Mobile communications
Suprema, a global pioneer of AI-based security solutions hosted the 'Suprema Global Partner Program (SGPP) 2024' in Malta, a Mediterranean island in Europe. The event brought together partners from around the world to discuss Suprema’s future vision and business strategies. SGPP 2024 The two-day event, held from November 20th to 21st, marked SGPP’s 13th anniversary. Inspired by Malta’s mythological significance as a turning point in Odysseus’s journey in The Odyssey, 2...
Zenitel has announced that its new Zenitel Connect Pro platform has received LenelS2 factory certification as part of the LenelS2 OpenAccess Alliance Program (OAAP). The new Zenitel Connect Pro system interfaces with the LenelS2 OnGuard® access control system, providing customers with solutions for a unified and scalable enterprise security platform. Zenitel products “Zenitel has completed required factory testing at LenelS2 to validate the functionality of its interface to t...
Matrix, a prominent player in the Security and Telecom sector, successfully wrapped up its participation at the East Tech Symposium 2024 in Kolkata. Leveraging over 30 years of expertise, Matrix connected with industry pioneers, gathered valuable insights, and explored new avenues for collaboration. Matrix's in-house R&D program Matrix is unwavering in its mission to deliver ground-breaking, technology-led solutions that place customer satisfaction at the forefront. The commitment is pow...
NAKIVO, a pioneering provider of backup and disaster recovery solutions, proudly announces the release of NAKIVO Backup & Replication v11. This landmark release introduces the most extensive set of features to date. Designed to address modern data protection needs, v11 introduces capabilities that improve backup flexibility, security, and usability. Agentless backup for Proxmox VE Proxmox VE has become a mainstream virtualisation solution, offering the flexibility, scalability, and afford...
Bugcrowd, the pioneer in crowdsourced security, announced the addition of Trey Ford as Chief Information Security Officer for the Americas, to the leadership team. Trey is a seasoned strategic advisor and security thought pioneer with over 25 years of experience in offensive and defensive security disciplines. Trey has held key leadership roles at Deepwatch, Vista Equity Partners, Salesforce, Black Hat, and more. He has also been a valued member of Bugcrowd's advisory board for over a decade....
Vantiva, a global technology pioneer enabling Network Service Providers to connect consumers worldwide, announced it has been selected by longtime partner e& UAE, the telecom arm of e& in the United Arab Emirates (UAE), to deploy a new 5G Fixed Wireless Access (FWA) gateway in the country. Featuring the region's first eSIM installed on a customer premises equipment, the gateway allows for a simplified and OPEX-saving self-installation, letting the end-user activate the solution without...
News
Blackline Safety SAS, a global pioneer in connected safety technology, announced that it has achieved the prestigious MASE certification—a dedicated health, safety and environment initiative specifically designed for and implemented in France. The robust programme aims to physically embed better health and safety practices and culture within organisations across all industries, covering all aspects of operation from workers and premises to cars, parking facilities, and the environment. Long-term vision “MASE certification reflects our long-term vision of creating a safer, more sustainable workplace for our customers, partners and employees,” said Cody Slater, Blackline Safety CEO and Chair. “The certification underscores our unwavering commitment to health, safety, and environmental excellence, and is a testament to the hard work and dedication of our team.” New processes and documentation The company saw greater employee hire in health and safety measures and environmental safety Certification involved implementing new processes and documentation, including conducting regular safety talks with the entire team. As certification work progressed, the company noticed greater employee engagement in health and safety measures, as well as environmental protection. “Since we started on the path to accreditation, our employees are more involved in making sure we’re meeting the MASE standards,” said Celine Loeuillet, Manager, People Services for Blackline’s France office. “They have suggested, researched and implemented solutions for recycling beyond just the basics and reducing fuel consumption and emissions.” International accreditations and certifications MASE certification allows Blackline Safety to share a common, signposted and structured health and safety programme with customers who are also certified, including those in the energy and petrochemical industries. Blackline can now provide them with complete traceability of all compliance and safety events for their solutions. MASE is the latest in a series of international accreditations and certifications Blackline holds, including ISO 14001, ISO 9001, and SOC 2 Type II, as well as PAS 2060 Carbon Neutral verification for its Europe office.
DRUID AI, a global pioneer in conversational and agentic AI, announced the launch of DRUID Conductor at their third annual customer conference Symbiosis. DRUID Conductor is an advanced AI agent designed to unify and orchestrate all the different agents an employee interacts with, regardless of which system creates or operates the agent. This innovation simplifies the complexity of managing multiple agents and provides a single interface for employees to use in their daily work. DRUID QA Agent DRUID Conductor empowers workers to create new AI agents on-the-fly through an AI-based agent DRUID Conductor also empowers employees to create new AI agents on-the-fly through a user-friendly, AI-based agent solution builder. Pre-loaded with best practice business processes, specialised skills and enterprise-specific knowledge, the platform makes it simple for employees to instantaneously create specialised, autonomous agents by simply conversing with DRUID. Additionally, using DRUID QA Agent, businesses can test newly created AI Agents before deployment and monitor existing agents to ensure their accuracy and that they perform as expected. DRUID Conductor Unlike other agents on the market, DRUID Conductor seamlessly integrates, learns from, and builds upon existing enterprise solutions such as Microsoft Copilot and Salesforce Einstein, providing a unified agent experience that enhances enterprise-wide AI functionality. With DRUID Conductor, customer-facing businesses can engage with clients autonomously, 24/7, across multiple channels using natural, conversational language. DRUID's AI agents The platform enables firms to set clear guardrails that escalate issues to human workers when needed DRUID's autonomous AI agents deliver swift, accurate responses grounded in trusted knowledge, achieving up to 95% accuracy. The platform also enables companies to set clear guardrails that escalate issues to human employees when needed. "Our mission at DRUID is to empower businesses to automate and scale rapidly by enabling them to create unlimited expert virtual employees on-the-fly, in the form of AI Agents," said Liviu Dragan, Co-founder and CEO of DRUID AI. New agentic AI innovations Dragan added: "With DRUID Conductor, enterprises can now effortlessly create new workflows that save time and drive revenue. Informed by over a decade of experience, customers using our agentic framework have seen a 30% increase in customer satisfaction and have automated up to 80% of specific business functions." DRUID AI is proud to announce DRUID Conductor as the first of several new agentic AI innovations and capabilities revealed during the Symbiosis conference.
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced the launch of Operations Centre, a cloud-based work management solution designed specifically for physical security operations. Available as part of Security Centre SaaS, or as a standalone product, this new solution is specifically designed for security operations professionals and will revolutionise the way physical security teams collaborate, communicate, and manage their tasks. Security operations challenges Genetec™ Operations Centre manages the operational challenges faced by Security Operations teams Genetec™ Operations Centre addresses the operational challenges faced by Security Operations teams, which often rely on spreadsheets or disconnected work management tools designed for IT or other departments. These fragmented systems can impede their efficiency and collaboration. Operations Centre solves this by integrating security dispatching, work ticketing, and activity tracking into a single platform. This unified approach enables users to manage tasks more effectively, maintain real-time visibility of their operations, and collaborate seamlessly across teams. Collaboration with security professionals "Security operations put in substantial effort to guarantee a secure day, one where everything runs smoothly without anyone noticing. Yet, they frequently lack the necessary tools for effective performance," said Christian Morin, Vice President of Product Engineering, Genetec Inc. "Operations Centre was created in close collaboration with security professionals specifically for their use. It aims to break down silos and enhance security operations, enabling them to work more efficiently and collaborate effectively across the organisation." Complex security infrastructure Chris Autry, Managing Director at Brigham Young University—a major US university with over 30,000 students and a complex security infrastructure—has adopted the solution in his practice: “Before Operations Centre, each of our security divisions managed information separately, making collaboration difficult." "Now, with nine departments and over 200 personnel using Operations Centre, we’ve greatly improved communication, fostered better collaboration, and facilitated valuable knowledge sharing across our entire security team.” A unique offering for the physical security industry Tasks and projects are managed on customisable boards that visually represent workflow stages Operations Centre is more than just a task management tool: it’s a comprehensive solution that is designed to better manage resources and assets. It is built to enhance every aspect of security operations through an intuitive web and mobile interface that connects teams globally. Tasks and projects are managed on customisable boards that visually represent workflow stages, offering a clear overview of progress and enhancing situational awareness for real-time collaboration. This ensures that the right person, equipped with the right tools, is assigned to the right task, thereby improving efficiency and the quality of work. Checklist for each task By providing a detailed checklist for each task, Operations Centre helps guide security officers in the field to their next tasks, whether it is dispatching patrols or responding to incidents, while automatically letting their supervisors know about their progress, status, and location. Supervisors can audit and generate reports on individual incidents, entire shifts, or team performance, with all activities logged in real-time, even off-site. Access to KPIs Leadership has immediate access to KPIs and statistics through their mobile app Leadership has immediate access to key performance indicators (KPIs) and statistics through their mobile app, eliminating the need for manual data entry. This streamlined access supports more informed, strategic decision-making and drives continuous efficiency improvements across the department. Operations Centre is fully customisable to meet the unique needs of any organisation. It scales effortlessly, supporting teams of all sizes and adapting to various workflows, processes, and reporting requirements while ensuring privacy by design. Availability To be unveiled at GSX 2024 on booth 2612, Operations Centre will be available globally as of September 23rd, 2024, as part of the Genetec Security Centre SaaS Premium subscription, as well as a standalone solution compatible with Security Centre 5.10 and later. Exclusively available through accredited members of the Genetec Channel Partner Program, the Operations Centre empowers channel partners to expand their portfolio, offering customers enhanced tools for collaboration, communication, and operational efficiency. Partners will also enjoy unlimited access to the product for customer demonstrations and internal use.
Proofpoint, Inc., a pioneering cybersecurity and compliance company, and CyberArk, the identity security company, announced an extended strategic collaboration, working together to help organisations around the world secure identities everywhere. Supporting this joint aim, the expanded partnership includes the launch of new integrations and solutions to address critical cyber challenges. Securing Identities Digital transformation and the cloud have altered infrastructures, while mobile technologies and remote access have changed how people work. Traditional endpoint and network-based controls are inadequate given the threat landscape—one where identities are the new perimeter and have become critical for organisations to secure. 93% of organisations suffered 2 or more identity security breaches in the past year With attackers increasingly exploiting identities thanks to the potential wide-ranging access they enable, 93% of organisations suffered two or more identity security breaches in the past year. The exponential growth of identities coupled with evolving attack techniques underscores the critical need for a paradigm shift towards identity-centric security strategies. Cyber adversaries’ Threat actors continue to target identities as the most effective way to land in and expand their access to the targeted organisation. From workforce users to IT admins with privileged administration rights, to an executive with access to confidential data, to a developer with access to code repositories or a machine identity such as an IoT device, identities are cyber adversaries’ preferred path to an enterprise-wide breach. Connecting a human-targeted attack with its potential impact has never been more critical. Identity security policies Proofpoint and CyberArk features a blend of layered defences designed to stop threats before they reach users The integration between Proofpoint and CyberArk features a combination of layered defences designed to stop threats before they reach users and applies preventative policies and controls that ensure access accuracy. Proofpoint prevents email attacks from reaching users and helps to identify the individuals and systems that are targeted by the most sophisticated, highest impact threats using its expansive data set comprised of trillions of data points every year. CyberArk takes this insight and applies adaptive controls and identity security policies to ensure legitimate users are only able to access what they need and nothing more. Advancement in identity-centric security “Because attackers now see people and their digital identities as their target of choice, it's time to shift security strategies to protect people and defend the data they create, placing identity at the centre of security,” said Ryan Kalember, chief strategy officer, Proofpoint. “Our strategic partnership with CyberArk represents a significant advancement in identity-centric security, empowering organisations to connect their key platform to understand human risk with their platform to mitigate it.” Centre of security strategies “Approaching how we secure identities must drastically evolve. With a single compromised identity, threat actors can attain an initial foothold that unlocks significant opportunities for all kinds of downstream attacks, including data theft and ransomware,” said Clarence Hinton, chief strategy officer at CyberArk. “Both CyberArk and Proofpoint are innovators in their respective security domains and share a commitment to placing digital identities at the centre of security strategies to deliver better outcomes for our joint customers.” Proofpoint’s ZenWeb browser extension Proofpoint’s ZenWeb browser wing solution protects employees and contractors from cruel URLs Web browsers—often consumer-focused and lacking in essential security, privacy and productivity features—are essential to how organisations operate. They are the connective tissue between identities, applications, and data, making them a primary target for cybercriminals and a prominent vector for security breaches. Powered by Proofpoint’s industry-pioneering threat intelligence, Proofpoint’s ZenWeb browser extension solution protects employees and contractors from malicious URLs that can download malware or steal corporate credentials and sensitive data. When deployed with CyberArk Secure Browser, organisations can, in real-time, detect and block malicious URLs, one of the pioneering attack vectors used by cyber adversaries. Additional benefits Additional benefits of Proofpoint’s ZenWeb and CyberArk’s Secure Browser integration include: Stopping targeted threats and malicious URLs in real-time, independent of how the user encountered the URL Identifying and securing privileged users by applying granular policies and minimising the risk of unauthorised access Enhancing user safety with adaptive controls and policies Reducing the risk of unauthorised access to sensitive data Streamlining incident response and automating remediation processes Deeper integrations Deeper integrations for innovative identity-centric threat remediation include: Leveraging Proofpoint’s Nexus TI (Threat Intelligence), email threats are identified and dynamically assessed for risk, then passed to CyberArk Identity Flows for adaptive response and remediation. Privileged users with high-risk access are singled out for enhanced layers of protection and real-time remediation when threats occur. Proofpoint also automates privileged account and local admin discovery, integrating with CyberArk to manage and secure them. CyberArk and Proofpoint will be showcasing their latest integration at Proofpoint’s upcoming ‘Protect’ event series, which commences in New York City on September 10, 2024.
The Orange County Emergency Services, Public Safety Communications Division became the 146th Emergency Communications Center (ECC) in the United States and the 14th ECC in the State of North Carolina to implement the Automated Secure Alarm Protocol (ASAP). Implementation of ASAP "The ASAP program provides our ECC with most accurate and timely alarm notifications possible while reducing the workload of our Public Safety Telecommunicators. The implementation of ASAP provides significant benefits to our Department, our partner public safety agencies, and the community we serve," stated Christopher H. Ward, Division Chief – Public Safety Communications for Orange County Emergency Services. Orange County went live on July 22, 2024 with the following companies: Rapid Response Monitoring, Vector Security, Alert360, Securitas, Holmes Security, Brinks Home Security, Dynamark Monitoring, United Central Control, Protection One, Guardian Protection, National Monitoring Center, Johnson Controls (Tyco), Vivint, CPI Security, Wegmans Security, Affiliated Monitoring, ADT and Security Central with Alert360 being brought online soon.
Blackline Safety Corp., a global pioneer in connected safety technology, has announced the launch of an international safety awards programme to recognise individuals and organisations who go above and beyond to keep their employees, communities, and the environment safe. Worker safety “Blackline’s No. 1 priority is ensuring that every worker returns home at the end of the day in the same form they arrived and that communities and the environment are protected from life-threatening situations,” said Christine Gillies, Chief Product & Marketing Officer of Blackline Safety, whose suite of safety devices are used by hundreds of fire and hazmat, oil and gas, petrochemical, food production, biotech, transportation, utilities, and water and wastewater organisations across North America, Europe, Middle East, Africa, Australia, and New Zealand. “Our goal is to recognise Blackline technology users who are aligned with our mission and have helped save lives by avoiding serious incidents or causalities in their pursuit of safety,” Gillies explained. Blackline Safety Impact Awards The Community Hero Award recognises an individual or group that has made a profound impact on their community Called the Blackline Safety Impact Awards, the first award was presented to two U.S. utility workers who saved a child’s life. The Blackline Safety Community Hero Award was awarded to Matt Overcasher and Steve Manypenny, field technicians with Columbia Gas of Ohio, at a July 29 ceremony at the utility’s training center in Gahanna, Ohio. The Community Hero Award recognises an individual or group that has made a profound impact on their community by going above and beyond to help save lives or protect the community from safety incidents. Two-way communication safety device Overcasher and Manypenny were on their way home from work in 2023 summer when they heard frantic screaming from a mother of an 18-month-old struggling to breathe. Using quick thinking, they pulled the emergency SOS latch on their Blackline two-way communication safety device and were able to get medical help dispatched within seconds. Communicating with an agent from Blackline’s 24/7 live Safety Operations Center throughout the incident, the duo was guided on what to do until EMS arrived on-site and revived the unconscious child. $10,000 donation For their heroic efforts, Overcasher and Manypenny each received a prestigious award, which also included a $10,000 donation to Ronald McDonald House of Central Ohio – the winners’ charity of choice. When a child is in the hospital, as the child was in this case following the rescue, the family needs to be close. Open 365 days a year, the Ronald McDonald House helps facilitate family-centered care that fosters health and well-being for the whole family. Incident response While working in the utility industry involves risks workers are fully safety trained to react to incidents Columbia Gas of Ohio is a brand of NiSource Inc., one of the largest fully-regulated utility companies in the U.S., serving approximately 3.5 million natural gas customers and 500,000 electric customers across six states. While working in the utility industry involves risks – from electrocution and falls to chemical exposure, fires and explosions – workers are fully safety trained to react to incidents. Layers of protection Both award winners say they have experienced emergencies before, but never one quite like this situation that involved a child. Blackline’s award-winning G6 wearable single-gas detector, G7 personal gas detectors, and G7 EXO area gas monitors are built for extremes and the toughest conditions, with GPS-enabled location tracking providing layers of protection to ensure a critical lifeline during an emergency. Cloud-connected monitoring platform Supported by Blackline Live, the company’s powerful, cloud-connected monitoring and analytics platform, the technology enables organisations to view in real-time all their workers’ locations and gas readings in the field and configure their devices, from any Internet-connected smartphone, tablet, or computer, no matter how remote the location. Blackline Safety Impact Awards will be presented annually in a variety of award categories, including customer, channel partner, and environmental heroes, in addition to community heroes.
Expert commentary
When a bomb detonated in the Port of Beirut, I had hundreds of employees under my care inside the blast zone. Within just two hours, I was able to determine who was impacted, understand their safety conditions, and share resources for on-the-ground support—all thanks to mobile technology. For Chief Security Officers, receiving calls like these launches a variety of protocols and necessary decision-making with the safety and security of people and assets as a top priority. And these calls are only becoming more common. Dependence on threat intelligence Mobile phones have dominated the post-COVID environment where people work from anywhere Threats ranging from natural disasters to geopolitical conflicts are becoming more frequent and complicate the responsibility organisations have in keeping their people safe. To meet these needs CSO’s are staying ahead of negative outcomes through creating a greater dependence on threat intelligence. In these times, effective, real-time risk management depends on hyper-local data from technology that is accessible, portable, and dynamic–such as cell phones. Mobile phones have revolutionised the way people live and work. They allow us all to walk around with a computer in our pocket, bringing the world to our fingertips and eliminating digital borders for over 90% of the world's population. Mobile phones have dominated the post-COVID environment where people work from anywhere and have geographically distributed teams but are also more vulnerable to threatening events. Mobile-friendly risk management platforms Mobile technology assigns workers with easy entry to data that can help keep them and their teams safe As we approach 2024, many organisations are adopting comprehensive risk management tools that empower personnel across the organisation with the intelligence and knowledge they need to stay safe wherever they are. Mobile-friendly risk management platforms, such as Crisis24 Horizon, provide always-on awareness, on-hand threat intelligence, and immediate communications and distress signalling through location monitoring. Users receive location risk assessments and push notifications directly to their devices about nearby issues and threats no matter if they are on or off the job. While only select risk managers have complete control of the platform and all sensitive employee data is protected through encryption, the app distributes critical intel to foster a culture of shared awareness and responsibility. Thus, mobile technology empowers employees with easy access to information that can help keep them and their teams safe. Creating a culture of mobile technology adoption In the last few years, the world has proven the importance of being well-informed of risks and mitigation plans to minimise harm. However, psychological barriers tend to trump physical barriers when it comes to accessing the vast array of tools our mobile devices offer. World has proven the matter of being well-informed of risks and relief plans to minimise harm Adopting this technology and establishing a culture that enforces risk management across an organisation is a daunting challenge that demands substantial commitment from leadership to be successful. Some companies have tackled this challenge by positioning security technology as part of the organisation’s employee benefits package, such as commuter benefits and health insurance, to encourage people to take advantage of these resources and learn how to use them. Cohesive risk management culture Technology is only as effective as the people whose actions it informs, which is why adoption and integration are so important. When a cohesive risk management culture meets a powerful technology platform, individuals are enabled to receive threat alerts and counter their impacts, letting others know when and how to take the necessary precautions to protect themselves and their team. For more information on mobile technology and other security trends, check out the Global Risk Forecast, an annual report by Crisis24 that provides a comprehensive analysis of key events around the world most likely to affect operations in the coming year.
Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications. From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physical security systems Hospitals in particular have developed into multi-faceted spaces that house hundreds to thousands of patients, staff and visitors at any one time. In England for example, research has found in the three months leading to June 2023, an average of 44,626 people visited major hospital A&E departments each day, with over 16 million attendances typically recorded over the course of a year-not to mention an additional nine million logged at other minor units. For any building, this level of sustained footfall can request severe security difficulties For any building, this level of sustained footfall can invite severe security tests. With that, the need to deploy effective physical security systems in healthcare is clear. And so, as access control continues to become more readily adopted and new products enter the market, decision-makers are reminded to consider the requirements of their building, ensuring they select the solutions most suited to their settings and budget. Security controlled Patient safety will always remain the top priority in healthcare settings, and where matters of health and social care come into question, a diverse set of professional regulatory bodies are tasked with setting and maintaining high standards. When it comes to healthcare premises specifically, patient security and perimeter security often come hand in hand and are amongst the most pressing of challenges that decision-makers must face. To help address operational planning and potential design concerns in the NHS, the Health Building Note (HBN), provides general design guidance for healthcare buildings under HBN 00-01-citing the use of access control measures as a way of maintaining security and protecting the safety of patients, staff and visitors. Use of access control Hospital buildings control varied levels of access for a number of security purposes Hospital buildings, for example, must control varied levels of access for a number of operational and security purposes. Routine scenarios exist where vulnerable patients are under monitoring and thus refrained from exiting the premises for their own safety, while at the same time, permitted staff must be able to reach their patients and medicines when required. For this, the use of access control is key. Equally, access credentials can also help management teams keep track of those who may be entering or exiting rooms with equipment and pharmaceutical supplies, deterring any unwanted visitors and opportunists in the process. Incorporation of access control systems On a similar note, regulations have set a minimum standard for how personal data should be stored and managed in healthcare environments, giving decision-makers an added responsibility to regulate staff-controlled areas with patient medical records. While instances of personal data breaches are rare, healthcare facilities and professionals are at legal risk should confidential data be found misused or missing. As such, the incorporation of access control systems has become essential in keeping data storage areas secure, with intuitive online systems capable of permitting access to staff with the correct credentials while simultaneously tracking who has requested clearance at digital entry points. HBN guidance Healthcare experts are better fitted to control the sheer volume of people entering and exiting To function effectively, healthcare facilities must always be perceived as safe places by the people who reside within them, and as HBN guidance implies, a unified physical security system can help address key safety and security concerns while enhancing patient and staff experience. Opportunely, access control systems are more accessible and adaptable than ever and combine several technologies such as mechanical locks and automatic doors with electronic access credentials in the form of smartphone apps, badge readers and biometric scanners. By integrating these systems into the building’s existing infrastructure, healthcare professionals are better equipped to control the sheer volume of people entering and exiting the premises without impairing the general flow of movement and coordination around the facility. Better by design Despite the clear benefits offered to healthcare facilities, there are a number of considerations to be mindful of when choosing an access control solution. Poorly implemented systems can have an adverse effect on security and functionality - quickly costing healthcare organisations time and budget to rectify and replace the inadequate products that don’t meet the building’s requirements. For that reason, decision-makers and design teams are reminded that there is no single solution that fits all healthcare buildings. As such, it’s crucial for decision-makers to understand the systems that are being put in place throughout each of the touchpoints in their facility. Clear collaboration is required during periods of specification, where together, teams can ensure the selected product works on all angles, from meeting fire safety and sustainability standards to aesthetics and scalability. Modern access control products Scalability is a key area that decision-makers must review when selecting access control systemsFrequently overlooked, scalability is a key area that decision-makers must review when selecting access control systems. Such is their diverse nature; healthcare facilities can often change and develop as years go by, and by selecting a system that facilitates growth, such as a cloud-based solution-security and efficiency is long-established. While modern access control products are known for seamless integration, there are some systems that may restrict the ability to use different vendors throughout the remainder of the building’s infrastructure. This, in effect, causes a monopolisation of products throughout the estate, which can have an adverse effect on growth by increasing costs and reducing the levels of service associated with the security system already in place. Improve security and safety A scalable and reliable access control system will continue to improve security and safety by adapting to a building’s new requirements-and all while having minimal impact on its operational network. And so, while technology will no doubt continue to influence and transform the access control market, healthcare facilities and their professionals must continue to remain educated on their own systems, ensuring they have the best options in place to keep their patients, staff and visitors safe and secure for years to come.
Security systems represent a significant investment, yet many organisations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance or drive operational efficiencies. Consumption gap When users aren’t tapping into the full power of the solution they bought, they aren’t realising their full return on investment. This creates a consumption gap. It’s a situation that has the potential to go in one of two very different directions. A misreading of a system, its capabilities and functionality can fast result in user discontent Left unchecked a consumption gap can create frustration for system integrators, manufacturers and end users alike. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction. Leading to a greater likelihood that they’ll look to change or focus investment into overlapping and likely competing solutions. Customers’ security goals Addressed appropriately it can help manufacturers, system integrators and end users to build trusted partnerships in which everybody wins. Understandably, systems integrators are primarily focused on installation—delivering reliable solutions that meet customers’ security goals to ensure their long-term success. However, engagement can go beyond deployment. Closing the consumption gap can be a strategic way to differentiate yourself from competitors. The deeper you understand your customer’s business, the better advice you’re able to offer—and the stronger the partnership you form. Why do consumption gaps exist? For customers, finding the time to learn multiple capabilities of a security system can be time-consuming. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks. Often, taking use of new tools and keys takes a backseat to the speed of daily tasks There are many reasons why customers may not be taking full advantage of the features available to them in their security platform. They may feel overwhelmed by a steep learning curve after deployment and might delay diving into the additional system features. Sometimes, there might be a lack of awareness of the technology’s full capabilities, and despite a willingness to learn, there are few options for training. Often, it can simply be they are not aware of the benefits of their system or are too busy with day-to-day and urgent tasks to learn other features. Bridging the consumption gap Systems are built to deal with a wide variety of use cases and broaden market appeal, but the goal isn’t to get everyone to use all the features of every product. You want to guide your customers towards the features and functionality that best meet their needs. This could entail reducing the friction they experience in their day-to-day operations, solving unique issues related to their business, or addressing their most important challenges. Having these conversations with your customers deepens your relationship and can organically open up new revenue streams. Continuous engagement allows you to recommend other relevant products or services that they may find helpful. Customised training plan Customers can learn at their own pace and gradually expand their understanding of their system Furthermore, customers are often not able to implement all features at once. You can help by proposing a plan to gradually evolve systems and processes over time. This could include a customised training plan to get the most value from their investment. Some manufacturers are also now providing learning management tools that system integrators can pass on to their customers. Customers can learn at their own pace and gradually expand their understanding of their system in accordance with their bandwidth. This allows them to get more out of their system. Simplifying deployment With the right software partners, systems integrators can focus on solving customer problems, not reactively troubleshooting issues. Look for manufacturers who offer good support systems for integrators. This includes not only quality technical support but also configuration and training services you can build on. Look for partners that offer tools and consultation services you can use to complement your value-added services, either to spend less time on the basics or for specialised expertise on complex projects. Beyond support and services, one telling sign is the configuration interface and tools that you as an integrator will primarily interact with. Ask yourself whether the manufacturer invests in their back-end tools and their primary user interface. Is there a noticeable difference between these two interfaces in terms of look and feel? Does one feel more dated? Widening consumption gap The harder it is to implement upgrades, the more reticent customers are to make the changes If the end user interface is easy to use but changes on the back end are difficult, the resulting friction can contribute to the widening consumption gap. It can become too time-consuming or difficult to upgrade or make changes to the system. The harder it is to implement upgrades, the more reticent customers are to make the changes. Configuration should be painless. If the system has a solid graphical user interface, you’ll be able to interact with the software in a fluid and intuitive way. When the system is intuitive for both you and your customers, you spend less time on setup and training. You can invest more attention in value-added activities. Conclusion A consumption gap could be a sign that technological innovation is outpacing people's ability to implement them in their day-to-day lives. You can work with your customers to simplify the adoption of the innovations so they can more easily implement them and realise the full value of their investment. By reviewing opportunities to bridge the consumption gap for your customers, you increase the likelihood of growing and renewing your system and service contracts. You also build relationships as a trusted partner. Customers will turn to you when looking to expand their security system and proactively solve new and incipient problems.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Case studies
Intellicene, the pioneer in intelligent security management platforms announced that Cass County, Iowa, has deployed the Intellicene Symphia mobile dispatch and response communication platform to enhance emergency operations and drive more informed, rapid response across the region. EMS challenges Cass County, a rural area encompassing 565 square miles of primarily agricultural land, has faced recent challenges in providing timely emergency medical services (EMS) due to decreased volunteers and reduced manpower. The county’s wide geographic area has further complicated emergency response efforts. However, growing risks and a burgeoning population have facilitated the need for robust emergency operations and response. Iowa United First Aid (IUFA) programme Cass County implemented Symphia NowForce, a state-of-the-art dispatch and response platform The State of Iowa’s implementation of the Iowa United First Aid (IUFA) programme allowed Cass County to address the critical gaps in its emergency response infrastructure. Developed by Lieutenant Governor Adam Gregg, IUFA aims to bridge crucial gaps in emergency services. With the support of IUFA, Cass County implemented Symphia NowForce, a state-of-the-art dispatch and response platform, to address these challenges and modernise its emergency response services. Symphia NowForce NowForce offers unparalleled situational awareness by seamlessly integrating real-time data into a single view. Using live and historical event data, GIS maps, responder positions, reporter inputs, and other external source information, security teams can efficiently dispatch the closest, best-equipped, and most appropriate personnel and help stakeholders remain informed and connected regardless of location. Quick response time “Whether it’s an emergency, accident, natural disaster, fire, or another safety event, an accurate and immediate response is critical,” said Erik Johnson, Cass County First Aid programme Coordinator. “Cass County is committed to ensuring its residents and businesses remain protected and have access to emergency services whenever needed." Public safety Cass County’s implementation of Symphia sets a precedent for improved operational effectiveness "Symphia NowForce has empowered us to reduce response times to approximately three minutes from the time of the 9-1-1 call. This expedited response time ensures greater safety, saves lives, and enhances collaboration between our first responders.” Cass County’s implementation of Symphia sets a precedent for improved operational effectiveness and public safety, showcasing the system’s critical role in bridging gaps in emergency services. Real-time situational awareness “Access to the right data at the right time is the difference between informed, rapid response and delayed operations. Symphia’s dispatch and response solution saves lives by ensuring quick responses to incidents and revolutionises how the country handles security events." "With technology like Symphia, emergency personnel can respond more intelligently, view real-time on-site situations, and share information instantly.”
When students come to study at the prestigious Les Roches Marbella campus in Spain, they are not just attending one of the world’s major hospitality business schools, they are also enveloped in extraordinary innovation and sophisticated living to mirror the exceptional experiences they are being prepared to facilitate in their future careers. Real-life training site The institution aims to serve up “academic rigor with a twist of innovation and entrepreneurship” to its 1,000+ students from all corners of the planet who collectively represent more than 80 nationalities. This real-life training site for elite hospitality professionals must offer an authentic, hands-on experience to its students — one that reflects the luxurious living and progressive comforts expected from high-end hospitality properties and their employees. Digital badge One particular aspect they sought to enrich was integrating “digital badge” access across the coastal Mediterranean To ensure Les Roches is always ahead of the curve and a model campus when it comes to exemplary learning based on cutting-edge technologies, administrators wanted to evolve its mobile ecosystem. One particular aspect they sought to enrich was integrating “digital badge” access across their coastal Mediterranean property in Spain. Project objective The project’s objective was to migrate to a mobile credentials-based system where a student’s plastic access card is replaced by a digital ID on a smartphone. This would serve as the verification for daily physical access and digital touchpoints (e.g., building access, vending machines, restaurant reservations, etc.). This effort would also allow the school to steer digital transformation and student efficiencies throughout its security and administrative functions. Catering to student experience “Everything here is about the student experience,” said Mano Soler, Director of Student Services and Operations at Les Roches Marbella. “It is our main driver and the reason we embrace and foster innovation because innovation makes our students’ lives easier and supports their well-being through secure technology. The students will eventually leave this campus and, in turn, take that know-how and excellence into the world with them.” Case study challenge The team wanted a mobile solution to fit specific campus requirements such as swift access For 10 years, Les Roches Marbella relied on an RFID (radio frequency identification) card-based system to identify and grant access to students. This was a fundamental tool that nearly 1,000 individuals needed to have with them at all times to validate themselves day in and day out. Supporting their quest for digital transformation, as part of the school’s Spark incubator programme, the leadership team wanted a mobile solution to fit specific campus requirements such as swiftly granting/removing accesses, avoiding disruption when students lose/forget cards, and accommodating a multi-system environment. Need for a mobile credentials-based system Management also wanted to drive improvements through back-office processes and procedures to save time and resources and enhance everyday life on campus through modern technology. One of the most pressing factors for this particular mobile initiative was to achieve higher efficiency around the school’s new student intake registration/check-in process each semester. Loading ID credentials individually onto RFID cards, then printing each of the 1,000+ cards, meant corrections along the way were inevitable. System re-adaptation Yet, the transition to mobile didn’t come without a series of obstacles and serious considerations. Each touchpoint where a card was to be replaced with smartphone technology required deep analysis and complex integration work, specifically involving seven to eight different brands whose products were already deployed throughout the premises (e.g., printers, vending machines, security technologies, door access, laundry facilities, parking garages and more). Les Roches required an access partner with solutions compatible with the many other products already in play within its existing infrastructure, and an ability to successfully address former system re-adaptation. iOS and Android support The mobile technology needed to support both Android and iOS phones, as well as physical card technology In addition, the mobile technology needed to support both Android and iOS phones, as well as physical card technology (the RFID ecosystem would remain intact for non-student purposes and serve as a migration path for other areas not yet mobile). The school wanted a single company to supply both the hardware and software elements. And, as a higher education establishment with upscale expectations and an outstanding reputation, the Les Roches decision-makers required a proven partner of this same ilk. HID solution To transform technologies and reach new degrees of onsite productivity and novel amenities, Les Roches Marbella selected HID for its unmatched mobile access portfolio. As a market pioneer in trusted identification and authentication, and with a network of partnerships that spans the globe, HID’s experts designed a system to meet each requirement from the school resulting in a tremendous collection of 40+ access points featuring mobile identification, app, portal, and reader technologies. Mobile components from HID The integration project was completed within an accelerated time frame to ensure it was in place before students set foot onto campus that fall. HID components that comprise this robust mobile ecosystem include HID OMNIKEY® readers and reader modules (OMNIKEY 5427, OMNIKEY 5127CK Mini, OMNIKEY 5127 Reader Core), HID Signo™ access control readers, HID Seos® mobile credentials, Aperio® locks from ASSA ABLOY and Aero™ X100 door modules. HID access technologies With a slight tap or wave of their smartphone, students interact easily with the mobile ecosystem and via the digital Seos credential to authenticate themselves as they move throughout the property each day. HID access technologies are embedded in: Parking garage systems Building entrances Vending machines Laundry facilities Printers Point-of-sale at restaurants/on-campus eateries Restaurant access control Class attendance tracking Dorm room door locks Mobile-first world “You cannot discount the value of mobile when it comes to today’s student populations,” said Soler. “It is their way of life. They were ‘born digital’ and they have an expectation when it comes to smart living, for them, it’s a mobile-first world. We get it. We embrace it. And, we intend to attract and retain students by offering them an unparalleled educational experience while here in Marbella.” Efficiencies and integration “We not only transformed our campus with epic mobile access technology but also drove important efficiencies and integration into everything we touched." "The value and inventiveness HIDexperts contributed to constructing this complicated mobile ecosystem is completely in line with our ongoing quest to ensure that innovation is at the heart of the Les RochesWay of Life," said Carlos Diez de la LastraGeneral Manager Les Roches Marbella. Results achieved HID credentials available via a smartphone make scaling individual access up and down significantly easier Tying back to one of the original reasons for this mobile initiative, registration check-ins are streamlined, and Les Roches Marbella has gained immediate improvements around this important event that takes place each semester. 100% of students use the mobile access system on campus. Students register digitally with the option to do so in-person, ahead of time, or remotely with no human interaction. HID credentials available via a smartphone make scaling individual access up and down significantly easier for IT, faculty, and students. A unique, homegrown handheld tool On a case-by-case basis, Les Roches Marbella is already finding ways to apply its in-house ingenuity to foster disruptive thinking. The school used 3D printers to design a customised case to house phones/tablets alongside HID access modules creating a unique, homegrown handheld tool that easily allows campus security personnel to check IDs as required. This safety support tool came about when there was no suitable offering available on the market to meet the school’s specific needs for security checkpoints. Automated student attendance tracking The flexibility and power of HID components enabled the team to re-imagine and invent an original Les Roches security product to, as always, improve the student experience. Many new use cases are in the works to fuel future “wins” across the premises. Automated student attendance tracking is already at the beginning of each class period and serves as another way to further support and protect students. Mini computers and readers were installed in each classroom so students could use their mobile ID (via their smartphone) to mark attendance. API-based interfaces, Aero door module When students go back to their dorm rooms any time, each door loc is integrated with the Aero door module All is handled by a web application running on the mini-computer that pushes and pulls data to/from the Les Roches Absences application in real time through API-based interfaces. And, when students go back to their dorm rooms any time, each door loc is integrated with the Aero door module, providing them with a seamless experience across the entire campus. Mobile authentication and verification “Our eyes are wide open to all the possibilities afforded by the marvelous world of mobile authentication and verification, and each week we come up with new ideas for the continued transformation we have in motion on our campus,” said Juan Luis Velasco, IT Manager at Les Roches Marbella. “Our students love this newfound convenience, and our staff members are reaping the benefits of this technology overhaul.” Best-in-class mobile access system Les Roches Marbella has a best-in-class mobile access system that squarely aligns with the school’s wider objective to be an example of innovation and excellence in global hospitality training both within its own brand family, as well as within the broader realm of higher education. Beyond elevating the student experience through the convenience of mobile IDs and strengthening security when it comes to student safety and mobile ID verification, Les Roches Marbella has an extremely efficient, flexible, and scalable solution that can grow with them as technologies evolve and digital trends continue to transform and connect us all to an international degree. Benefits of digital transformation “This is a story about the value of mobile and any size campus in any sector of education can benefit from the digital transformation angles when it comes to campus business,” said Velasco. “But the most rewarding aspect truly is connecting to our students in a way that’s important, convenient, and meaningful to them keeping them connected and secure via a device that’s already an extension of their existence.”
Geekplus, the global pioneer in mobile robot and smart logistics solutions, has deployed the first Shelf-to-Person PopPick project in the Nordics for one of the biggest online pharmacy wholesalers in the region, Med24.dk. System Teknik partnered on the Denmark project, which includes three PopPick stations and 30 Shelf-to-Person robots, bringing a flexible solution to a region where fixed automation still dominates. "With the rise of e-commerce, Med24.dk had been struggling with huge sales growth coupled with fast delivery demands from customers in Denmark, Norway, Sweden searching for pharmacy, health and beauty products. Peak season events had also caused considerable strain to their operations," said Blond Shkodrani, channel partner manager for the Nordics at Geekplus. "Due to their overwhelming success, Med24.dk needed a modular, automated order fulfilment solution for fast, efficient order fulfilment." Order fulfilment challenges Shelf-to-Person takes goods of all sizes while removing the need for infrastructure investment The Geekplus modular Shelf-to-Person solution optimises warehouse operations using mobile robots to transport shelves. In a region where fixed and cubic solutions have been the trend during recent years, Shelf-to-Person handles goods of all sizes while removing the need for infrastructure investment, making it the most flexible response to order fulfilment challenges. PopPick workstations use two retrieval arms and four presentation locations to present pickers with multiple, moveable 78-tote racks at one time, resulting in an industry-pioneering throughput of 450 totes per hour. PopPick can store goods of all types and sizes; the solution is not limited to small pieces and improves ergonomics for workers while picking. It also takes up less space than traditional systems, so customers can use more stations without adding facility space. Mobile order fulfilment solutions "We are very pleased to invest in flooring robots from Geekplus," said Med24.dk CEO Nils Træholt. "We believe that this new and innovative technology can help us realise our growth ambitions, while maintaining good delivery times for the benefit of our customers." Morten Kirch, System Teknik's CSO, added: "Due to Med24.dk's growth, we are thrilled to be able to deliver a tailor-made, automated solution that matches their needs." Geekplus offers a suite of Goods-to-Person mobile order fulfilment solutions-the only comprehensive robotic offering controlled by a single software platform. "Through trusted partners like System Teknik, we're showing customers all over Europe that Geekplus truly is a one-stop shop for modular warehouse automation," Shkodrani said.
Tenant and homeowner expectations in the multi-residential sector are evolving fast. Digital access offers a solution that fits a contemporary ethos blending design, functionality, technology, and sustainability. STAY by Kronos is a fast-growing developer and service provider in Spain’s build-to-rent (BTR) property sector, where business is booming: Investment grew over 17% between 2021 and 2022 alone. Such high-profile success attracts more providers who compete for location, quality, and customer satisfaction in the services they offer. The rental market is tightly regulated, so operational time- and cost-efficiency are essential. New twin-building site They sought convenient, user-friendly, connected control for both homes and common areas STAY already operates properties in cities including Córdoba and Tarragona and so understands the opportunities offered by digital access. For a new twin-building site in Madrid, they sought convenient, user-friendly, connected control for both homes and common areas including a gym and co-working space. The solution needed to be convenient and secure for residents — and make it easy for facilities managers to work efficiently with service providers who often require temporary access to the site. Convenient, secure mobile digital access STAY by Kronos chose ASSA ABLOY’s SMARTair® wireless digital access solution. Building managers now quickly cancel any lost credentials and issue new ones — remotely if necessary — which reduces operating costs, maintains building security, and provides the flexibility they need every day. Main door entrances are unlocked via SMARTair Wall Readers. Residents can conveniently access and move through the building with a regular smart card, RFID keyring or the SMARTair Openow app, which stores secure mobile keys on their personal smartphone. Secure, battery-powered i-max Wireless Escutcheons lock 121 apartments and shared amenities (gym, play area and so on) across both buildings. No cabling or major door modifications were needed during installation. Temporary mobile access SMARTair saves time managing the many providers who offer services to tenants For residents, the convenience advantage over metal keys is a big plus: “They have the key virtually on their mobile phone, so we are sure they won't lose it and they find it very useful,” says Carlos Rodríguez-Bailón Fernández, Managing Director at STAY by Kronos. From a facilities perspective, SMARTair saves time managing the many providers who offer services to tenants. Programming temporary mobile access to common spaces like a dining boutique via TS1000 Web is fast and intuitive. Digital locking with a security deadbolt The SMARTair i-max has inbuilt features designed to enhance security and give residents extra peace of mind. It is easy for them to lock their front door by simply pushing its handle upwards activating the deadbolt projection with a secure 3-bolt lock. Similarly, the i-max anti-panic mechanism guarantees quick emergency exit, even when the door is bolt-secured. Thanks to these security benefits and feedback on resident satisfaction, SMARTair is now the standard solution for all STAY by Kronos projects — in Madrid, Tarragona and beyond. “With ASSA ABLOY there was always that trust in an established company, a longtime pioneer in the market with a quality track record,” said Carlos Rodríguez-Bailón Fernández, adding “They were also our technology ally.”
The university stands out as a highly esteemed institution, particularly renowned among enthusiasts of science and technology. With its effective educational approaches, the institution experienced a surge in enrolment, necessitating an upgrade from outdated communication technology within its premises. Furthermore, with plans for expansion in the upcoming academic year, there's a growing need for modern communication technology to streamline communication across various buildings and offices. To delve into their challenges: Limited Capacity System: The existing system proved to be obsolete and lacked sufficient capacity to handle the communication demands across offices within the same institution and across multiple locations. Communication Among Multi-Located Offices: As the University embarked on an expansion project, including the establishment of a new building at a distant location, there arose a need for seamless connectivity between this new site and the main building in the form of a multi-location communication solution. Need for Upgradation: The absence of modern features such as multi-party Conferencing and Unified Services for Mobility highlighted the necessity to upgrade their outdated communication system. Scalability and Redundancy: They sought a solution capable of effortlessly adapting to future requirements, ensuring smooth scalability for forthcoming applications. Furthermore, incorporating redundancy measures was deemed essential to guarantee uninterrupted operations. Solution Devised a tailored Multi-Location contact solution aimed at enhancing and raising Matrix Comsec, in collaboration with Rutvi System, meticulously examined the challenges faced by the university administration. Through collaborative efforts, they devised a tailored multi-location communication solution aimed at enhancing and expanding the existing infrastructure by leveraging Matrix Telecom Solutions. This involved the implementation of a Hybrid IP PBX and integration of a Media Gateway to streamline communication processes and ensure readiness for future demands. The Matrix solution comprises: At location 1 within the university complex, the Hybrid PBX, ETERNITY LENX, was installed. Alongside digital key phones, multiple analog phones were also connected at this site. An IP connection was established between location 1 and location 2. Utilising the ETERNITY LENX with SARVAM Gateway ENT, a PRI Gateway arrangement from location 1 facilitated an IP connection to the ETERNITY MENX at location 2. Digital key phones and multiple analog phones were integrated into location 2. The Matrix Multi-Location communication solution seamlessly interconnected both locations while incorporating a range of modern communication features. This fosters enhanced adaptability and versatility within the organisation, offering optimal advantages for contemporary communication needs. Results The implemented solution not only provided them with access to modern communication features but also facilitated smooth communication across their expanded infrastructure. The Hybrid PBX Systems, including ETERNITY MENX16SAC and ETERNITY LENX27SDC, offered scalability for up to 2000 IP Users, ensuring future readiness. Moreover, the Hot Swappable Card feature ensured uninterrupted operation and simplified maintenance, while the redundancy feature ensured high availability and continuous communication. With the SARVAM Gateway ENT Licence, they were able to utilise SARVAM as both a Unified Communication Server and Gateway simultaneously, eliminating the need for additional investments. The EON510 - Premium Digital Key phone offered advanced call amenities such as Global Directory Integration and Advanced Call Routeing, enhancing employee productivity and efficiency. The multi-location communication solution provided by Matrix seamlessly connected multiple buildings for the University, while the incorporation of modern communication features made them more efficient and prepared for the future.
A highly esteemed private Science and Technology University situated in the Charotar region of Gujarat originated from a parent organisation dedicated to social service through education for over 125 years. Recognising its excellence, the Gujarat Government has designated the university as a "Centre of Excellence." With approximately 1700 faculty members and 8000 students, the institution stands as a prominent hub for education in the region. Modern communication technology This university holds a distinguished reputation among science and technology enthusiasts Challenges - This university holds a distinguished reputation among science and technology enthusiasts. Its enrolment has increased thanks to successful educational approaches, rendering outdated communication technology within its buildings obsolete. Furthermore, there are plans for expansion in the upcoming academic year, incorporating modern communication technology to streamline communication across various buildings and offices. To further delve into the difficulties they face: Outdated and insufficient capacity: The system demonstrated obsolescence and inadequate capacity to handle communication loads within both single and multi-location institutions. Communication issues among multi-location offices: The university was in the process of expansion, establishing a new building situated at a distance that required seamless connectivity with the main building. Lack of modern features: The absence of contemporary features such as Multi-party Conferencing, Unified Services for Mobility, etc., provides them with a motive to modernise their antiquated communication system. Scalability and redundancy: They needed a solution that could easily adapt to future requirements, guaranteeing seamless scalability for upcoming applications. Furthermore, the incorporation of redundancy (backup) was essential to ensure uninterrupted operations. Streamlining communication processes Matrix Comsec meticulously examined the challenges faced by the university authorities Solution - Matrix Comsec, in partnership with Rutvi System, meticulously examined the challenges faced by the university authorities. Collaboratively, they formulated a tailored solution for multiple locations. The proposed strategy concentrated on improving and extending the existing infrastructure through the integration of Matrix Telecom Solutions. This included the implementation of a Hybrid IP PBX and the integration of a Media Gateway to streamline communication processes, preparing them for future requirements. The Matrix solution includes: The Hybrid PBX, known as ETERNITY LENX, with Gateway, was situated within the University complex at location 1. Alongside the digital key phone, analog phones were linked in location 1. Location 1 was linked to location 2 via an IP connection. The ETERNITY LENX, along with SARVAM Gateway ENT, facilitated a setup of PRI Gateway from location 1, assigning an IP connection to ETERNITY MENX at location 2. In location 2, a collection of digital key phones and several analogue phones were interconnected. The Matrix Multi-Location Communication solution seamlessly merged both sites, offering a range of contemporary communication features. This results in enhanced adaptability and flexibility within the organisation, delivering optimal benefits for modern communication needs. Enhancing employee productivity Results - The adopted solution enabled them to experience the benefits of up-to-date communication features while ensuring smooth communication throughout their expanded infrastructure. The Hybrid PBX Systems, namely ETERNITY MENX16SAC and ETERNITY LENX27SDC, offered a user scalability capability of up to 2000 IP Users, positioning them for future needs. Furthermore, the Hot Swappable Card feature guarantees uninterrupted operation and simplified maintenance. The incorporated Redundancy ensured a high level of availability and seamless communication. The SARVAM Gateway ENT Licence empowered them to utilise SARVAM both as a Unified Communication Server and Gateway concurrently, eliminating the need for additional investments. EON510 - Premium Digital Key phone comes with next-gen call amenities like Global Directory Integration, and Advanced Call Routeing. This helped the institution to make the best out of these modern features by enhancing employee productivity and efficiency. Matrix's Multi-Location solution allowed the University to effortlessly link various buildings, and the contemporary communication features made them more efficient and well-prepared for the future.
Products
Round table discussion
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organisation, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
White papers
Moving to mobile: A guide for businesses switching to mobile access control
DownloadCyber security and high security in a business integrated world
Download5 reasons to integrate mobile technology into your security solution
DownloadPreparing your organisation with quality situational awareness
DownloadThe evolution of cards and credentials in physical access
Download9 Opportunities To Upgrade Your Access Control Technology
DownloadVideos
Mobile communications: Manufacturers & Suppliers
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download