customers. Real-time optimisation The crucial question remains whether both shoppers and retailers are prepared to shoulder the responsibility for these additional precautions. Nevertheless, these changes leverage data more effectively, optimising loss prevention strategies almost in real-time rather than relying on biannual inventory counts, therefore transitioning from static to dynamic loss prevention. Holistic approach Striking a balance between security measures and providing a seamless shopping experience is key In a retail environment, not all items require protection, and prioritising the safeguarding of the most frequently stolen and valuable items can significantly impact shrinkage. A holistic approach to retail theft is imperative, considering the entire journey of an item through the retail environment. Striking a balance between security measures and providing a seamless shopping experience is key. Protection without hindrance As stores move towards being checkout-free, retail criminals (or ORC gangs) will be presented with lucrative opportunities to steal, so retailers need to be one step ahead by introducing unobtrusive and effective technology solutions. For example, case building can be improved with item-level data. RFID data offers a more precise means of assessing the value of stolen items compared to relying solely on CCTV. It provides detailed insights into the specific items removed from the store and the timing of these incidents. This proves beneficial in tracking repeat offenders. Increased visibility with a proactive approach The modern retail environment continues to evolve and criminals are never far behind. RFID technology plays a crucial role in minimising shrinkage by enhancing inventory visibility. Moreover, it leverages the power of data to stay ahead, enabling better predictions of retail crime and the formulation of prevention strategies. This proactive approach allows for the implementation of more tailored solutions to alter outcomes positively.
As we head into a new year, it’s fair to say that it isn’t easy out there for the security integrator community. That’s understandable given the big ruptures felt in the market for physical security in 2023. Typically, Commercial Real Estate (CRE) landlords are the biggest and most influential buyers of physical security hardware and software, but this is starting to wane as heightened borrowing costs and biting inflation cause real estate valuations to plunge. Building security upgrades A lot of CRE landlords are in a fight for survival which unfortunately doesn't leave much room for budget spend on building security upgrades. This state of affairs is a problem for security integrators with extensive connections in the CRE space. Where do they pivot their services to keep their business growing in 2024? From the conversations I’ve been having with integrators and customers alike over the past few months – the answer is that the growth potential lies in the enterprise space. The trajectory of enterprise IT and physical security Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working It might initially feel unnatural to see the enterprise segment as a potential driver of demand for physical security services and products. Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working habits? These things are true but also present an opportunity for the right physical security proposition. Standardisation of enterprise IT Take efficiency drives as an example. A key element of such efforts is an acceleration towards the standardisation of enterprise IT platforms, hardware, and solutions, using the cloud. What was once a focus on moving on-prem systems and workloads to the cloud has shifted to efforts to keep cloud OpEx costs down by centralising as much as possible. Practically, this means utilising APIs to plug disparate IT applications and services into central platforms that boast a “single pane of glass” view. APIs APIs drive consumption, open new business models, and foster cross-industry partnerships APIs aren’t anything new to enterprises. They drive consumption, open new business models, and foster cross-industry partnerships. However, the use of APIs in the physical security sphere has been surprisingly slow to take off. There are multiple elements to this but a key reason is that some security software products on the market aren’t cloud-based. Adding cloud-based solutions to network Others are cloud-based, however, and these are the solutions that security integrators need in their portfolio to serve the influential enterprise market segment and its approach to IT networks. Selling the value of these solutions requires integrators to take it a step further by speaking the language of the enterprise IT buyer and understanding their goals. The power of cloud-based access control in the enterprise Hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events The continued relevance of physical security for enterprises can’t be understated. After all, hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events – not less. Despite the discourse around office downsizing, the reality for most enterprises is that the office can’t be done away with completely and there’s always going to be growth experienced by successful companies that require an upgrade in physical square footage. Physical security Access control systems that are cloud-based will be preferred by the enterprise to fulfill the essential function of physical security. That’s because they align with the push towards centralisation in the cloud that enterprises are carrying out business-wide. Access control has the potential to result in lots of disparate dashboards and apps. Think video management, license plate recognition, building management software, elevator monitoring, hot desking solutions, guest booking software, room booking functions, and more. Uniting all of these functions in one platform suits enterprise security teams well. Access control solutions Linking employee databases to an IAM solution, or creating seamless experiences by tying access credentials But this only scratches the surface. Access control solutions that can be integrated with hugely popular corporate software applications like Okta, Azure Active Directory, and Google Workspace quickly catch the eyes of enterprise IT security teams by pulling in the same direction as the broader tech stack. Whether it’s applying AI analytics to anomaly detection, linking employee databases to an Identity Access Management (IAM) solution, or creating seamless experiences by tying access credentials to things like meeting room bookings, it’s through APIs that cloud-based access control can thrive in an enterprise setting. Security integrators It’s worth also noting that as enterprises grow, access control gets harder. Managing the access requirements of thousands of employees across a global real estate footprint requires the scale that cloud computing is best placed to bring. Security integrators who can join the dots to make that link are well positioned to pivot toward the enterprise. Broadening horizons Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates This pivot is understandably a daunting prospect but the potential for natural synergy shouldn’t be overlooked. Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates and security anomalies won’t be completely alien to cloud-first enterprises. That’s an opportunity for integrators to upsell more sophisticated security set-ups in a way that they may have found more difficult with CRE clients and prospects. Tailored propositions It would be remiss to avoid mentioning that ‘enterprise’ is a very loose term that encompasses businesses across multiple industry verticals. To better pivot, security integrators need to offer tailored propositions specific to set verticals that cover all bases as opposed to offer, for example, piecemeal alarm or video product solutions. Enterprise industry verticals Security integrators should be weary of all-encompassing narratives in 2024. Whether or not the global economic picture darkens, there are always going to be pockets of growth within certain enterprise industry verticals. Plus, anecdotally, the indicators point to enterprises being the driver of demand for cloud-based access control as we head into the new year. Integrators who can dial into that shift have a lot to gain and nothing to lose.
Security beat
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information, perhaps just a voice on the phone or a location on their screen. Providing critical information Today, there are literally millions of information sources available, ranging from connected buildings to vehicle telematics to live video streams to health information from wearable devices. In fact, there are 540 million connected devices, any one of which could provide critical information in an emergency. But how can those information sources be leveraged to improve emergency response? That’s the mission and value proposition of RapidSOS, an ‘intelligent safety platform’ company that connects 911 operators with the vast universe of information available to promote better and faster emergency response. Highly sophisticated operation The platform is integrated into every major public safety software system and first responder agency “RapidSOS fuses human and artificial intelligence to put critical information from any connected device directly into the existing systems and operating procedures of first responders across the United States,” says Michael Martin, CEO of RapidSOS. RapidSOS is widely used by first responders. The platform is integrated into every major public safety software system and first responder agency. There are more than 4,600 software integrations that serve more than 21,000 first responders and 911 agencies. In 2023, RapidSOS supported the lifesaving work of public safety across 171 million emergencies with 3.3 billion data payloads. The system is adaptable and configurable to support any agency, from a highly sophisticated operation in New York City to a local sheriff running their own 911 center. Intelligent analytics and reporting RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation, rich content pathways, redundant connection to caller phones, and access to millions of connected devices. In an emergency, Unite intelligently fuses data from among millions of sensor feeds into a unified picture of an incident, allowing public safety officials to view real-time location, health profile, telematics, alarm data, and more. RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation RapidSOS offers core modules that handle call, text, video, sensor, mapping, and administration tools, and that provide partner data from connected devices. Additional modules provide enhanced geographic information system (GIS) data, and automated translation and transcription. There is also a single sign-on (SSO) upgrade, intelligent analytics and reporting, and seamless integration into field responder applications. Field responder applications Consider how an emergency might unfold and how RapidSOS can help. In a car accident, data from a modern automobile telematics system can alert a 911 operator of the accident as it happens. Data from a passenger’s wearable device might provide information about their health and condition. A nearby video or traffic camera could fill in details of how the accident occurred. Useful information in an emergency might come from any one of thousands of sources, including public safety data, sensor feeds, enterprise security systems, smart phones, etc. In a train derailment, electronic access to the cargo manifest can identify which train cars contain hazardous materials and how to manage the specific type of hazmat. This information could save valuable time when responding to incidents like the Feb. 3, 2024, Norfolk Southern train derailment involving 38 cars in East Palestine, Ohio. Consider how an emergency might unfold and how RapidSOS can help Institutional security partners Norfolk Southern is one of the companies that provides information to first responders using RapidSOS; in effect, the company provides a direct digital link from their rail security operations to any first responder in the United States. Amazon’s global operations centers also interface with RapidSOS to provide critical information to first responders. Partnering with corporate security helps to better support the flow of data from institutional security partners and their solutions. Information can transform and guide emergency responses. For example, in a structure fire, real-time sensor feeds throughout a building can help 911 and first responders understand how the fire is progressing. Real-time security camera footage Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR Leading the way to providing video feeds from private camera systems to 911 operators is an agreement between Eagle Eye Networks and RapidSOS, which was announced in April 2024. The agreement allows an enterprise to opt-in to share real-time security camera footage from an Eagle Eye video stream during a live 911 call. Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR. “Security cameras are crucial in many locations, including schools, but previously those cameras could not be accessed by 911 during an emergency but were only used for investigation after an incident,” says Martin. Improving fire and life safety systems RapidSOS is also integrated with Honeywell’s Connected Life Safety Services (CLSS) system, a cloud platform that combines software and hardware to improve fire and life safety systems. Technology integrations between the two companies further modernise and digitise the public safety communications process to provide faster, more accurate communications with emergency centers (i.e., 911 agencies). RapidSOS technology securely transmits detailed data about an emergency CLSS provides real-time visibility and connectivity to help systems integrators and facilities managers make informed decisions and manage fire systems more efficiently. When combined with Honeywell's solutions, RapidSOS technology securely transmits detailed data about an emergency, such as the type of hazard, severity, and location within the impacted building, to emergency response centers. Video object detection Rapid SOS’s emerging Harmony artificial intelligence (AI) product serves as a ‘co-pilot’ for 911 operators, helping them manage the high volume of emergencies by making their response more efficient. Harmony pulls all the sensor feeds in an emergency and works to make only the most important information available in the hands of 911 and first responders. Harmony can take key insights from text and video data, use ‘sentiment analysis’ to determine the emotion tone of a message, and help 911 professionals using language translation, keyword alerts and video object detection. Harmony can help local agencies as they address a 25% average staffing shortage by providing additional support to 911 professionals while lessening the workload. Harmony is also working to help RapidSOS expand the ecosystem, stitching more data together and quickly making it more actionable than ever. Emergency response system RapidSOS also interfaces with Iamresponding, a comprehensive end-to-end emergency response system for first responders in the fire and other emergency sectors. Iamresponding’s field responder application is used by RapidSOS to get information out to first responders in the field. More than 650,000 first responders use RapidSOS’s field application RapidSOS’s recent acquisition of Iamresponding helps the company improve the connection with the last mile “in-the-field” piece of the puzzle, ensuring partners across computer-aided dispatch (CAD), integrated applications, mobile data terminals, body cameras and other responders have access to critical data. More than 650,000 first responders use RapidSOS’s field application. Enhancing emergency response RapidSOS’s Safety Pioneer Program formalises the important partnership between RapidSOS and public safety agencies. Participants in the program receive early access to new platform features, contribute to the platform roadmap, and drive feedback to enhance emergency response. “911 and first responders do incredible lifesaving work,” says Martin. “Everything we have done and built at RapidSOS is a direct result of the engagement, partnerships, inside advice and insight we have gotten from public safety. We have learned from them, developed new technologies and tested them.” Martin adds: “Companies have data and we now know how to make that data actionable into the hands of 911 and first responders to save lives. This is an exciting moment for us continuing our mission in partnership with public safety, and for technology and security companies to have a major hand in that.” {##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##}
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
In the competitive world of physical access control, Big Tech companies are seeking to play a larger role. Physical access competition Apple Wallet continues to stake its claim on mobile credentialing. Amazon One Enterprise is pushing a palm-based identity service. Google/Nest offers smart locks for home access control, with identity and access management provided in the Google Cloud. The entry of these big companies in the historically fragmented physical access control market is causing disruption and foreboding new levels of competition. Apple Wallet impacting credentialing trends The popularity of mobile wallets and contactless technologies in general has grown, creating more demand At Apple’s Worldwide Developer Conference in June 2021, the company announced support for home, office and hotel keys, including corporate badges and student ID cards, in Apple Wallet. Later, the company announced Hyatt as the first hotel partner to support the technology. Since then, the popularity of mobile wallets and contactless technologies in general has grown, creating more demand for a seamless solution such as Apple Wallet. Easy access In 2023, HID Global announced the availability of their employee badge in Apple Wallet, allowing staff and guests to easily access corporate spaces with their iPhone or Apple Watch, including doors, elevators, turnstiles, etc. Employees just need to hold their iPhone or Apple Watch near the reader to unlock. Factors affecting the rate of adoption However, implementing and maintaining an Apple Wallet-based access control system can incur costs for hardware updates, software licencing, and ongoing maintenance. Factors affecting the rate of adoption include the need to upgrade existing infrastructures to accommodate the technology, and the necessity for access control manufacturers to develop and implement integrations with Apple Wallet. Benefits of adoption Keys in Apple Wallet take full advantage of the privacy and security built into the iPhone and Apple Watch With larger companies leading the way, some smaller ones might take longer to catch up. There is also a need to educate building owners and administrators to see the value and benefits of switching to Apple Wallet-based access control. Convenience and greater security can accelerate adoption. Keys in Apple Wallet take full advantage of the privacy and security built into iPhone and Apple Watch. Sensitive data protection A compatible app, specific to the building’s access control system, is needed. Once added, credentials are securely stored in the iPhone's Secure Enclave, a dedicated hardware chip designed for sensitive data protection. Holding an iPhone near an NFC-enabled reader enables transmission of encrypted credentials. In addition to Near Field Communication (NFC), some systems also utilise Bluetooth Low Energy (BLE) for added security, longer read range, and hands-free unlocking. Phones need sufficient battery charge to function. Amazon One Enterprise Enables Palm-Based Biometrics In November 2023, Amazon Web Services Inc. (AWS) announced an identity service providing comprehensive and easy-to-use authentication for physical and digital access control. The system enables users to employ their palm as an access control credential, allowing organisations to provide a fast and contactless experience for employees and others to gain access to physical locations as well as digital assets. Physical and digital locations Physical locations include data centres, office and residential buildings, airports, hotels, resorts Physical locations include data centres, office and residential buildings, airports, hotels, resorts, and educational institutions. IT and security administrators can easily install Amazon One devices and manage users, devices, and software updates using AWS’s Management Console. Elimination of physical credentials An advantage of the Amazon approach is the elimination of physical credentials such as fobs and badges, and digital elements such as personal identification numbers (PINs) and passwords. AWS says security is built into every stage of the service, from multi-layered security controls in the Amazon One device, which is the same technology used in the Amazon Go retail stores, where shoppers can pay for purchases by scanning the palm of their hands. The devices combine palm and vein imagery for biometric matching and deliver an accuracy rate of 99.9999%, which exceeds the accuracy of other biometric alternatives, says the company. AI and ML The palm-recognition technology uses artificial intelligence and machine learning to create a “palm signature” that is associated with identification credentials such as a badge, employee ID or PIN. Boon Edam, a revolving door and turnstile manufacturer, offers Amazon’s palm biometric technology on its equipment, and IHG Hotels & Resorts uses the technology to provide employees a convenient way to identify themselves and gain access to software systems. Google and Nest Devices in Access Control When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone Google’s Nest devices include smart locks for home access control. The Google Nest × Yale Lock allows access control via both physical keys and passcodes accessible through the Google Home app. When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone. Passcodes can be created for family, guests, and other trusted persons. Alerts can be provided whenever someone unlocks and locks the door. When Nest “knows” a resident is away, the door can lock automatically. Voice control, Google Home app Voice control, using Google Assistant integrated with various Nest devices, enables use of voice commands to lock and unlock doors, thus adding another level of convenience. Smart home devices from various manufacturers can be controlled through the Google Home app. SMART Monitoring ADT’s Self Setup smart home security systems integrate Google Nest smart home products with ADT security and life safety technology, including SMART Monitoring technology. Microsoft Azure is another company that could impact access control. The Microsoft Azure Active Directory is an identity and access management platform that could be extended to physical access control, leveraging existing user credentials. Long-Range Impact on the Security Marketplace Big Tech companies are creating platforms for managing access control data, integrating with other security systems Increasingly, Big Tech companies are creating platforms for managing access control data, integrating with other security systems, and offering analytics for optimising security and building operations. Big Tech is also actively researching and developing new technologies for access control, such as facial recognition, voice authentication, and AI-powered anomaly detection. Access control communication and integration As their involvement in physical access control grows, Big Tech companies could potentially gain more influence in setting industry standards for access control communication and integration, similar to how they have become dominant in other areas such as mobile platforms. Given their expertise in user interface design and data analysis, Big Tech companies could help to direct how future access control systems are managed and how users interact with them, including more intuitive and user-friendly operations. Future of physical access control Existing concerns about privacy, security, and potential dominance by a few Big Tech companies could spill over into physical access control. However, traditional security companies, startups, and industry consortiums are also actively developing innovative solutions. Ultimately, the future of physical access control will likely be shaped by a combination of many different players and technologies – large and small.
Case studies
The Ampelmännchen (“little traffic light man”) from the former GDR is a cult figure around the globe. For tourists, the shops of AMPELMANN GmbH in Berlin are a big draw. Branches are spread over the entire city, and to reduce the burden of employee and staff key assignments, the company sought to optimise access rights management. At the same time, branch security needed to be state-of-the-art. The CLIQ® access control solution from ASSA ABLOY met all these requirements with flying colours. AMPELMANN GmbH Founder and Owner - Markus Heckhausen sought a locking solution for eight AMPELMANN GmbH branches and a 2,200 m2 logistics centre, to meet the needs of a decentralised branch organisation. This creative company, which manufactures and sells a wide variety of products under the AMPELMANN brand with the Ampelmännchen, did not want a complex system suited only to large companies with thousands of employees. It should be practicable and fast for a company with around 150 employees, yet still be able to secure branches reliably. Easy administration, maximum security Branches must be accessible to customers during opening hours, yet sufficiently secured Small and medium-sized retailers face the same access control challenges as their large competitors. Employees need access to the store, warehouse, and offices, but not every employee should have the same authority. Branches must be accessible to customers during opening hours, yet sufficiently secured after closing time against unauthorised access. Challenges faced Key management is often an elaborate, time-consuming process, even more so when keys are lost or stolen. In such cases, all locking systems must be replaced, which requires more effort and significant costs. AMPELMANN GmbH in Berlin also faced these issues. Its eight branches are located in the best shopping areas in Berlin, each staffed by several employees. External service providers, such as cleaners also need access to the building. A large staff roster and significant distance between branches create a major key management workload. eCLIQ ensures branch security Together with the Berlin locksmith Hinz, AMPELMANN Owner - Markus Heckhauen found a solution in the flexible, decentralised, and reliable electronic locking system from ASSA ABLOY. Uli Hahn, Managing Director of Hinz, has been providing security in and around Berlin for more than 50 years. He says, "The eCLIQ locking system is very powerful and safe compared to conventional systems. It is easy to handle and to assemble. Above all, it enables quick and easy administration of access authorisations, making it the perfect choice for medium-sized companies, such as AMPELMANN." Plug-and-play solution Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software eCLIQ comes as a "plug and play" solution and is ready to use immediately after installation. The system works without cabling, so the extremely compact eCLIQ cylinder can be used in a wide variety of doors at any location. Power is supplied by batteries in each programmable key, which can be changed easily and without tools. A built-in chip makes every electronic key unique. Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software. Robust, durable, and safe In addition to the compact design, the system is characterised by robust, durable, and safe components. An integrated lubricant reservoir ensures the cylinders remain maintenance-free for up to 200,000 cycles. A high-quality processor protects the locking system against manipulation and intelligent attacks. Keys are also highly resistant and waterproof (IP67). eCLIQ cylinders and keys are VdS-certified (BZ +) and comply with the DIN EN 15684 standard for electronic locking systems. A wide range of different cylinder types makes the system suitable for many applications from the company's entrance gate to securing alarm systems, elevators, doors, and cupboards. Convincing solution "Decisive in our choice of eCLIQ was that we could control access authorisations easily and flexibly at any time," explains Markus Heckhausen, adding "If a key is lost, we can easily deactivate it and disable it." eCLIQ even makes time- and location-limited authorisations easy for example, by allowing cleaners to enter only at certain times. The allocation of access authorisations can be coordinated conveniently by individual branch managers, within a system that ensures maximum security for all AMPELMANN GmbH shops.
Corsight AI is proud to announce its involvement in a groundbreaking security project at the 14th Battalion in Osasco, a neighboring city within the metropolitan area of São Paulo. The initiative marks a significant step forward in leveraging advanced technology to enhance public safety. Comprehensive security solution Captain David, a key sponsor and advocate for this initiative, has been instrumental in integrating Segdboa's comprehensive security solution at the battalion. The solution features Corsight AI's cutting-edge Facial Intelligence platform, Digifort's Video Management System (VMS) and License Plate Recognition (LPR), IP Extreme's video analytics for gun detection, smoke detection, fall detection, and fight detection, as well as Dahua's cameras, video walls, and touch screen TVs positioned throughout the battalion. Faster response times "This project is a significant milestone in our efforts to enhance public safety in Osasco and beyond," said Captain David, coordinator of activities at the 14th Battalion. "With the advanced technology provided by Segdboa and Corsight AI, we can respond more quickly and effectively to potential threats." Real-time monitoring Segdboa also installs surveillance poles with cameras in front of critical private and public venues This initiative is part of a Public-Private Partnership (PPP) spearheaded by Segdboa, which donates fully-equipped monitoring rooms to each battalion, outfitted with the latest security technology. These rooms enable real-time monitoring and rapid response to potential threats. Segdboa also installs surveillance poles with cameras in front of critical private and public venues such as shopping centres, condominiums, bridges, and parks. These cameras detect suspects and alert the Military Police forces within the battalion’s jurisdiction, ensuring swift action and increased public safety. Accuracy in public safety "We are proud to support this initiative and bring our cutting-edge technology to the forefront of public safety efforts," said Roberto Rocha, CEO of Segdboa. "Our goal is to create a safer environment for everyone by integrating the best technology available with the dedicated efforts of our police forces. We chose Corsight AI's technology for its proven accuracy in real-world conditions and its unbiased performance across gender and ethnicity." Advanced technology Segdboa has donated monitoring rooms to five cities and the Civil Guard Corps of Ibiúna city To date, Segdboa has donated monitoring rooms to five cities and the Civil Guard Corps of Ibiúna city. The project aims to eventually deliver monitoring rooms to each of the 380 battalions of the Military Police of São Paulo state, known as Brazil's powerhouse and often sets the standard for the nation. "We are excited to be part of this innovative project that leverages our Facial Intelligence platform to enhance security and public safety," said Geraldo Sanga, Corsight AI's Brazil Regional Sales Director. "This collaboration demonstrates the power of combining advanced technology with dedicated public service." Efficient law enforcement operations Additionally, Segdboa plans to integrate each battalion's facial recognition database with the national Cortex system from the Ministry of Justice. This national database includes photos of all citizens with legal mandates and records of stolen vehicles, facilitating more efficient law enforcement operations across the state. Corsight AI is committed to supporting this vital initiative and enhancing public safety through innovative facial recognition technology. It looks forward to continuing the collaboration with Segdboa and the Military Police of São Paulo.
Koning Willem I College in north-east Brabant, The Netherlands offers various educational and integration programmes. In total, around 18,000 students take 250 courses at its 16 locations. Modern educational institution A new location on Onderwijsboulevard in 's-Hertogenbosch was designed to be a model modern educational institution, including its access control. The imposing new building has modern rooms that provide opportunities for consultation, collaboration in small and large groups, presentations, and individual work. Access to these spaces required a flexible and modern locking solution ideally with as few keys as possible. Employees and students must feel welcome and safe. Need for an easily integrated system Dependable security was needed for all kinds of valuable learning materials and sensitive information Dependable security was needed for all kinds of valuable learning materials and sensitive information. “Easy integration with the existing access control system without additional software,” was the goal, according to Alex te Pas, functional manager of facilities management information systems. Keyless access for improved security and management “Within our organisation, we want to phase out the use of keys,” he says. “Because when employees left, we noticed that people often forgot to turn in keys or tokens. In the event of an audit, we then have a problem." Wireless Aperio locks The college chose Aperio locks which are easy to integrate wirelessly with their existing Nedap AEOS access control system. No additional software is needed: wireless Aperio locks communicate via Aperio Hubs which handle secure, real-time communication between locks and the AEOS system. This way, college security staff have full control over access and can quickly revoke anyone’s access rights. Saves time and costs The ongoing cost of using these battery-powered locks is also much lower than for equivalent wired electronic locks Because Aperio devices run on batteries, rather than mains power, there was no need to make any major adjustments to the doors. This saves both time and cost during installation. The ongoing cost of using these battery-powered locks is also much lower than for equivalent wired electronic locks, which require an ‘always on’ connection to the power grid to maintain secure status. Aperio E100 Escutcheon The college chose the Aperio E100 Escutcheon to secure doors throughout the building. The E100 offers a convenient combination of free exit from the inside with automatic locking on closure from the outside. It comes in a variety of specifications to fit different door security levels or everyday usage, including a version with PINpad which adds another level of control. 2-factor authentication With the additional PIN code, the risk of unauthorised access via a found or stolen pass is minimised. “We wanted to provide our technical rooms with 2-factor authentication. So here we chose Aperio locks with PIN code capability,” adds te Pas. Extending an AEOS system with Aperio wireless devices Nedap’s versatile AEOS access control system integrates seamlessly with a broad range of Aperio Nedap’s versatile AEOS access control system integrates seamlessly with a broad range of Aperio devices. End-users can get even more out of an existing Nedap AEOS system by integrating Aperio cylinders, escutcheons, handles, and more, online and/or offline, giving security managers control over traffic to and through more areas at their premises. Multiple device support Nedap integration supports multiple devices from the Aperio range, including the award-winning wireless handle (H100), escutcheon (E100), cylinder (C100), and security lock (L100). Aperio devices are available for almost any interior or exterior door, including wooden and glass doors, as well as fire doors. Online integration with AEOS can use different interfaces (RS485 / IP), connecting lock and system via hubs that control up to 16 locks. AEOS software A full set of powerful functions and events is made available for any Aperio device within the AEOS interface, including door or battery status and tamper detection. AEOS software manages everything, eliminating unproductive tasks including any need to duplicate data entry saving time, and extending control without hassle for building users or administrators.
Named one of Money magazine’s Best Colleges in America 2023, Fairfax-based Geoge Mason University (Mason) is the largest public research university in the Commonwealth of Virginia. Its 10,000 faculty and staff provide classes and support services across three regional campuses, an international branch campus in Songdo, South Korea, and five instructional sites. With more than 40,000 students hailing from all 50 states and 130 countries and a six-year graduation rate that is well above the national average, Mason continues a rapid upward enrollment trajectory that saw headcount and credit hours increase by nearly 2 percent in Spring 2022 and Fall 2023 applications rise by 11 percent. R1 research university In addition to a heavy emphasis on diversity – U.S. News and World Report named it the state’s best public university for diversity and innovation – Mason is a pioneer in technology and research with 40 percent of its students majoring in STEM fields. It is also the youngest nationally ranked R1 research university, a top 10 public university for cybersecurity programmes, and a top 20 public university for five different engineering and education online programmes. University's challenge Providing an exceptional experience had to balance with the need to maintain public access to appropriate services Mason’s rapid growth requires it to embrace system-wide innovation, particularly when it comes to providing a safe, secure university environment for students, faculty, and staff. Providing an exceptional experience had to balance with the need to maintain public access to appropriate services, as well as the convenience of contactless entry and the ability to act quickly when credentials were lost, or stolen or the user’s status with the university changed. Goal “We have a very open campus. Most of our doors are unlocked from 7 AM until 11 PM and we have a public library, so we need to make sure access control isn’t in the way. On the other side, we need to make sure that if something does happen, we can react quickly to unfolding scenarios,” said Daniel W. Anthes, Director of Technology Services, at George Mason University. “The goal is to make it safe, easy, and seamless for people to navigate campus.” Case study Mason had already implemented a card-based access control solution featuring HID® Seos credentialling technology, HID OMNIKEY® chips, HID Asure ID card printing software, HID FARGO® printers, and HID Signo™ card readers. Photo identification cards were encoded with appropriate credentials allowing the holder to access everything from parking to residence and dining halls to facilities and services, including data centres, libraries, and shops by simply tapping or swiping. “Eventually, we reached the point that the switch to mobile credentialling was a straightforward next phase. This would make it easier for staff and students to get where they needed to be without having to fumble with a set of keys,” said Anthes. HID's solution HID Mobile Access lets any compatible mobile device – smartphones, tablets, or wearables – be used as a credential Mason again turned to HID and Atrium, deploying the HID Mobile Access® solution with Seos as the underlying credential technology. Atrium provisions and manages the lifecycle of the HID Mobile Access credentials. HID Mobile Access lets any compatible mobile device – smartphones, tablets, or wearables – be used as a credential to securely access doors, gates, networks, and more. It significantly increases convenience and boosts operational efficiency without compromising security. HID Mobile Access Because Mason had Signo readers already in place, deployment of HID Mobile Access required just a simple upgrade. Importantly, while mobile access eliminates the need for physical access cards, the highly versatile Signo readers support the widest range of credential technologies via native Bluetooth, Near Field Communication (NFC), and Apple Wallet – meaning those who choose to can continue using their physical ID cards until they are ready to transition to mobile access. Seamless integration “Once you get them using the technology, at that point the realisation hits that this phone access is awesome. Or you can use your Apple watch and never even pull your phone from your pocket. There are a lot of things you have to navigate when considering credentials." "Fortunately, the HIDand Atrium Campus partnership offers the complete solution, bundled together and working seamlessly in the way I expected. The seamlessness of the mobile credential and how quickly they can get where they need to be with their phone or wearable is cool to see in action,” said Anthes. Final results Mason’s more than 50,000 students, faculty, and staff can leverage mobile credentials at any campus In addition to access to approximately 7,000 doors across its campus locations, Mason’s more than 50,000 students, faculty, and staff can leverage mobile credentials at any campus cash register, printer, copy machine, and retail and recreational facility. Mobile access will increase the convenience factor exponentially for students, for example enabling express check-in for residence halls at the start 2024-25 school year which will let students bypass queues that in the past were hundreds deep and go straight to their dorm rooms. Mason Mobile ID Mason Mobile ID has also driven a significant drop in the issuance of temporary and replacement cards, saving both the university and students time, money, and frustration. Students can also easily switch credentials to a new wearable or mobile device, eliminating the need to have this done in person – a significant convenience when Apple released its iPhone 15 shortly after Mason transitioned to mobile access. Safety standpoint “We are only two months in, so there are a lot of benefits we have yet to see with Mason Mobile ID, but I’m excited about what we’ve already started noticing in terms of students engaging faster with their peers and community." "The police department also absolutely loves the wearables from a public safety standpoint, because they can get through the doors a whole lot faster than they could with the traditional cards or when they had to fumble with keys,” said Anthes. Operational efficiency Going forward, Mason is exploring expanding mobile access to shuttle buses, which would also allow them to track utilisation data, and for more special events access. “New technology like mobile access is how Mason improves operations, so if there is an opportunity, I will certainly push to have HID involved. There are a lot of things you have to navigate when considering credentials. Fortunately, the HID and Atrium Campus partnership offers the complete solution, bundled together and working seamlessly in the way I expected,” said Anthes.
When students come to study at the prestigious Les Roches Marbella campus in Spain, they are not just attending one of the world’s major hospitality business schools, they are also enveloped in extraordinary innovation and sophisticated living to mirror the exceptional experiences they are being prepared to facilitate in their future careers. Real-life training site The institution aims to serve up “academic rigor with a twist of innovation and entrepreneurship” to its 1,000+ students from all corners of the planet who collectively represent more than 80 nationalities. This real-life training site for elite hospitality professionals must offer an authentic, hands-on experience to its students — one that reflects the luxurious living and progressive comforts expected from high-end hospitality properties and their employees. Digital badge One particular aspect they sought to enrich was integrating “digital badge” access across the coastal Mediterranean To ensure Les Roches is always ahead of the curve and a model campus when it comes to exemplary learning based on cutting-edge technologies, administrators wanted to evolve its mobile ecosystem. One particular aspect they sought to enrich was integrating “digital badge” access across their coastal Mediterranean property in Spain. Project objective The project’s objective was to migrate to a mobile credentials-based system where a student’s plastic access card is replaced by a digital ID on a smartphone. This would serve as the verification for daily physical access and digital touchpoints (e.g., building access, vending machines, restaurant reservations, etc.). This effort would also allow the school to steer digital transformation and student efficiencies throughout its security and administrative functions. Catering to student experience “Everything here is about the student experience,” said Mano Soler, Director of Student Services and Operations at Les Roches Marbella. “It is our main driver and the reason we embrace and foster innovation because innovation makes our students’ lives easier and supports their well-being through secure technology. The students will eventually leave this campus and, in turn, take that know-how and excellence into the world with them.” Case study challenge The team wanted a mobile solution to fit specific campus requirements such as swift access For 10 years, Les Roches Marbella relied on an RFID (radio frequency identification) card-based system to identify and grant access to students. This was a fundamental tool that nearly 1,000 individuals needed to have with them at all times to validate themselves day in and day out. Supporting their quest for digital transformation, as part of the school’s Spark incubator programme, the leadership team wanted a mobile solution to fit specific campus requirements such as swiftly granting/removing accesses, avoiding disruption when students lose/forget cards, and accommodating a multi-system environment. Need for a mobile credentials-based system Management also wanted to drive improvements through back-office processes and procedures to save time and resources and enhance everyday life on campus through modern technology. One of the most pressing factors for this particular mobile initiative was to achieve higher efficiency around the school’s new student intake registration/check-in process each semester. Loading ID credentials individually onto RFID cards, then printing each of the 1,000+ cards, meant corrections along the way were inevitable. System re-adaptation Yet, the transition to mobile didn’t come without a series of obstacles and serious considerations. Each touchpoint where a card was to be replaced with smartphone technology required deep analysis and complex integration work, specifically involving seven to eight different brands whose products were already deployed throughout the premises (e.g., printers, vending machines, security technologies, door access, laundry facilities, parking garages and more). Les Roches required an access partner with solutions compatible with the many other products already in play within its existing infrastructure, and an ability to successfully address former system re-adaptation. iOS and Android support The mobile technology needed to support both Android and iOS phones, as well as physical card technology In addition, the mobile technology needed to support both Android and iOS phones, as well as physical card technology (the RFID ecosystem would remain intact for non-student purposes and serve as a migration path for other areas not yet mobile). The school wanted a single company to supply both the hardware and software elements. And, as a higher education establishment with upscale expectations and an outstanding reputation, the Les Roches decision-makers required a proven partner of this same ilk. HID solution To transform technologies and reach new degrees of onsite productivity and novel amenities, Les Roches Marbella selected HID for its unmatched mobile access portfolio. As a market pioneer in trusted identification and authentication, and with a network of partnerships that spans the globe, HID’s experts designed a system to meet each requirement from the school resulting in a tremendous collection of 40+ access points featuring mobile identification, app, portal, and reader technologies. Mobile components from HID The integration project was completed within an accelerated time frame to ensure it was in place before students set foot onto campus that fall. HID components that comprise this robust mobile ecosystem include HID OMNIKEY® readers and reader modules (OMNIKEY 5427, OMNIKEY 5127CK Mini, OMNIKEY 5127 Reader Core), HID Signo™ access control readers, HID Seos® mobile credentials, Aperio® locks from ASSA ABLOY and Aero™ X100 door modules. HID access technologies With a slight tap or wave of their smartphone, students interact easily with the mobile ecosystem and via the digital Seos credential to authenticate themselves as they move throughout the property each day. HID access technologies are embedded in: Parking garage systems Building entrances Vending machines Laundry facilities Printers Point-of-sale at restaurants/on-campus eateries Restaurant access control Class attendance tracking Dorm room door locks Mobile-first world “You cannot discount the value of mobile when it comes to today’s student populations,” said Soler. “It is their way of life. They were ‘born digital’ and they have an expectation when it comes to smart living, for them, it’s a mobile-first world. We get it. We embrace it. And, we intend to attract and retain students by offering them an unparalleled educational experience while here in Marbella.” Efficiencies and integration “We not only transformed our campus with epic mobile access technology but also drove important efficiencies and integration into everything we touched." "The value and inventiveness HIDexperts contributed to constructing this complicated mobile ecosystem is completely in line with our ongoing quest to ensure that innovation is at the heart of the Les RochesWay of Life," said Carlos Diez de la LastraGeneral Manager Les Roches Marbella. Results achieved HID credentials available via a smartphone make scaling individual access up and down significantly easier Tying back to one of the original reasons for this mobile initiative, registration check-ins are streamlined, and Les Roches Marbella has gained immediate improvements around this important event that takes place each semester. 100% of students use the mobile access system on campus. Students register digitally with the option to do so in-person, ahead of time, or remotely with no human interaction. HID credentials available via a smartphone make scaling individual access up and down significantly easier for IT, faculty, and students. A unique, homegrown handheld tool On a case-by-case basis, Les Roches Marbella is already finding ways to apply its in-house ingenuity to foster disruptive thinking. The school used 3D printers to design a customised case to house phones/tablets alongside HID access modules creating a unique, homegrown handheld tool that easily allows campus security personnel to check IDs as required. This safety support tool came about when there was no suitable offering available on the market to meet the school’s specific needs for security checkpoints. Automated student attendance tracking The flexibility and power of HID components enabled the team to re-imagine and invent an original Les Roches security product to, as always, improve the student experience. Many new use cases are in the works to fuel future “wins” across the premises. Automated student attendance tracking is already at the beginning of each class period and serves as another way to further support and protect students. Mini computers and readers were installed in each classroom so students could use their mobile ID (via their smartphone) to mark attendance. API-based interfaces, Aero door module When students go back to their dorm rooms any time, each door loc is integrated with the Aero door module All is handled by a web application running on the mini-computer that pushes and pulls data to/from the Les Roches Absences application in real time through API-based interfaces. And, when students go back to their dorm rooms any time, each door loc is integrated with the Aero door module, providing them with a seamless experience across the entire campus. Mobile authentication and verification “Our eyes are wide open to all the possibilities afforded by the marvelous world of mobile authentication and verification, and each week we come up with new ideas for the continued transformation we have in motion on our campus,” said Juan Luis Velasco, IT Manager at Les Roches Marbella. “Our students love this newfound convenience, and our staff members are reaping the benefits of this technology overhaul.” Best-in-class mobile access system Les Roches Marbella has a best-in-class mobile access system that squarely aligns with the school’s wider objective to be an example of innovation and excellence in global hospitality training both within its own brand family, as well as within the broader realm of higher education. Beyond elevating the student experience through the convenience of mobile IDs and strengthening security when it comes to student safety and mobile ID verification, Les Roches Marbella has an extremely efficient, flexible, and scalable solution that can grow with them as technologies evolve and digital trends continue to transform and connect us all to an international degree. Benefits of digital transformation “This is a story about the value of mobile and any size campus in any sector of education can benefit from the digital transformation angles when it comes to campus business,” said Velasco. “But the most rewarding aspect truly is connecting to our students in a way that’s important, convenient, and meaningful to them keeping them connected and secure via a device that’s already an extension of their existence.”
The Middle East has recently expanded its real estate market as the region's economy grows and urbanisation accelerates. This trend has led to an increasing demand for smart security, and the pace of digital intelligence change is gradually increasing. The security industry in the Middle East is rapidly growing, driven by the government's strong emphasis on national security and terrorism prevention. Centralised systems management Significant attention and investment have been directed toward this sector, estimated to grow at about 10% per year. There is no doubt that the Middle East has become one of the most important and fastest-growing security markets in the world. While traditional real estate management requires a location-based approach, the digital transformation of the marketplace means that centralised systems management will replace the traditional approach, and that's exactly what Provis is starting to think about. The customer Provis is a property management company based in the United Arab Emirates (UAE) Provis is a property management company based in the United Arab Emirates (UAE). With over 25,000 units under property management, over 28,000 units under Owners’ Association management, and thousands of properties sold and leased. Based on their accumulated in-depth industry knowledge, and technical expertise, it is their commitment to provide sustainable value-added services through the assets of their clients. Integrated service solutions To provide integrated service solutions based on international standards, allowing clients to focus on their core business with peace of mind, thereby setting a new benchmark for integrated real estate service solutions globally. For its owners to centrally manage their users and deliver smarter, easier real estate solutions to their customers, Provis turned to Anviz's integrator partners, PROGRESS SECURITY & SAFETY SYSTEMS and MEDC, for assistance. The challenge The company's business continues to grow and expand across various regions of the country Traditional property management in the UAE local area is inefficient and intensive, property managers need to spend a lot of time and energy to manually deal with those complicated and repetitive work. Conventional management is unable to effectively analyse a large amount of data, making it difficult to provide a basis for decision-making. Impact on user experience The delay and errors of manual processing are the very drawbacks that can be precisely removed in information management. Moreover, as the company's business continues to grow and expand across various regions of the country, the practice of processing information in a decentralised manner by location not only tends to create information silos, making it difficult to integrate and share data but also leads to delays in customer service due to lack of information exchange, thereby affecting user experience and the corporate image. The solution Thinking about the cut-and-dry and providing a heartfelt service Face Deep 3 maximises supports up to 10,000 dynamic face databases and quickly identifies users within 2 metres No matter whether in the youthful campus or orderly government and other places, there will be the movement of people. Quickly and accurately checking people is a basic requirement for front-end devices, and their Face Deep 3 maximises this need. It supports up to 10,000 dynamic face databases and quickly identifies users within 2 metres (6.5 feet) in less than 0.3 seconds, with customised alerts and various reports. The Account Manager of Provis said, "In the past, we always struggled with the data integration of multi-point control. Having used terminal devices and software that were not part of a single system, we found that it had no linkage effect and could not solve the problem of event recording and data sharing. And location-based time and attendance solutions were ineffective in centralising user management." Perspective of the CrossChex system Based on the scenario of property management, the personnel are scanned and inspected by Face Deep 3 and then redirected to the management department through the CrossChex application and CrossChex Cloud Web software to achieve data sharing and transfer. Thus, the workflow of the property personnel is streamlined and standardised. Efficiency and cost management CrossChex system integrates the property work content in an all-round and multi-dimensional way From the perspective of the CrossChex system, it integrates the property work content in an all-round and multi-dimensional way, which makes property management more scientific and orderly, improves management efficiency, and reduces cost. Meanwhile, the CrossChex system adopts a centralised management approach to gather all the information resources on a single platform. It also supports integration with ERP solutions to facilitate integrated management, which can reduce manpower and improve efficiency. The benefits Precision management, digital intelligence service CrossChex Cloud, as a software platform with customised functions based on customer scenarios, combined with Face Deep 3, which is embedded with the most updated technological algorithms, seamlessly handles the data of people's movements and promptly processes the event records to form multi-form visualisation reports. Additionally, it supports business customisation and expansion to meet different business needs. It provides safe and reliable data encryption and rights management to protect user information security. Client’s quote Provis' Project Manager said, "Choosing to use Anviz's time attendance devices and cloud-based platform, allowed us to solve 89% of the repetitive steps for our owners' property management matters, making our brand image more visible."
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Suddenly, artificial intelligence (AI) is everywhere. The smart technology brings a range of benefits to our lives, from streamlining everyday tasks to making scientific breakthroughs. The advantages of AI and machine learning (ML) also include automating repetitive tasks, analysing vast amounts of data, and minimising human error. But how do these benefits apply to the physical security industry, and is there a downside? We asked this week’s Expert Panel Roundtable: What are the benefits, and drawbacks, of using artificial intelligence (AI) in physical security?
The design of buildings encompasses many elements, from the practical to the aesthetic. Well-designed buildings should be functional, and they can also be beautiful and inspiring. But can security systems and building design coexist and complement each other? We asked this week’s Expert Panel Roundtable: How does building design impact physical security systems -- and vice versa?
The economic fallout of the COVID-19 epidemic was felt in supply chain disruptions, higher prices, and shortages of certain goods. The physical security industry was not spared, although the epidemic also presented opportunities for security companies. Changing access control trends triggered by the pandemic are still reverberating throughout the industry, for example. Four years later, the impact of the pandemic is still being felt in the security market, lingering like the symptoms of "long COVID." We asked this week's Expert Panel Roundtable: Four years after the start of the COVID-19 pandemic, what is its lingering impact on the physical security industry?
White papers
![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![How to lower labour costs when installing video surveillance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1718810612.jpg)
How to lower labour costs when installing video surveillance
Download![Total cost of ownership for video surveillance](https://www.sourcesecurity.com/img/white-papers/612/tco-headersecurity-informed-sizes-920-x-533-px.png)
Total cost of ownership for video surveillance
Download![The truth behind 9 mobile access myths](https://www.sourcesecurity.com/img/white-papers/612/920x533_1716462555.png)
The truth behind 9 mobile access myths
Download![5 surprising findings from OT vulnerability assessments](https://www.sourcesecurity.com/img/white-papers/612/920x533_1715779296.png)
5 surprising findings from OT vulnerability assessments
Download![Guide for HAAS: New choice of SMB security system](https://www.sourcesecurity.com/img/white-papers/612/920x533_1714665429.jpg)
Guide for HAAS: New choice of SMB security system
Download![Precision and intelligence: LiDAR's role in modern security ecosystems](https://www.sourcesecurity.com/img/white-papers/612/920x533_1713973583.png)
Precision and intelligence: LiDAR's role in modern security ecosystems
Download![Integrating IT & physical security teams](https://www.sourcesecurity.com/img/white-papers/612/920x533_1710938663.png)
Integrating IT & physical security teams
Download![Top 7 trends to watch in the physical security industry](https://www.sourcesecurity.com/img/white-papers/612/920x533_1707306824.jpg)
Top 7 trends to watch in the physical security industry
Download![How video technology is transforming loss prevention, operations, and customer experience in the retail sector](https://www.sourcesecurity.com/img/white-papers/612/920x533_1705333664.png)
How video technology is transforming loss prevention, operations, and customer experience in the retail sector
Download![2024 trends in video surveillance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1704889476.png)
2024 trends in video surveillance
Download![How intelligent video is transforming banking and financial institutions](https://www.sourcesecurity.com/img/white-papers/612/920x533_1703238176.jpg)
How intelligent video is transforming banking and financial institutions
Download![Securing data centres: Varied technologies and exacting demands](https://www.sourcesecurity.com/img/white-papers/612/920x533_1703082955.png)
Securing data centres: Varied technologies and exacting demands
Download![Best practices for asset management](https://www.sourcesecurity.com/img/white-papers/612/920x533_1699974817.png)
Best practices for asset management
Download![Understanding the IT needs of video surveillance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1698840937.jpg)
Understanding the IT needs of video surveillance
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![How to lower labour costs when installing video surveillance](https://www.sourcesecurity.com/img/white-papers/612/920x533_1718810612.jpg)
How to lower labour costs when installing video surveillance
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Gunshot detection](https://www.sourcesecurity.com/img/emagazines/612/gunshot-detection-magazine-security-technology-trends-international.jpg)
Gunshot detection
Download