Institute security
Advantech Co., Ltd., a global pioneer in IoT intelligent systems and embedded platforms hosted the "2025 New Year & New Vision Gathering " at the Taipei International Convention Center (TICC). 2025 brand vision The event, featuring afternoon and evening sessions, attracted more than 4,000 enthusiastic participants, including employees, their families, and partners. In addition to captivating performances, the highlight of the event was the unveiling of Advantech's new 2025 brand vision...
GroupBy Inc., a SaaS-based eCommerce search and product discovery pioneer, has partnered with adCAPTCHA, a cutting-edge security verification platform to elevate digital customer experiences by combining robust security measures with highly personalised product discovery shopping experiences. Bots Bots pose a significant threat to eCommerce businesses, accounting for half of global web traffic and costing millions of dollars daily in fraudulent activity. These malicious bots can manipulate se...
iDenfy, a global RegTech company specialising in Know Your Customer (KYC), Anti-Money Laundering (AML), and Know Your Business (KYB) verification solutions, has announced its achievement of SOC II certification with the submission of an independent auditor’s report. New office This milestone confirms iDenfy’s position as a trusted partner in the US market, ensuring that its data handling practices meet rigorous standards of security and confidentiality. The certification coi...
DNAKE, a global pioneer in IP video intercom and smart home solutions, is proud to announce the launch of its latest innovation: H616 8” Indoor Monitor. This cutting-edge smart intercom is designed to enhance communication and home security while offering a premium user experience. H616 combines a sleek design with advanced technology, making it ideal for both residential and commercial applications. Key features of the H616 Vertical Installation: The H616 can be easily rotated 90°...
The solar system has fascinated mankind for thousands of years. Astronomical research is looking for answers to the big questions of human existence. How big is the universe? How did it come into being? Astronomers all over the world are casting their gaze into space. However, it is not only huge space telescopes that provide spectacular images, smaller telescopes equipped with standard industrial cameras also allow backyard astronomers to look far and gain new insights. Image sensors&nb...
Kingdom Security, a proud part of The Kingdom Group, has celebrated an extraordinary evening at the prestigious Security and Fire Excellence Awards 2024, taking home two of the industry’s top awards. The Kingdom team took centre stage at the glittering awards ceremony held at the JW Marriott Grosvenor House in London on Monday, 2nd December. Team’s dedication Kingdom Security received a bronze award for ‘Security or Fire Best Company to Work For,’ truly celeb...
News
Footprints Conductive Education Centre, based in Nottingham, transforms the lives of children living with mobility and communication difficulties across the East Midlands. The charity provides babies and children and their families with the tools and support they need to thrive and reach their potential. Through this partnership, Skills for Security aims to support Footprints' mission by engaging its employees in fundraising and awareness activities throughout the year. Support of Skills for Security Says Stephen Frew, Business and Charity Manager at Footprints Conductive Education Centre: "The support of Skills for Security will be invaluable to Footprints, enabling us to continue providing essential services to more children and families across the East Midlands." "This partnership and its focus on fundraising offer a unique opportunity to raise awareness of our work and enhance our ability to help children grow, thrive, and achieve their potential. We are excited to work collectively to make a lasting impact." Broader commitment Team members at Skills for Security are passionate about giving back and view this partnership as an opportunity The collaboration reflects a broader commitment to community engagement. As the UK’s largest fire and security apprenticeship provider, Skills for Security believes in breaking down barriers, fostering inclusion, and encouraging individuals to reach their full potential. Supporting Footprints allows an extension of these values, helping children and families overcome difficulties and achieve meaningful progress. Team members at Skills for Security are passionate about giving back and view this partnership as an opportunity to make a real difference - not just through financial contributions but also by getting actively involved in volunteering efforts. Footprints’ dedication David Scott, Managing Director at Skills for Security, added: "We are proud to partner with Footprints Conductive Education Centre, whose work aligns with our values of empowerment and community. Footprints’ dedication to helping children overcome difficulties is truly inspiring, and we are committed to supporting them in their mission. Together, we hope to make a significant difference for the children and families they support and work with." Through this partnership, Skills for Security is committed to helping Footprints expand its services and reach even more children and families over the coming year. It underscores a dedication to meaningful community engagement, creating positive change, and inspiring others to take action.
As part of its Pan-European expansion plan, Integrity360 has acquired pioneering European PCI QSA (Payment Card Industry Qualified Security Assessor) and cyber security services company Adsigo. The terms of the transaction were not disclosed. The acquisition will enable Integrity360 to expand further into continental Europe and provides additional skilled resources to its existing substantial PCI and cyber security compliance teams. QSA organisation by Visa Adsigo has a pioneering position in PCI compliance and operates as one of the pioneering QSA corp in Europe Adsigo is a highly respected and well-established consultancy founded in 2013, and serves customers in Germany, Austria and Switzerland. It operates out of Stuttgart, Hamburg and Zurich from which it provides services to a wide range of financial, industrial, and services organisations. Adsigo has a pioneering position in PCI compliance and operates as one of the pioneering Qualified Security Assessor (“QSA”) organisations in Europe having completed over 1,500 assessments. Adsigo will complement Integrity360’s existing substantial PCI practice which operates as the No. 1 most chosen QSA organisation by Visa and Mastercard service provider organisations across Europe. Integrity360 SOC resources Integrity360 has also been a proud member of the PCI GEAR (Global Executive Assessor Roundtable) since 2018 helping to refine and define PCI standards for the benefit of the industry. Adsigo will also complement Integrity360’s existing regulatory and cyber framework services capability including ISO27001, cyber security strategy, and third-party risk management. Integrity360 will invest further in Adsigo to become a regional hub for the full suite of Integrity360 services during 2025, including the addition of a new SOC (“Security Operations Centre”) based in Germany, which will be combined with the existing circa 130 people Integrity360 SOC resources based out of Dublin, Stockholm, Naples and Sofia. innovative range of services SOC teams deliver a wide-ranging set of managed services for customers including EDR, XDR and MDR The SOC teams deliver a wide-ranging set of managed services for customers including EDR, XDR and MDR (Endpoint Detection and Response, Extended Detection and Response, and Managed Detection and Response). Integrity360’s innovative range of services have been recognised on multiple occasions by Gartner, namely as a Representative Vendor in the Gartner market guide for Managed Detection and Response services. Range of Integrity360 services Ian Brown, Executive Chairman at Integrity360 commented: “We are delighted to be welcoming the team from Adsigo to Integrity360. We have known Ralph and Stephan for some time and both organisations share the same passion for technical excellence and customer service as we do." "The enhanced group will now significantly expand our existing activities and cyber services across the DACH region (Germany, Austria and Switzerland) as well as offering the wider range of Integrity360 services to the existing customers of Adsigo. With the addition of Adsigo, group revenues in 2024 will exceed €135m significantly up on 2023, and group resources to approx. 550 employees.” Integrity360’s support Ralph Woern, Founder and Chief Executive Officer of Adsigo commented: “I am really delighted that Adsigo is joining Integrity360 and continuing the journey that we started some 20 years ago. Thanks to the support of our customers and employees, Adsigo has become a pioneering QSA and provider of cyber services in Germany, Austria and Switzerland. Adsigo is excited to continue that journey but also with Integrity360’s support, allowing us to further expand our team, our services, and our market coverage." "Our skills, combined with those of Integrity360, will provide an extension of our portfolio of professional, support and managed services. This is great news for employees, customers, and partners. I look forward to working closely with Ian and the wider Integrity360 team over the coming years”.
SecurityBridge, the Cybersecurity Command Centre for SAP, announced a strategic partnership with Altum Strategy Group (Altum), a pioneering advisory firm specialising in Responsible Transformation, Intelligence, Data & Technology, Operational Excellence, and Risk Management. This partnership will empower Altum’s small to mid-sized clients with SecurityBridge’s comprehensive SAP-native cybersecurity platform, providing a holistic approach to solving their SAP security challenges. Benefits from Altum’s clients By adding SecurityBridge’s solution, Altum will now offer its customers the ability to address SAP security with Altum’s deep expertise and strategic thinking and SecurityBridge’s cybersecurity solution. Altum’s clients will benefit from: A comprehensive approach to SAP security, ensuring that strategic and technical elements are effectively addressed. Access to SAP security senior pioneers and a highly experienced team that can implement real-world, actionable solutions. Closing critical control gaps, enabling organisations to meet compliance goals while implementing best practices to mitigate risks associated with SAP security gaps. SAP security challenges “SecurityBridge expands Altum’s cybersecurity offering,” said Matthew Gantner, CEO of Altum Strategy Group. “Their solution perfectly complements our advisory services, addressing the urgent need for advanced SAP security in today’s threat landscape." "Our clients can now leverage an industry-pioneering solution to overcome SAP security challenges, enhance resilience, and ensure business continuity.” Challenges and mitigate risks Combined solution will help organisations overcome challenges and mitigate risks in business operations Integrating SecurityBridge’s SAP-native cybersecurity platform into Altum’s advisory services also supports Altum’s Risk, Resilience, and Governance framework. This combined solution will help organisations overcome challenges and mitigate risks in business operations and IT systems, ensuring business continuity and fostering enterprise-wide resilience in an ever-changing cybersecurity landscape. SAP security solution “We are proud to partner with Altum Strategy Group,” said Bill Oliver, Managing Director, Americas, SecurityBridge. “Our SAP security solution perfectly aligns with Altum’s focus on helping businesses achieve responsible transformation and operational excellence." "Together, we will provide a comprehensive solution that addresses the strategic and technical sides of SAP security.”
Datamatics, a global Digital Technologies, Operations, and Experiences company, has achieved the Cyber Essentials and Cyber Essentials Plus certifications. Backed by the UK Government's National Cyber Security Centre (NCSC), these certifications validate Datamatics' robust security practices and position the company as a preferred partner for enterprises seeking trusted and secure solutions. Datamatics' proactive approach The process involved a specific evaluation of Datamatics' defences against various scenarios As cybersecurity becomes increasingly vital in maintaining trust and ensuring business continuity, these certifications reflect Datamatics' proactive approach to addressing common cyber threats. Audited by Techforce Cyber, an independent third-party auditor, the process involved a thorough evaluation of Datamatics' defences against various cyber-attack scenarios, confirming the company's adherence to stringent security standards. Key highlights: Comprehensive Security Audit: The certification process assessed over 100 criteria across five key areas: Firewalls, Secure Configuration, Security Update Management, User Access Control, and Malware Protection. Global Coverage: The certifications apply to Datamatics' operations in both the UK and India, ensuring consistent security practices across regions. Preferred Partner Eligibility: Achieving these certifications enhances Datamatics' credibility as a trusted partner, giving clients greater confidence in the company's ability to deliver secure, reliable services. Highest cybersecurity standards Rahul Kanodia, Vice Chairman and CEO of Datamatics, said: "Cybersecurity is not just a necessity — it is essential to maintaining business integrity. Achieving the Cyber Essentials and Cyber Essentials Plus certifications reinforces our commitment to safeguarding customer data and maintaining the highest levels of security across our global operations. This recognition strengthens Datamatics' position as a trusted, secure partner for businesses worldwide." Gopal Ranjan, Global Head-Quality and DPO at Datamatics, added: "This recognition follows a detailed assessment by Techforce Cyber, covering more than 100 technical controls to ensure we meet the highest cybersecurity standards. It highlights our dedication to protecting client data and reinforces the trust our customers place in us to deliver secure, dependable solutions." Implementation of the AIMS framework Additionally, Datamatics has recently become one of the first global organisations to receive the ISO 42001:2023 certification, recognising its implementation of the Artificial Intelligence Management System (AIMS) framework. By attaining these certifications, Datamatics sets a benchmark for cybersecurity excellence, reinforcing its position as a preferred partner for enterprises that prioritise secure and trusted digital solutions.
Hanwha Vision, the global vision solution provider, has unveiled the Dual-Lens Barcode Reader Camera, with models TNS-9040IBC, TNS-9050IBC, and TNS-9060IBC, to combine barcode recognition and video capture in one device. In combination with the Vision Logistics Tracking Software, barcodes, and video are provided in real-time to enhance inventory management, traceability, and incident investigation, reducing shipping errors, and returns, and ultimately boosting customer satisfaction. A first for logistics The Barcode Reader Camera utilises accurate barcode recognition, for multiple parcels in one frame, and tracking. AI-powered barcode label detection on the monochrome channel, including for high-speed conveyors, enables operators to find labels efficiently and with ease. The solution also includes WiseBCR, a pre-installed barcode application that supports real-time barcode information and history. Global shutter function The 16, 25, or 35mm lens provides a wide field of view that suits a variety of logistics environments The sensors for barcode recognition and video monitoring offer 4K resolution for clear imagery. The 16, 25, or 35mm lens provides a wide field of view that suits a variety of logistics environments. In addition, the global shutter function, available on both channels, captures distortion-free images of high-speed moving objects such as parcels on conveyor belts. Reduces installation and maintenance As a single device, the unit reduces installation and maintenance costs. In contrast, conventional systems require barcode readers and video surveillance cameras to be installed as separate systems. As a result, the Barcode Reader Camera boosts operator efficiency and incident investigation speed as managers can check location, time, and footage details of parcels and events in a single system instead of using separate systems. Furthermore, the device is highly durable with protection against dust, shock, and vibration thanks to IP66/67 and IK10 ratings and M12 connectors. The complete logistics solution Packing video management integrates third-party handheld scanners making it a useful tool for fulfillment centres The Barcode Reader Camera forms the foundation of a comprehensive logistics solution, in combination with Hanwha Vision software and hardware solutions. It seamlessly integrates with Hanwha Vision’s innovative Vision Logistics Tracking Software (VLTS), a platform that provides a full overview of operations. In addition, packing video management, part of VLTS, integrates third-party handheld scanners making it a useful tool for fulfillment centres. Productivity, cost-efficiency, and safety Through the system, logistics managers are empowered to achieve new levels of productivity, cost-efficiency, and safety while reducing damage and theft. “As a global vision solution provider, Hanwha Vision’s technologies are relied on by a number of the world’s leading logistics and package delivery service companies,” said John Lutz Boorman, Head of Product and Marketing at Hanwha Vision Europe. “Having the first Dual-Lens Barcode Reader Camera showcases Hanwha Vision’s commitment to innovation and ability to deliver market-specific solutions that help our customers to maximise productivity, reduce costs, and achieve their business goals.”
Bromsgrove-based security and monitoring company, Ecl-ips, is celebrating its win at the North Worcestershire Business Awards 2024. Best use of Technology Ecl-ips was a winner in the ‘Best use of Technology’ award category at the event at Hogarths Stone Manor near Kidderminster. Ecl-ips beat two other finalists: Redditch-based TSR Electrical Group and StarkEV, an electrical vehicle charging point installer to win. The security installer was among the 30 local businesses that were shortlisted for an award. HALO Smart Sensor The entry from Ecl-ips centred on the advanced technology that is provided by its vape detector offering, the HALO Smart Sensor manufactured by IPVideo in the USA. Ecl-ips was one of the first companies in the UK to identify the potential of the technology that provides real-time alerts of vaping as well as providing indoor air quality monitoring. Addressing the vaping problem This smart sensor has supported schools in the UK to tackle the problem of young people who are vaping With all its solutions Ecl-ips aims to find the best partners to help meet the needs of its clients. This smart sensor has supported schools in the UK to tackle the problem of the rising numbers of young people who are vaping. Schools are finding that students are disrupting lessons by asking to go to the toilet and creating an intimidating atmosphere in the school toilets because more students are gathering in them to vape. Vape detector When combined with strengthened behaviour policies and the use of CCTV outside the toilets to confirm the identities of students, the vape detector has proved to be very effective at improving pupil behaviour and reducing vaping at school. Ecl-ips customer, Charlotte Slattery Deputy Head Teacher at St Joseph’s College in Stoke-on-Trent, said, “I had dithered about it for over 12 months due to the cost but it has been transformational for us. We started with only 2 devices in our worst areas and have now ordered another 5 to go into more toilets.” North Worcestershire Business Awards The North Worcestershire Business Awards were judged by an independent panel that said the finalists reflect “an impressive range of diverse businesses, all showcasing their commitment to growth, sustainability and adding extra value for customers.” In their sixth year, the awards are organised by North Worcestershire Business Leaders (NWBL) and the local authorities in North Worcestershire in partnership with Hogarths Stone Manor.
Expert commentary
Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many factors – including building size, shape, type, location, national regulations and more – impact affordability and efficiency calculations. Crucially, the type of access solution a business selects – wired or wireless – impacts total operating costs, including during installation, running and any potential expansion or reconfiguration stages. Wireless installation Wiring premises can be expensive. So, the potential cost savings from choosing wireless digital access begin at the very start. Installation stage is the largest contributor to potential cost savings when businesses go wireless. In calculations for one report, access experts at ASSA ABLOY examined projected costs for a fictional 100-door installation. Labour savings for those who chose wireless over wired locks were 82.5%. Why? Firstly, because wireless installation is much faster. It is also less intrusive. Most wireless locking devices require little or no drilling of the door, whereas wired security needs cabling through and partly around a door – which means not just door damage, but the contracting of specialist electrical installers who may require multiple site visits. These costs add up. Digital access technology Torus aims for the highest level of LEED certification for all its new properties In Poland, for example, developer Torus aims for the highest level of LEED certification for all their new properties around Gdansk. Where possible, they choose products with Environmental Product Declarations (EPDs) and Green Circle documentation, favouring access solutions which reduce their carbon footprint. Wireless digital access technology is a natural choice. “The lack of wiring significantly reduces materials use, reduces costs, and ensures quick installation,” confirms Torus’ Roman Sokolowski. There’s no cabling, which cuts power consumption. There’s less damage to the building fabric and fitters make fewer journeys to and from the site. Adaptable locking solution By choosing a wireless solution, organisations also upgrade building security with little disruption. A wireless system makes it easier to improve security at an existing building via a retrofit process which does not inconvenience staff or disturb work routines. This was one goal at Plexal, a £15 million flexible work environment for London enterprise and academia. Plexal chose battery powered wireless locks integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install ASSA ABLOY Aperio® devices with minimal disruption,” confirms Stewart Johnson, Director at NetNodes. Cost savings with improved energy efficiency Choosing wireless over wired locking can play a vital role in reducing ongoing energy use Choosing wireless over wired locking can play an important role in reducing ongoing energy use – and, therefore, expenditure. Wholesale electricity prices in Europe are approximately double what they were in 2019, according to the IEA’s “Electricity 2024” report. For a variable cost such as energy, where businesses have little control over unit prices, it is critical to control usage, especially if high and/or changeable energy prices become what analysts at ING called “the new normal for business”. Thus, the fact that battery-powered locks consume much less energy than traditional wired solutions is increasingly relevant and important. Additional saving on energy costs Traditional wired door access devices often work via magnets connected permanently to mains electricity. These doors draw power around the clock to remain locked. Wireless locks work differently. They only “wake up” when presented with a credential, to make the access decision. This translates to an additional saving on energy costs during operation: more than 70%, or thousands of euros over a typical access system’s lifetime. Wireless digital access Wireless locks only need a change of their standard battery, which may be rechargeable Related energy and materials costs during in-use stage are also lower. Wireless locks only need a change of their standard battery – which may be rechargeable – typically once every two years. No specialist maintenance is required, saving on specialists and their travel to and from the site(s). By choosing wireless digital access, businesses help protect themselves against these ongoing costs, notably energy price increases and volatility. Cost-efficient flexible working, for staff and facilities managers Perhaps harder to quantify, but equally easy to imagine, the financial benefits of choosing a wireless digital solution are felt in the increased convenience and efficiency of daily operations. In the co-working sector, for example, flexible access to offices is a priority. As “fixed” office space rented by corporations continues to fall, co-working spaces are expected to keep growing, with one estimate suggesting almost 18% CAGR to 2030. To stand out from the competition, the founders of ULab in Alicante sought the latest innovations in access and design to create their 21st-century business centre. Part of the suite of digital access solutions from ASSA ABLOY, a SMARTair® system gave ULab real-time access management via battery-powered locks and Openowä, the Mobile Key solution for SMARTair, without any need to wire doors and other openings. SMARTair TS1000 Web interface With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone; ULab’s security team update their rights over the air. An office manager can perform any operation remotely from the SMARTair TS1000 Web interface. In case of an emergency, they could lock-down the site or open doors remotely, for example. It’s convenient, efficient and boosts ULab’s security, benefiting users and managers. And because of SMARTair’s flexibility, they can comfortably welcome many more than their usual 100 daily users. “In addition to regular daily traffic, weekly traffic can almost multiply by 10 if an event is held,” says Enrique Burgos Pérez, Director at ULab. “We needed an access control system as flexible and convenient as SMARTair.” ASSA ABLOY benchmarking report Choosing wireless locks also adds flexibility – and can reduce costs – when an organisation reconfigures or expands their commercial space. High-quality wireless devices like SMARTair can typically be reinstalled at another opening without impacting reliability. They move to wherever is convenient. If a business is rethinking workspace to encourage flexible or hybrid work patterns, for example, cost efficiencies could be significant. Typical savings on office relocation or expansion are estimated at around 30% with wireless over wired locking, according to the same ASSA ABLOY benchmarking report. Cost efficiency and more control with ASSA ABLOY digital access To refit and improve their student accommodation, managers at the University of St Andrews sought energy- and cost-efficient access control. They chose Aperio, another innovative digital access solution from ASSA ABLOY. Approximately 1,600 doors so far are equipped with battery-powered Aperio escutcheons – without cabling. Aperio devices integrate fully with both the university’s existing central security system and their student ID card. University security managers continue to enjoy the efficiency benefits of monitoring and controlling access from a single point and in real-time, including for doors across multiple buildings. Aperio, another innovative digital access solution from ASSA ABLOY. Benefits of cost-efficiency In comparison to a wired solution, Aperio offers significant cost-efficiency benefits. Devices are wireless, so can be installed with little energy use and no need for wiring to the mains. They consume near-zero energy when idle and run on standard batteries, consuming little power during operation. Through the entire product life-cycle, Aperio combines reliability with cost effectiveness. “Aperio gives us central management and control,” says Pauline Brown, Associate Chief Information Officer at the University of St Andrews, “and contributes to our award-winning track record in energy efficiency.”
These days, business is more collaborative, adaptable and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid and cloud systems. Good security is built on solid identity governance and administration (IGA) principles. From ransomware to supply chain intrusions, high-profile cybersecurity events frequently take advantage of weak identity and access management procedures. The Identity Defined Security Alliance found that 84% of organisations experienced an identity-related breach during its one-year study period. Robust IGA system Consequently, organisations need to find best-of-breed solutions for each section of the fabric Some of the most well-known cyber-attacks have not been made possible by a nation-state exploiting a remote zero-day vulnerability; rather, they have been made possible by something as basic as a hacked orphaned account. This resulted in lateral movement from an insecure platform to a high-value system, illegitimate privilege escalation or unsanctioned access to a computer system. To safeguard against such attacks, organisations must be aware of who has access to their systems and apps, and guarantee that access is revoked when it is no longer required. Here, a robust IGA system is helpful. It is not the whole picture, though; IGA is part of a larger identity fabric. A report by KuppingerCole noted that “Identity Fabrics are not necessarily based on a technology, tool or cloud service, but a paradigm for architecting IAM within enterprises.” The report pointed out that the paradigm is created using several tools and services. That’s because, contrary to marketing claims, no one vendor has a platform that provides all the needed elements. Consequently, organisations need to find best-of-breed solutions for each section of the fabric. Threats to the new corporate landscape Due to their exclusion from the corporate firewall and the security culture that comes with working on-site, remote employees and third parties are desirable targets for hackers. The transition to online office suites is another vulnerability that hackers are taking advantage of–for instance, through bogus authentication login dialogues. Additionally, hackers are using technologies like machine learning and artificial intelligence to circumvent current security tactics. A cyberattack powered by AI will imitate human behaviour and develop over time. Even publicly available information might be used by this "weaponised AI" to learn how to get past a target’s defences. CISO and the business users Attackers will finally find an entryway, but firms can protect the new perimeter–their identities It's no longer possible to secure the traditional perimeter. Attackers will eventually find an entryway, but businesses can protect the new perimeter–their identities. To defeat these threats, organisations must look again at identity and access management tools and how they are weighed against the impact on the organisation. Should you mandate multi-factor authentication (MFA) more often and earlier? Should only company-owned devices have access to networks, or should access be restricted to specific business hours or regions? Should access to sensitive information and critical systems be given just temporarily or should it be offered on a task-by-task basis? Both the CISO and the business users they assist should be asking these questions. Staying ahead of threats with identity Access control limits decrease dangers but can come with a cost. If you give your users too much access, your organisation becomes susceptible; if you give them too little, productivity suffers. But there are ways to strike a balance with security, compliance and productivity. More CISOs are turning to Zero Trust–which is based on the principle of maintaining strict access controls and not trusting anyone by default–to protect their systems from new attack types. However, Zero Trust is reliant upon having a thorough and baked-in strategy that underpins it. Other actions that companies can take include implementing automation for identity management, such as automating workflows for approval. This would significantly lessen the administrative burden and friction that security solutions like multifactor authentication (MFA) or time-restricted access to critical systems have on business users. This might include restricting access to particular devices, capping access hours during the day or enforcing MFA based on user behaviour. Identity fabric: Putting it all together Make sure your identity architecture is scalable, secure, and provides a seamless user experience These are just two elements of the identity fabric approach. Most organisations today have implemented pieces of an identity fabric, which is basically an organisation’s identity and access management (IAM) infrastructure and typically includes a mix of modular IAM solutions for multi-cloud and/or hybrid environments. Now, organisations need to define, enhance and develop this infrastructure. They must also institute guiding principles for how it should operate, meet current and future business requirements as well as identity-related cybersecurity challenges. In doing so, businesses can move past identity platforms and adopt an identity fabric perspective. The key is to make identity governance the starting point of your identity fabric strategy, ensuring seamless interoperability within your identity ecosystem. Make sure your identity architecture is scalable, secure, and provides a seamless user experience. Aligning security with business Due to the increase in knowledge workers using the cloud and working remotely, attackers are focusing on this group. These employees are easier to compromise, give access to valuable data and offer more attack targets. Knowledge workers also lack an administrator’s level of security expertise. Therefore, as part of their security fabric strategy, enterprises require a scalable IGA system. It is easier to comply with security and access regulations and takes less time for IT teams to do normal administrative activities when they invest in IGA, a crucial tenet of identity security. CISOs and boards, though, are currently looking at more than identity management. IGA is at the centre of the debate about security and governance. Taking an identity fabric-based approach, with a foundation built on modern, cloud-based IGA, will safeguard identities, increase productivity, and make staff adherence to organisational procedures easier.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
Security beat
GSX 2023 has its share of new product announcements, although many of the new products are enhancements to technologies shown at last spring’s ISC West show in Las Vegas. Booth traffic on the first day seemed busy at the Kay Bailey Hutchison Convention Center in Dallas, although one exhibitor complained that it takes some time for the traffic to make its way to the farthest areas of the show floor. Apparent throughout the GSX show is an expanding idea of what constitutes security. Increasingly, ‘security’ technologies offer benefits throughout other parts of a company or institution. Security is also being broadened to encompass ‘safety,’ including emergency response and wider issues of keeping a company safe. Managing multiple systems People look at the systems they have, and they are looking for more information" Manufacturers at GSX are talking about more than new products. Rather, they are offering new approaches to turn products into ‘solutions’ for customers. Among the benefits of new systems is the availability of more data. “People look at the systems they have, and they are looking for more information and data and insights from their systems,” says Kyle Hurt, Genetec’s Area Vice-President of Sales for the US and Canada. “In the past, if I’m managing multiple systems and spending time and resources, I am making sure systems are operational. Today, it’s more like: How do I make my enterprise more efficient? I spend less time on making sure systems are working together but more time on how we can use the information.” Manufacturers at GSX are talking about more than new products Security control room Genetec is enhancing its Security Center 5.11 version with a newly redesigned web client that provides new capabilities related to system audio, including the ability to trigger a public address from a mobile device in an emergency, two-way audio to and from the security operations centre, and the ability to record an incident. The new web client offers new levels of “Security on the go,” says Hurt. A mobile device becomes an extension of the security control room. “Customers want to have more remote capabilities and have their security personnel out and about, not tied to a desk,” says Hurt. The new web client works to unify the four pillars of the Security Centre— video, access control, license plate recognition, and now audio. Single source manufacturer Audio can now be used to broadcast a message, respond to an incident, and notify people" “Audio has taken time to develop legs in our ecosystem,” says Hurt. “We have been developing partnerships and use cases beyond an intercom at the door. Audio can now be used to broadcast a message, respond to an incident, and notify people en mass of what’s going on.” Manufacturers are also fine-tuning how they work to meet customers’ needs. “Customers want one point of contact, a single source manufacturer, and a solution that reflects the manufacturer is listening to the voice of the customer,” says Jerry Burhans, Managing Director of ASSA ABLOY Global Solutions - Critical Infrastructure, which seeks to be a global partner to critical infrastructure industries. The Critical Infrastructure business works across the various product groups of the notoriously siloed company to bring together solutions aimed at meeting each customer’s need. Manufacturers are also fine-tuning how they work to meet customers’ needs Best-in-class technology “We try to have best-in-class technology and collaborate within ourselves to make sure we have what customers need,” says Burhans. Critical infrastructure industries such as water, power and energy, oil and gas are developing standards to help support preparedness of the nation’s infrastructure, and ASSA ABLOY Global Solutions is helping operators secure access and provide audit trails on locking hardware and keys within their security perimeters. Managing customer assets Johnson Controls’ new OpenBlue Service for the security device market seeks to proactively manage customer assets (equipment) as a service. The company’s software platform of connected solutions monitors and manages security devices across vendors and provides remote support services including skilled engineers who can work to ensure that a company’s assets, including cameras and access control readers, operate dependably. Working remotely, OpenBlue analyzes the performance of each system component Johnson Controls estimates that, unfortunately, up to 25% of a company’s security assets may not be working as intended, whether they lack the latest firmware update or are not connected. Working remotely, OpenBlue analyses the performance of each system component and responds to ensure equipment operates as intended. “We believe we can close that gap with our solutions,” says Greg Parker, Vice President, Innovation & Portfolio Management for Johnson Controls. Physical security equipment A big advantage of OpenBlue for security customers is the ability to manage cybersecurity and threats at the edge, which may not currently be addressed by the IT department. The OpenBlue offering includes an embedded ‘air wall,’ which is a zero-trust architecture for physical security equipment. OpenBlue also helps customers manage the ever-changing lifecycles of various assets. Another concept prompting discussion at GSX 2023 is the gap between what a customer expects from a product and what the product can realistically deliver. With endless promotion in the last several years centring on concepts such as artificial intelligence (AI), is it any wonder that customers may sometimes have unrealistic expectations about what a technology can accomplish? The good news at GSX is that, as progress marches on, newer technologies are getting closer and closer to delivering on customers’ most ambitious expectations. The forward momentum of technology development is evident throughout the GSX 2023 show floor, reflecting the promise of even greater product capabilities in months and years to come.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Well attended and generating levels of excitement not seen since before the pandemic, ISC West may provide just the shot of adrenaline we need to drive industry success through the uncertain economic times ahead. Buzzwords like artificial intelligence (AI) and the cloud were still prevalent at the conference and exhibition in Las Vegas, but the hype of yesteryear seemed more subdued. Rather than breakthroughs to be celebrated, AI and cloud were discussed more as ways systems can realise even greater potential. Rampant cybersecurity attacks Rather than hype, discussions seemed much more practical and down-to-earth, encompassing shifting customer needs and how to address pain points. There was more discussion of the shift of security from a cost center to a profit center, where industry technologies can contribute to an enterprise’s bottom line. More companies seemed to be vigorously addressing the challenges of cybersecurity More companies seemed to be vigorously addressing the challenges of cybersecurity, although perpetually an obstacle. The industry seems more devoted than ever to protecting physical security systems in an age of rampant cybersecurity attacks. But more than in years past, it was the ISC West event itself that generated the most buzz. The crowded aisles of the exhibition seemed both reminiscent of the pre-covid past and prescient of the industry’s even brighter future. From booth to booth and attendee to attendee, the enthusiasm was both conspicuous and contagious. Everybody was thinking: ‘Wow! What a show!’ Pushing technology to the edge “The practice of physical security is about more than understanding threats, and end users are thinking now about the bigger picture of security and how networks work in the broader context of the business,” said Andrew Elvish, Vice President, Marketing at Genetec. Problems of latency and miscommunication are elements pushing technology to the network edge, he says. For example, in an access control scenario, decision-making should be as close to the door as possible to avoid network congestion, delays, or failure. Andrew Elvish, Vice President, Marketing at Genetec, displays Axis network door controller ‘powered by Genetec’ Elements pushing technology Reflecting the philosophy is a new collaboration introduced at the show called ‘Axis Powered by Genetec,’ an enterprise-level access control offering that combines Genetec Synergis software with A1210 and A1610 network door controllers by Axis Communications. Elvish says lines are blurring when it comes to edge versus cloud technologies. Rather than choosing ‘either-or,’ a blending of approaches is optimum, always ensuring that “Decision-making is close to the point of actuation,” he says. On-premise versus cloud systems Elvish also points to changing assumptions about the industry roles of on-premise versus cloud systems Elvish also points to changing assumptions about the industry roles of on-premise versus cloud systems. Historically, the assumption was that on-premise systems are most appropriate for enterprise customers, while the cloud is the best approach for small- to medium businesses (SMBs). Depending on the end customer’s needs, a system can be either or both at the same time. Rather than debate cloud versus edge, customers should consider the outcomes they seek, and how technologies can be merged to provide those outcomes. “They should consider a solution where they do both, with the gradation of controls provided at their fingertips,” says Elvish. Combining security into one platform Unifying security and related functions on a single platform was a widely evident trend at ISC West. An example is Verkada which now offers a unified platform that includes video, access control, and intrusion detection, as well as other functions such as air quality sensors, visitor management, and a door intercom. David Tsang, Product Director of Verkada, predicts demand to combine technologies into a single platform will grow in the industry. Furthermore, as data is collected in the single system, enterprises will find new ways to ‘connect the dots’ to provide better business intelligence. Air quality sensors Verkada’s cloud-based system enables fast deployment of the single platform “Our approach to building products is based around the idea that every company has different needs, and they want technologies to integrate seamlessly and operate off the same platform,” says Tsang. In addition to seamless integration, each product must also be able to stand on its own. Tsang manages Verkada’s various product categories, including access control, air quality sensors, intercoms, etc. Verkada’s cloud-based system enables fast deployment of the single platform, and the company works with dealers to ensure delivery of a 'better partner experience.' What happens after a binge of acquisitions? Acre Security unveiled a new corporate ‘identity’ and a big booth highlighting the technology brands the company has acquired over the last several years. Brands such as Feenics, ACTMobile, Comnet, Razberi, and others reflect Acre’s acquisition of these companies but are now being promoted as technology choices under the ‘one Acre’ approach. Don Joos, CEO of Acre Security, looked ahead to the future of the company at ISC West Visitor management product categories Change is in the air, and the booth’s unified visual design signifies the new direction for the company, says Don Joos, Acre’s CEO. Various technologies can be delivered via the cloud, through an on-premise installation, or using a hybrid approach Acre is highlighting ACTMobile’s mustering capability, useful in the K-12 market In tying technologies together, the ACTMobile product will play a key role in two major verticals -- command-and-control and K-12 schools. Acre is highlighting ACTMobile’s mustering capability, useful in the K-12 market, which was adapted from a technology used in the cruise industry. The Acre approach is to embrace the variety of opportunities available in the access control, intrusion, and visitor management product categories within a broad definition of ‘security’ that embraces both core capabilities and ‘adjacencies,’ says Joos. Acre seeks to enable customers to protect people, facilities, and critical assets. They manage customers’ security data and provide the insights they need. Ensuring a cohesive security system A challenge in the industry is combining various single products into a cohesive whole. “There are many products that do one thing well, but it’s harder to build a cohesive security platform,” says Ryan Schonfeld, Founder and CEO of Hivewatch. Hivewatch is a software platform that performs the functions previously associated with a ‘PSIM,’ which is a physical security information management system. The term PSIM has earned a questionable reputation in the industry, plagued by added costs and the perpetual challenges of integrating with ever-changing software platforms. Information management system Hivewatch seeks to bypass other software systems and to integrate as closely as possible with devices Hivewatch seeks to bypass other software systems and to integrate as closely as possible with devices on the edge, thus avoiding the impact of software system changes. They integrate with data in a ‘different way’ that eliminates the need to conform to other software systems. In today’s climate, the term ‘security’ could be seen as limiting when it comes to the various functions our industry’s systems can perform in the broader enterprise, says Schonfeld. Traditional enterprise reporting structures that have physical security reporting to the facilities or real estate department are limiting the broader role security can play in the enterprise. Positioning physical security Changing norms are positioning physical security to report to the CIO or CISO, thus reflecting physical security’s role in collecting and analysing data. Higher visibility within the enterprise can help security expand its influence and impact. “Security is too limiting, and it can keep us from getting a seat at the table,” says Schonfeld. “We need to shift from being a cost center to generating revenue and/or driving business — and data is the key. Rather than leading by fear, we need to show the value security can drive.”
Case studies
A premier cancer research and treatment institute in India, renowned for advancing oncology, serves as a national centre for specialised healthcare. Committed to delivering innovative treatments and holistic care, the institute integrates state-of-the-art technology with a highly skilled medical team. It emphasises comprehensive patient management, pioneering research, and educational initiatives to enhance oncology expertise. The institute's cutting-edge facilities are tailored to support groundbreaking research, driving progress in cancer treatment and care. Challenges/requirements The research institute relied on a legacy network setup that gradually introduced multiple challenges: Integration with Existing Infrastructure: The institute sought a Unified Communication System that could effortlessly adapt to its intricate legacy setup. Maintaining compatibility was essential to preserve seamless connectivity and ensure the continuity of critical daily operations. Scalability for Future Growth: With plans for expansion, the institute foresaw growing communication needs, including enhanced connectivity and advanced functionalities. Matrix was entrusted to provide a solution that not only resolves present challenges but is also designed to scale effortlessly for future requirements. Secure Communication: With the critical sensitivity of medical communications, ensuring data security and compliance with healthcare standards was paramount. Matrix was tasked with delivering a robust solution designed to safeguard privacy and protect against security risks. Solution The Matrix Unified Communication System incorporated a VoIP-PRI gateway and an embedded IP-PBX server, effectively integrating with third-party IP phones. This configuration bridged modern communication technology with the institute's legacy systems, ensuring seamless functionality. The solution highlights are as follows: Integration with Legacy Network: The Matrix Unified Communication System incorporated two SETU VTEP1P VoIP-PRI gateways, seamlessly connecting with the existing legacy PRI network to ensure smooth integration and enhanced communication capabilities. IP Network: The embedded IP-PBX server, PRASAR UCS-SPARK200, facilitates the IP network connection via a router, enabling seamless communication across the system. Integration with Third-Party IP Phones: The IP-PBX server, connected via the LAN, powers the IP network to support over 300 third-party IP phones, creating a comprehensive and unified communication system. Results The implementation of the Matrix Unified Communication System significantly enhanced the Cancer Research Institute's communication infrastructure. The key outcomes were: Smooth Transition with Legacy Infrastructure: The system effortlessly connected with the institute’s existing PRI network, allowing the retention of its current setup while introducing modern VoIP capabilities. This ensured operational continuity and efficient workflows without the need for costly upgrades or disruptions. Future-Ready Scalability: The IP-PBX server, capable of supporting up to 2100 users, provides the institute with a flexible and adaptable communication solution. Designed to accommodate future growth, the system ensures increased connectivity and the integration of advanced features, aligning seamlessly with the institute’s expanding needs. Optimized Licencing Structure: The deployment of the Matrix SIP server enabled the institute to reduce licencing costs by up to 20%, delivering significant savings while maintaining high-quality communication capabilities. Enhanced Device Connectivity: Reliable IP connectivity across over 300 third-party IP phones has streamlined internal communication within the institute. This seamless integration allows staff to collaborate efficiently across departments, enabling quicker decision-making and more unified operations. The Matrix Unified Communication System empowered the Cancer Research Institute to transition to a scalable and integrated communication infrastructure. This solution not only supports current operations but also accommodates future growth, effectively resolving core challenges with a seamless and sustainable approach.
360 Vision Technology, the UK manufacturer of ruggedised HD, radar, and thermal PTZ imaging cameras, has supplied its Invictus TX streaming camera surveillance technology for installation at South Tyneside Council (STC) car parks. Part of a wider STC CCTV surveillance scheme, thirty 360 Vision Invictus TX cameras have been installed by integrated technology solutions provider, North, to provide 24-hour monitoring for car parks located across South Shields. Challenges with existing CCTV Daniel Chappell, Technical Account Manager at North takes up the story, “Historically, South Shields had an existing public safety CCTV system, which was mainly street-focused." "However, this camera network had become unreliable with age, with some cameras being removed. As part of a project to overhaul the system, an opportunity arose for the STC car parks department to allocate a new surveillance solution, to cover its twelve town centre car parks." New solution requirements “After discussing the car parks’ CCTV requirements with long-term client STC, we set about securing a robust solution, with technical support supplied in discussions with the team at 360 Vision. We outlined the technical requirements and video transmission restrictions of the project to 360 Vision’s technical team and were delighted with the enthusiasm and technical understanding of the demanding requirements of this installation." “While cameras were required to replace existing devices, mostly in existing camera tower locations, the choice of video transmission needed to be re-considered, as the legacy fibreoptic cabling had become unreliable and a replacement fibre network would have been prohibitively expensive." TX streaming camera “On consideration of the cabling issue, 360 Vision suggested that we consider their TX streaming camera option, to transmit camera video wirelessly, over 4G mobile networks. This would have the benefit of substantially low-cost video transmission compared to the expense and civil works disruption required to own or lease a new fibre network, totally negating the need for fixed cabling." "Taking up the idea and to secure the best 4G network supplier for each TX camera, exact camera locations were provided and cross-referenced with network operators to provide the best quality of signal at each specific camera location.” Invictus PTZ TX cameras Authorised operatives in the field can view selected Invictus TX camera images using a laptop browser Utilising 4G unlimited data sim cards and backed-up by on-the-edge built-in camera recording, the new Invictus PTZ TX cameras are securing STC car parks with video streaming, supplying high-quality wireless images to a Veracity Viewscape VMS in the main STC control room. In addition to control room monitoring, authorised operatives in the field can view selected Invictus TX camera images using a laptop browser or mobile phone. Car park safety and security Councillor Jim Foreman, Lead Member for Housing and Community Safety at South Tyneside Council, said, “This investment forms part of wider improvements to our CCTV provision which is a vital tool in helping to keep our residents and visitors safe." “The surveillance flexibility and technology that comes with this new system greatly enhances the safety, security, and management of the car parks." Real-time monitoring "Staff has a reliable video system for monitoring the cameras and supporting them to manage and respond to incidents in real-time more quickly and effectively." "The upgrade demonstrates our commitment to providing safe and secure car parks, many of which hold prestigious Park Mark awards in recognition of good management and maintenance, as well as appropriate levels of lighting, signage, cleanliness, and surveillance.” Camera features Invictus TX cameras installed deliver close-up imaging via their 32x zoom lens and excellent night-time vision Featuring a continuous rotation pan, unobstructed 360-degree view, and 160-degree tilt, the 360 Vision Invictus TX cameras installed deliver close-up imaging via their 32x zoom lens and excellent night-time vision, being equipped with optional on-board white light LED technology. “If a network becomes crowded and the transmission bandwidth reduced, for example, during events such as the Great North Run, the TX camera will automatically optimise its video compression to maintain the best quality of video available,” Daniel explains. Comprehensive coverage “This advanced functionality offers peace of mind for STC car parks that the best quality video will always be received for monitoring, whatever the network conditions. And in the case of a network outage, no essential video will be lost, as back-up recording is stored in the Invictus TX camera head, ready for ‘on-demand’ download and viewing when the network has recovered.” The cameras provide comprehensive coverage of the STC car parks, at a fraction of the cost associated with traditional hard-wired video transmission infrastructure. Ultra-low light technology Adrian Kirk, Business Development Director at 360 Vision Technology commented, “The combined Invictus TX camera and integrated LED white light technology makes it the perfect choice for the demanding coastal environment at STC’s South Shields car parks." "For the ultimate in imaging performance, Invictus’ ultra-low light technology 1/1.9’’ ULL sensors deliver brighter, crisper, and more defined colour images, even at night time. We are proud to have delivered a practical Invictus TX-based camera solution as part of the STC CCTV network upgrade.”
Alamo Colleges in San Antonio, Texas supports more than 65,000 students and 7,000 staff. It's five campuses and smaller regional learning centres connect students and staff, expanding the reach of learning for the community. Colleges' challenge Alamo’s challenges included leveraging technology to support its high standards of safety and security as a priority for its campuses. They were tackling a technology gap among users across the diverse landscape of the larger San Antonio area and also wanted to support an effective work-life balance by transitioning faculty and staff from desktop to mobile devices. Action taken To ensure accessibility for all, Alamo deployed secure, high-performance Alcatel-Lucent OmniSwitch® platforms A long-time customer of Alcatel-Lucent Enterprise, Alamo Colleges has stayed focused on providing a secure, reliable, and accessible network for learning. To ensure accessibility for all, Alamo deployed secure, high-performance Alcatel-Lucent OmniSwitch® platforms and Alcatel-Lucent OmniAccess® Stellar wireless networking across its campuses. They expanded the reach of the OmniAccess Stellar Access Points to develop Park and Learn, enabling students to connect and complete their studies from the parking lots without the need to physically be on campus. Alcatel-Lucent solution Security and safety are of the utmost concern, and Alamo has leveraged its Alcatel-Lucent OmniPCX® phone system to make emergency calls to Alamo Colleges dispatch, 911, and local Bear County authorities. They recently added the Alcatel-Lucent Visual Notification Assistant (VNA) solution, which can pick up a call from a user on a mobile device and provide their location, expediting response time. To manage all these systems, Alamo uses Alcatel-Lucent OmniVista® Network Management. With one view of all the networks, Alamo’s IT staff can monitor the network during the ongoing construction of centres and provide maintenance remotely across its far-reaching network. Products and solutions Alcatel-Lucent OmniPCX® Enterprise Alcatel-Lucent 8128 MIPT handsets Alcatel-Lucent OmniSwitch® 6900-X72-F Alcatel-Lucent OmniSwitch® 6960E-U28 Alcatel-Lucent OmniSwitch® 6860E-P48 Alcatel-Lucent OmniSwitch® 6450E-P48 Alcatel-Lucent OmniAccess® Stellar AP1101 Alcatel-Lucent OmniVista® 2500 Network Management System Alcatel-Lucent Visual Notification Assistant (VNA) Results obtained Technical benefits Delivers redundant, reliable networks and high data transfer rates with OmniSwitch layer 3 and chassis solutions. Provides consistent and complete Wi-Fi across campuses and parking lots with OmniAccess Stellar wireless network. Advanced phone system supports 911 calls and notifies college security and county authorities with Alcatel-Lucent VNA solution. Simplifies monitoring with a unified view of the network and visual maps showing the status of switches in all college facilities. Financial benefits Saves on recurring service costs with the ALE solutions. Network Management single view shows how many switches and how many ports are in use, which helps in decision-making. User experience benefits Provides messaging notification services, conferencing capabilities, and broadcast alerts during a crisis on campus with VNA connected with Rainbow™ by Alcatel-Lucent Enterprise. eSports' popularity with students is growing thanks to high-performance networks. “The Alcatel-Lucent Enterprise products are reliable and just work. What I like best about the partnership with Alcatel-Lucent Enterprise is they’re always there for us,” said Christopher Delgado, Senior Manager of Network Operations, at Alamo Colleges.
In Neuss, Düsseldorf, and Meerbusch, ISR (International School on the Rhine) offers an excellent international education from kindergarten to grade 12. The teachers at ISR prepare students for the world's most prestigious universities, placing great emphasis not only on academic excellence, but also on positive character development and the teaching of values. Since 2022, ISR has also been using the DeepHub whiteboard for this purpose. Test phase from 2022 "The modernisation of classrooms and the additional digitalisation of teaching methods are important concerns for us," explains Peter Soliman, Managing Partner of ISR, adding "Dahua's DeepHub whiteboard offers us versatile functionalities and the perfect solution for our needs." Mohammed Aloof, Head of IT at ISR, adds, "We have already deployed the DeepHub whiteboards in some classrooms since 2022. The feedback we have received from teachers and our students has been extremely positive. Therefore, we have decided to install a more modern whiteboard in every classroom for even better learning conditions." Improved visibility and interaction The new whiteboards have significantly improved the visibility of the learning content. Students can read the text on the screen very well from all angles of the classroom. And thanks to the optimised brightness of the screen, classrooms no longer need to be darkened. Whiteboard function "Being able to add handwritten information to documents on the whiteboard adds a lot of value for me," said Bianca McLeod, a Teacher at ISR and Head of Secondary Education. She adds, "The sensitivity here is just right. For example, I can also call up pre-made geometric shapes and use them for lessons. The whiteboard function allows me to save the pages afterward and call them up again at any time." DeepHub Bianca McLeod continues, "The students can save the learning content by scanning a QR code." She said, "Our teachers can also upload and use extensive materials and teaching aids on DeepHub, which is very practical and accommodates an increasingly paperless - and thus environmentally friendly - aspiration at ISR." Innovative and interactive teaching Classroom interaction is also further encouraged with the DeepHub. For example, teachers encourage students to participate directly via the whiteboard and answer the quiz displayed on the DeepHub screen. This two-way sharing system between DeepHub and the students' tablets is particularly practical and allows for innovative and interactive teaching. Benefits "After almost a year of experience with DeepHub, I have noticed a positive change in my teaching," Ms McLeod points out. She adds, "The students have become more engaged and even more proactive. We are convinced that further upgrading of the screens will bring even more benefits!" Administration work is simplified The Head of the IT department at ISR, Mr. Aloof, is also satisfied, "The Dahua DeepHub makes administration very easy." He adds, "A highly modern DeepHub device now replaces the old equipment, projector, speakers, microphone, countless cables, and much more. It makes the management work much easier." Clever all-in-one solution The DeepHub whiteboard ensures excellent presentation experiences and creative ideation by allowing participants to fully concentrate on the task at hand without having to worry about technical aspects. In doing so, its 4K 3840×2160 touch UHD display with a screen diagonal of 65 to 98 inches and a 178° viewing angle, combined with anti-glare technology, ensures a clear, more legible display, sharp images, and vivid colours. Interactive features In training situations and the classroom, knowledge can be conveyed intuitively and with fun One-touch projection from up to four terminals via the USB wireless screen sharing dongle or eshare software simplifies collaborative presentations. In training situations and the classroom, knowledge can be conveyed intuitively and with fun in this way. At the same time, as part of a quality control process, other teachers, as well as academic coordinators, have the opportunity to participate in lessons from any location with internet access, even if they are not on-site, thanks to the interactive features. High-quality, interactive touchscreen The touch-active screen supports an optimal writing experience: Smooth writing works virtually in real-time with less than ten ms latency. Responses to touch and support for simultaneous writing vary depending on the application. The integrated camera (up to 5MP) and up to eight microphones enable powerful video conferencing. Thanks to its high audio and video quality, the Dahua interactive whiteboard is also suitable for seminars, business negotiations, and training. Compatibility The integrated Android as well as an optional Windows operating system ensures full compatibility Of course, comprehensive compatibility is also taken care of: the pre-installed Android and an optional Windows operating system enable the use of a wide range of productivity tools. This makes perfect sense, as dual operating systems offer a wide range of apps and software. The device is also compatible with popular third-party video conferencing software. Its competitive price and a three-year warranty ensure a high return on investment. In addition, the integrated Android, as well as an optional Windows operating system ensure full compatibility with numerous teaching and learning programs. Conclusion "ISR has many Dahua products in use. In the past, our security system, but now also state-of-the-art interactive whiteboard technology in all classrooms. We are grateful for the support from a global leader in technology and IoT solutions," explains Peter Soliman. He concludes, "I am convinced that the new technology will add great value to ISR's students."
Type of Site: Apartment Building Location: Nagodziców 6-18, Warszawa, Poland The situation This is an older housing estate located in Nagodziców 6-18, Poland with 3 entrance gates and 105 apartments. The investor wants to retrofit the property to improve community safety and elevate residents' smart living experience. One of the main challenges in this retrofit is managing the wiring. How can the project minimize disruption to the building’s occupants and reduce the impact on residents’ daily activities? Additionally, how can costs be kept down to make the retrofit more economically attractive? Solution highlights No Wiring No Indoor Units Fast, Cost-Saving Retrofits Future-Proof Intercom Solution Installed products S615 4.3” Facial Recognition Android Door Station Smart Pro, an App-based Service without a Physical Indoor Monitor Solution benefits No Indoor Units, Cost-effectiveness: Users pay for a subscription-based service, which is often more affordable and predictable DNAKE cloud-based intercom services eliminate the need for expensive hardware infrastructure and maintenance costs associated with traditional intercom systems. Users don't have to invest in indoor units or wiring installations. Instead, users pay for a subscription-based service, which is often more affordable and predictable. No Wiring, Ease of Deployment: Setting up DNAKE cloud-based intercom service is relatively easier and quicker compared to traditional systems. There's no need for extensive wiring or complicated installations. Residents can connect to the intercom service using their smartphones, making it more convenient and accessible. Easy and Multiple Access Ways: In addition to facial recognition, PIN code, and IC/ID card, there are also multiple app-based access methods available, including calling & app unlocking, QR code, temp key, and Bluetooth. Residence can manage access from anywhere at any time.
Mul-T-Lock is working with Charnwood Lock and Key for Loc8me, a premier student accommodation management agency to provide dedicated master key systems enabling secure and efficient access for maintenance of its growing property portfolio. Since its establishment in 2008, Loc8me has grown to have over 6,000 tenants living with them and they manage over 2,500 properties across Loughborough, Bristol, Durham, Newcastle, Nottingham, Leeds, Manchester, Hull, Leicester, Liverpool and Birmingham. Highest level of security Loc8me relies on Charnwood Key to deliver Mul-T-Lock key suites that can simplify access To ensure the ongoing maintenance of properties, Loc8me relies on Charnwood Lock & Key to deliver specialist Mul-T-Lock master key suites that can streamline access for property management processes, while ensuring the highest level of security for residents. Says Raffaele Russo, Founder of Loc8me: “For a lot of students, moving into a student home is a huge step in their independence and we want to make sure we offer the best environment for them. This includes placing a great emphasis on customer service and making them feel truly at home, with all their maintenance needs taken care of." Mul-T-Lock as a master key suite Russo added: “Working with Charnwood Lock & Key enabled us to embrace Mul-T-Lock as a master key suite we could rely on." "We have one set for each of our property developments and our associated landlords, ensuring we can maintain overall security, whilst balancing necessary access for our maintenance teams to ensure our homes are kept to a high standard.” Mul-T-Lock's advanced security solutions Charnwood Lock and Key played a pivotal role in implementing Mul-T-Lock's advanced security solutions for Loc8me's properties. This included considering the flexible security requirements to accommodate the many different sites whilst not compromising on the high level of protection, operational excellence and advanced quality assurance. Says Harry Stafford of Charnwood Lock & Key: “Loc8me places a great emphasis on creating and maintaining the best co-living experiences for students. Maintenance services are naturally key to this success. We had no hesitation in recommending Mul-T-Lock’s renowned master key suites to manage authorised access as and when required." Mul-T-Lock's master key systems Mul-T-Lock's master key systems for student redefine security and comfort in the student sector Stafford added: “The benefits of the system include flexibility for user-friendliness and ease of use, with limited key duplication that we can manage here. With Mul-T-Lock's advanced master key systems in place, Loc8me can effectively manage access control across its growing student housing properties, enhancing security for residents and providing peace of mind for property managers.” Mul-T-Lock's master key systems for student accommodation redefine security and convenience in the student housing sector. Tailored to the unique needs of accommodation providers like loc8me, Mul-T-Lock's solutions offer control and flexibility. Individual sector requirements Jamie Jagpal, Mul-T-Lock’s Product Manager added: “Our bespoke master key systems can be created to suit individual sector requirements, often guided by our long-term partners such as Charnwood Lock & Key." "What Loc8me demonstrates is by creating an established solution, it can evolve with the company’s requirements, especially with its mission to be a major management agency university in the country. We are proud to play a role in enhancing the safety and convenience of such high-end student housing."
Round table discussion
College campuses are meant to be places of learning, growth, and community. Fostering such an environment requires the deployment of policies and technologies that ensure safety and security. Considering the growing role of security technology in the higher education market, we asked this week’s Expert Panel Roundtable: What are the new applications for security technology in the college and university markets?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products
Videos
Institute security: Manufacturers & Suppliers
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download