Electronic security systems
Salto proudly unveils the Glass XS Reader Series, an innovative line of products that sets a new standard in access control technology for wall readers. This range of wall reader products delivers breathtaking smart access experiences, stylish design, and ultrafine details. The Glass XS Reader Series elevates access control to unparalleled levels, blending elegance, design, and simplicity while ensuring top-tier security. The new Glass XS Reader, a part of the Salto XS wall reader product...
Centrios, a new brand created within ASSA ABLOY to serve the small business market, announces their first shipment of hardware products to SECLOCK. Centrios is a cloud-based access control solution developed to radically simplify the needs of small and growing businesses. By connecting the Centrios mobile app with Centrios smart readers and locks, owners and managers can quickly and easily manage access for all employees and visitors in one place. Small and growing businesses The first shipme...
{##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##} In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or...
Masaya Kida, Managing Director of OPTEX Security, reflects on the 45th anniversary of OPTEX and what it means, discusses the driving factors behind the business’ success and looks ahead at what’s next for OPTEX and the wider security industry. OPTEX’s 45th anniversary When OPTEX was founded in Japan in 1987 by Electronics Engineer - Toru Kobayashi and three colleagues, their vision was to build a global sensing technology business with precision and intelligence at its heart....
Allegion US, a pioneering provider of security solutions, technology and services, is excited to announce the launch of the Von Duprin 70 Series Exit Devices. This new product line combines the quality and trust associated with Von Duprin with a medium price point, making it an ideal choice for a wide range of applications including warehouse, industrial, office, multifamily, retail and hospitality spaces. The Von Duprin 70 Series Exit Devices are ANSI/BHMA Grade 1 certified, ensuring the...
Westminster Security Group, a renowned name in private security, announces a strategic investment in Tratix, an innovative technology company based in Tel Aviv. Tratix, founded and led by seasoned entrepreneur - Sharon Rashty, specialises in cutting-edge solutions to help prevent cargo theft. With a distinguished background in Israeli Intelligence services and building early-stage startups, Sharon Rashty brings a wealth of experience to Tratix. Her expertise in tailing detection, counter-survei...
News
IDEMIA Secure Transactions (IST) revolutionises the world of digital payments by demonstrating the first ever offline central bank digital currency (CBDC) payments incorporating enhanced security against quantum threats. This major innovation promises to transform financial transactions and pave the way for an era of post-quantum security with IST positioning itself as the leader in this transformation. With quantum computers soon to enter all areas of business and finance, it is vital that companies prepare for all the new threats that will accompany these revolutionary technologies. Most experts estimate that a powerful quantum computer capable of breaking widely used cryptographic defenses could be developed within the next 10 years. IDEMIA Secure Transactions (IST) IDEMIA Secure Transactions (IST) has already demonstrated its ability to adapt to the new threats IDEMIA Secure Transactions (IST) has already demonstrated its ability to adapt to the new threats posed by quantum computers through its crypto agility solution and now takes the lead in the CBDC market with the world’s most secure approach. IST has been committed to this goal for many years, and today demonstrates its feasibility for central banks and financial institutions, offering their citizens ultra-secure, quantum-computer-resistant methods for their offline CBDC payments. The advent of quantum computers must be taken into account as central banks design today their CBDC solutions to ensure long-term security. Offline CBDC payment transactions Offline CBDC allows digital currency transactions without internet, ensuring cash-like secure and seamless payments in areas with limited connectivity. This offline CBDC payment transaction uses quantum-resistant public key cryptography endorsed by the National Institute of Standards and Technology (NIST), a world first leveraging IST’s pioneering leadership in advanced cryptography. The offline transactions demonstrated as part of this quantum-safe solution are performed using two smartphones thanks to NFC. Money is stored inside a secure element fortified with quantum-safe cryptography to guarantee security and prevent the risks of double spending or unauthorised money creation. CBDC transactions are secure For end-users, this means reassurance that their CBDC transactions are secure and seamless independently of the advent of powerful quantum computers. In other words, IST gives citizens access to the most secure methods of payment without having to worry about possible risks. IST calls on central banks and financial institutions to join forces to co-innovate and prepare for future threats Transition to post-quantum cryptography The transition to post-quantum cryptography will require strong and long-term partnerships The transition to post-quantum cryptography will require strong and long-term partnerships between technology providers, central banks and financial institutions to ensure continued trust in the financial system. This pioneering technology offers them the opportunity to work with IDEMIA Secure Transactions to develop their tailor-made CBDC solutions, adapted to the challenges of the post-quantum era. Reliable quantum-safe offline CBDC Jerome Ajdenbaum, Vice President (VP) - Digital Currencies at IDEMIA Secure Transactions, said, "This world first confirms IDEMIA Secure Transactions’ role as a pioneer and frontrunner in today and tomorrow’s payment technologies." He adds, "The quantum threat is real, but the good news is we demonstrated today it is possible to create a reliable quantum-safe offline CBDC. Starting now, we will integrate it from the design phase with our partner central banks."
Hikvision, a world-renowned manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, is excited to announce the rollout of its Phase 1 Kiosk Program across 28 locations in the U.S. This initiative includes live product demos at participating distributors, designed to offer customers a hands-on experience with the latest Hikvision technologies and equipment. Range of Hikvision products "The Hikvision Kiosk Program is a customer-facing live demo which allows customers to walk into a Hikvision Experience Centre to get hands-on experience or training with the latest and greatest Hikvision technologies and equipment," said John Xiao, Vice President of Marketing, Hikvision USA, adding, "This initiative will drive engagement, enabling customers to explore and interact with our innovative solutions firsthand." Kiosk users will have the chance to study and interact with a range of Hikvision products Each kiosk will feature the HikCentral Workstation, which serves as the central hub for demonstrating Hikvision's advanced features to customers. Kiosk users will have the opportunity to explore and interact with a range of Hikvision products on the HikCentral Workstation, including: 8K M-Series NVRs: Ultra high-definition recording and playback capabilities. ColorVu Technology: Enhanced low-light performance cameras for full-colour 24/7. TandemVu Cameras: Dual-lens technology and smart linkage auto-tracking with a bullet and PTZ in one unit for broader surveillance coverage. Thermal Cameras: Advanced HeatPro thermal imaging for deep learning analytics, seeing the invisible along perimeters, and early fire detection. Stealth Edition Black Housing Cameras: Style meets functionality in our portfolio of black housing cameras. Touch Screen Facial Authentication Intercom: Next-generation, touchless access control using facial authentication or other biometrics. Vandal-Proof Intercom: Durable and robust access control for urban environments.
Morse Watchmans, the industry pioneer in key control and asset management systems, is set to showcase its advanced solutions tailored for higher education institutions at two significant industry events this June. The company will exhibit at the ACUHO-I Conference and Expo from June 22-25, 2024 at the Baird Center in Milwaukee, and at the IACLEA Annual Conference from June 27-30, 2024 in New Orleans. Key management systems "Ensuring the security of college and university campuses is more critical than ever," said Tim Purpura, VP of Global Sales and Marketing, Morse Watchmans. He adds, "Our comprehensive key management systems provide higher education facilities and law enforcement with robust, scalable solutions to manage and safeguard their keys and assets effectively. By integrating our systems into campus operations, universities can enhance their security protocols, ensuring a safer environment for students, faculty, and staff." Morse Watchman’s key control systems Morse Watchman’s key control systems are designed to securely store keys in electronic cabinets Morse Watchmans’ key control systems are designed to securely store keys in electronic cabinets, releasing them only to authorised users based on pre-determined criteria. These systems are crucial in managing campus security, providing a high level of integration and control across the broad range of university departments. From campus security and police to facilities management, and across campus housing, transportation, and the student union, these solutions provide dynamic key security for complex applications. Facility management teams often face challenges with managing hundreds to thousands of physical keys across campus. Morse Watchmans’ key control systems allow for easy access to specific keys, limiting master key use to authorised individuals. Three core solutions The Morse Watchman's team will highlight three core solutions at these events: The Emergency Key Grab (EKG) Kit ensures that first responders can quickly access facility keys during a lockdown. Central to the kit is the KeyWatcher Touch System, which securely stores keys and allows authorised emergency personnel to retrieve them swiftly using a PIN code or credential. The kit includes colour-coded SmartKeys and KeyRings, both designed for easy identification and enhanced security. The KeyBank® Touch system offers a secure and convenient way to manage keys with a user-friendly 7-inch touchscreen interface. The system features KeyAnywhere, allowing keys to be returned to any key storage system within the enterprise, and KeyFind, which helps locate specific keys or identify who has them. With the patented SmartKey system, modular design, and full scalability, the KeyBank Touch can manage up to 18,000 keys and 10,000 users per site, all within a common database. The KeyWatcher Fleet system is an advanced key control solution tailored for managing higher education fleets. It offers comprehensive control over vehicle distribution, utilisation, and fleet right-sizing with an intuitive dashboard displaying vehicle use, bookings, status, and detailed charts. The system allows for the creation of automated vehicle allocation policies and ensures secure key access through unique pin codes or optional card and fingerprint readers. Built on the reliable KeyWatcher Touch hardware, it supports thousands of keys and users, network integration, and API support, making it ideal for efficient fleet management on university campuses. Join Morse Watchmans at ACUHO-I (booth 209) and IACLEA (booth 406) to explore how their key management solutions can transform campus security.
Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, announces the company was recognised this month as runner-up for the 2024 Police Dispatch Quality Award (PDQ). The prestigious honour, which is organised by the Security Industry Alarm Coalition (SIAC), was presented during a ceremony at the recent Electronic Security Expo (ESX) held in Louisville. Since 2005, the PDQ program promoted security companies and law enforcement agencies working together as partners, sharing information and communicating frequently to protect public safety and serve their communities. It identifies providers that exemplify cooperative best practices to reduce unnecessary dispatches that drain precious resources and give officers the most complete information when responding to security incidents. Reporting zero false alarms Elite, which has now twice been named PDQ runner-up and won the award in 2020, is the first provider to have completely eliminated false alarms and false dispatches to law enforcement. “There are many security systems and monitoring providers in the industry that talk about more effectively managing and stopping false alarms, and many do an admirable job, but many also fail to put teeth into that talk or stop at lip service only,” says Elite Founder and CEO, Aria Kozak, who earlier this year was named to the Industry Hall of Fame. Aria Kozak adds, “Elite has developed the most proven and effective mitigation of false alarms and dispatches the industry has ever seen. Our revolutionary remote video guarding service reports zero false alarms to responding law enforcement, which is unheard of.” Forensically designed systems Elite agents address any suspicious activity with a live voice-down in an average time of 7 seconds During the 2023 evaluation period, Elite accomplished zero false alarms while also assisting police in achieving more than 1,000 arrests and detainments. In addition, the company registered nearly 73,000 crime interventions through the swift, expert actions of its command center agents, who are all former military or former law enforcement. With forensically designed systems on customer sites and using a custom calibrated technology stack that filters out most of the “noise,” Elite agents address any suspicious activity with a live voice-down in an average time of 7 seconds. As for building police relationships, Elite may be the only provider that has an in-house Law Enforcement Advisory Board (LEAB) comprised of active and former LE command staff and executives. They are fully engaged in the daily activities of Elite’s subterranean, UL-Listed command center. Facilitating optimal support The LEAB trains Elite agents, reviews and ensures calls for dispatch follow best protocols, and routinely communicates and meets with agencies around the country to facilitate optimal support and collaboration. A 2023 letter of commendation from Peace Officers Association of Los Angeles County Board President, Anthony Miranda, states: “During the years of our association with Elite, we have witnessed the evolution of procedures and technology where your company went from significantly reducing to now virtually eliminating false alarm calls. The impact on reducing unnecessary police response to alarms, enhancing officer safety when response is merited and the prevention of losses at your protected premises is extraordinary.”
Members of the Electronic Security Association (ESA) recently approved several competency director and officer positions. After voting for recent director positions concluded on May 24th, Chair-elect Kevin Stone recommended two Competency Directors and requested Board approval on June 2nd. These director positions are selected based on their subject matter expertise and must be an owner, officer, or employee of an ESA Member in Good Standing. Each Competency Director shall serve for a two-year term beginning July 1st, 2024. Competency director positions Kirk MacDowell, the 2023 Weinstock Person of the Year Award winner, is the founder and CEO of MacGuard Security Advisors. Bringing insight from his time at industry innovator Alarm.com, top Fortune 100 manufacturers General Electric and United Technologies, a top 50 SDM integrator, and his own electronic security firm, Kirk now offers guidance on how to innovate, transform, and compete in the ever-changing electronic security landscape. Kirk also remains active in many corps serving on multiple industry and private firm boards A sought-after industry speaker, Kirk also remains active in many associations serving on numerous industry and private company boards. He was the Past Board of Director of the Security Industry Association (SIA) and The Monitoring Association (TMA), past Chairman of AIREF (Alarm Industry Research & Education Foundation), past Chairman of the Security Industry Alarm Collation (SIAC) and past president of the Los Angeles County Burglar and Fire Alarm Association (LABFAA). Kirk currently serves as the Chairman of ESA’s Leadership Identification and Nominating Committee (LINC). Kirk was recently inducted into the SSI Industry Hall of Fame. “I am honoured to join ESA’s board of directors as a competency director and proud to serve the industry that has given me so much. Looking forward to working alongside ESA’s elected board and officers.” Michael Barnes, who recently served as a Competency Director from 2022-2024 under Chairman John Loud, founded Barnes Associates in 1986 and directs the firm’s Mergers and Acquisitions activities. He is based in St. Louis, Missouri. Since founding Barnes Associates, Michael has been involved in more than 280 security alarm acquisitions and financings, with an aggregate transaction value in excess of $29 billion. He has lectured at numerous events within the security alarm industry on matters relating to acquisitions, the availability of capital and the operating dynamics and performance of alarm companies. Michael was the 13th person to be inducted into the SSI Industry Hall of Fame, an honor he received in 2004. Barnes Associates co-sponsors the annual Barnes-Buchanan Conference. “Overall, I feel honoured to once again be invited to serve on ESA’s Board. The organization does such great work in supporting and advocating for the industry, and the Board has a large responsibility for setting direction. I feel the weight of that responsibility and hope I can rise to the occasion.” Officer Positions In addition to the approval of the Competency Directors, the Board approved three officer positions to serve from July 1, 2024, through June 30, 2025. Integrator Director Jeremy Bates, of Bates Security, will serve as Vice Chairman. The Vice Chairman reports to the Chairman and the Board of Directors, serves as liaison to at least one of the standing committees of the Association, promotes all the objectives of the Association, and performs such duties as may be assigned to him or her by the Chairman and the Board of Directors. Competency Director Michael Barnes, of Barnes Associates, will continue in his role as Treasurer. The Treasurer has general supervision of the fiscal affairs of the Association. Integrator Director Melissa Brinkman, of Custom Alarm, will serve as Secretary to the Board. The Secretary is responsible for the preparation of accurate minutes of the proceedings at all membership and board meetings.
Emergency pull-wire switches have become established as "extended emergency-stop" buttons, especially along conveyor belts: one pull on the wire, and the relevant part of the machine comes to a safe halt. As long as the conveyor is running in a straight line - as is usually the case - the wire can easily be tensioned within the maximum approved deflection over distances of up to 2 x 100 metres. For this task, the accessories range from steute includes both closed and open eye bolts. Multiflex 4R pulley But how can an emergency-stop function which complies with the standards and is easy to operate be realised along conveyors which go round bends, or in other extensive and non-linear hazardous areas? This question was brought to steute by a manufacturer of airport luggage conveyors. The developers in the steute business division Controltec came up with an equally simple and effective solution that has been added to the steute range of emergency pull-wire switches: the Multiflex 4R pulley. Wire guided Even when the pulley is deflected multiple times, the friction is minimal, helped by the mobile rollers in the cavity The head of this pulley, guiding the wire, can be rotated to any position. The Multiflex 4R thus provides a wire guide suited to conveyors that twist and turn in different directions. The important thing here: even when the pulley is deflected multiple times, the friction is minimal, helped by the mobile rollers in the cavity of the pulley. EN 60947-5-5 compliance The system complies with a maximum deflection force of 200 N in conjunction with a maximum deflection of 400 mm, as required by EN 60947-5-5. Pulling the "ripcord" to actuate the emergency-stop function is comfortable, wear and tear is minimal, and even longer pull wires can be deflected multiple times without requiring a high actuation force. Simple and universal mounting There has also been interest from many other areas of the industry using conveyor technology An M8 thread in the foot of the pulley facilitates simple and universal mounting of the Multiflex 4R. Alternatively, it can be fixed to conventional profile systems, e.g. conveyor systems for transporting packages and luggage, using a slot nut. There has also been interest from many other areas of the industry using conveyor technology – for example, tunneling. Here conveyor systems transport the stripped material out of the tunnel. Emergency-stop function An emergency-stop function is guaranteed by robust emergency-stop pull-wire switches. Sometimes the conveyors have to go round bends inside the tunnels, and then the Multiflex 4R is the perfect solution, additional support for the "extended emergency stop" in combination with an emergency-stop pull-wire switch from the steute Extreme range.
Expert commentary
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
In the competitive world of physical access control, Big Tech companies are seeking to play a larger role. Physical access competition Apple Wallet continues to stake its claim on mobile credentialing. Amazon One Enterprise is pushing a palm-based identity service. Google/Nest offers smart locks for home access control, with identity and access management provided in the Google Cloud. The entry of these big companies in the historically fragmented physical access control market is causing disruption and foreboding new levels of competition. Apple Wallet impacting credentialing trends The popularity of mobile wallets and contactless technologies in general has grown, creating more demand At Apple’s Worldwide Developer Conference in June 2021, the company announced support for home, office and hotel keys, including corporate badges and student ID cards, in Apple Wallet. Later, the company announced Hyatt as the first hotel partner to support the technology. Since then, the popularity of mobile wallets and contactless technologies in general has grown, creating more demand for a seamless solution such as Apple Wallet. Easy access In 2023, HID Global announced the availability of their employee badge in Apple Wallet, allowing staff and guests to easily access corporate spaces with their iPhone or Apple Watch, including doors, elevators, turnstiles, etc. Employees just need to hold their iPhone or Apple Watch near the reader to unlock. Factors affecting the rate of adoption However, implementing and maintaining an Apple Wallet-based access control system can incur costs for hardware updates, software licencing, and ongoing maintenance. Factors affecting the rate of adoption include the need to upgrade existing infrastructures to accommodate the technology, and the necessity for access control manufacturers to develop and implement integrations with Apple Wallet. Benefits of adoption Keys in Apple Wallet take full advantage of the privacy and security built into the iPhone and Apple Watch With larger companies leading the way, some smaller ones might take longer to catch up. There is also a need to educate building owners and administrators to see the value and benefits of switching to Apple Wallet-based access control. Convenience and greater security can accelerate adoption. Keys in Apple Wallet take full advantage of the privacy and security built into iPhone and Apple Watch. Sensitive data protection A compatible app, specific to the building’s access control system, is needed. Once added, credentials are securely stored in the iPhone's Secure Enclave, a dedicated hardware chip designed for sensitive data protection. Holding an iPhone near an NFC-enabled reader enables transmission of encrypted credentials. In addition to Near Field Communication (NFC), some systems also utilise Bluetooth Low Energy (BLE) for added security, longer read range, and hands-free unlocking. Phones need sufficient battery charge to function. Amazon One Enterprise Enables Palm-Based Biometrics In November 2023, Amazon Web Services Inc. (AWS) announced an identity service providing comprehensive and easy-to-use authentication for physical and digital access control. The system enables users to employ their palm as an access control credential, allowing organisations to provide a fast and contactless experience for employees and others to gain access to physical locations as well as digital assets. Physical and digital locations Physical locations include data centres, office and residential buildings, airports, hotels, resorts Physical locations include data centres, office and residential buildings, airports, hotels, resorts, and educational institutions. IT and security administrators can easily install Amazon One devices and manage users, devices, and software updates using AWS’s Management Console. Elimination of physical credentials An advantage of the Amazon approach is the elimination of physical credentials such as fobs and badges, and digital elements such as personal identification numbers (PINs) and passwords. AWS says security is built into every stage of the service, from multi-layered security controls in the Amazon One device, which is the same technology used in the Amazon Go retail stores, where shoppers can pay for purchases by scanning the palm of their hands. The devices combine palm and vein imagery for biometric matching and deliver an accuracy rate of 99.9999%, which exceeds the accuracy of other biometric alternatives, says the company. AI and ML The palm-recognition technology uses artificial intelligence and machine learning to create a “palm signature” that is associated with identification credentials such as a badge, employee ID or PIN. Boon Edam, a revolving door and turnstile manufacturer, offers Amazon’s palm biometric technology on its equipment, and IHG Hotels & Resorts uses the technology to provide employees a convenient way to identify themselves and gain access to software systems. Google and Nest Devices in Access Control When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone Google’s Nest devices include smart locks for home access control. The Google Nest × Yale Lock allows access control via both physical keys and passcodes accessible through the Google Home app. When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone. Passcodes can be created for family, guests, and other trusted persons. Alerts can be provided whenever someone unlocks and locks the door. When Nest “knows” a resident is away, the door can lock automatically. Voice control, Google Home app Voice control, using Google Assistant integrated with various Nest devices, enables use of voice commands to lock and unlock doors, thus adding another level of convenience. Smart home devices from various manufacturers can be controlled through the Google Home app. SMART Monitoring ADT’s Self Setup smart home security systems integrate Google Nest smart home products with ADT security and life safety technology, including SMART Monitoring technology. Microsoft Azure is another company that could impact access control. The Microsoft Azure Active Directory is an identity and access management platform that could be extended to physical access control, leveraging existing user credentials. Long-Range Impact on the Security Marketplace Big Tech companies are creating platforms for managing access control data, integrating with other security systems Increasingly, Big Tech companies are creating platforms for managing access control data, integrating with other security systems, and offering analytics for optimising security and building operations. Big Tech is also actively researching and developing new technologies for access control, such as facial recognition, voice authentication, and AI-powered anomaly detection. Access control communication and integration As their involvement in physical access control grows, Big Tech companies could potentially gain more influence in setting industry standards for access control communication and integration, similar to how they have become dominant in other areas such as mobile platforms. Given their expertise in user interface design and data analysis, Big Tech companies could help to direct how future access control systems are managed and how users interact with them, including more intuitive and user-friendly operations. Future of physical access control Existing concerns about privacy, security, and potential dominance by a few Big Tech companies could spill over into physical access control. However, traditional security companies, startups, and industry consortiums are also actively developing innovative solutions. Ultimately, the future of physical access control will likely be shaped by a combination of many different players and technologies – large and small.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
Case studies
Koning Willem I College in north-east Brabant, The Netherlands offers various educational and integration programmes. In total, around 18,000 students take 250 courses at its 16 locations. Modern educational institution A new location on Onderwijsboulevard in 's-Hertogenbosch was designed to be a model modern educational institution, including its access control. The imposing new building has modern rooms that provide opportunities for consultation, collaboration in small and large groups, presentations, and individual work. Access to these spaces required a flexible and modern locking solution ideally with as few keys as possible. Employees and students must feel welcome and safe. Need for an easily integrated system Dependable security was needed for all kinds of valuable learning materials and sensitive information Dependable security was needed for all kinds of valuable learning materials and sensitive information. “Easy integration with the existing access control system without additional software,” was the goal, according to Alex te Pas, functional manager of facilities management information systems. Keyless access for improved security and management “Within our organisation, we want to phase out the use of keys,” he says. “Because when employees left, we noticed that people often forgot to turn in keys or tokens. In the event of an audit, we then have a problem." Wireless Aperio locks The college chose Aperio locks which are easy to integrate wirelessly with their existing Nedap AEOS access control system. No additional software is needed: wireless Aperio locks communicate via Aperio Hubs which handle secure, real-time communication between locks and the AEOS system. This way, college security staff have full control over access and can quickly revoke anyone’s access rights. Saves time and costs The ongoing cost of using these battery-powered locks is also much lower than for equivalent wired electronic locks Because Aperio devices run on batteries, rather than mains power, there was no need to make any major adjustments to the doors. This saves both time and cost during installation. The ongoing cost of using these battery-powered locks is also much lower than for equivalent wired electronic locks, which require an ‘always on’ connection to the power grid to maintain secure status. Aperio E100 Escutcheon The college chose the Aperio E100 Escutcheon to secure doors throughout the building. The E100 offers a convenient combination of free exit from the inside with automatic locking on closure from the outside. It comes in a variety of specifications to fit different door security levels or everyday usage, including a version with PINpad which adds another level of control. 2-factor authentication With the additional PIN code, the risk of unauthorised access via a found or stolen pass is minimised. “We wanted to provide our technical rooms with 2-factor authentication. So here we chose Aperio locks with PIN code capability,” adds te Pas. Extending an AEOS system with Aperio wireless devices Nedap’s versatile AEOS access control system integrates seamlessly with a broad range of Aperio Nedap’s versatile AEOS access control system integrates seamlessly with a broad range of Aperio devices. End-users can get even more out of an existing Nedap AEOS system by integrating Aperio cylinders, escutcheons, handles, and more, online and/or offline, giving security managers control over traffic to and through more areas at their premises. Multiple device support Nedap integration supports multiple devices from the Aperio range, including the award-winning wireless handle (H100), escutcheon (E100), cylinder (C100), and security lock (L100). Aperio devices are available for almost any interior or exterior door, including wooden and glass doors, as well as fire doors. Online integration with AEOS can use different interfaces (RS485 / IP), connecting lock and system via hubs that control up to 16 locks. AEOS software A full set of powerful functions and events is made available for any Aperio device within the AEOS interface, including door or battery status and tamper detection. AEOS software manages everything, eliminating unproductive tasks including any need to duplicate data entry saving time, and extending control without hassle for building users or administrators.
When students come to study at the prestigious Les Roches Marbella campus in Spain, they are not just attending one of the world’s major hospitality business schools, they are also enveloped in extraordinary innovation and sophisticated living to mirror the exceptional experiences they are being prepared to facilitate in their future careers. Real-life training site The institution aims to serve up “academic rigor with a twist of innovation and entrepreneurship” to its 1,000+ students from all corners of the planet who collectively represent more than 80 nationalities. This real-life training site for elite hospitality professionals must offer an authentic, hands-on experience to its students — one that reflects the luxurious living and progressive comforts expected from high-end hospitality properties and their employees. Digital badge One particular aspect they sought to enrich was integrating “digital badge” access across the coastal Mediterranean To ensure Les Roches is always ahead of the curve and a model campus when it comes to exemplary learning based on cutting-edge technologies, administrators wanted to evolve its mobile ecosystem. One particular aspect they sought to enrich was integrating “digital badge” access across their coastal Mediterranean property in Spain. Project objective The project’s objective was to migrate to a mobile credentials-based system where a student’s plastic access card is replaced by a digital ID on a smartphone. This would serve as the verification for daily physical access and digital touchpoints (e.g., building access, vending machines, restaurant reservations, etc.). This effort would also allow the school to steer digital transformation and student efficiencies throughout its security and administrative functions. Catering to student experience “Everything here is about the student experience,” said Mano Soler, Director of Student Services and Operations at Les Roches Marbella. “It is our main driver and the reason we embrace and foster innovation because innovation makes our students’ lives easier and supports their well-being through secure technology. The students will eventually leave this campus and, in turn, take that know-how and excellence into the world with them.” Case study challenge The team wanted a mobile solution to fit specific campus requirements such as swift access For 10 years, Les Roches Marbella relied on an RFID (radio frequency identification) card-based system to identify and grant access to students. This was a fundamental tool that nearly 1,000 individuals needed to have with them at all times to validate themselves day in and day out. Supporting their quest for digital transformation, as part of the school’s Spark incubator programme, the leadership team wanted a mobile solution to fit specific campus requirements such as swiftly granting/removing accesses, avoiding disruption when students lose/forget cards, and accommodating a multi-system environment. Need for a mobile credentials-based system Management also wanted to drive improvements through back-office processes and procedures to save time and resources and enhance everyday life on campus through modern technology. One of the most pressing factors for this particular mobile initiative was to achieve higher efficiency around the school’s new student intake registration/check-in process each semester. Loading ID credentials individually onto RFID cards, then printing each of the 1,000+ cards, meant corrections along the way were inevitable. System re-adaptation Yet, the transition to mobile didn’t come without a series of obstacles and serious considerations. Each touchpoint where a card was to be replaced with smartphone technology required deep analysis and complex integration work, specifically involving seven to eight different brands whose products were already deployed throughout the premises (e.g., printers, vending machines, security technologies, door access, laundry facilities, parking garages and more). Les Roches required an access partner with solutions compatible with the many other products already in play within its existing infrastructure, and an ability to successfully address former system re-adaptation. iOS and Android support The mobile technology needed to support both Android and iOS phones, as well as physical card technology In addition, the mobile technology needed to support both Android and iOS phones, as well as physical card technology (the RFID ecosystem would remain intact for non-student purposes and serve as a migration path for other areas not yet mobile). The school wanted a single company to supply both the hardware and software elements. And, as a higher education establishment with upscale expectations and an outstanding reputation, the Les Roches decision-makers required a proven partner of this same ilk. HID solution To transform technologies and reach new degrees of onsite productivity and novel amenities, Les Roches Marbella selected HID for its unmatched mobile access portfolio. As a market pioneer in trusted identification and authentication, and with a network of partnerships that spans the globe, HID’s experts designed a system to meet each requirement from the school resulting in a tremendous collection of 40+ access points featuring mobile identification, app, portal, and reader technologies. Mobile components from HID The integration project was completed within an accelerated time frame to ensure it was in place before students set foot onto campus that fall. HID components that comprise this robust mobile ecosystem include HID OMNIKEY® readers and reader modules (OMNIKEY 5427, OMNIKEY 5127CK Mini, OMNIKEY 5127 Reader Core), HID Signo™ access control readers, HID Seos® mobile credentials, Aperio® locks from ASSA ABLOY and Aero™ X100 door modules. HID access technologies With a slight tap or wave of their smartphone, students interact easily with the mobile ecosystem and via the digital Seos credential to authenticate themselves as they move throughout the property each day. HID access technologies are embedded in: Parking garage systems Building entrances Vending machines Laundry facilities Printers Point-of-sale at restaurants/on-campus eateries Restaurant access control Class attendance tracking Dorm room door locks Mobile-first world “You cannot discount the value of mobile when it comes to today’s student populations,” said Soler. “It is their way of life. They were ‘born digital’ and they have an expectation when it comes to smart living, for them, it’s a mobile-first world. We get it. We embrace it. And, we intend to attract and retain students by offering them an unparalleled educational experience while here in Marbella.” Efficiencies and integration “We not only transformed our campus with epic mobile access technology but also drove important efficiencies and integration into everything we touched." "The value and inventiveness HIDexperts contributed to constructing this complicated mobile ecosystem is completely in line with our ongoing quest to ensure that innovation is at the heart of the Les RochesWay of Life," said Carlos Diez de la LastraGeneral Manager Les Roches Marbella. Results achieved HID credentials available via a smartphone make scaling individual access up and down significantly easier Tying back to one of the original reasons for this mobile initiative, registration check-ins are streamlined, and Les Roches Marbella has gained immediate improvements around this important event that takes place each semester. 100% of students use the mobile access system on campus. Students register digitally with the option to do so in-person, ahead of time, or remotely with no human interaction. HID credentials available via a smartphone make scaling individual access up and down significantly easier for IT, faculty, and students. A unique, homegrown handheld tool On a case-by-case basis, Les Roches Marbella is already finding ways to apply its in-house ingenuity to foster disruptive thinking. The school used 3D printers to design a customised case to house phones/tablets alongside HID access modules creating a unique, homegrown handheld tool that easily allows campus security personnel to check IDs as required. This safety support tool came about when there was no suitable offering available on the market to meet the school’s specific needs for security checkpoints. Automated student attendance tracking The flexibility and power of HID components enabled the team to re-imagine and invent an original Les Roches security product to, as always, improve the student experience. Many new use cases are in the works to fuel future “wins” across the premises. Automated student attendance tracking is already at the beginning of each class period and serves as another way to further support and protect students. Mini computers and readers were installed in each classroom so students could use their mobile ID (via their smartphone) to mark attendance. API-based interfaces, Aero door module When students go back to their dorm rooms any time, each door loc is integrated with the Aero door module All is handled by a web application running on the mini-computer that pushes and pulls data to/from the Les Roches Absences application in real time through API-based interfaces. And, when students go back to their dorm rooms any time, each door loc is integrated with the Aero door module, providing them with a seamless experience across the entire campus. Mobile authentication and verification “Our eyes are wide open to all the possibilities afforded by the marvelous world of mobile authentication and verification, and each week we come up with new ideas for the continued transformation we have in motion on our campus,” said Juan Luis Velasco, IT Manager at Les Roches Marbella. “Our students love this newfound convenience, and our staff members are reaping the benefits of this technology overhaul.” Best-in-class mobile access system Les Roches Marbella has a best-in-class mobile access system that squarely aligns with the school’s wider objective to be an example of innovation and excellence in global hospitality training both within its own brand family, as well as within the broader realm of higher education. Beyond elevating the student experience through the convenience of mobile IDs and strengthening security when it comes to student safety and mobile ID verification, Les Roches Marbella has an extremely efficient, flexible, and scalable solution that can grow with them as technologies evolve and digital trends continue to transform and connect us all to an international degree. Benefits of digital transformation “This is a story about the value of mobile and any size campus in any sector of education can benefit from the digital transformation angles when it comes to campus business,” said Velasco. “But the most rewarding aspect truly is connecting to our students in a way that’s important, convenient, and meaningful to them keeping them connected and secure via a device that’s already an extension of their existence.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation announced that its proactive gun detection and intelligent situational awareness solution will be deployed by Michigan’s Olivet Community Schools to protect students and faculty against gun-related violence. The school was approved for the State’s dedicated grant funding, enabling Olivet to implement ZeroEyes. Olivet Community School Olivet Community School comprises an elementary school, as well as a middle and high school that is located at the same complex. According to The Gun Violence Research Center, 55% of the incidents analysed in Michigan educational systems were spontaneous attacks and 42% involved former students. To combat the rising threat of violence, the district has been bolstering its safety and security efforts by installing an access control system and brand-new digital cameras, along with the deployment of ZeroEyes. Multi-layered security framework "We've always maintained a multi-layered security framework, from our security camera and access control system to CRG maps for first responders, and adding ZeroEyes significantly strengthens our preparedness," said John Mertz, Superintendent of Olivet Community Schools. "While this technology greatly enhances our security, we hope we never have to use it in a real-world situation." AI gun detection and intelligent situational awareness If a gun is identified, images are instantly shared with the ZOC staffed 24/7/365 by specially trained U.S. veterans ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement and the district's school resource officers as quickly as 3 to 5 seconds from detection. Proactive safety measures "We applaud Olivet Community Schools for their proactive approach to safety," said Mike Lahiff, CEO and co-founder of ZeroEyes. "Our AI gun detection technology is a vital layer in fortifying the security of both students and staff."
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation announced that Park City School District (PCSD) of Summit County, Utah has deployed its proactive gun detection and intelligent situational awareness solution to mitigate gun-related violence. Park City School District (PCSD) Nestled within the mountains of the year-round resort town, PCSD encompasses four elementary schools, a middle school, a junior high, a high school, and a learning centre. The district educates nearly 5,000 students annually and boasts a graduation rate in the top 1 percent of the nation. Intelligent situational awareness software AI gun detection and intelligent situational awareness software is layered on existing digital security cameras PCSD is highly focused on student safety, collaborating with the Summit County Sheriff's Department and the Park City Police Department to deploy advanced electronic, physical, and procedural security measures. ZeroEyes' AI gun detection and intelligent situational awareness software is layered on existing digital security cameras at all eight student-occupied PCSD buildings. ZeroEyes Operations Centre If a gun is identified, images will instantly be shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they will dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to local staff and first responders in as fast as 3 to 5 seconds from detection. AI algorithms The platform does not store personal or biometric data or conduct any kind of facial recognition The company's AI algorithms only search for guns, not faces or bodies. Until a gun is identified, the monitoring screens in the ZOC stay blank; the ZeroEyes Operations team does not see a live feed from any cameras. Further, the platform does not store personal or biometric data or conduct any kind of facial recognition. Gun-related violence “We hold a deep commitment to safeguarding our students and staff, and ZeroEyes is a compassionate ally in our mission,” said Michael Tanner, COO of Park City School District. He adds, “By addressing the concerns of gun-related violence while also respecting the need for privacy, this solution allows us to provide a secure yet welcoming campus environment.” Proactive safety measures “Between its collaboration with local law enforcement and the deployment of proactive safety measures throughout its schools, Park City School District has shown that it is on the cutting edge of security,” said Mike Lahiff, CEO, and Co-Founder of ZeroEyes, adding “We are proud to work alongside this dedicated leadership team to protect students and staff against gun-related threats.” Park City School District was introduced to ZeroEyes through the company’s exclusive Utah reselling partner Aegix, a provider of industry-pioneering resources, technology, equipment, and training for first responders.
Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world’s most famous tavern,” explains its Security Manager, Robert Graßl. “The whole world goes in and out. Security is very important.” Hofbräuhaus Bavarian Duke Wilhelm V commissioned Munich’s original Hofbräuhaus in 1589, initially as a brewery to supply the Wittelsbacher Hof. Moved at the end of the 19th century and severely damaged during World War II, it underwent reconstruction in 1958. It currently attracts tourists and city locals, seating up to 3,000 guests indoors and a further 400 in the beer garden. Need for digital access Inobtrusive digital devices and low-impact installation were a necessity to ensure compliance Although the building is an important heritage monument, it requires 21st-century digital access to keep site users safe and streamline day-to-day operations. They wanted fast, secure access rights management for employees and service providers including up to 100 waiters working each shift within a unified system that could authorise access at both the Hofbräuhaus and their food production facility in Brunntal. Of course, inobtrusive digital devices and low-impact installation were a necessity to ensure compliance with heritage preservation regulations. eCLIQ key-based digital access solution Many electronic access products and technologies are not appropriate for historic buildings. An eCLIQ key-based digital access solution is different: eCLIQ cylinders are compatible with the strict monument preservation requirements at the Hofbräuhaus. They have a flush fit, so don’t even appear to be part of an electronic locking system. With wireless installation at the doors, devices blend with the building interior. Programmable keys for staff management ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys “We can exchange a mechanical cylinder 1:1 with an eCLIQ cylinder without having to modify anything on the door or install cables,” confirms Miriem Hammoudi, Business Development Manager at ASSA ABLOY Sicherheitstechnik GmbH. ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys for Hofbräuhaus managers to issue to relevant staff and service contractors. Easy operation for flexible, cost-efficient management Every eCLIQ key has an integrated chip and is programmable individually for the keyholder. The versatility of eCLIQ is demonstrated when a key is lost: Access authorisations are removed rapidly, simply by reprogramming cylinders ensuring security is maintained. The eCLIQ system also helps manage workflows for service providers such as cleaners: Their access is enabled on a time-limited basis. A standard battery inside each programmable electronic key powers the cylinder or padlock on insertion and encrypts the data transfer between the cylinder, key, and system so no external power source or wiring is needed. Scalable web-based platform The Hofbräuhaus team manages their system via a flexible, scalable web-based platform, CLIQ Web Manager, “I can programme keys from anywhere or also block them quickly if a key has been lost or if someone is no longer allowed to enter,” says Robert Graßl. “And I can install any cylinder in any door by adjusting the length. I don’t have to carry extra stock which is really cost effective.” Anytime, anywhere access The system is easy to expand anytime, future-proofing Hofbräuhaus access With the hosting solution chosen, access data is stored securely at ASSA ABLOY, accessible anytime and from any location, which is an ideal configuration for managing large systems or multiple locations. Their system is easy to expand anytime, future-proofing Hofbräuhaus access. Master key system “The situation before the new master key system was installed was problematic,” says Robert Graßl. “Keys were distributed and nobody knew who held them. Everyone carries only one key programmed with details of where and when they can enter. It’s perfect.”
When it comes to connecting to the community and protecting its schools, Sumter County in central Florida has implemented some pretty impressive, innovative, and thoughtful solutions. The county, located west of the Greater Orlando area, recently set out on a mission to increase security at its 14 schools district-wide by installing SARGENT IN120 Intelligent Wi-Fi locks on classroom doors and other interior openings. Digital access technology All Sumter County schools feature multiple classroom buildings. So, in addition to deploying more digital access technology indoors, the district took the extra safety measure of installing a special security fence around each campus’s group of buildings, complete with a single point-of-entry gate controlled by an IN120. Custom-made from resilient metal stock, this gate access solution provides further assurance that only students and staff are allowed to enter. For contractors, family members, and other visitors, there’s a separate controlled entrance at the main administration building of each school where they can be vetted for clearance to specific areas. A simpler, cost-effective path IN120s exchange permission data and grant access strictly by Wi-Fi and run on six AA alkaline batteries IN120s exchange permission data and grant access strictly by Wi-Fi and run on six AA alkaline batteries, virtually eliminating the need for hard wiring. This makes the solution very straightforward to install, power, and connect. IN120s are also easy to operate. Faculty and other authorised personnel simply present their issued credentials to a door’s IN120 card reader to release the lock. Fence point-of-entry For the fence point-of-entry, a scheduled staff member stationed at the opening activates the IN120 the same way, unlocking the gate to let students in as they arrive for the day. Once they’ve entered and are on their way to their assigned classroom buildings, the gate is closed and locked until the next time a student or staff member needs access. Per life safety/fire codes, of course, free egress is always possible by pushing on the exit device (panic bar) on the inside of the gate door. Cost savings The rationale for choosing SARGENT IN120 Intelligent Wi-Fi locks for the gate doors was to eliminate the expense The rationale for choosing SARGENT IN120 Intelligent Wi-Fi locks for the gate doors was to eliminate the expense of trenching and cabling between the fence entry point and a nearby building, which would have been necessary for the power and communication requirements of a traditional hard-wired system. That option was out of budget. IN120s, on the other hand, offered a significant cost-saving alternative, which allowed for a better use of available funds. The Power of Wi-Fi Fortunately, high-speed internet and Wi-Fi are plentiful at all the district’s school buildings both indoors and out, the result of Sumter County’s initiative to boost and extend service to campus parking lots after recognising that many people in the somewhat rural area didn’t have access to such an important necessity. This allows students to come to the parking area and easily connect to online resources that help complete schoolwork, an essential amenity especially during off-hours and over weekends. Alternative standalone power source Strong Wi-Fi reach, of course, also fills the connectivity requirements of the IN120 locks Strong Wi-Fi reach, of course, also fills the connectivity requirements of the IN120 locks, including those at exterior gate locations. Batteries outdoors, however, are another matter. The extreme heat and wintertime cold that Sumter County experiences can shorten battery life and high humidity tends to cause corrosion. That meant finding an alternative standalone power source for each of the single-point entries. Securitron BPSS-20 solar power supply Thankfully, the ASSA ABLOY team had a bright idea. They proposed bypassing the batteries altogether and installing the external power 91-prefix version of the IN120 driven by a Securitron BPSS-20 solar power supply. With a 12V, 20W panel, and 18Ah battery mounted nearby, they were able to turn the intelligent Wi-Fi gate lock into a complete IN120 solar energy solution for Sumter County. Proof again that their schools provide valuable learning experiences and great opportunities for creative problem-solving.
Round table discussion
The design of buildings encompasses many elements, from the practical to the aesthetic. Well-designed buildings should be functional, and they can also be beautiful and inspiring. But can security systems and building design coexist and complement each other? We asked this week’s Expert Panel Roundtable: How does building design impact physical security systems -- and vice versa?
The economic fallout of the COVID-19 epidemic was felt in supply chain disruptions, higher prices, and shortages of certain goods. The physical security industry was not spared, although the epidemic also presented opportunities for security companies. Changing access control trends triggered by the pandemic are still reverberating throughout the industry, for example. Four years later, the impact of the pandemic is still being felt in the security market, lingering like the symptoms of "long COVID." We asked this week's Expert Panel Roundtable: Four years after the start of the COVID-19 pandemic, what is its lingering impact on the physical security industry?
There is a bright outlook for trade shows in 2024. In particular, ISC West has recently become the must-see event in the security marketplace. ISC West will take place April 9-12 at the Venetian Expo in Las Vegas. In addition to providing access to a wide range of technological innovations, the show also serves as a platform to introduce new products and services. As the industry counts down to the big exhibition, we asked this week’s Expert Panel Roundtable: What will be the big news at ISC West 2024?
Products
White papers
The real cost of an outdated Video Security System
DownloadA step-by-step checklist for choosing an intercom system
DownloadUnderstanding key control systems and best practices
DownloadModernizing facilities management
DownloadA more secure alternative to 125 kHz proximity cards
DownloadThe benefits of Edge AI + Cloud for security systems
DownloadCreating a secure and positive healthcare experience
Download11 advantages of a combined system for access control and intrusion
DownloadIntegrated access control: reap the benefits of connected security
DownloadChoosing the right storage technology for video surveillance
DownloadThe inevitability of The Cloud
Download5 reasons to integrate mobile technology into your security solution
Download11 considerations for embedded system RFID readers
Download3 reasons to migrate to a new access control system
DownloadOSDP is the strongest access control for your business
DownloadVideos
Electronic security systems: Manufacturers & Suppliers
- Software House Electronic security systems
- CyberLock Electronic security systems
- ACT Electronic security systems
- Alpro Electronic security systems
- CLIQ - ASSA ABLOY Electronic security systems
- ASSA ABLOY - Aperio® Electronic security systems
- ASSA ABLOY Electronic security systems
- HID Electronic security systems
- Hikvision Electronic security systems
- Morse Watchmans Electronic security systems
- Dahua Technology Electronic security systems
- SALTO Electronic security systems
- TDSi Electronic security systems
- AMAG Electronic security systems
- Sargent Electronic security systems
- Corbin Russwin Electronic security systems
- Baxall Electronic security systems
- EVVA Electronic security systems