Key management
Morse Watchmans, the industry pioneer in key control and asset management systems, is highlighting the KeyWatcher® Touch at ISC East on November 20-21 at the Javits Centre in New York City. Located at booth 231, Morse Watchmans will feature hands-on demonstrations of the KeyWatcher Touch and other solutions, showcasing advanced capabilities for robust, scalable key control. Key management system KeyWatcher Touch features a modular, expandable design that allows corps to tailor the sy...
ABUS returns to the Safety & Health Expo 2024 to launch its brand-new range of personal protective equipment (PPE), reinforcing its commitment to workplace safety and security. Known for its world-class industrial padlocks, lockout/tagout systems, and key management solutions, ABUS is expanding its product offering to include PPE, addressing the critical need for comprehensive safety measures in the workplace. New PPE line Visitors to stand SH1800 will be able to preview the new PPE line...
ASSA ABLOY’s innovative new mobile access solution has won yet another prestigious industry award. At October’s Detektor International Awards, ABLOY CUMULUS received the 2024 prize for Innovative Achievement in IoT & Security. Secure mobile unlocking Chosen from among hundreds of products reviewed over the year by Detektor experts, ABLOY CUMULUS "streamlines access management with encrypted mobile credentials, eliminating key management hassles. Its robust, customisable...
A Midland entrepreneur is in pole position after teaming up with the dementia charity founded by his motor racing idol. David Ogden, CEO and Founder of The Key Safe Company, has joined forces with Race Against Dementia, the charity Sir Jackie Stewert set up after his wife Helen was diagnosed with frontotemporal dementia. The Worcester-based company will donate to the charity five percent from every ark Tamo key safe it sells on a newly-created webpage. Key Safe has helped to transform social ca...
NAKIVO, a pioneering provider of backup and disaster recovery solutions, proudly announces the release of NAKIVO Backup & Replication v11. This landmark release introduces the most extensive set of features to date. Designed to address modern data protection needs, v11 introduces capabilities that improve backup flexibility, security, and usability. Agentless backup for Proxmox VE Proxmox VE has become a mainstream virtualisation solution, offering the flexibility, scalability, and afford...
Morse Watchmans, the industry pioneer in key control and asset management systems, is demonstrating its innovative KeyWatcher® solutions at The Hospitality Show kicking at the Henry B. Gonzalez Convention Centre in San Antonio. Attendees can visit Booth 735 to explore how KeyWatcher Touch systems can help hospitality owners and operators streamline key control, improve security, and enhance operational efficiency. KeyWatcher system "Our KeyWatcher system has proven to be a game-changer fo...
News
Morse Watchmans, the industry pioneer in key control and asset management systems, is pleased to announce the appointment of Jordan Andrews as Sales Manager. Jordan Andrews will initially lead domestic sales operations and later expand his responsibilities to oversee the company's global sales efforts. Strengthening market presence "Jordan's appointment represents a significant step forward for Morse Watchmans," said Tim Purpura, Vice President of Global Sales and Marketing at Morse Watchmans. He adds, "His proven track record and leadership experience in the security industry will enable us to strengthen our market presence and drive continued growth domestically and internationally." Jordan Andrews' work experience Andrews is passionate about building a collaborative culture focused on excellence and customer satisfaction Jordan Andrews brings extensive experience in sales management, business development, and strategic leadership within the security and information technology sectors. He is dedicated to delivering innovative, reliable solutions that enhance security and operational efficiency. Andrews is passionate about building a collaborative culture focused on excellence and customer satisfaction. His expertise in managing key accounts and exceeding client expectations will be vital to the company's ongoing success. New responsibilities In his new role, Jordan Andrews will focus on expanding Morse Watchmans’ market share by leveraging his expertise in growing new business, strengthening customer relationships, and driving overall sales performance. As the company continues to innovate and scale globally, his leadership will be critical to advancing the mission of providing cutting-edge key management solutions across a wide range of industries. New opportunities "Morse Watchmans has long been a pioneer in the key management space, and I’m excited to join them during such a pivotal time," said Jordan Andrews. He adds, "I look forward to working with the talented team here and contributing to the company’s growth as we explore new opportunities domestically and abroad."
Gunnebo Safe Storage AB has announced the full acquisition of Primat Group, to invest in a company with over a century of expertise in the manufacturing and sales of high-quality security products. Primat Group, headquartered in Maribor, Slovenia, is set to become an integral part of Gunnebo's European Safes and Cabinets manufacturing strategy. Primat Group The Primat Group, comprising PRIMAT SISTEMI d.o.o. and PRIMAT d.d. in Maribor (Slovenia), PRIMAT OPREMA d.o.o. in Baljevac (Serbia), and PRIMAT d.o.o. Sarajevo (Bosnia and Herzegovina) offers a comprehensive product range that includes safes, cabinets, strong rooms, and vault doors. Products are manufactured in Slovenia and Serbia, serving customers in over 25 countries, with a strong market presence in the UK, Benelux, and DACH regions. Quality and innovation Gunnebo Safe Storage has committed to a significant investment in Primat Group to drive growth, improve manufacturing As part of the acquisition, Gunnebo Safe Storage has committed to a significant investment in Primat Group to drive growth, improve manufacturing facilities, and equip employees with the essential skills, tools, and opportunities needed to succeed. Commenting on the acquisition, Tanja Djokic, Director of the Primat Sistemi, said, “This partnership represents a tremendous opportunity for us to build on our long-standing tradition of quality and innovation. We are incredibly proud that Gunnebo has recognise Primat's significant potential, and we are excited to become an integral part of Gunnebo Safe Storage’s European Safes and Cabinets manufacturing strategy." High-quality safe security solutions “By combining our strengths, we are well-positioned to meet the evolving needs of our customers, expand our market reach, and continue to deliver the high-quality safe security solutions that both our companies are known for." "Together, we will create a stronger future with the highest levels of protection, reliability, and value.” Carbon reduction ambitions The acquisition is strategically aligned with Gunnebo Safe Storage’s goal of driving innovation, enhancing lead times The acquisition is strategically aligned with Gunnebo Safe Storage’s goal of driving innovation, enhancing lead times, and supply chain resilience, to win customers. This move will also contribute to Gunnebo's carbon reduction ambitions by positioning production closer to customers, thereby minimising the environmental impact. Primat’s existing expertise in engineering, craftsmanship, and structured processes, complemented by global certifications such as VdS, ECB-S, and UL will significantly develop Gunnebo Safe Storage’s product offer. Investing in a brand "We are thrilled to introduce the Primat Group to the Gunnebo family," said Elisabeth. Whitefield, General Manager Safes & Cabinets and EverydaySafe. “Primat has a rich history, dating back to 1901 when Franc Schell began producing iron safes." "For over 120 years, the Primat Group has been synonymous with excellence in security equipment, and we are proud to have the opportunity to continue to support and invest in such a reputable brand as part of our evolving safe storage journey.” Safe storage Stefan Syren, CEO, of Gunnebo Group, concluded, “Gunnebo Safe Storage’s investment in the Primat Group and its expert team manifests our dedication to innovation, growth, and delivering customer value." "We plan to continue supporting this great work to further develop existing routes to market and discover new opportunities for safe storage. We are looking forward to presenting our new proposition to our customers, new and existing, to support them in our aim to create a safer world together.”
Codelocks has added the KitLock by Codelocks KL1200 NetCode® electronic locker lock to its KitLock range, to provide flexible, temporary access for heavy-duty, high-use environments where additional robustness is required. It is particularly suitable for self-service locations, storage facilities, and lockers, for granting temporary access to event and school lockers, and storage areas in holiday rental homes as the addition of Codelocks NetCode® Technology allows the owner or manager to set a date and time-sensitive code remotely via the Codelocks Connect Portal. Keyless access codes Steve Newman, Regional Director at Codelocks EU said, “Adding Codelocks NetCode® Technology to our KL1200 locker lock means that facilities managers and rental owners have more control over access and can grant temporary keyless access codes to storage areas, cabinets, and lockers." "This saves them from having to physically attend the location to reset a code, reducing admin time spent managing access. The addition of NetCode® technology to locks on lockers that are used by multiple people also offers improved usability of the storage.” Dual authorisation feature This feature helps to safeguard, adding another layer of control and making it suitable for medical cart applications As well as Codelocks’ NetCode® Technology, the KL1200 NetCode® electronic locker lock comes with a host of new features. A new dual authorisation feature adds a level of access control by requiring two valid User Codes or two valid NetCodes to be entered to grant access. This feature helps to safeguard, adding another layer of control and making it suitable for medical cart applications and valet parking key storage solutions. KL1200 NetCode® locker The KL1200 NetCode® locker lock can be programmed to unlock automatically at a specified time, in sports centres and school environments this feature is useful for service staff who need to clean for next-day use. It is also possible to control access between set hours, for example, to make lockers and storage available outside of opening hours or prevent access during unauthorised hours. ISO-certified photocatalytic coating The KL1200 NetCode® is available in a silver grey or black finish and can come with the optional Clean The KL1200 NetCode® is available in a silver grey or black finish and can come with the optional Clean by Codelocks finish. This ISO-certified photocatalytic coating offers enhanced protection against viruses, germs, and other environmental toxins. Making it suitable for education facilities and healthcare environments. Red LED light feature Easy to install and programme, Codelocks’ KL1200 NetCode® electronic locks generate up to 50,000 openings per 2 x AAA batteries. The low battery warning ‘red LED light’ feature highlights when batteries need replacing. If batteries fail before they can be replaced, the KL1200 NetCode® boasts a battery override function – a 9-volt PP3 battery can be placed against external contacts to gain access.
Morse Watchmans, the industry pioneer in key control and asset management systems, is showcasing its premier key control management solutions for casino applications at booth 1337 at G2E 2024 at The Venetian Expo Las Vegas through October 10. As the trusted choice for leading casinos worldwide, the Morse Watchmans KeyWatcher® Touch and its suite of solutions deliver secure, efficient, and regulation-compliant key management, providing a seamless experience tailored to the demands of gaming environments. Unique challenges “Morse Watchmans understands the unique challenges faced by casino operations, and our KeyWatcher® Touch system is designed to address these needs head-on,” said Tim Purpura, VP of Global Sales and Marketing at Morse Watchmans. “Our solutions offer unmatched security, efficiency, and compliance, enabling casinos to streamline their key management processes, minimise risks, and ultimately enhance the guest experience.” Morse Watchmans Key Solutions KeyWatcher® Touch electronic key cabinet stands out as the ultimate scalable key for casinos The KeyWatcher® Touch electronic key cabinet stands out as the ultimate scalable key control solution for casinos seeking to secure, manage, and track keys and other assets efficiently. Equipped with a 7-inch touchscreen interface and Morse Watchmans’ patented SmartKey system with KeyAnywhere technology, the KeyWatcher® Touch offers a user-friendly experience, enabling staff to withdraw and return keys securely to any key cabinet across the enterprise. KeyWatcher® Touch Additionally, the KeyWatcher® Touch supports advanced reporting capabilities, allowing casinos to generate and schedule reports for governing agencies as needed. Seamless integration with various access control systems delivers a layered and robust security approach. The KeyWatcher® Touch automates many routine casino procedures required by gaming regulations, ensuring compliance and efficiency: Management of drop boxes outside scheduled hours Captures required signatures for key access seamlessly Generates comprehensive access audits for complete oversight Fully programmable to manage complex protocols like the “three-man rule” for accessing restricted key sets Ensures cabinet doors open and keys released only after verifying three required logins, delivering unmatched security and regulatory adherence SmartKey® Locker Touch System The Morse Watchmans lineup also features the KeyWatcher Fleet® for automotive fleet management, KeyBank® Touch for managing large quantities of keys, and the SmartKey® Locker Touch System for tracking larger items. These solutions, combined with Morse Watchmans’ advanced software, service, and support, provide comprehensive security for a wide range of physical assets. Visit Morse Watchmans at booth 1337 during the G2E Gaming Show to discover how its solutions can elevate a casino's key control strategy.
The PSIA had another impressive and compelling demonstration of its PKOC spec at GSX 2024. Some of the major lock and physical access control (PACS) vendors were able to see PKOC in action, with commercially available readers, cards, and apps all relying on the open specification, showing seamless interoperability. PKOC product lines “It was gratifying to see all of the hard work of the PKOC technical committee come together at the demonstration at GSX 2024,” said David Bunzel, Executive Director of the PSIA. “Many new manufacturers and customers of the security industry were not only impressed, but discussing ways to include PKOC into their product lines and deployments.” Secure and interoperable credentials The simplicity of PKOC, ease of integration, and the significant advantage of asymmetric encryption The simplicity of PKOC, ease of integration, and the significant advantage of asymmetric encryption were some of the drivers that were most interesting to the companies and customers who were able to see the demonstration. PKOC creates truly secure and interoperable credentials. “The commercial and security advantages of the asymmetric key-based credential over traditional symmetric keys which we have been using for decades are finally attainable with the PKOC specification." Public key-based solution "A public key-based solution can not be underestimated in its value over traditional credential solutions. You now get security, availability, interoperability, and purchasing options all in one,” says John Cassise, Chairman of the PSIA’s PKOC Work Group, and Chief Product Officer, of SAFR at RealNetworks. “While changing from traditional access control products is never easy, the vulnerabilities they have, make more robust solutions, like PKOC, an obvious choice for security, and a more flexible choice for the future.” PKOC specification PKOC uses the device itself to generate the private & public key pair enabling the private-public key handshake The PKOC specification leverages the concept of PKI without the need for the typical complex, expensive identity Infrastructure necessary for PKI. PKOC uses the device itself to generate the private & public key pair, (known as Keygen) enabling the private-public key handshake to authenticate the credential. Bring Your Credential The beauty of PKOC is that the private key never leaves the device, and the public key becomes the “badge #” which can be easily shared with any system or device used to control access. With PKOC the USER literally “owns” the encryption keys and does not require any complicated process for managing or sharing keys. Furthermore, PKOC enables you to “Bring Your Own Credential” (BYOC).
DNAKE, an industry-pioneering and trusted provider of IP video intercom and solutions, and CETEQ, a pioneering distributor specialising in access control, parking management, intercom systems and key management, have jointly announced their partnership in the Benelux region. This partnership aims to enhance the availability and distribution of DNAKE’s smart intercom solutions across Belgium, the Netherlands, and Luxembourg. By leveraging CETEQ’s established network and expertise in the security sector, the partnership will enable a more streamlined approach to delivering advanced communication and security solutions to customers. Distribution of security solutions CETEQ’s extensive venture in the distribution of security keys makes them an ideal half for DNAKE CETEQ’s extensive experience in the distribution of security solutions makes them an ideal partner for DNAKE. Leveraged by DNAKE’s easy and smart intercom solutions, CETEQ can now expand its offerings to encompass a broader range of smart intercom products suitable for both residential and commercial sectors. This partnership not only enhances CETEQ’s portfolio but also empowers them to provide innovative and streamlined communication and security technologies that meet the diverse needs of their clients. Together, they aim to deliver seamless integration, improved accessibility, and enhanced security features that elevate the overall user experience. What can they expect from DNAKE smart intercom solution? Futureproofing Cloud Service: DNAKE Cloud Service offers a comprehensive intercom solution with a mobile app, a management platform and intercom devices. It enables seamless communication between intercom devices and Smart Pro app through DNAKE cloud service, facilitating interaction between the app and the devices. Furthermore, DNAKE cloud service optimises device and resident management, significantly enhancing efficiency and lowering labour costs. Remote & Multiple Access Solutions: Communicate with visitors and remotely unlock doors via the Smart Pro application anytime, anywhere. Beyond facial recognition, PIN code, card-based access, they can also unlock doors using application, QR code, temporary keys, Bluetooth, and more. Seamless & Broad Integration: DNAKE smart intercom often works with other smart devices, like, CCTV and home automation systems, enhancing security and convenience. For instance, they can view not only live feed of the DNAKE door station but also up to 16 installed cameras from a single indoor monitor. Easy Installation & Deployment: DNAKE IP intercoms are designed for straightforward setup over existing networks or 2-wire cables, making installation and configuration easy. Customers in the Benelux region can look forward to improved access to innovative intercom solutions that prioritise security and convenience.
Expert commentary
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defences, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitisation of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of cyber resilience in protecting service availability Cyber resilience refers to organisation's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organisation's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimising the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimised, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organisation. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorised individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorised access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organisations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organisations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labelled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organisations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organisations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organisation can respond quickly and effectively to a breach, minimising its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organisations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Physical security is essential for a modern production facility, users don’t want just anyone entering the building or accessing secure areas. But what about production machinery? Machine authentication is often a missing link in the security plan for manufacturers. Why machine authentication? Most manufacturers have made significant investments in physical access control (PAC) for production facilities. Few shops currently hand out physical keys to employees or leave the building unlocked during production hours. For all but the smallest shops, front-door access typically involves individual radio-frequency identification (RFID) badges that enable tracking of who is coming and going and at what times. Use of physical keys, password login It is simply assumed that anyone who has access to the factory floor has the knowledge, authority, and training But when it comes to production machinery, many manufacturers still rely on physical keys, password login on the human-machine interface (HMI), or a shared PIN to unlock machine access. In some shops, machines may not be secured at all, it is simply assumed that anyone who has access to the factory floor has the knowledge, authority, and training to use the machines responsibly. However, this is not necessarily a good assumption, especially in a larger manufacturing plant where many people can access the production floor. Valuable and sensitive equipment CNC machines, robotic welders, process equipment, and other production machinery can cost anywhere from $5,000 to half a million or more, depending on their size and function. They also have significant safety risks for untrained users and may hold valuable and sensitive IP (such as customer design specs or batch recipes). User authentication Authenticating users at the machine level closes an important security loophole and makes plants safer and more productive. Machine authentication prevents untrained or unauthorised users from accessing production machinery. The right authentication system also allows access levels to be tailored for different users based on training credentials, job roles, or even projects. Machine authentication benefits A strong machine authentication solution provides several benefits for manufacturers: Minimises unplanned downtime and expensive damage to machines caused by untrained operators. Enables tracking of production outcomes by machine operator for better quality control and troubleshooting. Protects company and client IP held on the machine by preventing unauthorised access to machine controls and memory. Enhances plant safety and compliance by limiting machine access to operators with the appropriate credentials. Reduces the risk of deliberate sabotage by unauthorised operators, including damage to machines and production facilities and data theft or corruption. Mark Merino, the Director of the Digital Factory Group for Polaris Automation, explains, “Machine authentication allows us to identify which people are logged into different pieces of equipment and make sure they are trained appropriately for the machine and have the right clearances for the data they are trying to access.” Choosing the right machine authentication solution Access control for production machinery can be accomplished by various means, including password and PIN systems, physical keys or fobs, RFID badges, or smartphone-based mobile credentialing systems. The best machine authentication system will: Be highly reliable and secure to protect the machine from unauthorised access. Enable identification of individual operators and tracking of who has used the machines, at what times, and for what projects. Allow access levels to be differentiated by the user. Be easy to implement and administer. Discourage sharing or cloning of credentials. RFID readers An RFID reader can be easily connected to or integrated with the HMI for the machine In most manufacturing environments, the simplest solution for machine authentication is the RFID badge employees already carry for building entry. An RFID reader can be easily connected to or integrated with the HMI for the machine. All users must do to authenticate themselves is swipe their badge over the reader to unlock machine controls. RFID benefits RFID provides multiple benefits for end users, IT, and managers: It leverages technology already widely used, so users do not have to carry a separate key or fob to access machine controls. It is more secure and easier to manage than a password system, as passwords are frequently forgotten, shared, or hacked. Unlike shared PINs, physical keys, or fobs, user authentication via an ID badge enables accurate identification of who is logging into the machine. Users are much less likely to share their picture ID badge (which is often also linked to HR functions such as time and attendance) than a machine password, PIN, or key. If an ID badge is lost or stolen, or an employee leaves the company, IT can easily disable access to the card. RFID credentials are very difficult to hack or clone. Transmission between the reader and card can be encrypted for added security. Unlike biometric options, RFID is highly reliable even in hot, dirty, or humid environments and does not require workers to remove gloves, safety goggles, or masks. Getting started with machine authentication Machine authentication starts with selecting the right RFID reader. A universal RFID reader supports easy implementation, integration with other building systems, and scaling. A universal reader also provides flexibility for the future in case companies want to change transponder technologies or allow for user authentication using mobile credentials on a smartphone. IIoT model User authentication must be designed within the context of the wider security ecosystem of the plant To ensure the security of production machinery, user authentication must be designed within the context of the wider security ecosystem of the plant. Modern production machines are increasingly networked and connected in an “Industrial Internet of Things” (IIoT) model. That means machines are not only vulnerable themselves but are also endpoints in the broader IT landscape of the plant. Machine authentication systems must incorporate best practices for endpoint security, such as those outlined by ISO (International Organisation for Standardisation), NIST (National Institute of Standards and Technology), and other industry organisations. Best practices: The reader installation should be tamper-proofed to prevent physical disruption of the authentication system. Use an encryption standard suitable for the security level of the application. Encryption prevents data interception or card cloning. If higher security is desired, RFID can be implemented as part of a multi-factor authentication system along with biometrics and/or a password or PIN. The authentication system should support different access levels for different users or classes of users. A role-based permission system allows for different levels of access for line operators, supervisors, IT, and maintenance, for example. For maximum safety and security, individual users should only have the minimum access required to do their jobs. With secure machine authentication, manufacturers can protect people, production equipment, and IP, while enabling smooth operations. It all starts with an authentication system that supports reliable and secure operator identification at the machine level.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
Large-scale events, including both corporate and sporting events, are coming back strongly in the aftermath of the pandemic. With the increase in activity comes more demand for oversized credentials preferred by many event planners and end users. Pent-up demand due to the pandemic has caused a tremendous uptick in the entire ID card industry in 2022. The return of large-scale events and in-person trade shows will extend the higher demand for cards well into 2023 and beyond, says Andrew Schonzeit, President of Idesco, a provider of ID card solutions. Supply chain concerns Supply chain concerns will continue as companies seek to upgrade and purchase new ID printers and badges An impact of the pandemic was a shortage of supplies related to the ID card industry, says Schonzeit. Like other industries, several leading ID card and printer manufacturers had supply chain issues, and some deliveries were delayed at times for more than six months. Supply chain concerns will continue into 2023 as more companies return to the workplace and others seek to upgrade their current systems and purchase new ID printers and badges. Persistent price increase concerns “The shortage created hardships for end users and often resulted in them purchasing any solution that was readily available even if it was not the preferred one,” says Schonzeit. Another issue during the pandemic was persistent price increases, due both to inflationary pressures and a shortage of products. The industry was used to stable prices with infrequent increases, but the pandemic changed this quickly. Some companies also decided to upgrade their entire system as employees returning to the office increased demand. Oversized credentials advantages Among the advantages of oversized credentials is the ability to print more information on the card, says Schonzeit. For example, a larger credential allows event organisers to preprint the corporate agenda on the back of the card to increase efficiency. In addition, companies can enhance their brand presence by distributing a nice thick plastic badge to attendees. Two categories Standard credit card size These are generally CR100 size, which is around 40% larger than the standard credit card Oversized badges fall into two main categories. One category is for cards that are larger than the standard credit card size (CR80), but smaller than event badges. These are generally CR100 size, which is around 40% larger than the standard credit card. They are generally used by law enforcement or healthcare institutions. It is easier to see an oversized badge more clearly from a distance than a regular-sized badge. Oversized ID badges The other category of oversized ID badges is used for events, these badges are typically 3.5” by 5.5” and are usually worn around the neck. These events include categories such as sporting events, corporate events, music festivals, and trade shows. The badges are generally used only for the duration of the event and are often kept as souvenirs. Anticipating the needs “My advice for event planners is to manage your expectations about badges as it is very hard to order extra badges at the last minute,” says Schonzeit. “It is important to plan well in advance and anticipate your needs upfront to help avoid a shortage.” Idesco often gets requests from customers to include some type of technology on the credentials. The most common technologies are proximity cards, NFC, and/or UHF. “It is a much ‘cleaner’ and safer solution if the chip can be embedded within the credential as opposed to putting a sticker on the outside of the credential,” says Schonzeit. Additional technologies in credentials Customers wanting technology in their credentials should allow additional lead time Generally, these additional technologies are used for gaining entry to a location (access control), or they can be used for gathering valuable information regarding an event, including attendance at seminars, crowd flow, vending, and food services information, among others. Supply chain issues have led to less availability of many of the most common chips, which can impact delivery times. Customers wanting technology in their credentials should allow additional lead time, says Schonzeit. Applications In addition to corporate events, sporting events, and trade shows, other markets can also benefit from oversized ID badges. Industries include healthcare, government, and law enforcement. Oversized badges are becoming more popular in hospitals, for example, where color coding can make it easy to identify doctors, nurses, and hospital personnel from a distance, even in congested hospital spaces. ID card necessity Could there be a negative impact on the ID card industry if more companies allow employees to work from home? It’s always a possibility, says Schonzeit. “However, with many hybrid options out there, most employees are required to come to the office either one or two days a week,” he says. “Employees will still need a way to access their workplace for meetings, conferences, etc., and will require an ID card to do so.” Mobile vs. physical credentials The growing popularity of mobile credentials has created some concerns in the ID card marketplace The growing popularity of mobile credentials has created some concerns in the ID card marketplace about the continuing need for a physical credential. So far it has not been an issue. “[Mobile credentials] have not had any type of meaningful effect on the physical ID card market,” says Schonzeit. Relying on smartphones “Sometimes these disruptive technologies can linger in the background for some time and then suddenly have a massive effect on the market. This is something to be concerned about, but I don’t think there is an imminent threat.” A big issue with using only mobile credentials is the need for a backup plan rather than relying only on a smartphone to enter a facility. Also, for mobile credentials to work, specialised readers are required, which requires a large investment. “In my opinion, ID badges are here to stay for the long haul,” says Schonzeit.
Case studies
World Trade Centre (WTC) Amsterdam is home to more than 300 companies. The commitment of its security team to providing a safe working environment in WTC’s fixed and flexible offices goes without saying. However, building managers wanted more from their access solution. More than just an office space, WTC Amsterdam has complementary onsite facilities, including childcare, a gym, physiotherapy clinic, bar/café, dry cleaning service and more. All its facilities must be cleaned and serviced regularly: they sought a more time-efficient way to manage the many contractors and suppliers who come and go every day. Modern digital solution Modern digital solution would provide better oversight of movement around the building They also hoped a modern digital solution would provide better oversight of movement around the building, including usage data to improve maintenance scheduling. For convenience during installation and day-to-day management they targeted a wire-free solution – for simpler, less disruptive switching of 1,000 doors from mechanical locks to digital access – and intuitive management, allowing for easy changing of individual access authorisations, even at the last minute. Digital access system With all these criteria in mind, WTC Amsterdam managers decided on ASSA ABLOY’s smart key digital access system, eCLIQ. They upgraded doors from mechanical to digital access simply by swapping the existing cylinder for an eCLIQ device. Doors are unlocked by battery-powered user smart keys, with a typical battery lifespan of 10 years. “Providing these doors with wired access control would be a huge job and become costly. Instead, we opted for the eCLIQ solution,” explains Sander Borggreve, Facility Manager at WTC Amsterdam. Concrete improvements in operations Scheduling is further simplified by storing keys with a Traka key management system The ROI in terms of workflow benefits has been significant. “Granting temporary controlled access to third parties is very easy with the eCLIQ system. We can set access for a certain period of time, but we can also revoke it at any time,” says Sander. Scheduling is further simplified by storing keys with a Traka key management system. After removing a key from the cabinet, authorised team members enter it into the adjacent eCLIQ Wall Programming Device. In seconds, the key is issued with its fine-grained access rights – covering both door-by-door and time validity. Maintenance and operations With the eCLIQ system, WTC Amsterdam gained not only control but also insights into usage and user flows. This data now informs maintenance and operations, reducing the overall Total Cost of Ownership for the solution. “eCLIQ works very pleasantly in practice. My employees are very satisfied with how the keys work,” says Rutger Barendse of D&B The Facility Group, who provide security staff for WTC Amsterdam. “It is easy as pie!” adds Sander.
Mul-T-Lock is working with Charnwood Lock and Key for Loc8me, a premier student accommodation management agency to provide dedicated master key systems enabling secure and efficient access for maintenance of its growing property portfolio. Since its establishment in 2008, Loc8me has grown to have over 6,000 tenants living with them and they manage over 2,500 properties across Loughborough, Bristol, Durham, Newcastle, Nottingham, Leeds, Manchester, Hull, Leicester, Liverpool and Birmingham. Highest level of security Loc8me relies on Charnwood Key to deliver Mul-T-Lock key suites that can simplify access To ensure the ongoing maintenance of properties, Loc8me relies on Charnwood Lock & Key to deliver specialist Mul-T-Lock master key suites that can streamline access for property management processes, while ensuring the highest level of security for residents. Says Raffaele Russo, Founder of Loc8me: “For a lot of students, moving into a student home is a huge step in their independence and we want to make sure we offer the best environment for them. This includes placing a great emphasis on customer service and making them feel truly at home, with all their maintenance needs taken care of." Mul-T-Lock as a master key suite Russo added: “Working with Charnwood Lock & Key enabled us to embrace Mul-T-Lock as a master key suite we could rely on." "We have one set for each of our property developments and our associated landlords, ensuring we can maintain overall security, whilst balancing necessary access for our maintenance teams to ensure our homes are kept to a high standard.” Mul-T-Lock's advanced security solutions Charnwood Lock and Key played a pivotal role in implementing Mul-T-Lock's advanced security solutions for Loc8me's properties. This included considering the flexible security requirements to accommodate the many different sites whilst not compromising on the high level of protection, operational excellence and advanced quality assurance. Says Harry Stafford of Charnwood Lock & Key: “Loc8me places a great emphasis on creating and maintaining the best co-living experiences for students. Maintenance services are naturally key to this success. We had no hesitation in recommending Mul-T-Lock’s renowned master key suites to manage authorised access as and when required." Mul-T-Lock's master key systems Mul-T-Lock's master key systems for student redefine security and comfort in the student sector Stafford added: “The benefits of the system include flexibility for user-friendliness and ease of use, with limited key duplication that we can manage here. With Mul-T-Lock's advanced master key systems in place, Loc8me can effectively manage access control across its growing student housing properties, enhancing security for residents and providing peace of mind for property managers.” Mul-T-Lock's master key systems for student accommodation redefine security and convenience in the student housing sector. Tailored to the unique needs of accommodation providers like loc8me, Mul-T-Lock's solutions offer control and flexibility. Individual sector requirements Jamie Jagpal, Mul-T-Lock’s Product Manager added: “Our bespoke master key systems can be created to suit individual sector requirements, often guided by our long-term partners such as Charnwood Lock & Key." "What Loc8me demonstrates is by creating an established solution, it can evolve with the company’s requirements, especially with its mission to be a major management agency university in the country. We are proud to play a role in enhancing the safety and convenience of such high-end student housing."
Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world’s most famous tavern,” explains its Security Manager, Robert Graßl, adding “The whole world goes in and out. Security is very important.” Bavarian Duke Wilhelm V commissioned Munich’s original Hofbräuhaus in 1589, initially as a brewery to supply the Wittelsbacher Hof. Moved at the end of the 19th century and severely damaged during World War II, it underwent reconstruction in 1958. It now attracts tourists and city locals, seating up to 3,000 guests indoors and a further 400 in the beer garden. Access rights management Digital devices and low-impact skills were needed to assure compliance with origin protection Although the building is an important heritage monument, it requires 21st-century digital access to keep site users safe and streamline day-to-day operations. They wanted fast, secure access rights management for employees and service providers – including up to 100 waiters working each shift – within a unified system that could authorise access at both the Hofbräuhaus and their food production facility in Brunntal. Of course, inobtrusive digital devices and low-impact installation were a necessity to ensure compliance with heritage preservation regulations. Digital access for a famous heritage building Many electronic access products and technologies are not appropriate for historic buildings. An eCLIQ key-based digital access solution is different: eCLIQ cylinders are compatible with the strict monument preservation requirements at the Hofbräuhaus. They have a flush fit, so don’t even appear to be part of an electronic locking system. With wireless installation at the doors, devices blend with the building interior. “We can exchange a mechanical cylinder 1:1 with an eCLIQ cylinder without having to modify anything on the door or install cables,” confirms Miriem Hammoudi, Business Development Manager at ASSA ABLOY Sicherheitstechnik GmbH. ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys for Hofbräuhaus managers to issue to relevant staff and service contractors. Easy operation for flexible, cost-efficient management Every eCLIQ key has an integrated chip and is programmable individually for the keyholder Every eCLIQ key has an integrated chip and is programmable individually for the keyholder. The versatility of eCLIQ is demonstrated when a key is lost: Access authorisations are removed rapidly – simply by reprogramming cylinders – ensuring security is maintained. The eCLIQ system also helps manage workflows for service providers, such as cleaners: Their access is enabled on a time-limited basis. A standard battery inside each programmable electronic key powers the cylinder or padlock on insertion – and encrypts data transfer between cylinder, key and system – so no external power source or wiring is needed. Scalable web-based platform The Hofbräuhaus team manages their system via a flexible, scalable web-based platform, CLIQ Web Manager: “I can program keys from anywhere or also block them quickly if a key has been lost or if someone is no longer allowed to enter,” says Robert Graßl. He adds, “And I can install any cylinder in any door by adjusting the length. I don’t have to carry extra stock which is really cost effective.” New master key system With the hosting solution chosen, access data is stored securely at ASSA ABLOY, accessible anytime and from any location, which is an ideal configuration for managing large systems or multiple locations. Their system is easy to expand anytime – future-proofing Hofbräuhaus access. “The situation before the new master key system was installed was problematic,” says Robert Graßl, adding “Keys were distributed and nobody knew who held them. Now, everyone carries only one key programmed with details of where and when they can enter. It’s perfect.”
Take a walk to the local high street. Compared to a few years ago, they may notice many more “To Let” signs in empty shop windows. It comes as no surprise given the number of shocks to the economic system over the last five years, ranging from COVID-19 to international conflicts, all of which have led to various consequences, such as energy price hikes, interest rate increases, and a general shift in many people's work patterns and consumer behaviour. Vacant retail space The total number of void private-sector commercial properties stands at approximately 165,000 According to Savills Research, the overall footfall of vacant retail space in the UK is around 14.5%, while the total number of void private sector commercial properties stands at approximately 165,000. Additionally, an estimate of 7,000 commercial and business properties owned by Local Governments in Great Britain have been unoccupied for over 12 months. Net Zero ambitions Furthermore, a recent BBC article points out that business tenants are more inclined to search for smaller, newer and more energy-efficient office spaces to rent, are willing to downsize owing to hybrid working, and seek buildings that complement their Net Zero ambitions. This might be interpreted as an indication that a number of long-standing commercial premises would become vacant in the near future, forcing owners to update and repurpose empty spaces to meet the demands of a changing market. A costly asset that requires extra protection Insurance companies charge higher premiums for void property and require regular security While the property market and customer demands are shifting, some truths remain unchanged: commercial property should generate money, not drain it. However, void sites imply outgoing costs and no profit, so it only makes sense that any vacant space should be flipped as soon as possible. Unoccupied premises can become an alluring target for squatters, vandals, thieves and trespassers, which is one of the main reasons why insurance companies charge higher premiums for void property and require regular security and fire safety checks too. Enhanced security measures Such properties must be protected by enhanced security measures. This often involves the installation of steel doors and screens, perimeter protection, vigilant surveillance and prompt alarm response. After all, any break-in can cause far greater financial damage than the costs of protection; and the owner is legally liable for any injuries sustained by trespassers. Meanwhile, legit access is very much required by contractors to upgrade and renovate the site in preparation for the next business occupier. Any delays or missed visits result in further charges on an asset that is essentially nothing but another bill while vacant. Access issues: Fetch the keys For every contractor visit, property check or viewing, a key must be obtained offsite and then returned A minor but, consequently, very important issue might arise when accessing a site that is unmanned 24/7. For every contractor visit, property inspection or viewing, a key must be obtained offsite and then returned. This takes time, implies unnecessary travel and, potentially, may result in additional missed visit fees and rebooking arrangements in instances when a contractor is unable to gain entry. As a result, it may slow down the void property turnaround time. Keyholding arrangements Furthermore, complex keyholding arrangements can also slow down the security alarm response time. More and more security companies are moving away from the traditional keyholding model, in which keys are stored at the central location or in heavy key lockers in vans during patrols. While reaction time is critical, time is frequently wasted collecting keys or waiting for a keyholding patrol (rather than the nearest one) to arrive on site. Lock up and leave the keys. Securely. Keyholding solution must be more robust than doors or other means of entry to stop opportunistic intruders What about storing keys at the point of entry? This may be controversial, but it is a solution that has gained popularity in void property management with implementation of secure range key safes and lockboxes. The primary concern in such an approach is security. Even though property is void, the keyholding solution must be more robust than doors or other means of entry to prevent opportunistic intruders from taking advantage of the new keyholding arrangement. Smart key management solutions Stuart Wheeler, Managing Director of Keynetics, a company that offers smart key management solutions with security-certified key safes, comments, “Over the years, we have developed strong relationships with the top void property management companies in the UK and Europe. These clients require a keyholding solution that enables efficient FM service provision for vacant properties while also providing a high level of security.” “Storing keys at the point of need enables quicker alarm response times and allows approved contractors to enter the premises without any delays, but security must not be compromised; in that respect, our SentriGuard key safes are suitable for commercial properties and certified to LPS 1175 (Loss Prevention Standard) C1 and C3 security ratings, which is unrivalled by any other supplier.” SentriGuard key management system Stuart confirmed that in addition to security, the SentriGuard key management system is highly praised for its innovative technology. First, it incorporates a bespoke cloud-based platform that allows customers to manage access to multiple properties remotely and generate various audit reports that can also serve as a proof of service delivery. Second, assigned individuals may gain access to premises either using the mobile app or a time-restricted code. He added, “The ability for clients to access real-time data of site visits with a solution that does not break the bank and is secure has been the key to the success here in the U.K. and now across mainland Europe.”
Hotel managers require security, flexibility, durability and aesthetics in an access management system that can cover guest rooms and shared spaces, on one hand, and private staff areas on the other. With multiple buildings, a private beach and sports areas, the new TH Resorts Capo Rizzuto on Calabria’s Ionian coast receives high daily traffic from guests and staff, who must have access at different times according to their specific needs. On taking over resort, TH management quickly identified the need for a new locking system that would allow each staff member to access different, specific areas of the facility. In specifying a new master key system, they had two more important criteria. Firstly, the solution should be mechanical rather than digital, to preserve existing hotel aesthetics. Secondly, they required a hierarchical system, where different staff members could have levels of access authority based on their roles. A CYS10 system makes fine-grained customisation possible Security of the comfy nickel-silver key is protected against unauthorised copying by two patents Working closely with the expert specification team at ASSA ABLOY Italia, managers at TH Capo Rizzuto chose a CYS10 master key locking system with Euro profile double cylinders for common area access points and staff-only zones. For guest room doors they selected CYS10 thumbturn cylinders, which lock securely for privacy and quickly unlock from the inside. The CYS10 platform consists of 6-pin sawn key cylinders; it is tested and certified according to EN 1303:2015 and SKG security standards. Security of the comfortable nickel-silver key is protected against unauthorised copying by two separate patents. Their robust design makes them ideally suited to challenging environments such as a busy hotel. Effective master key system design With 63 available key profiles, CYS10 cylinders enable the creation of a complex master key setup with several levels and sub-levels – perfect for access customisation. Effective master key system design reduces the number of keys they need to cut, track or replace. It saves hotel managers time and money. “It is a truly flexible solution and allows us to limit the quantity of keys assigned as much as possible,” says Carmelo Sava, Head of Maintenance at TH Resorts. Effective master key system design reduces the number of keys they need to cut, track or replace Five distinct master key systems – numbering more than 500 CYS10 cylinders in total – were implemented at TH Capo Rizzuto, one for each of the resort’s individual facilities. Each cylinder has its own paired key and, for each building, a master key opens all cylinders. The entire property is controlled by a single grand master key entrusted to management. Future-proof setup at Capo Rizzuto “The ASSA ABLOY master key system allows us to manage the access of all our staff without any security problems,” adds Carmelo Sava. To ensure future-proof setup at Capo Rizzuto, their key systems can adapt or expand at any time: The CYS10 device range includes single, double, thumbturn, screw-in and rim cylinders for interior and exterior doors, switch cylinders for control panels, plus cam locks for letterboxes or furniture. The CYS10 padlock secures gates, lockers, and more.
The Ampelmännchen (“little traffic light man”) from the former GDR is a cult figure around the globe. For tourists, the shops of AMPELMANN GmbH in Berlin are a big draw. Branches are spread over the entire city, and to reduce the burden of employee and staff key assignments, the company sought to optimise access rights management. At the same time, branch security needed to be state-of-the-art. The CLIQ® access control solution from ASSA ABLOY met all these requirements with flying colours. AMPELMANN GmbH Founder and Owner - Markus Heckhausen sought a locking solution for eight AMPELMANN GmbH branches and a 2,200 m2 logistics centre, to meet the needs of a decentralised branch organisation. This creative company, which manufactures and sells a wide variety of products under the AMPELMANN brand with the Ampelmännchen, did not want a complex system suited only to large companies with thousands of employees. It should be practicable and fast for a company with around 150 employees, yet still be able to secure branches reliably. Easy administration, maximum security Branches must be accessible to customers during opening hours, yet sufficiently secured Small and medium-sized retailers face the same access control challenges as their large competitors. Employees need access to the store, warehouse, and offices, but not every employee should have the same authority. Branches must be accessible to customers during opening hours, yet sufficiently secured after closing time against unauthorised access. Challenges faced Key management is often an elaborate, time-consuming process, even more so when keys are lost or stolen. In such cases, all locking systems must be replaced, which requires more effort and significant costs. AMPELMANN GmbH in Berlin also faced these issues. Its eight branches are located in the best shopping areas in Berlin, each staffed by several employees. External service providers, such as cleaners also need access to the building. A large staff roster and significant distance between branches create a major key management workload. eCLIQ ensures branch security Together with the Berlin locksmith Hinz, AMPELMANN Owner - Markus Heckhauen found a solution in the flexible, decentralised, and reliable electronic locking system from ASSA ABLOY. Uli Hahn, Managing Director of Hinz, has been providing security in and around Berlin for more than 50 years. He says, "The eCLIQ locking system is very powerful and safe compared to conventional systems. It is easy to handle and to assemble. Above all, it enables quick and easy administration of access authorisations, making it the perfect choice for medium-sized companies, such as AMPELMANN." Plug-and-play solution Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software eCLIQ comes as a "plug and play" solution and is ready to use immediately after installation. The system works without cabling, so the extremely compact eCLIQ cylinder can be used in a wide variety of doors at any location. Power is supplied by batteries in each programmable key, which can be changed easily and without tools. A built-in chip makes every electronic key unique. Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software. Robust, durable, and safe In addition to the compact design, the system is characterised by robust, durable, and safe components. An integrated lubricant reservoir ensures the cylinders remain maintenance-free for up to 200,000 cycles. A high-quality processor protects the locking system against manipulation and intelligent attacks. Keys are also highly resistant and waterproof (IP67). eCLIQ cylinders and keys are VdS-certified (BZ +) and comply with the DIN EN 15684 standard for electronic locking systems. A wide range of different cylinder types makes the system suitable for many applications from the company's entrance gate to securing alarm systems, elevators, doors, and cupboards. Convincing solution "Decisive in our choice of eCLIQ was that we could control access authorisations easily and flexibly at any time," explains Markus Heckhausen, adding "If a key is lost, we can easily deactivate it and disable it." eCLIQ even makes time- and location-limited authorisations easy for example, by allowing cleaners to enter only at certain times. The allocation of access authorisations can be coordinated conveniently by individual branch managers, within a system that ensures maximum security for all AMPELMANN GmbH shops.
Products
Round table discussion
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Faces captured by video cameras could be perceived as an invasion of privacy, as could images captured through residential windows or that involve private or proprietary information. Fortunately, modern video systems incorporate technological features that help avoid an inadvertent invasion of privacy, while preserving any data that may be needed by authorized persons. For the latest commentary, we turn to our Expert Panel Roundtable with this week’s question: What new features of video systems are helping to ensure privacy?
Videos
Key management: Manufacturers & Suppliers
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download