Key management
Lucid Software, the pioneer in visual collaboration software announced the launch of Enterprise Shield, an enhanced layer of fortified security and granular control that organisations can add to Lucid’s already highly secure platform. Safeguarding data "Our customers are building incredible things, with many working in highly regulated industries with very sensitive material that requires their intellectual property to be protected at the highest level,” said David Torg...
Morse Watchmans, the industry pioneer in key control and asset management systems, is excited to bring its key control safety solutions to the 20th Annual National School Safety Conference being held in Orlando, FL July 29-August 2. On display in booth #100 and tabletop T-15 are advanced key control solutions for K-12 and Higher Education applications, including the innovative Emergency Key Grab (EKG) Kit, which allows for quick access to critical keys in emergencies, as well as the industry-pi...
Regula, a developer of forensic devices and identity verification solutions, prepared a dedicated package of expert articles focused on document verification, tailored to meet the needs of carriers, border verification authorities, the hospitality industry, and businesses during the 2024 Olympics. These resources aim to address the unique challenges posed by the influx of international visitors, ensuring seamless and secure experiences for all. Security and access management France...
Darktrace, a pioneer in cybersecurity AI, has released its UK State of AI Cybersecurity Report, which surveyed over 200 security pioneers and practitioners across a broad array of industries. The research asked security pioneers their thoughts on the threats facing their businesses following the widespread adoption of AI, which has increased the speed, sophistication, and success of cyber attacks. Report findings Almost three-quarters (71%) of businesses are already seeing AI-powered cyber th...
HID, a worldwide pioneer in trusted identity solutions, announces the availability of the new HID® Signo™ Mechanical Keypad Reader 40T, engineered to offer high performance in harsh and challenging environments where the weather is wet or cold and visibility is low. The new reader has a robust IP-65 rated construction meaning the electrical components are dustproof and watertight along with a traditional mechanical push button keypad to make it easy to use when wearing gloves or...
Ajax Systems, Europe’s largest security systems manufacturer, and Yale, the smart home security solutions provider, are expanding their partnership to 30 additional countries. This announcement builds on the initial partnership revealed earlier in 2024, which has already seen successful implementations in several countries. Originally rolled out in five European countries, the integration is currently available to users and businesses in many more markets. Countries that support the inte...
News
Zentra, a brand of Allegion®, and pioneering provider of smart access solutions, has integrated resident keys capability in Apple Wallet for use by customers and their residents. This enables residents to easily and securely add their resident keys to Apple Wallet and unlock their apartment with a simple tap of an iPhone or Apple Watch. With this new capability, residents are able to unlock their building doors, amenity spaces and individual apartment units without contact using their iPhone or Apple Watch — eliminating the need to use a traditional, physical key. Improved security and streamlined operations “This new feature reflects our commitment to prioritising the needs of multifamily property owners and operators,” said Dave Ilardi, senior vice president and president of Allegion Americas. “We are excited to bring an enhanced living experience to residents, bolstered by improved security and streamlined operations.” Benefits include: Seamless, Secure Access with a Tap of an Apple Device: Resident keys in Apple Wallet enable residents to conveniently access all their assigned doors using just their iPhone or Apple Watch. Once a resident key is added to Apple Wallet, residents can hold their device near a door’s NFC-enabled lock to seamlessly access secured areas. With Express Mode, residents don’t need to unlock their device to use their resident key in Wallet. If an iPhone needs to be charged, residents can still use their device to access their apartment with Power Reserve, an Apple feature. Operational Efficiency for Multifamily Properties: Property owners, operators, and managers will benefit from the streamlined operations of Zentra’s solution. Resident keys can be remotely issued and managed, eliminating the hassle of physical key management and replacement. This not only streamlines operations but also enhances the overall resident experience. Secure, Private Access Experience: Resident keys in Wallet take full advantage of the privacy and security features already built into iPhone and Apple Watch. Data is encrypted and protected against tampering and theft, and Apple cannot see when or where a resident uses a resident key in Apple Wallet. If their iPhone or Apple Watch is misplaced, the owner of the device can promptly use the Find My app to lock the device and help locate it. Future of multifamily access control Zentra and resident key in Apple Wallet key is open on the Schlage Control® Mobile Enabled Smart Lock Currently, the Zentra and resident key in Apple Wallet solution is available on the Schlage Control® Mobile Enabled Smart Lock, award-winning Schlage NDE Mobile Enabled Wireless Cylindrical Lock, Schlage MTB Mobile Enabled Multi-technology Reader, and Schlage RC Reader Controller. Zentra has plans to expand its capabilities to the new Schlage XE360 Series later this year. Attendees of Apartmentalize 2024, taking place from June 19-21 at the Pennsylvania Convention Centre in Philadelphia, are invited to experience live demonstrations of the resident key solution in Apple Wallet at Zentra’s booth #366. The Zentra team will showcase the solution’s capabilities, providing a hands-on look at the future of multifamily access control. Innovative technology solutions For those multifamily professionals who are not attending this year’s Apartmentalize, they can contact a multifamily consultant from Zentra to learn more about the solution and how to implement it on their property. Zentra offers unparalleled security and access solutions, backed by Allegion, and designed with operators, residents, and multifamily integrators in mind. Visit the website to learn more and follow on LinkedIn to stay up to date with meet and greet opportunities at Apartmentalize. Zentra is dedicated to enhancing the way people interact with their living spaces through innovative technology solutions. With a focus on resident experience and security, Zentra continues to lead the industry in smart access control for multifamily properties.
Morse Watchmans, the industry pioneer in key control and asset management systems, is set to showcase its advanced solutions tailored for higher education institutions at two significant industry events this June. The company will exhibit at the ACUHO-I Conference and Expo from June 22-25, 2024 at the Baird Center in Milwaukee, and at the IACLEA Annual Conference from June 27-30, 2024 in New Orleans. Key management systems "Ensuring the security of college and university campuses is more critical than ever," said Tim Purpura, VP of Global Sales and Marketing, Morse Watchmans. He adds, "Our comprehensive key management systems provide higher education facilities and law enforcement with robust, scalable solutions to manage and safeguard their keys and assets effectively. By integrating our systems into campus operations, universities can enhance their security protocols, ensuring a safer environment for students, faculty, and staff." Morse Watchman’s key control systems Morse Watchman’s key control systems are designed to securely store keys in electronic cabinets Morse Watchmans’ key control systems are designed to securely store keys in electronic cabinets, releasing them only to authorised users based on pre-determined criteria. These systems are crucial in managing campus security, providing a high level of integration and control across the broad range of university departments. From campus security and police to facilities management, and across campus housing, transportation, and the student union, these solutions provide dynamic key security for complex applications. Facility management teams often face challenges with managing hundreds to thousands of physical keys across campus. Morse Watchmans’ key control systems allow for easy access to specific keys, limiting master key use to authorised individuals. Three core solutions The Morse Watchman's team will highlight three core solutions at these events: The Emergency Key Grab (EKG) Kit ensures that first responders can quickly access facility keys during a lockdown. Central to the kit is the KeyWatcher Touch System, which securely stores keys and allows authorised emergency personnel to retrieve them swiftly using a PIN code or credential. The kit includes colour-coded SmartKeys and KeyRings, both designed for easy identification and enhanced security. The KeyBank® Touch system offers a secure and convenient way to manage keys with a user-friendly 7-inch touchscreen interface. The system features KeyAnywhere, allowing keys to be returned to any key storage system within the enterprise, and KeyFind, which helps locate specific keys or identify who has them. With the patented SmartKey system, modular design, and full scalability, the KeyBank Touch can manage up to 18,000 keys and 10,000 users per site, all within a common database. The KeyWatcher Fleet system is an advanced key control solution tailored for managing higher education fleets. It offers comprehensive control over vehicle distribution, utilisation, and fleet right-sizing with an intuitive dashboard displaying vehicle use, bookings, status, and detailed charts. The system allows for the creation of automated vehicle allocation policies and ensures secure key access through unique pin codes or optional card and fingerprint readers. Built on the reliable KeyWatcher Touch hardware, it supports thousands of keys and users, network integration, and API support, making it ideal for efficient fleet management on university campuses. Join Morse Watchmans at ACUHO-I (booth 209) and IACLEA (booth 406) to explore how their key management solutions can transform campus security.
Pioneering global access solutions provider Salto Systems, part of SALTO WECOSYSTEM, is thrilled to announce the launch of the new Design XS Keypad Wall Reader series. With a sleek design that is ideal for any space, this revolutionary product represents a breakthrough in access control technology. Designed for ease of use for both physical credentials and mobile access, the reader is built to last with a durable keypad. To assist the visually impaired, numbers and symbols are embossed with 5-point braille. Design XS Keypad Wall Reader Design XS Keypad Wall Reader is designed to set new industry norms in smart access control The Design XS Keypad Wall Reader is designed to set new industry standards in smart access control. With multi-factor authentication and the option of PIN code access, this wall reader provides double authentication and enhanced opening modes which significantly increases security. What sets the Design XS European Keypad Wall Reader apart is its seamless integration into any facility. Since it's designed to fit standard electric boxes, installation is seamless. The wall reader, in combination with a Salto BLUEnet access controller, simplifies network infrastructure with the latest advancements in wireless access control technology and connectivity. Cloud access control and mobile applications are supported, providing a streamlined and efficient access management system that controls lifts, sliding doors, perimeter access, and electronic gate doors. New standards for access control Design XS Keypad Wall Reader also offers a wide range of credential options for users "We’re extremely excited to introduce the Design XS European Keypad Wall Reader to the market," said Sheila Alvarez Lancho, UK Marketing Manager at Salto. "This product not only provides advanced security features but also offers a seamless and convenient user experience. We believe it will set new standards for access control applications." The Design XS Keypad Wall Reader also offers a wide range of credential options for users. With seamless mobile and physical credential access, users can tap NFC, RFID cards, key fobs, or Bluetooth LE for quick and convenient entry. This versatility ensures that individuals can choose the access method that best suits them. Long-lasting performance and reliability The Design XS Keypad Wall Reader has been rigorously tested and is compliant with all certifications, ensuring long-lasting performance and reliability. It’s designed to withstand even the harshest of conditions, making it the perfect choice for environmentally exposed locations. With the launch of the Design XS Keypad Wall Reader series, Salto continues to innovate and lead the way in smart access solutions. Salto is committed to providing its customers with top-of-the-line products that offer security and convenience.
ABLOY, a global pioneer in security, is proud to announce the launch of the innovative ABLOY CUMULUS Swing Handle for keyless access via smartphone. The handle is designed to meet the needs of professionals who safeguard our society's vital services in various sectors, from commercial organisations to critical infrastructure. Swing Handle The Swing Handle has a wide array of applications. It can be used across numerous industries with needs ranging from telecom, fibre, and electrical cabinets to server environments. It is also well-suited for CCTV camera control, monitoring automation, and storage cabinets. Moreover, its robust design makes it ideal for outdoor installations such as electric charging stations, as well as traffic control and street light cabinets. Secure and convenient keyless solution “In today's unpredictable times, securing physical assets and ensuring staff safety is paramount,” says Hanna Sillanpää, Head of Digital Solutions at Abloy. "Our Swing Handle, compatible with the ABLOY CUMULUS access management platform, provides a secure and convenient keyless solution for outdoor cabinets used by various industries including data centres, utilities, and maintenance." Robust design meets digital The sturdy, waterproof CUMULUS Swing Handle is designed to endure harsh conditions and meets industry standards The shift towards digital access rights and seamless, location-independent, and keyless management is at the heart of ABLOY solutions. The sturdy, waterproof CUMULUS Swing Handle is designed to endure harsh conditions and meets industry standards for durability (IP66) and resistance (IK10). It also features a real-time clock to reliably log lock state and audit trails. Application programming interfaces The CUMULUS family already includes a range of other products, such as padlocks, controllers, and key deposits, all crafted for optimal security and accessibility. These products are designed to work seamlessly with the ASSA ABLOY Access management system. Furthermore, CUMULUS offers application programming interfaces (APIs) for easy integration with third-party systems, enhancing operational efficiency and convenience. Real-time, authorised access “Our advanced battery-powered technologies enable real-time, authorised access." "The Swing Handle, a crucial part of the comprehensive CUMULUS solution, can be integrated with other applications and software, ensuring secure digital operations, and providing an exceptional customer experience,” comments Hanna Sillanpää. Product specifications and features 1) Available in platforms: ABLOY CUMULUS 2) Material Lock body: Zamac (zinc), and Grivory composite, Locking mechanism: Steel 3) Mechanical key use option: (optional feature) ABLOY PROTEC2, ABLOY PROTEC2 CLIQ 4) Certification: meets RC2 and IK10 standards 5) Protection against environmental factors: IP66 (when the handle is closed), IP54 (when the handle is open) 6) Temperature range: −25 C° to +60 C° 7) Battery lifecycle: 5 years / 5000 open cycles The CUMULUS Swing Handle is immediately available for purchase directly from authorised ABLOY distributors.
Organisations equipped with CLIQ intelligent key-based access management have confidence that their premises and employees are safe and secure. With CLIQ employees can flexibly manage access, to secure almost any opening with electronic cylinders or padlocks and programmable smart keys. A new upgrade in the programming device family simultaneously enhances this security and convenience. Credential updates Requiring regular credential updates is the simplest, most effective method for keeping premises secure. ASSA ABLOY’s new CLIQ Wall Programming Device (PD) helps to update keys’ access rights faster without involving the system administrator. This cuts the risk of unauthorised keys circulating. CLIQ Wall Programming Device Robust, durable CLIQ cylinder locks secure lifts, machines, mailboxes, cabinets, and more CLIQ is built around precision-engineered locking cylinders and high-end microelectronics. A standard battery, lasting approximately 10 years with typical use, inside each programmable smart key powers the cylinder or padlock and encrypts the data transfer between lock, key, and system. Robust, durable CLIQ cylinder locks secure lifts, machines, mailboxes, cabinets, and more with the same control as sensitive doors. A range of programming devices transfer and update access rights for keys. Fast, reliable CLIQ key updating for enhanced security The CLIQ Wall PD, available as an indoor and outdoor variant, has now been redesigned to make this updating process faster and easier than ever. “Facility managers can have the peace of mind that every user key in circulation is easy to load with the latest approved access rights and validity,” explains Stephan Schulz, CLIQ Product Manager at ASSA ABLOY Opening Solutions EMEIA. “The Wall PD can also collect audit trails directly from keys. Life is just easier when you CLIQ!” Weather and vandalism protection The upgraded CLIQ Wall PD protects users against missteps, confusion, or false positives during key programming: Intuitive LED lighting instantly confirms when their key is updated in both the indoor and outdoor product variants. The CLIQ Outdoor Wall PD is the ideal solution for demanding environments as it is protected against weather and vandalism. Enhanced encryption Enhanced encryption via Ethernet ensures every issued CLIQ key is protected with robust security With the new CLIQ Wall PDs, keyholders and facility managers don’t need to worry about data privacy. Enhanced encryption via Ethernet ensures every issued CLIQ key is protected with robust security. The upgraded device supports the 802.1x protocol for enhanced security. Rapid installation With rapid installation, using the existing wiring and backplate, it is simple to switch existing wall programmers for new devices to keep a site and staff safer. Total compatibility with existing and future CLIQ keys ensures that replacing old programmers with the new CLIQ Wall PD is hassle-free and future-proof.
Gunnebo Entrance Control is proud to announce the promotion of Jamie Keyte to the position of Country Manager for the UK & Ireland, to oversee all business growth, sales, and operations. Jamie Keyte Jamie's journey with Gunnebo began as an apprentice at 16, and his dedication, hard work, and exceptional leadership skills earned him this significant role. Starting as an apprentice, and operating through Service and Contract Management roles, Jamie quickly demonstrated his technical prowess and an innate understanding of the business, consistently exceeding expectations and contributing to Gunnebo's success. Secure entrance control solutions "I am incredibly honoured and excited to take on this new role as Country Manager for the UK & Ireland," said Jamie Keyte. Jamie Keyte adds, "Gunnebo Entrance Control has been my professional home throughout my career, and I am deeply committed to our mission of providing innovative and secure entrance control solutions. I look forward to heading our talented team and continuing to deliver exceptional value to our customers." Customer-centricity, and operational excellence Gunnebo Entrance Control is confident Jamie Keyte’s leadership will bring renewed energy and strategic direction Jamie’s vision for the future is rooted in innovation, customer-centricity, and operational excellence. He aims to leverage his extensive experience and deep industry knowledge to steer Gunnebo Entrance Control toward new heights of success. Gunnebo Entrance Control is confident Jamie Keyte’s leadership will bring renewed energy and strategic direction to the UK & Ireland business growth, sales, and operations. His promotion is a testament to Gunnebo’s commitment to nurturing talent and promoting from within, ensuring that the company’s leadership is both experienced and deeply connected to the company's values and mission. Blanca's comment “We are very proud of Jamie and his promotion to Country Manager at Gunnebo,” said Blanca Sebastia, Vice President & General Manager of Gunnebo Entrance Control Europe. Blanca Sebastia adds, “His journey from apprentice to Country Manager is inspiring and reflects our dedication to developing our employees’ skills and careers from within. We are excited about the future and confident that Jamie will lead our UK & Ireland operations to even greater success.”
Expert commentary
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defences, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitisation of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of cyber resilience in protecting service availability Cyber resilience refers to organisation's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organisation's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimising the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimised, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organisation. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorised individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorised access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organisations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organisations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labelled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organisations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organisations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organisation can respond quickly and effectively to a breach, minimising its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organisations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Physical security is essential for a modern production facility, users don’t want just anyone entering the building or accessing secure areas. But what about production machinery? Machine authentication is often a missing link in the security plan for manufacturers. Why machine authentication? Most manufacturers have made significant investments in physical access control (PAC) for production facilities. Few shops currently hand out physical keys to employees or leave the building unlocked during production hours. For all but the smallest shops, front-door access typically involves individual radio-frequency identification (RFID) badges that enable tracking of who is coming and going and at what times. Use of physical keys, password login It is simply assumed that anyone who has access to the factory floor has the knowledge, authority, and training But when it comes to production machinery, many manufacturers still rely on physical keys, password login on the human-machine interface (HMI), or a shared PIN to unlock machine access. In some shops, machines may not be secured at all, it is simply assumed that anyone who has access to the factory floor has the knowledge, authority, and training to use the machines responsibly. However, this is not necessarily a good assumption, especially in a larger manufacturing plant where many people can access the production floor. Valuable and sensitive equipment CNC machines, robotic welders, process equipment, and other production machinery can cost anywhere from $5,000 to half a million or more, depending on their size and function. They also have significant safety risks for untrained users and may hold valuable and sensitive IP (such as customer design specs or batch recipes). User authentication Authenticating users at the machine level closes an important security loophole and makes plants safer and more productive. Machine authentication prevents untrained or unauthorised users from accessing production machinery. The right authentication system also allows access levels to be tailored for different users based on training credentials, job roles, or even projects. Machine authentication benefits A strong machine authentication solution provides several benefits for manufacturers: Minimises unplanned downtime and expensive damage to machines caused by untrained operators. Enables tracking of production outcomes by machine operator for better quality control and troubleshooting. Protects company and client IP held on the machine by preventing unauthorised access to machine controls and memory. Enhances plant safety and compliance by limiting machine access to operators with the appropriate credentials. Reduces the risk of deliberate sabotage by unauthorised operators, including damage to machines and production facilities and data theft or corruption. Mark Merino, the Director of the Digital Factory Group for Polaris Automation, explains, “Machine authentication allows us to identify which people are logged into different pieces of equipment and make sure they are trained appropriately for the machine and have the right clearances for the data they are trying to access.” Choosing the right machine authentication solution Access control for production machinery can be accomplished by various means, including password and PIN systems, physical keys or fobs, RFID badges, or smartphone-based mobile credentialing systems. The best machine authentication system will: Be highly reliable and secure to protect the machine from unauthorised access. Enable identification of individual operators and tracking of who has used the machines, at what times, and for what projects. Allow access levels to be differentiated by the user. Be easy to implement and administer. Discourage sharing or cloning of credentials. RFID readers An RFID reader can be easily connected to or integrated with the HMI for the machine In most manufacturing environments, the simplest solution for machine authentication is the RFID badge employees already carry for building entry. An RFID reader can be easily connected to or integrated with the HMI for the machine. All users must do to authenticate themselves is swipe their badge over the reader to unlock machine controls. RFID benefits RFID provides multiple benefits for end users, IT, and managers: It leverages technology already widely used, so users do not have to carry a separate key or fob to access machine controls. It is more secure and easier to manage than a password system, as passwords are frequently forgotten, shared, or hacked. Unlike shared PINs, physical keys, or fobs, user authentication via an ID badge enables accurate identification of who is logging into the machine. Users are much less likely to share their picture ID badge (which is often also linked to HR functions such as time and attendance) than a machine password, PIN, or key. If an ID badge is lost or stolen, or an employee leaves the company, IT can easily disable access to the card. RFID credentials are very difficult to hack or clone. Transmission between the reader and card can be encrypted for added security. Unlike biometric options, RFID is highly reliable even in hot, dirty, or humid environments and does not require workers to remove gloves, safety goggles, or masks. Getting started with machine authentication Machine authentication starts with selecting the right RFID reader. A universal RFID reader supports easy implementation, integration with other building systems, and scaling. A universal reader also provides flexibility for the future in case companies want to change transponder technologies or allow for user authentication using mobile credentials on a smartphone. IIoT model User authentication must be designed within the context of the wider security ecosystem of the plant To ensure the security of production machinery, user authentication must be designed within the context of the wider security ecosystem of the plant. Modern production machines are increasingly networked and connected in an “Industrial Internet of Things” (IIoT) model. That means machines are not only vulnerable themselves but are also endpoints in the broader IT landscape of the plant. Machine authentication systems must incorporate best practices for endpoint security, such as those outlined by ISO (International Organisation for Standardisation), NIST (National Institute of Standards and Technology), and other industry organisations. Best practices: The reader installation should be tamper-proofed to prevent physical disruption of the authentication system. Use an encryption standard suitable for the security level of the application. Encryption prevents data interception or card cloning. If higher security is desired, RFID can be implemented as part of a multi-factor authentication system along with biometrics and/or a password or PIN. The authentication system should support different access levels for different users or classes of users. A role-based permission system allows for different levels of access for line operators, supervisors, IT, and maintenance, for example. For maximum safety and security, individual users should only have the minimum access required to do their jobs. With secure machine authentication, manufacturers can protect people, production equipment, and IP, while enabling smooth operations. It all starts with an authentication system that supports reliable and secure operator identification at the machine level.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
Large-scale events, including both corporate and sporting events, are coming back strongly in the aftermath of the pandemic. With the increase in activity comes more demand for oversized credentials preferred by many event planners and end users. Pent-up demand due to the pandemic has caused a tremendous uptick in the entire ID card industry in 2022. The return of large-scale events and in-person trade shows will extend the higher demand for cards well into 2023 and beyond, says Andrew Schonzeit, President of Idesco, a provider of ID card solutions. Supply chain concerns Supply chain concerns will continue as companies seek to upgrade and purchase new ID printers and badges An impact of the pandemic was a shortage of supplies related to the ID card industry, says Schonzeit. Like other industries, several leading ID card and printer manufacturers had supply chain issues, and some deliveries were delayed at times for more than six months. Supply chain concerns will continue into 2023 as more companies return to the workplace and others seek to upgrade their current systems and purchase new ID printers and badges. Persistent price increase concerns “The shortage created hardships for end users and often resulted in them purchasing any solution that was readily available even if it was not the preferred one,” says Schonzeit. Another issue during the pandemic was persistent price increases, due both to inflationary pressures and a shortage of products. The industry was used to stable prices with infrequent increases, but the pandemic changed this quickly. Some companies also decided to upgrade their entire system as employees returning to the office increased demand. Oversized credentials advantages Among the advantages of oversized credentials is the ability to print more information on the card, says Schonzeit. For example, a larger credential allows event organisers to preprint the corporate agenda on the back of the card to increase efficiency. In addition, companies can enhance their brand presence by distributing a nice thick plastic badge to attendees. Two categories Standard credit card size These are generally CR100 size, which is around 40% larger than the standard credit card Oversized badges fall into two main categories. One category is for cards that are larger than the standard credit card size (CR80), but smaller than event badges. These are generally CR100 size, which is around 40% larger than the standard credit card. They are generally used by law enforcement or healthcare institutions. It is easier to see an oversized badge more clearly from a distance than a regular-sized badge. Oversized ID badges The other category of oversized ID badges is used for events, these badges are typically 3.5” by 5.5” and are usually worn around the neck. These events include categories such as sporting events, corporate events, music festivals, and trade shows. The badges are generally used only for the duration of the event and are often kept as souvenirs. Anticipating the needs “My advice for event planners is to manage your expectations about badges as it is very hard to order extra badges at the last minute,” says Schonzeit. “It is important to plan well in advance and anticipate your needs upfront to help avoid a shortage.” Idesco often gets requests from customers to include some type of technology on the credentials. The most common technologies are proximity cards, NFC, and/or UHF. “It is a much ‘cleaner’ and safer solution if the chip can be embedded within the credential as opposed to putting a sticker on the outside of the credential,” says Schonzeit. Additional technologies in credentials Customers wanting technology in their credentials should allow additional lead time Generally, these additional technologies are used for gaining entry to a location (access control), or they can be used for gathering valuable information regarding an event, including attendance at seminars, crowd flow, vending, and food services information, among others. Supply chain issues have led to less availability of many of the most common chips, which can impact delivery times. Customers wanting technology in their credentials should allow additional lead time, says Schonzeit. Applications In addition to corporate events, sporting events, and trade shows, other markets can also benefit from oversized ID badges. Industries include healthcare, government, and law enforcement. Oversized badges are becoming more popular in hospitals, for example, where color coding can make it easy to identify doctors, nurses, and hospital personnel from a distance, even in congested hospital spaces. ID card necessity Could there be a negative impact on the ID card industry if more companies allow employees to work from home? It’s always a possibility, says Schonzeit. “However, with many hybrid options out there, most employees are required to come to the office either one or two days a week,” he says. “Employees will still need a way to access their workplace for meetings, conferences, etc., and will require an ID card to do so.” Mobile vs. physical credentials The growing popularity of mobile credentials has created some concerns in the ID card marketplace The growing popularity of mobile credentials has created some concerns in the ID card marketplace about the continuing need for a physical credential. So far it has not been an issue. “[Mobile credentials] have not had any type of meaningful effect on the physical ID card market,” says Schonzeit. Relying on smartphones “Sometimes these disruptive technologies can linger in the background for some time and then suddenly have a massive effect on the market. This is something to be concerned about, but I don’t think there is an imminent threat.” A big issue with using only mobile credentials is the need for a backup plan rather than relying only on a smartphone to enter a facility. Also, for mobile credentials to work, specialised readers are required, which requires a large investment. “In my opinion, ID badges are here to stay for the long haul,” says Schonzeit.
Case studies
Hotel managers require security, flexibility, durability and aesthetics in an access management system that can cover guest rooms and shared spaces, on one hand, and private staff areas on the other. With multiple buildings, a private beach and sports areas, the new TH Resorts Capo Rizzuto on Calabria’s Ionian coast receives high daily traffic from guests and staff, who must have access at different times according to their specific needs. On taking over resort, TH management quickly identified the need for a new locking system that would allow each staff member to access different, specific areas of the facility. In specifying a new master key system, they had two more important criteria. Firstly, the solution should be mechanical rather than digital, to preserve existing hotel aesthetics. Secondly, they required a hierarchical system, where different staff members could have levels of access authority based on their roles. A CYS10 system makes fine-grained customisation possible Security of the comfy nickel-silver key is protected against unauthorised copying by two patents Working closely with the expert specification team at ASSA ABLOY Italia, managers at TH Capo Rizzuto chose a CYS10 master key locking system with Euro profile double cylinders for common area access points and staff-only zones. For guest room doors they selected CYS10 thumbturn cylinders, which lock securely for privacy and quickly unlock from the inside. The CYS10 platform consists of 6-pin sawn key cylinders; it is tested and certified according to EN 1303:2015 and SKG security standards. Security of the comfortable nickel-silver key is protected against unauthorised copying by two separate patents. Their robust design makes them ideally suited to challenging environments such as a busy hotel. Effective master key system design With 63 available key profiles, CYS10 cylinders enable the creation of a complex master key setup with several levels and sub-levels – perfect for access customisation. Effective master key system design reduces the number of keys they need to cut, track or replace. It saves hotel managers time and money. “It is a truly flexible solution and allows us to limit the quantity of keys assigned as much as possible,” says Carmelo Sava, Head of Maintenance at TH Resorts. Effective master key system design reduces the number of keys they need to cut, track or replace Five distinct master key systems – numbering more than 500 CYS10 cylinders in total – were implemented at TH Capo Rizzuto, one for each of the resort’s individual facilities. Each cylinder has its own paired key and, for each building, a master key opens all cylinders. The entire property is controlled by a single grand master key entrusted to management. Future-proof setup at Capo Rizzuto “The ASSA ABLOY master key system allows us to manage the access of all our staff without any security problems,” adds Carmelo Sava. To ensure future-proof setup at Capo Rizzuto, their key systems can adapt or expand at any time: The CYS10 device range includes single, double, thumbturn, screw-in and rim cylinders for interior and exterior doors, switch cylinders for control panels, plus cam locks for letterboxes or furniture. The CYS10 padlock secures gates, lockers, and more.
The Ampelmännchen (“little traffic light man”) from the former GDR is a cult figure around the globe. For tourists, the shops of AMPELMANN GmbH in Berlin are a big draw. Branches are spread over the entire city, and to reduce the burden of employee and staff key assignments, the company sought to optimise access rights management. At the same time, branch security needed to be state-of-the-art. The CLIQ® access control solution from ASSA ABLOY met all these requirements with flying colours. AMPELMANN GmbH Founder and Owner - Markus Heckhausen sought a locking solution for eight AMPELMANN GmbH branches and a 2,200 m2 logistics centre, to meet the needs of a decentralised branch organisation. This creative company, which manufactures and sells a wide variety of products under the AMPELMANN brand with the Ampelmännchen, did not want a complex system suited only to large companies with thousands of employees. It should be practicable and fast for a company with around 150 employees, yet still be able to secure branches reliably. Easy administration, maximum security Branches must be accessible to customers during opening hours, yet sufficiently secured Small and medium-sized retailers face the same access control challenges as their large competitors. Employees need access to the store, warehouse, and offices, but not every employee should have the same authority. Branches must be accessible to customers during opening hours, yet sufficiently secured after closing time against unauthorised access. Challenges faced Key management is often an elaborate, time-consuming process, even more so when keys are lost or stolen. In such cases, all locking systems must be replaced, which requires more effort and significant costs. AMPELMANN GmbH in Berlin also faced these issues. Its eight branches are located in the best shopping areas in Berlin, each staffed by several employees. External service providers, such as cleaners also need access to the building. A large staff roster and significant distance between branches create a major key management workload. eCLIQ ensures branch security Together with the Berlin locksmith Hinz, AMPELMANN Owner - Markus Heckhauen found a solution in the flexible, decentralised, and reliable electronic locking system from ASSA ABLOY. Uli Hahn, Managing Director of Hinz, has been providing security in and around Berlin for more than 50 years. He says, "The eCLIQ locking system is very powerful and safe compared to conventional systems. It is easy to handle and to assemble. Above all, it enables quick and easy administration of access authorisations, making it the perfect choice for medium-sized companies, such as AMPELMANN." Plug-and-play solution Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software eCLIQ comes as a "plug and play" solution and is ready to use immediately after installation. The system works without cabling, so the extremely compact eCLIQ cylinder can be used in a wide variety of doors at any location. Power is supplied by batteries in each programmable key, which can be changed easily and without tools. A built-in chip makes every electronic key unique. Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software. Robust, durable, and safe In addition to the compact design, the system is characterised by robust, durable, and safe components. An integrated lubricant reservoir ensures the cylinders remain maintenance-free for up to 200,000 cycles. A high-quality processor protects the locking system against manipulation and intelligent attacks. Keys are also highly resistant and waterproof (IP67). eCLIQ cylinders and keys are VdS-certified (BZ +) and comply with the DIN EN 15684 standard for electronic locking systems. A wide range of different cylinder types makes the system suitable for many applications from the company's entrance gate to securing alarm systems, elevators, doors, and cupboards. Convincing solution "Decisive in our choice of eCLIQ was that we could control access authorisations easily and flexibly at any time," explains Markus Heckhausen, adding "If a key is lost, we can easily deactivate it and disable it." eCLIQ even makes time- and location-limited authorisations easy for example, by allowing cleaners to enter only at certain times. The allocation of access authorisations can be coordinated conveniently by individual branch managers, within a system that ensures maximum security for all AMPELMANN GmbH shops.
In 1899, the Texas Legislature authorised the formation of the Southwest Texas State Normal School, which opened in San Marcos four years later. At the time, the school’s mission was to prepare Texas public school teachers, but over the years, it has undergone several expansions and name changes to reflect its evolution into the major multi-purpose university Texas State has become. From its humble beginnings located in a single building, Texas State’s original San Marcos campus has grown to cover a 485-acre campus that is home to 267 buildings, as well as an additional 5,038 acres of recreational, instructional, farm and ranch land. The university added a second campus in Round Rock, which has grown from 15 temporary buildings to a 101-acre campus with state-of-the-art facilities. Electronic key control systems Texas State’s student population has kept pace with its physical expansion, growing from 303 in 1903 to more than 35,546 in 2013 – marking the 16th consecutive year of enrolment growth for the university. Texas State reviewed its security policies and chose the need to execute electronic key Anticipating major physical and population growth to continue into the future, Texas State reviewed its security policies and determined the necessity of implementing electronic key control systems in sensitive areas. Based on its size, the understanding was that as many as 85 of these systems could potentially be needed as part of this initiative. Aggressive construction campaign Texas State was faced with a particularly challenging growth-related issue in September 2013, as its freshman enrolment surged to more than 5,000. Like many universities, Texas State requires its freshmen to live on campus, which it sees as a tool for retention. That policy seems to be working, with approximately 80 percent of freshmen living on campus technically returning for the following semester. To accommodate the growing ranks of on-campus residents, the university has pursued an aggressive construction campaign, building a new residence hall complex every two years to house approximately 600 additional students with plans to break ground this fall on a third new housing complex. In all, Texas State spent more than $190 million on new or renovated buildings, with more construction planned into the foreseeable future. Update key management policies Maintenance staff members would often reach for the key to a particular building they needed to access With a large number of individuals requiring access to so many facilities, the university recognised that key management had the potential to become a high-risk issue and determined to become proactive in reducing that risk. Maintenance staff members would often reach for the key to a particular building they needed to access, only to find it was already checked out. They would then be forced to go through the time-consuming – and frustrating – process of determining who had the key last and tracking that person down to retrieve it. The decision was made to update key management policies and practices to make them more efficient and effective. “We’ve been especially happy with the KeyWatcher’s access and reporting capabilities, and the system’s reporting tools make reviewing events and issues incredibly simple,” Kyle Estes Associate Director of Housing for Facilities Services Texas State. Options for key management systems To combat these problems and increase the security and effectiveness of its key management, Texas State charged its University Police Department and other stakeholders with undertaking an extensive review of the available options for key management systems on the market. This exhaustive process involved gathering research from printed materials and online research, having discussions with current customers of the various vendors, and listening to on-site presentations from the companies under consideration. At the conclusion of its review of key control cabinets and systems, Texas State chose KeyWatcher Touch from Morse Watchmans. This exhaustive process involved gathering research from printed materials and online research The main factors that led Texas State to choose KeyWatcher Touch systems were its robust feature set and competitive pricing. The school was also impressed by Morse Watchmans’ receptiveness to its specific needs – a six-digit user ID, for example – and ability to implement changes quickly. Access to support was also a main consideration, so Texas State appreciated that the system was produced domestically by a company with a 130-year history. Enterprise management capability Of the KeyWatcher systems to be implemented, the largest number were to be deployed for Texas State’s Department of Housing and Residential Life, which provides housing and services to approximately 7,000 residents in 25 facilities. The department also operates a facilities service group consisting of 110 full-time employees and a staff of 170 building paraprofessionals. The department also operates a facilities service group consisting of 110 full-time employees Because of the personnel changes the department experiences on an annual basis, the system’s enterprise management capability has been a valuable feature, as have its robust reporting capabilities, says Kyle Estes, Texas State’s Associate Director of Housing Facilities Services. Having keys available in each residence hall for use by maintenance staff has made the department more efficient and reduced their liability; staff no longer need to carry multiple master keys across campus for different buildings. Centralised management features “Because the system automatically generates a log of who has each key, we’ve been able to establish much better employee accountability for key usage,” Estes says. “The ability to set a maximum duration that each key can be checked out and to receive alarms when that limit is exceeded has eliminated the problem of having keys unnecessarily checked out and as a result inaccessible when someone needs them.” Ease of use and centralised control parts fed by the system’s web capabilities All KeyWatcher Touch systems deployed at Texas State are connected to the university’s network and interface with its card access and email systems. The ease of use and centralised management features provided by the system’s network capabilities have streamlined the once cumbersome process of generating reports and reviewing incidents. One particular feature, the ability to access the system from anywhere, has made the system even more effective, Estes says. Earliest adopters of KeyWatcher Touch As one of the earliest adopters of KeyWatcher Touch, the Housing and Facilities Department served as a test case of sorts for the system. Based on the success the department has had, combined with its continued rapid growth and expansion, Texas State University’s 85-system implementation is ongoing. As more systems are added, expansion will be a consideration moving forward, but Estes doesn’t anticipate that being a problem. “We’ve found that expanding these systems is fairly easy and doesn’t involve time-consuming processes that could delay implementation of key management for particularly sensitive areas,” Estes says. “Overall, the system has been very reliable, and the support staff has been very responsive and regularly available to help resolve the very few minor issues we’ve encountered in a timely manner."
As an Indian multinational public sector bank, this financial services entity plays a crucial role in bolstering India’s economy and addressing the diverse needs of its vast customer base. In the United Kingdom, this institution has been active since the early 1900s, gradually growing to become the largest Indian bank in the UK. Initially, its focus in the UK market was on wholesale banking, but it has since expanded its offerings to include a dedicated retail arm. Financial products and services Operating 11 branches across the UK, it provides a wide range of financial products and services tailored to both commercial and individual clients. These include commercial lending, buy-to-let mortgages, cash ISAs, safe deposit lockers, instant access savings accounts, business accounts, and fixed deposits. Overview The institution faced operational inefficiencies and security concerns due to maintaining separate software Confronted with the challenge of integrating attendance and payroll software, along with the inability to effectively restrict unauthorised access to its secured premises across 14 locations, a prominent financial institution sought a comprehensive multi-location solution. Additionally, the institution faced operational inefficiencies and security concerns due to maintaining separate software platforms for employee directories. Need for a cloud-based attendance system To address these issues, the institution sought an integrated cloud-based attendance system that seamlessly integrates with payroll, enhances access control measures, and consolidates employee directory management. This solution aimed to ensure streamlined operations and heightened security across its premises. Institution's challenge The challenges centered around implementing a cloud-based attendance system and access management processes, as detailed below: Need for Integrated Attendance and Payroll Software The financial institution faced difficulties managing attendance and payroll software separately, resulting in inefficiencies and potential discrepancies in salary processing. There was an urgent need to integrate these systems to ensure seamless data flow and improve payroll management. Inadequate Entry and Exit Security Measures The institution struggled to restrict unauthorised entry and exit into its secured premises, posing significant security risks. Strengthening access control measures was essential to mitigate the threat of unauthorised access and protect personnel and assets. Need for a Single Employee Directory Using different software for employee directories created complexity and inefficiency Using different software for employee directories created complexity and inefficiency in administrative processes. It was crucial to consolidate employee directory management into a single platform to ensure accurate, consistent, and easily accessible employee information. Need for a Dedicated Server to Safeguard Data Integrity and Compliance The client had stringent requirements regarding data usage, with a key stipulation being that their main servers could not be used to manage third-party applications. This necessitated the implementation of a separate server or a cloud-based attendance system to host third-party applications and services, ensuring strict data protection measures and compliance with relevant regulations. These challenges highlighted the need for comprehensive solutions to improve operational efficiency, security, and data management within the financial institution. Matrix solution To tackle the challenges faced by the financial institution, Matrix delivered comprehensive solutions, including a cloud-based attendance system that transformed its attendance management processes: Integration of Events and Payroll Software: Matrix seamlessly merged the institution's event logs and payroll software, Darwin Box, through API Integration, guaranteeing synchronised data flow. Through this consolidation, Matrix facilitated smooth payroll processing, lessening inefficiencies, and decreasing the likelihood of discrepancies in salary management. Enhancement of Entry and Exit Security Measures: Utilising advanced technology, Matrix enhanced security protocols, reducing potential risks Matrix deployed proactive access control measures to strengthen the institution's premises against unauthorised entry and exit. Utilising advanced technology, Matrix enhanced security protocols, reducing potential risks and effectively protecting personnel and assets. Unified Employee Directory Management: Matrix unified the institution's management of employee directories by offering a centralised platform. By consolidating employee data, Matrix optimised the system so that updates made in the payroll software would automatically synchronise with the COSEC software, ensuring precise, uniform, and easily accessible vital employee information. Implementation of Cloud-based Solution: Due to a strict restriction on using the COSEC application on their primary server, Matrix proposed and implemented COSEC VYOM, a cloud-based attendance system tailored to their requirements. Moreover, this system was seamlessly linked with their payroll system through API Integration. Results observed Matrix's comprehensive solutions brought significant enhancements across various facets of the financial institution's operations, yielding measurable improvements in efficiency, security, and compliance: Efficient Payroll Processing: By integrating event logs and payroll software, Matrix facilitated seamless data flow and streamlined payroll By integrating event logs and payroll software, Matrix facilitated seamless data flow and streamlined payroll processing. This consolidation minimised inefficiencies and reduced discrepancies in salary management, causing more accurate and efficient payroll operations. Improved Premises Security: Matrix's proactive implementation of access control technology, Matrix fortified entry and exit points, mitigating security risks, and effectively safeguarding personnel and assets. Centralised Employee Directory Management: Through a unified platform for employee directory management, Matrix streamlined administrative processes and ensured consistency and accuracy in employee data. Changes made in the COSEC application automatically updated the payroll software, reducing manual effort and error. Compliance with Data Protection Regulations via Cloud-Based Attendance System: Matrix's provision of COSEC VYOM, a cloud-based attendance system, helped ensure compliance with strict data protection requirements. By segregating data and applications, Matrix improved data integrity and ensured adherence to regulations, minimising the risk of data breaches and non-compliance penalties. Operational efficiency, security, compliance Matrix's solutions not only tackled the financial institution's challenges but also delivered tangible enhancements In summary, Matrix's solutions not only tackled the financial institution's challenges but also delivered tangible enhancements in operational efficiency, security, compliance, and data management. Matrix contributed to the institution's effectiveness and resilience in the financial sector through integrated systems and innovative solutions. Products offered COSEC ARGO CAM200: MiFare Classic Card-Based Ultra Fast Door Controller COSEC VYOM TENANT: Tenant User Licence COSEC VYOM PLATFORM UD10K: Cloud-based Platform User Licence for 10K User Days COSEC VYOM PLATFORM UD100K: Cloud-based Platform User Licence for 100K User Days
Morse Watchmans, the industry pioneer in key control and asset management systems, has a full lineup of key control solutions with unmatched expertise and robust technology that is bolstering security at K-12 schools nationwide, improving security operations, reducing costs, and facilitating better response times after an incident. Highlights include innovations like the Morse Watchmans’ Emergency Key Grab (EKG) Kit, which provides first responders with secure, fast access to keys in the event of a facility lockdown. Key control solution “Harnessing our specialised key management expertise, we’ve developed a comprehensive key control solution for K-12 schools that is boosting peace of mind for administrators, teachers, students and parents alike,” said Tim Purpura, VP of Global Sales and Marketing, Morse Watchmans. "Key management systems are a smart investment for K-12 schools, cutting security costs by preventing lost keys and controlling access for authorised staff. By deploying a centralised key control system, schools enhance security by ensuring keys are housed securely and are easily accessible to first responders.” Key management from Morse Watchmans Morse Watchmans brings an effective solution to safeguard students and staff, optimise operations Addressing K-12 challenges, such as limited budgets and maximising efficiency with less technology, advanced key management from Morse Watchmans brings an effective solution to safeguard students and staff, optimise operations, and allow first responders rapid access during an emergency. Using this solution, keys are stored securely in an electronic key cabinet, granting access only to authorised users with credentials. This allows schools to mitigate the risks of unauthorised entry or lost keys. Leveraging integrated software expands its capabilities, allowing administrators to configure access, generate reports, and receive notifications. Software can connect with other systems such as video surveillance and access control for broader situational awareness. Morse Watchmans’ EKG kit The centralised key control systems allow quick access for first responders in the event of a lockdown. Working hand in hand with Morse Watchmans’ Emergency Key Grab (EKG) kit, first responders will have quick access to keys during an incident, allowing faster response times when seconds count. The EKG Kit includes the following technology: One-module or greater KeyWatcher Touch System, an electronic key control system that stores facility keys in a key cabinet, only to be accessed by those with the proper permissions. Morse Watchmans’ color-coded SmartKeys and KeyRings that track access to master facility keys. Coloured red, these accessories are designed to be easily identifiable by responding personnel. K-12 playbook hard copies and one-on-one educational training from Morse Watchmans. The staggering statistic that more than 370,000 U.S. students have experienced gun violence in the past two decades, alongside mounting concerns for teacher safety, underscores the urgent need for pre-emptive measures to protect lives. Establishing robust key control systems is crucial to creating secure educational environments for both students and educators.
Every year, the Veronafiere exhibition centre and its conference centre host an average of 35 exhibitions and 50 conventions. Among the successful and best-known events, Vinitaly, Marmomac, Fieracavalli, Fieragricola, Samoter, Progetto Fuoco, and MotorBike Expo stand out. These events attract up to 800,000 trade fair visitors and exhibitors every year. To ensure security for the outdoor areas of the brand new “Gallerie Mercatali” in Verona, Veronafiere again decided to install a Dallmeier video security system with Panomera® cameras. Trade fairs and events Veronafiere S.p.A. is an international group that has been organising trade fairs and events “connecting people, nations, and different businesses” since 1898. The trade fair site of Veronafiere with its various exhibition halls stands in the centre of the Italian city of Verona. Dallmeier video security system The high-tech solution also allows for objective management of any complaints Precisely to ensure greater safety for its guests, since 2016 Veronafiere implemented a Dallmeier video security system with a total of 15 Panomera® cameras. The initiative protects as much as possible both exhibitors, starting from the stand set-up phase, and visitors and operators, during the events. This high-tech solution also allows for objective management of any complaints, in a rapid, reassuring, and unequivocal way. “Recognition” with a minimum number of cameras In 2021 the Dallmeier Panomera® video coverage was also extended to the spaces of the “Gallerie Mercatali” of Verona, transformed by Veronafiere into additional exhibition and meeting spaces serving business and the city, after a long conservative restoration intervention of the two archaeological industrial structures. “The purpose of the video system is to minimise the hazards from vandalism, theft, and unauthorised entry, even when no trade fairs or events are taking place. At the same time, Veronafiere wanted to watch over the adjacent parking area,” says Simone Sterza, System Engineer of Italsicurezza, installer and system integrator who collaborates with Dallmeier. Price-performance ratio “It was just as important to the customer to have the best possible price-performance ratio: Veronafiere wanted to have 'Recognition' image quality according to DIN 62676‐4 over the entire area to be monitored, with the smallest number of cameras possible and low total operating costs.” Furthermore, the system should also offer high availability and have comprehensive data protection and data security functions. Any number of “virtual PTZs” and just one Allen key To find a video solution that satisfies the requirements profile, Veronafiere instituted a call for tenders To find a video solution that satisfies the requirements profile, Veronafiere instituted a call for tenders, which was won by the Italian general contractor Cubi S.r.l. One of the main reasons the contract was awarded to Cubi was that as a customer of Italsicurezza, it was able to offer the patented “Panomera®” multifocal sensor cameras. High-resolution images The remarkable feature of the Panomera® cameras is that they can capture long distances and large expanses in high resolution. To do this, they combine up to seven detail sensors having various focal lengths with an overview sensor in one optical unit. The result is a homogeneous, high-resolution total image covering the entire area that is to be captured. 4K cameras The benefit in this case is equivalent to combining multiple 4K cameras with any number of “virtual” PTZ systems but with significantly lower total operating costs. The reason for this is that, apart from fewer cameras, users also need considerably less infrastructure, such as cables, masts, networks, and monitors, to be able to see everything that is happening. Mountera® mounting “Besides their well-known image quality, the thing I found particularly surprising about the new Dallmeier Panomera® cameras was how quickly and easily we were able to mount them,” declares Simone Sterza, System Engineer with Italsicurezza. “Just a single Allen key size was needed for all of the main installation and adjustment work. Thanks to the Mountera® mounting system we were able to mount the cameras safely using just one technician, without needing any assistance from a second person.” Helpful extra services It was also a simple matter to integrate the new cameras and the IPS 10000 Recording Server The Dallmeier cameras capture the outdoor area of the Gallerie Mercatali in the resolution specified in the call for tenders. Italsicurezza was able to define this precisely for the entire area of 10,625 m2 using Dallmeier planning software. It was also a simple matter to integrate the new cameras and the IPS 10000 Recording Server into the existing Dallmeier system. Panomera® S8, S4, and single-sensor cameras Accordingly, Veronafiere only needs two Panomera® S8, three Panomera® S4, and two single-sensor cameras to secure the whole outdoor area of the Gallerie Mercatali and keep a reliable watch over everything that is happening over the entire area. To take advantage of the expanded video system from the very beginning, the security personnel at Veronafiere received thorough training from the team of Dallmeier Italy. Privacy & Security by Design These days, the Veronafiere control centre houses just three workstations, with which the authorised security personnel can observe the entire outdoor area of the trade fair site live and access camera recordings. RAID-6 storage ensures high availability of the recordings. To satisfy Italian data protection regulations, the system deletes the recordings of the camera images automatically after seven days. VCA or AI-based video analysis Searches for specific incidents could also be carried out even more rapidly Moreover, the modular nature of the system allows “upgrades on demand”: this means that Veronafiere could also implement Video Content Analyse (VCA) or AI-based video analysis applications to enable automatic reporting of unauthorised access to “sterile areas” (i.e., areas in which people and objects are not permitted to remain). Searches for specific incidents could also be carried out even more rapidly. Video system for safe events “The Dallmeier system”, ends Simone Sterza, “helps to ensure that exhibitors and visitors have an untroubled, enjoyable trade fair experience.”
Products
Round table discussion
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Faces captured by video cameras could be perceived as an invasion of privacy, as could images captured through residential windows or that involve private or proprietary information. Fortunately, modern video systems incorporate technological features that help avoid an inadvertent invasion of privacy, while preserving any data that may be needed by authorized persons. For the latest commentary, we turn to our Expert Panel Roundtable with this week’s question: What new features of video systems are helping to ensure privacy?
Videos
Key management: Manufacturers & Suppliers
Access control system planning phase 2
DownloadHoneywell GARD USB threat report 2024
DownloadThe role of artificial intelligence to transform video imaging
DownloadDNAKE Cloud Intercom: Dive into V1.5.1 Updates
DownloadArtificial intelligence
Download