Building security
{##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##} In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or...
Morse Watchmans, the industry pioneer in key control and asset management systems, is set to showcase its advanced solutions tailored for higher education institutions at two significant industry events this June. The company will exhibit at the ACUHO-I Conference and Expo from June 22-25, 2024 at the Baird Center in Milwaukee, and at the IACLEA Annual Conference from June 27-30, 2024 in New Orleans. Key management systems "Ensuring the security of college and university campuses is more crit...
Briton has launched a new exit hardware catalogue, showcasing its range of trusted panic and emergency exit hardware systems, and providing specifiers and trade professionals with a user-friendly guide and product selection resource. New catalogue features The new 28-page catalogue showcases a flagship range of Briton products and accessories, with product specifications, EN classifications, and certified application information listed for each of Briton’s panic and emergency exit hardwa...
RecFaces, a provider of advanced facial biometric software, is excited to announce its upcoming India business trip from June 17 to June 28, 2024, for exclusive, face-to-face meetings and is inviting all interested distributors, partners, and end users. Their experts will be available in Mumbai (June 24-25), Bangalore (June 26), Hyderabad (June 27), and Delhi (June 17,18, 28). This strategic trip aims to foster deeper collaborations and offer personalised insights into the revolutionary capabil...
The design of buildings encompasses many elements, from the practical to the aesthetic. Well-designed buildings should be functional, and they can also be beautiful and inspiring. But can security systems and building design coexist and complement each other? We asked this week’s Expert Panel Roundtable: How does building design impact physical security systems -- and vice versa?
In the current dynamic environment, the need for robust and responsive security systems is paramount. Assimilating access control and time-attendance solutions with Building Management Systems (BMS) via the BACnet Integration provides a comprehensive approach to ensuring proactive security and efficient building operations. This integration bridges the gap between various systems, creating a cohesive and responsive security network. Here’s a closer look at how this integration enhances se...
News
Automated Logic's announcement marks a significant milestone in the evolution of building management systems with its latest software update for the WebCTRL® building automation system. WebCTRL v9 underscores Automated Logic's commitment to innovation and excellence in providing solutions that simplify the complexities of managing modern buildings. With a focus on empowering facility managers, building owners, and operators, the new software release is designed to enhance user experience while offering deeper insights and control over building performance. Latest WebCTRL software Automated Logic, a pioneering provider of innovative building-management solutions, is a part of Carrier Global Corporation, the pioneering global provider of healthy, safe, sustainable and intelligent building and cold chain solutions. Pioneering global provider of healthy, safe, sustainable and intelligent building and cold chain solutions "Our latest WebCTRL software offers a suite of enhancements that reinforce our commitment to security, usability, and efficiency,” said Axel Reichert, President, Automated Logic. “With these enhancements, WebCTRL v9 seeks to boost operator productivity, allowing them to accomplish more in less time and providing them with better insights to help drive sustainability, comfort, and control in their buildings.” Features of the WebCTRL® v9 system New features of the WebCTRL® v9 system include: User Privilege Improvements – Operators now have even more granular control and the ability to multi-select related privileges when setting up access management for various users or user groups, providing an intuitive and tailored approach to access management that aligns with specific roles and responsibilities within an organisation. By enabling precise control over who can do what, and where, operators can minimise risks and ensure that each user has the access necessary to perform their duties effectively, without overstepping their bounds. Single Sign-on (SSO) – A new optional SSO feature allows operators to integrate with the SAML 2.0 or OIDC identity provider of their choice to access their WebCTRL® system, elevating the security posture of the WebCTRL system and enhancing usability. The optional feature works seamlessly with the traditional WebCTRL sign-in process, combining the ease of SSO with the robustness of WebCTRL's existing authentication framework. New Security Report – Users with the administrator privilege can now view a summary of all security settings within the WebCTRL system and the SiteBuilder engineering tool in a single, easy-to-read report. The report can also be scheduled to run at desired intervals. This new feature streamlines the process of a security assessment, ensuring that operators can easily access, review, and adjust security settings as necessary. Enhanced Alarm Summary View – Users can now visualise and filter alarms across various locations within their system, providing them with a comprehensive understanding of where alarms are concentrated and how they are affecting the building's overall operation. Alarm counts by location allow operators to pinpoint areas with the highest frequency of alarms so they can allocate resources more effectively and address potential issues before they escalate. Filtering options, the ability to view alarms for a defined period, and the capability to search for an alarm source or location, also enhances the user experience. Improved Resource Management – Operators can add files to their WebCTRL system remotely and link to them easily. For example, technicians and engineers can quickly upload installation manuals, maintenance guides, or custom operation procedures that can be linked directly from graphics within the WebCTRL system, so that operators do not have to sift through external file systems to find relevant information when they need it. Multiple, Simultaneous Downloads – As protocol speeds have increased and network architectures have changed over time, controller downloads have also become faster and more efficient. In addition to simultaneous downloads from the WebCTRL server to BACnet routers on the IP network, v9 now allows up to ten simultaneous controller downloads to IP networks downstream of a BACnet router, allowing facilities staff to deploy controller updates more rapidly. REST API to read Alarm data – A new REST API is available, providing external applications with read-only access to WebCTRL’s alarm data. This functionality enables developers to design applications or integrations that leverage real-time data from WebCTRL to enhance operational efficiency and improve response times to critical alarms. In addition to the above new features, WebCTRL v9 also includes additional security enhancements per our ongoing commitment to customer security, added user interface improvements to streamline operations and make system management more intuitive, and updated engineering tools to empower users to maintain and optimise the WebCTRL system more effectively.
Automated Logic is proud to announce the expansion of its OptiFlex controller line for the WebCTRL® building automation system. Two new controllers join the OptiFlex family, including the OptiFlex 022 (OF022-E2) zone controller and the OptiFlex compact segment router (OFCSR-E2). These controllers feature dual IP ports for convenient daisy-chain deployment and a compact footprint for a more flexible system design. Automated Logic, a provider of innovative building-management solutions, is a part of Carrier Global Corporation, the provider of healthy, safe, sustainable, and intelligent building and cold chain solutions. OptiFlex 022 (OF022-E2) zone controller The OptiFlex 022 (OF022-E2) zone controller is engineered to deliver unparalleled efficiency and reliability for modern building environments. Featuring dual IP ports for convenient daisy-chain deployment, the OF022-E2 supports two universal inputs and two analog outputs, ensuring versatile control options for a variety of applications. Its smaller form factor not only simplifies installation but also optimises space, making it an ideal solution for areas requiring dependable and precise environmental control. OptiFlex compact segment router (OFCSR-E2) OFCSR-E2 offers robust routing capabilities between BACnet®/IP, BACnet Ethernet, BACnet/ARCnet, and BACnet MS/TP Complementing the OptiFlex 022, the OptiFlex compact segment router (OFCSR-E2) is designed to facilitate seamless migration from traditional serial network segments to fast and performant IP backbones. The OFCSR-E2 offers robust routing capabilities between BACnet®/IP, BACnet Ethernet, BACnet/ARCnet, and BACnet MS/TP networks, with native support for IPv4. It is equipped with three physical communication ports: two 10/100 Mbps BACnet IP/Ethernet ports and a high-speed EIA-485 port that can be configured for BACnet/ARCnet or BACnet MS/TP. Additionally, the device features a USB port for local access. Intelligent, connected, and efficient buildings “At Automated Logic, we are committed to pushing the boundaries of what’s possible in building automation to create more intelligent, connected, and efficient buildings,” said Axel Reichert, President, of Automated Logic. “The introduction of the OptiFlex 022 zone controller and the OptiFlex compact segment router is a testament to our dedication to innovation and our customers’ needs." IP-based communication "These solutions not only enhance building performance and network reliability but also offer a path forward for legacy systems to embrace the benefits of IP-based communication.” The OptiFlex 022 zone controller and the OptiFlex compact segment router are available for order through Automated Logic’s global network of dealers.
BSRIA, the research and information membership body for the built environment, has appointed a new Chief Executive Officer, Lisa Ashworth, who is tasked with furthering BSRIA's impressive growth ambitions. Lisa Ashworth Ashworth joins BSRIA with a wealth of experience in pioneering technology-based data and information businesses. With an illustrious career marked by her tenure at organisations such as the Financial Times, PR Newswire, Frost and Sullivan, and Reevoo/Feefo, Ashworth brings a successful track record of growing businesses across diverse sectors. In addition to her extensive operational experience, she has a strong background in setting up and expanding businesses internationally. Lisa Ashworth takes up her position on the 1st of June 2024, following an induction period. Career in data, information, and research Chris Harty, Chairman, of BSRIA, says, "Lisa brings a wealth of experience and new energy. Not only has she spent her career in the data, information, and research arena, but her strong track record includes scaling commercial operations internationally. Her experience makes her an ideal pioneer for BSRIA as it embarks on its next phase of development." "Her leadership style is open, collaborative, and people-centric and aligns seamlessly with BSRIA's organisational ethos. Committed to fostering a cohesive and dynamic work environment, I am confident she is the perfect person to take BSRIA into its exciting new chapter." Sustainability agenda Lisa Ashworth, CEO, of BSRIA, says, "I'm excited to join a business that is already so pivotal to the industry it supports, but equally well positioned to grow further in the knowledge, data, and information market." "Data is a vital raw material for the sustainability agenda of the construction sector and will play a crucial role in closing the performance gap and creating better buildings." Digitisation and decarbonisation goals "As the built environment gears toward a greener future, our resources will be foundational for helping organisations achieve their digitisation and decarbonisation goals, creating a practical pathway to Net Zero and beyond." "As BSRIA looks ahead to further innovation and expansion, I'm looking forward to working alongside our customer-focused, vibrant teams to advance our research ambitions and drive commercial growth." Testing, research, and consultancy services BSRIA is committed to maintaining its independent approach and authoritative reputation For nearly 70 years, BSRIA has provided registered testing, research, and consultancy services to the construction and building services industry. As a member-based association, BSRIA is committed to maintaining its independent approach and authoritative reputation. Construction and building services Employing over 160 professionals across its head office in Berkshire (UK), BSRIA North in Lancashire, regionally based construction compliance offices throughout the UK, and offices in France, China, and the USA, BSRIA's global presence underscores its commitment to serving stakeholders worldwide with research and best practice guidance. 2025 sees BSRIA celebrate its 70th anniversary, commemorating decades of delivering the highest-quality specialist services in construction and building services.
EllisDon, a global construction and building services company, announces a new partnership between its Infrastructure Services & Technology (IST) Division and J2 Innovations, a platform provider for smart buildings, smart equipment, and the Internet of Things (IoT). FIN Framework The collaboration will see EllisDon utilise J2 Innovations’ FIN Framework, a flexible open software framework, enabling original equipment manufacturers (OEMs) to create automation and IoT applications quickly and efficiently. This partnership will enable EllisDon’s IST Division to further develop their digital twin application, EKO, which is focused on integrating all data points within a facility to optimise the built environment and enhance the end user’s experience. Integrated building management solutions EllisDon IST will use the FIN Framework, on which FIN Stack is developed, to create and customise its new OEM product suite This announcement comes after EllisDon implemented a range of projects using J2 Innovations’ FIN Stack software, a comprehensive suite of ready-to-use apps, enabling integrated building management solutions to be engineered quickly and easily. Motivated by its efficiency and adaptability, EllisDon IST will use the FIN Framework, on which FIN Stack is developed, to create and customise its new OEM product suite for EKO. Digital twin application "We are excited to collaborate and enhance industry standards by utilising J2 Innovations’ expertise in FIN Framework, as it will be an important component of our digital twin application, EKO," says Robert Barnes, Senior Vice President of Energy & Digital Services at EllisDon. He adds, "This partnership will leverage the strengths of both companies by exploring new opportunities, strengthening product offerings, and providing cutting-edge solutions to meet the evolving needs of the market." Support market segments and end users EllisDon and J2 Innovations will extend the use of FIN and utilise it as an enabling platform for EKO As a market pioneer in the integration of primary building systems (i.e. building automation, lighting control, electronic security, elevators, etc.), EllisDon is expanding into the integration of technology and enterprise management systems with EKO. Through this collaboration, EllisDon and J2 Innovations will extend the use of FIN and utilise it as an enabling platform for EKO, allowing it to support multiple market segments and end users. Net zero future In addition, EllisDon holds a distinctive position in the building industry and, through their extensive experience constructing and operating large, complex facilities, has developed close relationships with building and facility management stakeholders. With these relationships, along with their J2 Innovations partnership, EllisDon is poised to drive industry-wide change and lead the transition towards a net zero future. Hospital building automation Jeremy Wolfe, Vice President of Sales Americas at J2 Innovations, said, "Our partnership with EllisDon underpins the effectiveness of their products in a range of commercial environments, and will exploit the potential for a significant advancement in hospital building automation and beyond." He adds, "Together we can harness our next-generation software framework to EllisDon’s vision to push the limit of data and efficiency-driven construction management."
Johnson Controls, the global pioneer for smart, healthy and sustainable buildings, launches the Facility Explorer FX90 Supervisory Controller, packed with unique, advanced features to make building automation easier, smarter and more cost-efficient. The FX90 represents the next generation of Facility Explorer supervisory controllers designed to streamline and automate workflows to increase building automation performance with minimal maintenance. Responsive user interface “Every aspect of the FX90 controller was designed with the user in mind,” said Kaishi Zhang, global vice president of product management, Building Automation Systems and Controls at Johnson Controls. “From start-up and commissioning to its responsive user interface and the highly scalable design, the FX90 simplifies each process to drive building performance now and in the future.” IoT-embedded controller The IoT-embedded controller seamlessly connects as many as 200 equipment controllers This latest evolution of the Facility Explorer platform delivers unmatched additional value with more than 20 exclusive productivity tools within the FX Appliance built on top of the proven Niagara Framework®. These enable system integrators to quickly establish a system configuration database in minutes using automatic tagging, auto-generated 3D graphics and more to save time and money. The IoT-embedded controller seamlessly connects as many as 200 equipment controllers, creating a robust control supervision and network management system. Key benefits of the FX90 controller The FX90 features a one-size-fits-all hardware platform with modular accessories and flexible device/point licencing that enables it to handle building automation jobs of any size and complexity. Some of the key benefits of the FX90 controller include: Creates powerful, future-ready buildings: Increased computing power with 2 GB memory and 8 GB storage provides faster boot-up and station startup, quicker data access and decision making along with plenty of storage for backups, point history and future upgrades. Seamless integration: FX Workbench Import Managers and N2 protocol drivers enable easy integrations, including added support for the TEC3000 Series Thermostat Controller. Maximises scalability: The controller scales from basic to complex applications with a single hardware platform, using orderable devices and point licencing. Licence upgrades can be purchased as future needs arise. Enhanced user experience: An optimised graphical user interface makes operation easier to help reduce the learning curve and human error. Legacy FX80 controller The FX90 Supervisory Controller replaces the legacy FX80 controller, which will be phased out in 2025. The FX90 uses the same footprint, wiring connection location and orientation as the FX80, and is fully compatible with all existing expansion modules to enable a seamless drop-in replacement or upgrade. Future-proofing the system now allows for a long operational life and makes future updates easier.
Johnson Controls, the global pioneer for smart, healthy and sustainable buildings, demonstrated complete building security solutions at ISC West 2024 in Las Vegas. The company showcased its comprehensive product innovation, system integration and service expertise, ultimately enabling customers to protect their people, facilities and assets. “Johnson Controls is pioneering new innovations that are transforming traditionally reactive physical security processes into connected data-driven solutions,” said Faisal Pandit, vice president and general manager of Global Security Products at Johnson Controls. “This year’s ISC West attendees were able to see how our products are at the forefront of transforming the security industry.” Complete building solutions Johnson Controls highlighted keys for clients across various drives including education At the show, Johnson Controls highlighted solutions for customers across various industries including education, healthcare, government, data centres and industrial facilities. “We are among a select group of companies that can deliver complete building solutions for security professionals, from product engineering and innovation to full system integration and exceptional service,” said Julie Brandt, president of Building Solutions North America at Johnson Controls. “Johnson Controls is the driving force behind the future of secure and sustainable buildings, catering to the evolving needs of our customers." Key trends in the industry Johnson Controls pioneers also discussed key trends they are seeing in the industry such as: Shift to AI, specifically an investment across the industry in technologies with AI capabilities for advanced threat detection and response. Move to service models and an increased focus on seamless user experiences, for example, mobile-friendly solutions and streamlined, flexible operations. Customers are seeking support for managing security operations that address staffing shortages with automation, improved training, and growth programs. Renewed focus on digitisation and sustainability. Businesses are realising how security products can help meet sustainability goals, prioritise budgets for optimal operational efficiency, create healthy and productive environments that attract employees and keep occupants and assets safe. A change in user base from operations to enterprise/security management. Data is now viewed through multiple levels, showcasing the need for and importance of software modernisation. An intersection of access control and video so customers can develop a strategy for a more cohesive and comprehensive security approach.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common K12 security pain points There’s no one-size-fits-all solution in school district security. School districts may have big plans to implement upgraded security systems but to set out on the right foot, pioneers must have a clear vision of their long-term strategy. When embarking on their security journey, education pioneers often wonder where to start and what exact steps are they need to be taking to identify and address weaknesses. Local K12 and government pioneers are promoting and mandating security assessments to uncover safety gaps on campuses and mitigate these risks with advanced technology solutions. Not only do assessments provide detailed, customisable roadmaps for district pioneers, but they also recommend technologies and funding opportunities to help close threat gaps. K12 school districts are mainly vulnerable to cyber-attacks due to the sensitive nature of student records In today’s climate, schools face a growing number of physical and digital security threats. From a cybersecurity standpoint, K12 school districts are particularly vulnerable to cyber-attacks due to the sensitive nature of student records. However, only one-third of these districts have adequate staffing to address threats effectively. In addition, according to a recent survey from Johnson Controls and Forrester Consulting, security decision-makers are having trouble receiving actionable insights. Nearly two-thirds of respondents said that they struggle to receive information from all necessary systems regarding their security threats. To gain more clarity into what school districts need in terms of security tools and threat mitigation, implementing system-wide monitoring and optimisation can be invaluable. This approach enhances equipment and operational efficiency, while providing necessary resources and expertise for critical patch updates across all systems, strengthening their overall security posture. Achieving a well-rounded security program In the past few years, AI technology has emerged as a trending solution and is generating considerable attention. While the allure of implementing cutting-edge technologies is undeniable, it’s important to recognise that a robust security program hinges on solid access control. Access control technology provides administrators with the means to oversee and regulate entry into facilities, serving as the foundation for basic physical security. The technology helps administrators and staff control access to multiple areas from web-enabled devices, even during lockdowns which is crucial in emergency situations. School district pioneers should utilise available digital risk assessment tools to uncover threat areas Once basic security controls are in place, school districts must address their next set of security pain points and identify which solutions meet their specific needs. This involves identifying and prioritising the highest need and most cost-effective investments that will have the greatest impact on enhancing security measures. To accurately determine which security solutions are needed for a specific environment, school district pioneers should utilise available digital risk assessment tools to uncover threat areas and determine levels of priority. By focusing on these priority areas, districts can allocate their resources and efforts where they are needed most, ensuring maximum effectiveness in mitigating risks and vulnerabilities. Securing funding before approaching deadlines A major challenge for school districts surrounding campus security is identifying and securing the necessary funding to implement solutions aligned with their goals. Leveraging available funding sources is critical, especially considering certain programs are approaching their deadline, like the Elementary and Secondary School Emergency Relief (ESSER) fund. Announced during the pandemic, ESSER is a funding program that has allocated nearly $190 billion in aid to U.S. public school districts to fund projects benefitting the well-being of occupants. Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024 Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024, when schools must attribute all of their funds to assigned contracts. Following this date, pioneers will need to complete all ESSER spending by January 2025 unless approved for an extension into March 2025. As ESSER wanes, school districts are acutely aware of the fiscal cliff in budgets through 2025. However, many states are ramping up grant funding to close the deficit gap. Administrators should become familiar with these grant opportunities at a local and state level. Get started on security plans The time for school district pioneers to act is now. While the safety and well-being of students and staff are always top priorities, it’s crucial to acknowledge that a lack of insight into necessary security upgrades and available funding options will leave districts behind the curve. Seizing the final months of ESSER funding presents an ideal window to address security pain points and build a safer future for K12 facilities. Looking beyond ESSER, pioneers must proactively seek out and leverage other funding avenues to help ensure the continuity of their security efforts and maintain a proactive stance in safeguarding healthy and safe educational environments.
As we head into a new year, it’s fair to say that it isn’t easy out there for the security integrator community. That’s understandable given the big ruptures felt in the market for physical security in 2023. Typically, Commercial Real Estate (CRE) landlords are the biggest and most influential buyers of physical security hardware and software, but this is starting to wane as heightened borrowing costs and biting inflation cause real estate valuations to plunge. Building security upgrades A lot of CRE landlords are in a fight for survival which unfortunately doesn't leave much room for budget spend on building security upgrades. This state of affairs is a problem for security integrators with extensive connections in the CRE space. Where do they pivot their services to keep their business growing in 2024? From the conversations I’ve been having with integrators and customers alike over the past few months – the answer is that the growth potential lies in the enterprise space. The trajectory of enterprise IT and physical security Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working It might initially feel unnatural to see the enterprise segment as a potential driver of demand for physical security services and products. Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working habits? These things are true but also present an opportunity for the right physical security proposition. Standardisation of enterprise IT Take efficiency drives as an example. A key element of such efforts is an acceleration towards the standardisation of enterprise IT platforms, hardware, and solutions, using the cloud. What was once a focus on moving on-prem systems and workloads to the cloud has shifted to efforts to keep cloud OpEx costs down by centralising as much as possible. Practically, this means utilising APIs to plug disparate IT applications and services into central platforms that boast a “single pane of glass” view. APIs APIs drive consumption, open new business models, and foster cross-industry partnerships APIs aren’t anything new to enterprises. They drive consumption, open new business models, and foster cross-industry partnerships. However, the use of APIs in the physical security sphere has been surprisingly slow to take off. There are multiple elements to this but a key reason is that some security software products on the market aren’t cloud-based. Adding cloud-based solutions to network Others are cloud-based, however, and these are the solutions that security integrators need in their portfolio to serve the influential enterprise market segment and its approach to IT networks. Selling the value of these solutions requires integrators to take it a step further by speaking the language of the enterprise IT buyer and understanding their goals. The power of cloud-based access control in the enterprise Hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events The continued relevance of physical security for enterprises can’t be understated. After all, hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events – not less. Despite the discourse around office downsizing, the reality for most enterprises is that the office can’t be done away with completely and there’s always going to be growth experienced by successful companies that require an upgrade in physical square footage. Physical security Access control systems that are cloud-based will be preferred by the enterprise to fulfill the essential function of physical security. That’s because they align with the push towards centralisation in the cloud that enterprises are carrying out business-wide. Access control has the potential to result in lots of disparate dashboards and apps. Think video management, license plate recognition, building management software, elevator monitoring, hot desking solutions, guest booking software, room booking functions, and more. Uniting all of these functions in one platform suits enterprise security teams well. Access control solutions Linking employee databases to an IAM solution, or creating seamless experiences by tying access credentials But this only scratches the surface. Access control solutions that can be integrated with hugely popular corporate software applications like Okta, Azure Active Directory, and Google Workspace quickly catch the eyes of enterprise IT security teams by pulling in the same direction as the broader tech stack. Whether it’s applying AI analytics to anomaly detection, linking employee databases to an Identity Access Management (IAM) solution, or creating seamless experiences by tying access credentials to things like meeting room bookings, it’s through APIs that cloud-based access control can thrive in an enterprise setting. Security integrators It’s worth also noting that as enterprises grow, access control gets harder. Managing the access requirements of thousands of employees across a global real estate footprint requires the scale that cloud computing is best placed to bring. Security integrators who can join the dots to make that link are well positioned to pivot toward the enterprise. Broadening horizons Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates This pivot is understandably a daunting prospect but the potential for natural synergy shouldn’t be overlooked. Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates and security anomalies won’t be completely alien to cloud-first enterprises. That’s an opportunity for integrators to upsell more sophisticated security set-ups in a way that they may have found more difficult with CRE clients and prospects. Tailored propositions It would be remiss to avoid mentioning that ‘enterprise’ is a very loose term that encompasses businesses across multiple industry verticals. To better pivot, security integrators need to offer tailored propositions specific to set verticals that cover all bases as opposed to offer, for example, piecemeal alarm or video product solutions. Enterprise industry verticals Security integrators should be weary of all-encompassing narratives in 2024. Whether or not the global economic picture darkens, there are always going to be pockets of growth within certain enterprise industry verticals. Plus, anecdotally, the indicators point to enterprises being the driver of demand for cloud-based access control as we head into the new year. Integrators who can dial into that shift have a lot to gain and nothing to lose.
The adoption of innovative and interconnected door hardware systems can help overcome the challenges associated with building security, explains Daniel May of Consort Architectural Hardware. The security of our built environment and the safety of its people is paramount throughout a building’s lifecycle. While these elements remain a primary focus at each touchpoint of a construction project, today’s design teams are sooner adopting modern access control systems to address this age-old challenge, but why? Modern access control Where systems were once rudimentary, modern access control has evolved into a revolutionary factor of building design, unlocking various benefits for its many users in the process. The Internet of Things (IoT) has enhanced building security as we know it, and as technology continues to advance, more options enter the market. Following more than a decade of innovation and integration, the access control market is projected to grow year on year, from £7.8 billion in 2023 to £11.8 billion by 2028. Modern user requirements have led to several operational and technological advancements Modern user requirements have led to several operational and technological advancements during this period, and decision makers and design teams alike can now choose from a versatile selection of options. Some door hardware products now utilise smart locks, cloud control and even biometrics for example, and most recently, there’s been a substantial change to the way access control systems operate, with focus moving towards end users and ease of use. Modern access control has evolved into a revolutionary factor of building design Smart door hardware From an operational perspective, interconnected access control systems gift users with an intuitive network that improves building security through the use of real-time status updates, while also providing them with the ability to grant instant access approval and denial at the touch of a button. Often, users can operate their building’s various access points through their mobile phone, which has led to improved flexibility and efficiency in most environments - whether at home or in a public access property. The security benefits also become clear when compared to the alternative of physical keys. If a traditional key is lost or stolen, the security of a building becomes at risk until it is found or replaced. Intuitive access control systems are designed to build upon the traditional lock and key methods. By seamlessly integrating smart door hardware into both new and retrofit projects, users can manage access points and improve security across the building - without stifling ease of access, stunting future scalability or unsettling the aesthetics. Users can operate their building’s various access points through their mobile phone Access control system The PSIA standard is one of the widely recognised and respected standards for access control products As many adopt Wi-Fi infrastructures, NFC technology and cloud services into their buildings, decision makers must also consider the need for better standards. While the introduction of IoT may advance security, performance and functionality, it can also introduce new risks which must be mitigated by adhering to both localised and international standards, such as ISO 27001 for example. The Physical Security Interoperability Alliance (PSIA) standard is one of the widely recognised and respected standards for access control products and provides comprehensive requirements for systems by focusing on interoperability, scalability, and functionality. While the introduction of IoT may advance security, it can also introduce new risks Providing comprehensive requirements This standard ensures that access control products from different manufacturers can seamlessly integrate and communicate with each other, allowing for greater flexibility and choice when designing a complete access control system. After all, a one size fits all access control solution simply doesn’t exist and decision makers would be remiss in not selecting a product that aligns with their building’s needs while meeting the required standards.
Security beat
The sale of Carrier’s Global Access Solutions to Honeywell in December amounted to a dramatic finish to a big year in 2023 for mergers and acquisitions (M&A) in the physical security market. In the transaction between two industry giants, Honeywell sought to enhance and strengthen its building automation capabilities with the acquisition of Carrier’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. Honeywell acquires Carrier Access business The acquisition, which includes both hardware and software solutions, will mean a new corporate owner for the LenelS2 brand, a pioneering business for over 25 years in commercial and enterprise access solutions, including well-known offerings Onguard and Netbox. In addition, the acquisition covers the Onity brand of electronic locks, including hospitality access, mobile credentials, and self-storage access; and the Supra brand of cloud-based electronic real estate lockboxes. ADT sells commercial business, which rebrands as Everon ADT Inc. announced the sale of its commercial security, fire, and life safety business unit to GTCR ADT Inc., another industry giant and a trusted brand in smart home and small business security, announced the sale of its commercial security, fire, and life safety business unit to GTCR, a private equity firm, for a purchase price of $1.6 billion. ADT Commercial, a security integrator and premier provider of commercial security, fire, and life safety in the United States, announced that it will move forward as a standalone organisation and rebrand as Everon. Bosch to sell building technologies products Bosch Building Technologies announced in 2023 that it is realigning its Building Technologies division to focus solely on its regional integrator business, with solutions and services for building security, energy efficiency, and building automation. Therefore, Bosch plans to sell most of the Building Technologies division’s product business. At year-end, Bosch was seeking a buyer who would take on all three business units with their associates and locations. This includes the Video, Access and Intrusion, and Communication business units, and affects some 4,300 associates at more than 90 locations worldwide. Building its integrator business earlier in 2023, Bosch announced the acquisition of Paladin Technologies, Inc., headquartered in Vancouver, Canada, a provider of security and life safety solutions and system integration services in North America. Motorola acquires IPVideo, creator of HALO Sensor In another deal emerging late in 2023, Motorola Solutions acquired IPVideo Corp., Bay Shore, N.Y., the creator of the HALO Smart Sensor, an all-in-one intelligent sensor that detects real-time health and safety threats. The powerful capabilities of the HALO sensor extend Motorola’s end-to-end physical security offering by integrating a non-video threat detection product into the safety and security ecosystem. IDIS acquires Costar Technologies Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. Korean video manufacturer IDIS and U.S. company Costar Video Systems had enjoyed a long-term existing ODM (original design manufacturer) relationship, and approximately 60% of Costar Video products were already made by IDIS. Therefore, it made sense when IDIS Co., Ltd. and Costar Technologies Inc. announced an agreement and plan to merge, with IDIS acquiring Costar. Leveraging Costar's established distribution networks and sales channels in the U.S. gives a significant boost to IDIS' growth strategy, which is founded on building long-term relationships with systems integrators. Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. that will benefit from IDIS’ NDAA-compliant and 100% Korean-made technology. SECOM invests in Brivo and Eagle Eye Eagle Eye Networks, a cloud video surveillance company, and Brivo, a provider of cloud-based access control and smart space technologies, announced one of the largest investments to date in cloud physical security in 2023. SECOM CO., LTD, based in Japan and one of the largest security integration companies in the world, has made a primary equity investment of $192 million in the two companies, $100 million in Eagle Eye Networks, and $92 million in Brivo. $100M primary equity investment Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific Eagle Eye Networks, a global pioneer in cloud video surveillance, announced it will use the $100M primary equity investment to expand its suite of AI-powered products, fund geographic expansion, and enhance its enterprise features. Brivo will use the investment to grow sales and marketing, accelerate product development scale support and operational functions, and evaluate strategic acquisitions. Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific, and enhance the smart spaces and AI functionality in the Brivo Access Platform. ACRE buys PremiSys Portfolio ACRE, a security company built on acquisitions, is continuing to broaden its portfolio and serve the expanding needs of its customer base. In 2023, ACRE acquired the PremiSys software and hardware portfolio and assets from IDenticard. PremiSys’ technologies enable organisations to self-manage door access and view integrated video and lockdown facilities. The acquisition extends opportunities for ACRE in healthcare, education, data centers, and senior living facilities. Qognify is a part of Hexagon Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond Qognify, a provider of video (VMS) and enterprise incident management (EIM) solutions announced that it has become a part of Hexagon. Qognify joins the Safety, Infrastructure & Geospatial division of Hexagon, following the completion of its acquisition originally announced on Dec. 19, 2022. Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond to incidents, providing a more robust offering. ASSA ABLOY continues acquisition trend ASSA ABLOY continued to acquire companies in 2023 to strengthen its position in mature markets by adding complementary products and solutions to the core business. Among the companies acquired in 2023 were Ghost Controls, a U.S. supplier of automated residential gate openers, and Securitech Group, a manufacturer of high-security mechanical and electronic door hardware products in the U.S. Door and fencing ASSA ABLOY also acquired Leone Fence, a Canadian manufacturer, distributor, and installer of fencing products for commercial and residential applications, and Lawrence Hardware and Gallery Specialty, providers of commercial hinges, locksets, exit devices, and door hardware accessories in Canada. Another new acquisition is Inovadoor Portas Industriais Ltda, a Brazilian manufacturer of sectional and high-speed doors. Earlier in 2023, ASSA ABLOY completed the acquisition of Spectrum Brands’ Hardware and Home Improvement division and the divestment of Emtek and the Smart Residential business in the U.S. and Canada to Fortune Brands.
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritise prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis and prioritisation, and finally, development of mitigation measures.” Safety and security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analysing and prioritising mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements to physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorised individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritise improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders and non-profit organisations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organisations can offer valuable resources, training, and support programmes to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Well attended and generating levels of excitement not seen since before the pandemic, ISC West may provide just the shot of adrenaline we need to drive industry success through the uncertain economic times ahead. Buzzwords like artificial intelligence (AI) and the cloud were still prevalent at the conference and exhibition in Las Vegas, but the hype of yesteryear seemed more subdued. Rather than breakthroughs to be celebrated, AI and cloud were discussed more as ways systems can realise even greater potential. Rampant cybersecurity attacks Rather than hype, discussions seemed much more practical and down-to-earth, encompassing shifting customer needs and how to address pain points. There was more discussion of the shift of security from a cost center to a profit center, where industry technologies can contribute to an enterprise’s bottom line. More companies seemed to be vigorously addressing the challenges of cybersecurity More companies seemed to be vigorously addressing the challenges of cybersecurity, although perpetually an obstacle. The industry seems more devoted than ever to protecting physical security systems in an age of rampant cybersecurity attacks. But more than in years past, it was the ISC West event itself that generated the most buzz. The crowded aisles of the exhibition seemed both reminiscent of the pre-covid past and prescient of the industry’s even brighter future. From booth to booth and attendee to attendee, the enthusiasm was both conspicuous and contagious. Everybody was thinking: ‘Wow! What a show!’ Pushing technology to the edge “The practice of physical security is about more than understanding threats, and end users are thinking now about the bigger picture of security and how networks work in the broader context of the business,” said Andrew Elvish, Vice President, Marketing at Genetec. Problems of latency and miscommunication are elements pushing technology to the network edge, he says. For example, in an access control scenario, decision-making should be as close to the door as possible to avoid network congestion, delays, or failure. Andrew Elvish, Vice President, Marketing at Genetec, displays Axis network door controller ‘powered by Genetec’ Elements pushing technology Reflecting the philosophy is a new collaboration introduced at the show called ‘Axis Powered by Genetec,’ an enterprise-level access control offering that combines Genetec Synergis software with A1210 and A1610 network door controllers by Axis Communications. Elvish says lines are blurring when it comes to edge versus cloud technologies. Rather than choosing ‘either-or,’ a blending of approaches is optimum, always ensuring that “Decision-making is close to the point of actuation,” he says. On-premise versus cloud systems Elvish also points to changing assumptions about the industry roles of on-premise versus cloud systems Elvish also points to changing assumptions about the industry roles of on-premise versus cloud systems. Historically, the assumption was that on-premise systems are most appropriate for enterprise customers, while the cloud is the best approach for small- to medium businesses (SMBs). Depending on the end customer’s needs, a system can be either or both at the same time. Rather than debate cloud versus edge, customers should consider the outcomes they seek, and how technologies can be merged to provide those outcomes. “They should consider a solution where they do both, with the gradation of controls provided at their fingertips,” says Elvish. Combining security into one platform Unifying security and related functions on a single platform was a widely evident trend at ISC West. An example is Verkada which now offers a unified platform that includes video, access control, and intrusion detection, as well as other functions such as air quality sensors, visitor management, and a door intercom. David Tsang, Product Director of Verkada, predicts demand to combine technologies into a single platform will grow in the industry. Furthermore, as data is collected in the single system, enterprises will find new ways to ‘connect the dots’ to provide better business intelligence. Air quality sensors Verkada’s cloud-based system enables fast deployment of the single platform “Our approach to building products is based around the idea that every company has different needs, and they want technologies to integrate seamlessly and operate off the same platform,” says Tsang. In addition to seamless integration, each product must also be able to stand on its own. Tsang manages Verkada’s various product categories, including access control, air quality sensors, intercoms, etc. Verkada’s cloud-based system enables fast deployment of the single platform, and the company works with dealers to ensure delivery of a 'better partner experience.' What happens after a binge of acquisitions? Acre Security unveiled a new corporate ‘identity’ and a big booth highlighting the technology brands the company has acquired over the last several years. Brands such as Feenics, ACTMobile, Comnet, Razberi, and others reflect Acre’s acquisition of these companies but are now being promoted as technology choices under the ‘one Acre’ approach. Don Joos, CEO of Acre Security, looked ahead to the future of the company at ISC West Visitor management product categories Change is in the air, and the booth’s unified visual design signifies the new direction for the company, says Don Joos, Acre’s CEO. Various technologies can be delivered via the cloud, through an on-premise installation, or using a hybrid approach Acre is highlighting ACTMobile’s mustering capability, useful in the K-12 market In tying technologies together, the ACTMobile product will play a key role in two major verticals -- command-and-control and K-12 schools. Acre is highlighting ACTMobile’s mustering capability, useful in the K-12 market, which was adapted from a technology used in the cruise industry. The Acre approach is to embrace the variety of opportunities available in the access control, intrusion, and visitor management product categories within a broad definition of ‘security’ that embraces both core capabilities and ‘adjacencies,’ says Joos. Acre seeks to enable customers to protect people, facilities, and critical assets. They manage customers’ security data and provide the insights they need. Ensuring a cohesive security system A challenge in the industry is combining various single products into a cohesive whole. “There are many products that do one thing well, but it’s harder to build a cohesive security platform,” says Ryan Schonfeld, Founder and CEO of Hivewatch. Hivewatch is a software platform that performs the functions previously associated with a ‘PSIM,’ which is a physical security information management system. The term PSIM has earned a questionable reputation in the industry, plagued by added costs and the perpetual challenges of integrating with ever-changing software platforms. Information management system Hivewatch seeks to bypass other software systems and to integrate as closely as possible with devices Hivewatch seeks to bypass other software systems and to integrate as closely as possible with devices on the edge, thus avoiding the impact of software system changes. They integrate with data in a ‘different way’ that eliminates the need to conform to other software systems. In today’s climate, the term ‘security’ could be seen as limiting when it comes to the various functions our industry’s systems can perform in the broader enterprise, says Schonfeld. Traditional enterprise reporting structures that have physical security reporting to the facilities or real estate department are limiting the broader role security can play in the enterprise. Positioning physical security Changing norms are positioning physical security to report to the CIO or CISO, thus reflecting physical security’s role in collecting and analysing data. Higher visibility within the enterprise can help security expand its influence and impact. “Security is too limiting, and it can keep us from getting a seat at the table,” says Schonfeld. “We need to shift from being a cost center to generating revenue and/or driving business — and data is the key. Rather than leading by fear, we need to show the value security can drive.”
Case studies
With approximately 29,000 employees worldwide, Amdocs is a pioneering global software company providing services and solutions to communications and media companies. When building a new campus in Ra’anana, Israel, their large site with four office buildings and three underground floors required a door closer solution tailored to every door, considering their different size, type, and usage. Finding a single supplier to meet all their needs was a challenge, but they succeeded. Site requirements This new site required reliable, flexible door-closing solutions tailored for use at several hundred doors of multiple types: fire doors, public entrances, high and low traffic, and many more. For such a complex project, they also sought trustworthy specification support from an established, experienced manufacturer with a proven track record and a team with local knowledge. Door solutions across campus Requirements included full support for choosing, supplying, and installing solutions for doors across the campus “ASSA ABLOY has many access solutions related to openings in the building, including door closers. I am pleased that our project specification team was able to provide the right solutions for our customer’s requirements,” says Avi Kimhazi, Managing Director at ASSA ABLOY Israel. This included full support for choosing, supplying, and installing solutions for doors across the campus. ASSA ABLOY’s expertise and advice were always available. Product portfolio to meet the individual needs The vast range of available ASSA ABLOY Door Closers, Electric Strikes, Locks, Panic Exit Devices, and other products ensured every opening at the Amdocs Park campus was equipped with its ideal solution, without compromises. Certifications including fire compliance across the full range help to remove regulatory worries for specifiers and facilities managers. Cam-Motion technology Models supplied include ASSA ABLOY Cam-Motion® Door Closers for several applications Models supplied include ASSA ABLOY Cam-Motion® Door Closers for several applications. With innovative Cam-Motion technology, the push-force required to open a door falls rapidly, providing barrier-free access for all plus secure closing to keep premises safe. DC700, DC840 and DC200 ASSA ABLOY’s Cam-Motion DC700 model creates comfortable, secure access to high-traffic public doors in the building. The DC840 model conceals the same technology within the door leaf itself and is deployed where minimal aesthetic impact is required. For smaller door sizes, choosing the cost-efficient DC200 rack and pinion door closer helped the project hit its budget targets. Hitting project deadlines with specification support Designers could visualise door solutions accurately and the right solution was specified for each opening The project was managed using BIM principles from the outset. ASSA ABLOY’s local specification team became a hub for coordinating and disseminating up-to-date information for every door solution as part of the BIM process. Alongside providing timely specifications, the team made sure supply and installation hit the timelines that construction managers required. Detailed specifications were supplied and updated digitally, so designers could visualise door solutions accurately and the right solution was specified for each opening. Openings Studio® software Openings Studio® software was a key tool for everyone involved in the project. This user-friendly software ensures accurate specification data is logged and, when approved, transmitted to the live Revit® design. With detailed specifications supplied and updated digitally, designers visualise door solutions accurately as soon as possible and ensure the right solution is specified for each opening. And because every stakeholder can have appropriate Openings Studio access, they work transparently and with accurate, up-to-date specifications.
Installers JTI Brandbeveiliging was contracted to help make safety a number-one priority at a pioneering food manufacturer in The Netherlands. They achieved this by choosing Hochiki Europe’s marketing pioneering fire detection system, Latitude, alongside waterproof devices from the ESP range. This comprehensive solution ensures the highest level of fire protection throughout the facility, giving the food manufacturer peace of mind and allowing them to focus on what they do best: producing delicious food. Kervo Kervo is a specialist in the high-quality cultivation and processing of fruit in the Netherlands. Since 1980 morello cherries have been grown in the Vossen family’s orchards in Roggel, The Netherlands. The family was one of the first growers in the region to use mechanical harvesting in the ’80s, fast forward 43 years later and Kervo currently runs operations across Europe and the UK and is proud of its reputation for offering the finest quality fruit to bakeries and fresh food processors. Fire protection systems Complexities of this project was that during food production significant amounts of steam were generated JTI Brandbeveiliging was founded in 2009 and is trusted by its customers for advice, installations, repairs, and maintenance of fire protection systems across the region. The team, led by Luciën van Eldijk was commissioned in 2022 to design and fit the fire safety system that would be integrated into Kervo's new manufacturing plant in Neer. One of the complexities of this project was that during food production, and particularly during the cleaning processes, significant amounts of steam are generated, thus causing false alarms. Latitude fire safety system Lucien explains how he and the team navigated this issue, “In food production sites like this, the machinery needs to remain clean throughout the entire process. This means there is a lot of steam and water present, which, unfortunately, can trigger false alarms." "We needed to install devices that could negate this issue, Hochiki’s waterproof call points, sounders, and sensors were the perfect solution. They worked seamlessly with the Latitude fire safety system from Hochiki.” Fire detection devices and systems Latitude, which is BOSEC-approved, a requirement for fire detection devices and systems in The Netherlands, has a powerful network-wide cause-and-effect capability. The system can support 5000 entries, with up to 20,000 inputs and 20,000 outputs across the network. Benefits of Latitude The new building at Kervo is a huge facility making the Latitude system the best solution The new building at Kervo is a huge facility, at over 40 metres in height it required over 2.5km of cabling and hundreds of fire detection devices to help make the building secure, making the Latitude system the best solution. “Due to the nature of this project, there have been some technical aspects where we have needed to seek advice, but the team at Hochiki has been very helpful in working with us to create the best solution for our customer." Easy to install with high standards "We choose Hochiki products and systems because they are reliable, they are easy to install and, most importantly, meet the high standards and regulations required by the laws of The Netherlands, we would recommend Hochiki products for this reason.” Hochiki’s analogue addressable range (ESP intelligent) together with the Latitude system are EN54 Part 13 certified and with the BOSEC certification also in place, they provide the best complete and compliant fire detection system for businesses across the Belgium region as well as bordering countries such as Luxemburg, the Netherlands, and Germany.
Biometrics company, Fingerprint Cards AB (Fingerprints™), has upgraded the physical access security of its Gothenburg HQ. S-Key biometric access cards from Freevolt Technologies Limited, which embed Fingerprints’ own T2 sensors, have been implemented across the entire Gothenburg site. The updated authentication system further strengthens Fingerprints’ workplace security and enables role-based access control, whilst ensuring a convenient and easy-to-use experience. Role-based access control Fingerprints’ Gothenburg HQ has security gates to enter and exit the building, and restricted areas for hardware and software R&D. By replacing access keyfobs with biometrics access cards, site-wide security has been enhanced and role-based access control has been enabled to better control access to sensitive areas of the site. By replacing traditional security methods based on something they know/have with something they are, multi-factor authentication has been enabled while maintaining convenience for employees. Fingerprints’ latest ‘T2’ sensors Solution eliminates the security risk of lost or stolen cards, without adding infrastructure costs Caroline Krüger, CHRO of Fingerprints comments: “The workplace has evolved significantly in recent years. At Fingerprints, we offer hybrid working whilst still ensuring our workforce has 24/7 access to HQ. Amidst this dynamic working environment, it is essential our team feels the workplace is accessible and safe. This requires a flexible, secure and convenient access control solution.” Fingerprints has implemented Freevolt’s flagship biometric access card solution, S-Key. The solution eliminates the security risk of lost or stolen cards, without adding infrastructure costs. The card incorporates Fingerprints’ latest ‘T2’ sensors which deliver optimised image quality, processing speed and power efficiency. Traditional security methods Adam Philpott, CEO of Fingerprints comments: “To meet today’s security challenges we must move away from traditional security methods. And, as a biometrics company, it is important that we lead the way in ensuring robust, frictionless security in our own operations." "There is an opportunity here too; what can we learn, what innovations will we identify by using these systems day to day? I look forward to continuing our strong and innovative collaboration with Freevolt technologies.” Energy harvesting technology Gonzalo de Gisbert, Head of Product & Business Development at Freevolt Technologies, adds: “Fingerprints are pioneers in biometrics, with sensors in billions of products, so they know what makes a good biometric solution. We’re therefore thrilled that Fingerprints has chosen S-Key to strengthen security at their global headquarters, in Gothenburg." "Our pioneering radio frequency energy harvesting technology combined with Fingerprints’ ‘T2’ sensors, known as FPC 1323, enables S-Key to be completely battery-less, lasting for many years. Roll-out was seamless, with everyone set up in less than 1 hour. That’s simple, safe, and secure biometrics, powered by Freevolt.”
Tenant and homeowner expectations in the multi-residential sector are evolving fast. Digital access offers a solution that fits a contemporary ethos blending design, functionality, technology, and sustainability. STAY by Kronos is a fast-growing developer and service provider in Spain’s build-to-rent (BTR) property sector, where business is booming: Investment grew over 17% between 2021 and 2022 alone. Such high-profile success attracts more providers who compete for location, quality, and customer satisfaction in the services they offer. The rental market is tightly regulated, so operational time- and cost-efficiency are essential. New twin-building site They sought convenient, user-friendly, connected control for both homes and common areas STAY already operates properties in cities including Córdoba and Tarragona and so understands the opportunities offered by digital access. For a new twin-building site in Madrid, they sought convenient, user-friendly, connected control for both homes and common areas including a gym and co-working space. The solution needed to be convenient and secure for residents — and make it easy for facilities managers to work efficiently with service providers who often require temporary access to the site. Convenient, secure mobile digital access STAY by Kronos chose ASSA ABLOY’s SMARTair® wireless digital access solution. Building managers now quickly cancel any lost credentials and issue new ones — remotely if necessary — which reduces operating costs, maintains building security, and provides the flexibility they need every day. Main door entrances are unlocked via SMARTair Wall Readers. Residents can conveniently access and move through the building with a regular smart card, RFID keyring or the SMARTair Openow app, which stores secure mobile keys on their personal smartphone. Secure, battery-powered i-max Wireless Escutcheons lock 121 apartments and shared amenities (gym, play area and so on) across both buildings. No cabling or major door modifications were needed during installation. Temporary mobile access SMARTair saves time managing the many providers who offer services to tenants For residents, the convenience advantage over metal keys is a big plus: “They have the key virtually on their mobile phone, so we are sure they won't lose it and they find it very useful,” says Carlos Rodríguez-Bailón Fernández, Managing Director at STAY by Kronos. From a facilities perspective, SMARTair saves time managing the many providers who offer services to tenants. Programming temporary mobile access to common spaces like a dining boutique via TS1000 Web is fast and intuitive. Digital locking with a security deadbolt The SMARTair i-max has inbuilt features designed to enhance security and give residents extra peace of mind. It is easy for them to lock their front door by simply pushing its handle upwards activating the deadbolt projection with a secure 3-bolt lock. Similarly, the i-max anti-panic mechanism guarantees quick emergency exit, even when the door is bolt-secured. Thanks to these security benefits and feedback on resident satisfaction, SMARTair is now the standard solution for all STAY by Kronos projects — in Madrid, Tarragona and beyond. “With ASSA ABLOY there was always that trust in an established company, a longtime pioneer in the market with a quality track record,” said Carlos Rodríguez-Bailón Fernández, adding “They were also our technology ally.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution will be deployed at Canyon Hills Community Church to protect its congregation against gun-related threats. Canyon Hills Community Church Located in the suburbs thirty minutes north of Seattle, Canyon Hills Community Church is a non-denominational, elder-led, bible-teaching church founded in 1995. Since then, it has grown to host over 4,000 people each weekend and several hundred during the week for bible study and youth groups. Gun violence incidents Canyon Hills Community Church has expanded its security strategy to include ZeroEyes’ proactive solution According to the United States Justice Department, 17.3% of all hate crimes were motivated by bias against religion. Furthermore, data from The ZeroEyes Gun Violence Research Center indicates that of analysed incidents involving religious organisations, 38% of shooters had no affiliation with the place of worship. As it continues to grow, Canyon Hills Community Church has expanded its security strategy to include ZeroEyes’ proactive solution. This decision reflects the church's philosophy that while the building serves as a place of worship, the true priority is the safety and well-being of its people. Prioritising safety “Our commitment to creating a secure environment for worship and fellowship has never been stronger,” said Jon Huff, Operations Director at Canyon Hills Community Church. Jon Huff adds, “As protectors of our flock, we’ve always prioritised the safety of our community. With ZeroEyes, we are equipped to not only react to potential threats but to prevent them, helping to ensure peace of mind for everyone who walks through our doors.” AI gun detection If a gun is identified, images are instantly shared with the ZeroEyes Operations Center, staffed 24/7/365 ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement and church staff as quickly as 3 to 5 seconds from detection. Proactive security technology "At a time when places of worship are experiencing increased hostility and threats, Canyon Hills Community Church is setting a standard for others to follow," said Mike Lahiff, CEO of ZeroEyes. Mike Lahiff adds, "We're honoured to be the first proactive security technology they've adopted, and we commend them for their efforts to ensure a safe environment for their members."
As a longtime maintenance provider for Trafalgar Theatres at their Orchard Theatre site in Dartford, Blake Fire & Security and Cygnus’ distributor Illumino Ignis (Kent) Ltd (IIKL) were approached for a solution to a unique problem: Satisfying the stringent fire safety requirements of their new temporary venue to hold 1,091 audience members, while the main Orchard Theatre was closed due to RAAC Works. SmartNet-Pro fire detection With a very short turnaround of a week, Blake Fire & Security and IIKL instantly knew that the Cygnus EN 54 certified, fully wireless SmartNet-Pro fire detection and alarm system would be a perfect fit for the venue. It provides an aesthetically pleasing solution and quick installation, with full EN 54 and BS5839 Part 1 compliance, while also allowing the right cause and effects for the theatre operation. SmartNet-Pro range’s wireless network features SmartNet-Pro range’s wireless network features give a minimum of two communication paths to each wireless device Designed to deliver a reliable and safe solution, the SmartNet-Pro range’s wireless network features patented Cygnus technology and is run by battery-powered radio devices as part of a robust, self-forming, and self-healing mesh network, giving a minimum of two communication paths to each wireless device for maximum reliability. “We have worked with Cygnus and the SmartNet-Pro system previously and knew it would be ideal for this unique project,” comments Rory Foster, Fire Safety Systems Manager at Blake Fire & Security. 100% wireless “SmartNet-Pro is 100% wireless as well as being robust and reliable, it was exactly what we needed for the complexities of this project. We also knew we could rely on the Cygnus team to help deliver the project in a timely and efficient way.” Given the nature of the venue, the fire alarm system needed to have some advanced features to give the theatre control of the system. Factors to consider The Blake Fire & Security and IIKL team were required to consider these factors when creating the system: Smoke Machines being used during the performances. A function of the SmartNet-Pro panel allowed us to program a function on the button on the control panel to isolate the smoke elements of the detectors in the auditorium during performances (Show Mode) while keeping the Heat elements of the detectors functioning as normal. Heating pipes with hot air being blown throughout the site. By utilising the Cygnus SmartNet-Pro Combi Smoke/Heat A1R detectors, we were able to only have the smoke detection parts active for devices in the stream of the hot air, to avoid A1R false alarms. The costly effect of a false alarm and evacuating the venue during a performance. By having a 30-second initial delay, and a 2.5-minute investigation delay, we satisfied both the Fire Service and the Theatre by allowing the theatre staff to assess the cause of the alarm before evacuating the venue, without leaving too long without the fire alarm activating if no one responded. The combustible nature of the building is mostly dressed in linen throughout. Additional smoke detectors were installed on the edges of the linen-draped ceilings at the request of the local fire authority, with high-sensitivity smoke and heat detection to raise the alarm extremely quickly if the linen was likely to become compromised by fire. Specification and design The whole process was taken care of without any design surprises at the end of the project After a free site survey and design service, Blake Fire & Security and IIKL provided the specification and design to the theatre who then got the design signed off by the local council and local fire authority. Working closely with the theatre and local council, amendments and additions were made to the design, so the whole process was taken care of without any design surprises at the end of the project. Testing and demonstrations The SmartNet-Pro system of 65 devices was installed in a day, with another day allowed for testing and demonstrations; using rods and Unistrut fixings to fix detectors into positions where wired detectors would not feasibly be able to be installed. The fire alarm panel was installed by the stage door so that the stage door staff could hear when an activation has occurred, and then decide on whether to initiate the investigation delay. Zone Plan and As-Fitted Drawing The system was demonstrated to the crew, so they knew what the alarm sounded like, and how to react As with all Blake Fire & Security and IIKL installations, a framed Zone Plan and As Fitted Drawing were fitted by the Control Panel, to give the Theatre Staff and Fire Brigade instant knowledge of the building, and where the Fire Alarm activation has occurred. All members of the Stage Door crew were trained by Blake Fire & Security and IIKL in the operation of the system including all the advanced functions like the delays and “Show Mode”. The system was demonstrated to the crew, so they knew what the alarm sounded like, and how to react when the panel buzzer activates. High-level detection Rods with the detectors mounted onto them were clamped onto the trusses for the lighting, giving high-level detection in the auditorium where it was not possible to fix the black linen ceiling. These detectors were then programmed on the SmartNet-Pro system to be Heat Only when the system is in “Show Mode” to prevent unwanted alarms from special effect smoke used during performances. Manual Call Points Combi detectors were mounted just below the linen ceiling using rods clamped to the metal structure Ensuring all exits including stage exits were covered by Manual Call Points which would instantly evacuate the building without delay was imperative to allow occupants and staff in the venue to feel safe in the knowledge that if a person identifies a real fire, the fire alarm can be raised instantly at any exit from the building. The ceilings in the Front of the House have heating tubes running through them, so combi detectors were mounted to the side of this, just below the linen ceiling using rods clamped to the metal structure above the linen. Smoke detection Extra smoke detection was installed along the low-level edges of the linen ceilings, on L Brackets, so that a fire could be detected quickly before the linen ceilings caught alight. These detectors were supplementary to the main detection along the apex of the ceilings. Given the nature of the ceilings, conventional wiring methods would not have been possible without a very unsightly installation, so the wireless nature of the Cygnus SmartNet-Pro system was an obvious choice. Ongoing maintenance Blake Fire & Security and IIKL issued the O&M Manual with all certificates and drawings required for Building Control Following the completion of the installation, commissioning, and testing Blake Fire & Security and IIKL issued the O&M Manual with all certificates and drawings required for Building Control to sign off the system and deem the venue safe to open to the public. Blake Fire & Security and IIKL will provide ongoing maintenance of the system to ensure that the system is kept up-to-date and compliant. EN 54 certified, and BS 5839 compliant fire detection SmartNet-Pro is the world’s first 100% wireless, EN 54 certified, and BS 5839 compliant fire detection and alarm system while the new SmartNet-100 is ideal for small to medium-sized projects, where the scalability of SmartNet-Pro is not required. Cygnus was thrilled to support the project by providing a complete SmartNet-Pro system to guarantee the fire safety requirements were met.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security systems use is minimal when compared to the total energy usage in a typical building. However, as awareness of environmental issues has surged, and as some of the "low-hanging fruit" has been harvested, attention has come back to opportunities for additional, if small, savings. The lifecycles of security products are also being more closely examined, including the environmental impact of using plastics and other chemicals. We asked this week's Expert Panel Roundtable: How can the security industry contribute to protecting the environment?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![Multi-residential access management and security](https://www.sourcesecurity.com/img/white-papers/612/920x533_1715165602.jpg)
Multi-residential access management and security
Download![Precision and intelligence: LiDAR's role in modern security ecosystems](https://www.sourcesecurity.com/img/white-papers/612/920x533_1713973583.png)
Precision and intelligence: LiDAR's role in modern security ecosystems
Download![Managing security in the age of boundaryless working](https://www.sourcesecurity.com/img/white-papers/612/920x533_1696951068.png)
Managing security in the age of boundaryless working
Download![Effectively branding a multifamily property](https://www.sourcesecurity.com/img/white-papers/612/920x533_1696259527.png)
Effectively branding a multifamily property
Download![Integrating control access and security](https://www.sourcesecurity.com/img/white-papers/612/920x533_1696258072.png)
Integrating control access and security
Download![6 good reasons to embrace mobile credentialing](https://www.sourcesecurity.com/img/white-papers/612/920x533_1694182764.jpg)
6 good reasons to embrace mobile credentialing
Download![The welcoming workplace](https://www.sourcesecurity.com/img/white-papers/612/920x533_1692265753.png)
The welcoming workplace
Download![Levelling up with campus safety](https://www.sourcesecurity.com/img/white-papers/612/level-up-with-campus-safety-mock-up-920x533.jpeg)
Levelling up with campus safety
Download![Understanding key control systems and best practices](https://www.sourcesecurity.com/img/white-papers/612/920x533_1713432940.jpg)
Understanding key control systems and best practices
Download![Assessing safety readiness for education campuses](https://www.sourcesecurity.com/img/white-papers/612/education-1-920x533.jpg)
Assessing safety readiness for education campuses
Download![Improving city mobility using connected video technology](https://www.sourcesecurity.com/img/white-papers/612/safe-city-3-920x533.jpg)
Improving city mobility using connected video technology
Download![Public-private partnerships on campus: What you need to know](https://www.sourcesecurity.com/img/white-papers/612/img-920x533.jpg)
Public-private partnerships on campus: What you need to know
Download![5 ways to strengthen physical security with an integrated system](https://www.sourcesecurity.com/img/white-papers/612/asset-image-920x533_1660648693.jpg)
5 ways to strengthen physical security with an integrated system
Download![The benefits of Edge AI + Cloud for security systems](https://www.sourcesecurity.com/img/white-papers/612/anviz1-920-x-533.jpg)
The benefits of Edge AI + Cloud for security systems
Download![Integrated access control: reap the benefits of connected security](https://www.sourcesecurity.com/img/white-papers/612/image.jpg)
Integrated access control: reap the benefits of connected security
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)