Ruggedized products
LYYN AB, a pioneer in real-time image processing for bad visibility conditions, has received an order from a major US Defence Contractor for 100 units of the Eagle product. The order has a six-digit value in USD. Enhancement solution providers The LYYN products are destined for use in national defence and security, and have been tested by the defence contractor and their customer over the course of one year, in different types of degraded visibility conditions. “We are very proud to hav...
Artificial Intelligence Technology Solutions, Inc., announced that its wholly owned subsidiary, Robotic Assistance Devices, Inc. (RAD) introduced RIO, a portable, solar-powered security solution. RIO is the company’s first product announced for a wider market sector, positioning RAD solutions outside of the traditional manned-guarding security industry. RIO (ROSA Independent Observatory) RIO (ROSA Independent Observatory) continues the productisation of RAD...
Established in 1991, Matrix is a pioneer in Security and Telecom solutions for modern organisations. Matrix offers a comprehensive range of solutions for IP Video Surveillance, Access Control, Time-Attendance, and Telecom applications. The solutions are designed to meet the communication and security requirements of large enterprises, SMEs, and SMBs. As a technology-driven and customer-focused organisation, Matrix invests in manufacturing world-class products that are indigenously researched, d...
Allied Universal®, the global security and facility services company, completed its strategic acquisition of Attenti Group, one of the electronic monitoring companies. This enables the combination of Attenti and G4S Monitoring Technologies, to create a pioneer in electronic monitoring solutions. With combined revenues of over $160 million and operations in 35 countries, the new company will offer customers access to technology innovation and an even greater depth of expertise and support....
ZeroEyes, Inc., creators of the only A.I.-based platform focused on weapons detection that holds the US Department of Homeland Security SAFETY Act Designation announced a roadshow to support active shooter training events at multiple U.S. schools. The company will conduct demonstrations and discussion sessions to educate schools and law enforcement on how to prepare for and respond to active shooter scenarios by leveraging A.I. gun detection software supported by real-time threat intellig...
VIVOTEK, the IP surveillance solution provider, is proud to announce it will showcase its FE9192-H recessed fisheye network camera with Trend Micro IoT Security during ISC West 2022, held in Las Vegas, Nevada. from March 23-25 at the Venetian Expo and Convention Centre, booth #22015. “The FE9192-H is a small camera with big functionality, featuring a detailed 12-Megapixel resolution sensor for superb image quality with a diameter of only 82mm,” explained David Liu, President of VIVO...
News
Dragonfruit, the award-winning, highly scalable AI analytics platform, is introducing Dragonfruit Frontier, a new cloud VMS with AI analytics included, at this year’s ISC West, booth #20069. This is the first time Dragonfruit is demonstrating the frontier solution in front of a large-scale audience since the launch in February. “We are excited to showcase Dragonfruit Frontier’s capabilities, integrations, and hardware for the first time in a trade-show setting at ISC West,” said Amit Kumar, Founder, and CEO, Dragonfruit. Fully integrated experience “Frontier was designed with the user in mind with minimal install requirements, budget-friendly licensing, and low bandwidth requirements, so to finally demonstrate this product in-person to potential users is very exciting.” Frontier is designed for multi-location enterprises that are not able to deploy expensive GPU hardware Frontier delivers a fully integrated experience, combining consumer-grade usability with enterprise-grade capability. Using advanced cloud intelligence, Frontier allows users to securely manage hundreds of locations from a single browser without any additional hardware costs. Frontier is designed for multi-location enterprises that are not able to deploy expensive GPU hardware across all their sites (for on-premises AI), and do not have enough upload bandwidth for cloud-based AI. User-friendly solutions Frontier is the world’s most powerful base station, offering an installation experience enabling users to go from unboxing to live in just minutes. The state-of-the-art base station is built on the Apple M1 platform – another industry first – providing the most advanced OS and the most cost-effective GPU performance. Following the Dragonfruit mission of delivering cost-effective and user-friendly solutions, Frontier works seamlessly with an organisation’s existing analogue and digital cameras, meaning no rip-and-replace installs or product lock-ins. With pay-as-you-go advanced features, users can start with the VMS and add more features as needed, either à la carte or by packaged suite.
The next generation of the Nexkey Core is here. Meet Nexkey Core II. Nexkey Core II is a smart cylinder that transforms any type of mechanical lock, door, cabinet, or locker into a smart, cloud-connected device, able to be managed and unlocked via a smartphone. Back in 2019, the original Nexkey Core had won the best new product in wireless access control at ISC West, the largest show for physical security solutions, because of the uniqueness of it being one device making any type of mechanical door smart. No hubs, no wires, no additional hardware required. Traditional access control Since then thousands of businesses have not only used the Nexkey Core to replace their keys with the mobile phone to unlock doors but the product also enabled them to have the ability to gain intelligent insights around their space from measuring space occupancy to analysing the flow of people. Businesses also gain an audit trail for the first time where it wasn’t possible before. The improvements in Nexkey Core II helps customers easily maintain the product The improvements in Nexkey Core II helps customers easily maintain the product, improve the daily user experience and bring the vision of eliminating every key in the world closer to reality by extending compatibility far beyond traditional door locks to nearly any type of mechanical lock. Nexkey Core II drove Nexkey toward new verticals and more opportunities where traditional access control falls short. Better user experience They improved the design of Nexkey Core II to make battery changes even faster and easier. The battery is now more secured in its housing, and the redesign of the handle and concave secure screw allows a smoother process from start to finish. Engineering made a major change to the handle to ensure a better user experience when rotating Nexkey Core II to unlock. The unique shape of the new handle allows for a better and more natural grip when unlocking a variety of lock types. This new handle also makes Nexkey Core II more durable from any potential damage. Outfit mechanical locks Audit logs will distinguish between a regular unlock and proximity unlock made by the user Without having to pull out the phone and open the app, users can now unlock Nexkey Core II with proximity unlock. Audit logs will distinguish between a regular unlock and proximity unlock made by the user. Admins can turn this feature off for added security by requiring the user to open the app. This feature works with iOS and Android devices. Nexkey Core II can now outfit mechanical locks on popular cabinet types like cam, plunger, ratchet locks, and more. This is specifically helpful for customers like retailers who manage access for hundreds of store associates and need to secure every retail cabinet to battle internal theft. With this change, Nexkey Core II has expanded access management beyond doors, to secure assets in lockers, cabinets, and more with one platform. Physical security industry How will Nexkey Core II change the physical security industry? - How they work and where they work has drastically changed in the past two years. Access is really at the heart of the massive physical transformation that is happening to accommodate flexible work. 66% of business decision-makers are considering redesigning physical spaces According to the 2021 Work Trend Index by Microsoft, 66% of business decision-makers are considering redesigning physical spaces to better accommodate hybrid work. In Nexkey’s 2021 Access Control Trends Review, the mobile credential is the #1 choice for people to access their office, and 62% of managers want to see trends in occupancy and space usage from their access control system. Access control industry The current state of the access control industry has been solely focused on entries of buildings, keeping the bad guys out. This market opportunity is way bigger. With the next generation of Nexkey Core II, they are pushing the envelope once again, making it possible to transform every type of mechanical lock throughout the building into a cloud-connected device with one product. Businesses can efficiently operate their spaces and secure people and assets with Nexkey Core II while simplifying access and gaining data throughout their space, not just the perimeter. In this new normal, automation and data throughout a smart building will be key. Businesses are making these investments now. And Nexkey is uniquely positioned to be the one to make this transition happen. Simplified access management CANOPY explains how easy it is to use Nexkey Core to make their now 100+ offices keyless What type of businesses will benefit from these Nexkey Core II changes? - For the past three years, Nexkey Core has been a game-changer to bring simplified access management, mobile credentials, and data to every part of the office. CANOPY explains how easy it is to use Nexkey Core to make their now 100+ offices keyless across multiple co-working locations where they are able to easily manage access to all staff and members with one unified system. They are continuing to expand to this day. “We for sure wanted something that was all mobile, all cloud and really no additional hardware or expertise required. Our goal was something as seamless and really invisible as possible. Getting in and out of your private office should be effortless. We've achieved that with Nexkey,” says Steve Mohebi, Co-Founder at CANOPY. Securing interior spaces Nexkey Core II, can add every one of those environments onto the Nexkey platform Now because of the changes to Nexkey Core II, they are expanding beyond office spaces into every type of environment. In this new normal, gyms not only need to manage 24/7 access across staff and members, but also need to secure various interior spaces including lockers. Healthcare facilities need a real-time audit log for medicine cabinets or specimen lock boxes just as much as they need to control access to the front door. One device, Nexkey Core II, can add every one of those environments onto the Nexkey platform. Uninterrupted shopping experience One type of business recently found the Nexkey Core II themselves, retailers. Retail stores face a huge issue with internal theft, and their solution so far has been to lock these items up and give the managers the physical key. Now customers wait 15-20 minutes just to unlock baby formula, body wash, chargers, almost everything these days, and theft hasn’t been eliminated. Nexkey Core II allows retailers to easily grant access to every store associate for every door, and now with the extended lock types, every retail cabinet. Managers will get a full audit trail for all unlock activity. If an item is stolen, they know exactly who had access and when. Theft has drastically been reduced and customers have a faster, uninterrupted shopping experience. Servicing cloud access Nexkey Core II installs in minutes with zero wiring and no additional hardware The physical security industry has been just serving as the tip of the iceberg for how access can transform a business. They’re excited to see how they can change access to every physical space in the future. What is the advantage of Nexkey Core II for system integrators? - One of the biggest issues they hear from integrators is not having the talent and resources to make this transition into servicing cloud access control systems, even when they know this is the future. Nexkey Core II installs in minutes with zero wiring and no additional hardware like the controllers or hubs needed with other smart cylinders on the market. Incredible overnight transition With the Nexkey Core II, partners are able to start bringing cloud-based access control to their customers. No certifications or training is required. The opportunity is massive. With one retail store, their partners were able to deploy over 300 locks in just under two days, an incredible overnight transition not possible with any other enterprise-grade product available. They are showcasing the next generation of Nexkey Core II in Las Vegas on March 23-25th at ISC West. Stop by booth L24 to get a demo. They’re right in the lobby in front of the expo main entrance.
At ISC West – March 23 - 25, 2022 in booth 11053, Bosch will showcase new products, services, and software for creating customised solutions that enhance security, improve safety, and deliver data for business insights. Booth visitors will experience deep neural network-based video analytics, a new Video Surveillance as a Service (VSaaS) offering, the first combination intrusion and fire control panel that connects with a public address system, and the latest version of Access Management System from Bosch. An immersive solutions area will also provide interactive demonstrations of integrated systems that address challenges often faced by end-users. Connected security devices “As our industry moves toward the next generation Internet of Things (IoT) that combines artificial intelligence (AI) with IoT, there are new possibilities for connected security devices beyond their traditional uses," said Brian Wiser, Regional President of Bosch Security and Safety Systems, North America. Bosch AIoT video products act as sensors, gathering information on activity or objects in an area" "Bosch AIoT video products act as sensors, gathering information on activity or objects in an area to strengthen the protection of people and property and provide business insights that bring new value to organisations. Solutions built on these intelligent sensors are shaping the future of security – one that assists users to predict unforeseen or future situations. They can help prevent things from happening or assist in uncovering business opportunities that create new revenue streams or reduce costs. When combined with intrusion, access control, and communications systems, there is even greater opportunity to improve security, safety, and operations for users.” Video management software To demonstrate the full power of integrated solutions, Bosch will simulate an office building within its booth. In this area, visitors will experience how combining intrusion detection, AIoT video products, access control, and communications technology enable increased security and safety, more efficient monitoring and control, and automated audio announcements. For example, access control integrated with intrusion detection and AIoT video products benefits high-risk areas. Using dual authentication, users must present a credential at an access control reader and enter a pin on a keypad when accessing a high-security area. Integration with Bosch AIoT cameras ensures that any attempts to enter the area by unauthorised individuals will trigger the video management software to display video of the location at the operator workstation. Partner software offerings Bosch G Series is the first combination intrusion and fire control panel to meet UL2572 requirements This capability will be demonstrated with the Bosch Video Management System, Genetec Security Center, and Milestone XProtect, showing that customers can benefit from integrated solutions whether they choose a complete Bosch solution or combine Bosch technology with partner software offerings. With integrated audio announcements, visitors will also see how activating an emergency pull station connected to a Bosch intrusion control panel can trigger the Bosch public address system to play emergency instructions through a loudspeaker, improving safety for building occupants. Bosch G Series is the first combination intrusion and fire control panel to meet UL2572 requirements for mass notification. As a result, G Series now provides control, visual annunciation, and central station reporting for mass notification applications. Improving traffic flow ISC West attendees will also experience how new deep neural network-based video analytics helps distinguish, count, and classify vehicles, including cars, trucks, buses, motorcycles, and bicycles in congested scenes with precise detail. It can also detect and count people. Users can make informed decisions to avoid safety issues, ease traffic congestion, and reduce emissions This technology is built-in to Object Classification (OC) versions of the latest Bosch INTEOX fixed and moving cameras and provides improved detection of people along perimeters as well as people and vehicle counting in crowded spaces. Interactive demonstrations in the booth will present ways to use data captured by the cameras to improve traffic flow, parking management, and intersection safety. The solutions help users keep vehicles and people moving efficiently while gathering information on roadway and parking lot usage. With these insights, users can make informed decisions to avoid safety issues, ease traffic congestion, and reduce emissions. Video security footage Video Surveillance as a Service (VSaaS) by Bosch is a new offering that enables users to monitor, manage, record, and replay video security footage in the cloud from anywhere. It helps site managers, security operators, or operations staff makes quick decisions when faced with alarms, preventing them from becoming incidents. With VSaaS, cameras are the only hardware investment needed on-site, which benefits many businesses – especially those with multiple sites or remote locations – and reduces their capital expenses. It also eliminates maintenance and decreases costly site visits for storage equipment and server upkeep, while creating new recurring revenue streams for integrators. Bosch will also introduce Access Management System 4.0. This simple, scalable, and highly resilient system offers a solution for medium- to large-sized organisations with support for up to 400,000 cardholders, 10,000 doors, and 400 divisions. Enhanced situational awareness A Master Access Controller ensures that system controllers continue to communicate with each other For high availability, a Master Access Controller ensures that system controllers continue to communicate with each other and share necessary information from card readers in the event of a server failure. Up to 15 configurable threat levels – such as secured, open, or custom configurations – means that safety measures can be initiated quickly in critical situations. Access Management System 4.0 also integrates seamlessly with the Bosch Video Management System and B and G Series intrusion control panels for increased security and enhanced situational awareness. In addition, the new Bosch Security Manager mobile app provides flexibility for users to monitor and control B and G Series intrusion systems remotely. Capabilities include arming and disarming, adding, deleting, and changing user passcodes, and receiving push notifications. Users can also access live video from Bosch cameras integrated with their systems.
David Moser has been appointed as Senior Vice President & Head of Digital Access Solutions EMEIA. He succeeds Stephanie Ordan in the post, who became Executive Vice President & Head of ASSA ABLOY Global Solutions late in 2021. David’s role will focus on continuing to strengthen ASSA ABLOY’s position as the pioneer in access control solutions across EMEIA. He will oversee the continued efforts in market education and exciting product developments from ASSA ABLOY’s brands across Europe, the Middle East, Africa, India, and the SAARC countries. Digital transformation journey ASSA ABLOY’s access control solutions are trusted in multiple sectors including education, healthcare, multi-family housing, offices, public institutions, critical infrastructure, and many more. David joined ASSA ABLOY in 2017 where he has held the role of CTO and Vice President of Product Innovation David joined ASSA ABLOY in 2017 where he has held the role of CTO and Vice President of Product Innovation for the last four and a half years, leading the transformation of the division’s innovation and product development organisation and has been at the centre of the digital transformation journey. David joined ASSA ABLOY from the automotive industry, where he held several international management positions in product development and management, operations, and marketing. Energy-harvesting technology “I am proud to lead the next chapter of ASSA ABLOY Opening Solutions EMEIA’s digital transformation, with focus on the international expansion of our existing and new product lines. The Incedo Ecosystem remains at the core of our digital strategy, and we will continue to extend this formidable IoT Platform with access control and electro-mechanical locking devices.” “The next step of Incedo’s evolution is to provide offline functionality through the Cloud, combined with key-based digital cylinders which do not require batteries and are powered by our sustainable energy-harvesting technology. Incedo will then start combining the best of ASSA ABLOYs leading technologies that will create maximum value for our customers.”
OrderWork, a provider of installation services across the UK has announced its partnership with Yale, a global giant in door access and security solutions. The two companies have joined forces to provide Yale's customers with on-site installation services for its smart product range. 218 million smart products were bought by UK consumers in 2020, an increase of 22% on the previous year. The trend to request an installation service on the back of a smart product purchase has resulted in OrderWork growing its workforce to 6,500+ engineers and installation technicians. High-quality security This partnership marks an official start for Yale to provide customers with a superior product + service purchase combination. James Anderton, CEO of OrderWork said, "We're delighted to add a world-famous brand to our already impressive stable of partnerships, which includes Currys, Samsung, and Amazon. Often customers prefer to have technology products installed by professionals for peace of mind. Yale's customers can now buy high-quality security and locking solutions knowing that the installation will be carried out by skilled technicians." Duncan Chamberlain, Managing Director at Yale UK said, "The appetite among consumers for smart, connected products has dramatically increased. Our range of products is designed to offer reassurance to customers, of which correct installation is an important part. We're delighted to partner with OrderWork and provide customers with quality products, backed by quality services."
Speed and accuracy are critical to finalising door specifications in any complex architecture project. Working with ASSA ABLOY’s Openings Studio specification consultants helps Sweden’s TM Konsult to support customers of every size with clearer information. Collaboration speeds up the process and allows architects to focus on building design. Door and security specification can be slow and laborious. For architects and designers who may be unfamiliar with the technical detail of door solutions, it can be a drain on valuable design and creative time. Complex door environments ASSA ABLOY’s specification consultancy service provides this expertise. Specification experts help to ensure everyone involved in a project can access up-to-date information quickly. This service and local knowledge are available in regions and markets all over the world. TM Konsult has worked with ASSA ABLOY Opening Solutions on multiple projects including hotels In Sweden, TM Konsult has worked with ASSA ABLOY Opening Solutions on multiple projects including hotels, residential developments, and public buildings. They range from 50 to more than 1,000 doors in size. Door solutions and specification are critical elements within every project’s overall Building Information Modelling (BIM) process. “Being able to have support for complex door environments is super valuable and time-saving,” says Jonatan Jacobsson, Engineer Architecture at TM Konsult. Data-rich collaboration The BIM process is an ongoing dialogue, a process which helps architects, building contractors, investors, and project owners to work collaboratively. More than just workflow management or virtual modelling, BIM is a data-rich collaboration. One important, time-saving result is that every product specification is placed within a comprehensive, up-to-date, digital model of the building. “All our projects are done today with the support of BIM in some way,” adds Jacobsson. “The value is there from day one, for the consultant as well as the customer.” Specifiers from ASSA ABLOY Opening Solutions contribute directly throughout the BIM process. Their specialized knowledge is available to architect and client throughout, including dedicated, specification meetings. Efficient collaboration also enables transparent communication of critical project changes, so TM Konsult can address concerns and remedy errors fast — which keeps the project on track and the client happy. Digital collaboration environment During specification set-up, architects can send door information directly from Revit Working closely with ASSA ABLOY consultants helps TM Konsult to deliver complete proposals for compliant door environments at an early stage. With door experts on board, decisions are made quickly and discussions are faster to conclude. To supplement specification input from ASSA ABLOY, TM Konsult uses Openings Studio software as a digital collaboration environment. This intuitive package is optimised to work with popular design programs including Autodesk, Revit and Graphisoft, Archicad. During specification set-up, architects can send door information directly from Revit, saving time and ensuring accurate information transfer. When new decisions about a door package are made, the architect or designer can instantly update the specification with chosen products and parameters. Openings Studio can then export updated door specification information directly back into the project’s design. Openings Studio also facilitates communication with the client. Customers prefer to receive information in different ways: Openings Studio has the flexibility for TM Konsult to present it in a way that suits each one.
Expert commentary
TOA Corporation (UK) Ltd discuss what changes COVID-19 has bought to the installation of VA/PA Systems and how the integration of IP has impacted on that. With a year and a half of global uncertainty, we have seen huge changes in what VA/PA systems will need to deliver in order to provide safe and robust solutions with advanced zone and directional messaging. The impact of COVID has pushed installers to re-think what end-users need long-term to manage any future changes in guidelines especially for large events and complex applications such as travel hubs and how the integration of IP will assist with installing safe systems in the future. Providing public announcements PA/VA has been one of the few parts of our industry that has remained consistent and buoyant during the lockdown. It has been the ideal time for public buildings to upgrade as restrictions did not apply to the construction industry and many installations were actually fast-tracked in the hope that when restrictions lifted commercial properties could open as quickly as possible. PA/VA has been one of the few parts of our industry that has remained consistent This was coupled with the knowledge that changes would have to be made to address the increased demand in providing public announcements outside the standard evacuation messages that most VA/PA have been traditionally used for and enable the impact of having to be flexible to deliver multiple messages. Flexible system management So what is changing? Leading in VA/PA is the availability of IP which enables more flexible system management. It allows installation/solution management engineers to offer remote access to complex systems from a central control room meaning that they can maintain and control systems from one hub and operate for multiple areas on large complex sites such as an airport or stadiums. This provides not only a better level of technical coverage across a whole site but also allows an engineer to monitor and fault find without the delay of waiting to being able to access a specific area. This is especially important for vulnerable applications such as schools and health facilities as it enables them to control and reduce the amount of interaction with engineers they need to give physical access to – therefore reducing risk. Potentially less maintenance This makes it more financially viable for both the end-user and the maintenance provider Long-term, IP also makes these systems much more cost-effective. For example, one engineer can manage a hub of multiple locations with potentially less maintenance call-out costs. This makes it more financially viable for both the end-user and the maintenance provider to justify the initial investment. With these systems being paramount to people’s safety remote intervention allows for swift fault finding and problem resolution in a more effective response time and cost-effective way. To enable this the biggest development has been the integration between product manufacturers and software developers. They have been able to collaborate greatly to get products such a horn speakers to connect via industrial standard network protocols giving much greater flexibility in remote system management. Multi-rack systems The technology involved in VA/PA, especially integrating with IP, has seen huge growth recently and we are involved in projects that involve multi-rack systems to enable controlled zone management and evacuation options with greater collaboration between integrators to get the systems to work effectively. VA/PA systems must be at the forefront of long term solutions and sustainability As more people are allowed to gather in larger numbers public-facing buildings need to address their evacuation and voice announcement procedures in order to be compliant. They need to be able to deliver clear and effective messages to their visitors in order to remain open whenever guidelines change. VA/PA systems must be at the forefront of long-term solutions and sustainability. The other area of VA/PA that has changed immensely in the last 18 months is the vast difference in messaging requirements that organisations need. Public safety announcements Systems that have been used infrequently for emergency situations only are now delivering daily messages with public safety announcements. In reality, although we all hope that we will never go back to the peak of lockdown, installations must be robust to cope with any situation in the future. Many smaller spaces that wouldn’t have thought they would need a PA system at all now understand that they too have an obligation to deliver public information and guidance and on a regular daily basis and this will lead to system designs being scaled up and down to meet the broadening array of applications that require VA/PA and how this is managed in the event that new protocols have to be introduced. Detailed technical plans Systems should be certified on the European Standard EN 54-16 and should be expertly designed Design and planning should be key when sourcing the right solution. Systems should be certified on the European Standard EN 54-16 and should be expertly designed to specification with detailed technical plans and tailor-made to the requirements of the end-user. With people’s safety in your hands, you cannot get these systems wrong so it is important that installers are able to draw on the expert technical team resources that we, as a manufacturer, offer in adhering to this standard and for us to be able to provide a commissioning service to sign off on these important safety systems. Compared with traditional lights and sounders systems we believe the future of evacuation will be voice-based. In our ever-increasing culturally diverse world we have to embrace systems that need to be multi-lingual or be able to dedicate a message to a specific target audience and be able to be drilled down to zones and give much more directional information. Multi-zoned academies As office buildings get taller, health facilities become super hospitals or schools upgrade into multi-zoned academies we have to be able to evacuate or hold back evacuation to enable safe crowd control. In order to facilitate this VA will have to replace traditional systems or work in tandem with them. We must point out that in residential high-rise properties the primary method of evacuation, to comply to BS 8629, would still be traditional lights and sounders even if you install a separate VA system. Voice Alarm and Public Address is a long-term investment, especially as the global situation may take many years to recover, and as manufacturers working with our integrators and software developers we must continue to lead in the development of the best systems to ensure we can keep everyone safe.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from innovative cyber threats. Security solutions enterprises Organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organisations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organisations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analysing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognise we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organisation's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organisation’s defences, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organisation's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious behaviour Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organisations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behaviour on your network and can prioritise threats for SOC teams for faster remediation. In-depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organisations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organisations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organisations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioural analytics The solution can then know when to remove an adversary before a breakout occurs Behavioural analytics and machine learning capabilities identify known and unknown threats by analysing unusual behaviour within the network. These have the ability to provide an essential first line of defence, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organisations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organisation cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organisations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organisations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organisations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
Security beat
Zigbee is a familiar name in the smart home arena, and the Zigbee Alliance is expanding its technology approach to address the challenges of the Internet of Things. As the Internet of Things (IoT) has evolved, the need has become obvious for stronger unity among brands and ecosystems to enable products within smart environments to work together more easily. Working to serve that need is the Zigbee Alliance, which seeks to promote collaboration in the Internet of Things by creating, evolving, and promoting universal open standards that enable all objects to connect and interact. Shifting the smart home market Their IoT effort took off when Amazon, Apple, Google and the Zigbee Alliance announced an industry working group in December 2019 to take the ‘best of market’ technologies from smart home standards, portfolios and ecosystems and to develop a ‘super spec’ that will be open, inclusive and a significant industry shift in the smart home market. Zigbee Alliance has been for a while now working on openness and interoperability" “Zigbee Alliance has been for a while now working on openness and interoperability, which has led us to the Project Connected Home over IP (CHIP), which is looking to unify the environment, under one technology, one certification program and one logo,” says Chris LaPré, Zigbee Alliance’s IoT Solutions Architect. “It really does fuel IoT possibilities, whether in security or any other sectors.” Project CHIP is a royalty-free connectivity standard that unifies brands and ecosystems into a single smart home automation system that operates any other technology based on Internet Protocol (IP). Simplifying product development The intent is to simplify product development for device manufacturers, broaden consumer choice, and to ensure easy discoverability, deployment and engagement to fuel connected living. “We have noticed that, as the IoT has evolved, there is a stronger need for unity, which is why we are developing Project Connected Home over IP,” says Jon Harros, Zigbee Alliance’s Director of Certification and Testing Programs. “It fits with the Zigbee Alliance’s goal to unify systems, and to focus on everyone using the same application at the top. It unifies that environment, whether you are integrating your system with Amazon Echo devices or connecting to Google Home.” Participating in development of Project CHIP are 125 companies of various types from around the world working together with more than 1,100 of their experts serving across sub-committees to formulate specifications and fine-tune the project. Home system technologies The original Zigbee protocol is used for many applications around the world, including smart homes Although the technology is being developed for the home market, the specifications have been formulated with an eye toward expanding into the commercial market in the future. Development of open, interoperable systems provides greater freedom for consumers to choose among the many technology choices on the market, without being tied to a single brand or ecosystem. Zigbee Alliance certifications and memberships span the globe, with roughly a third in Europe, a third in North America and a third in Asia. Involvement in Europe is slightly higher than the other regions. Alliance members represent manufacturing sites all over the world. Project CHIP is a newer initiative of the Zigbee Alliance, which previously developed Zigbee Pro to enable home system technologies to operate using IEEE 802.15.4 wireless signals on the 2.4GHz radio band over a self-healing true mesh network. The original Zigbee protocol is used for many applications around the world, including smart homes. Certification transfer programme Among the strengths of the Zigbee Alliance are years of experience certifying products, which includes testing them and confirming that they comply with the promoted specifications and functionality. The specifications are open standards that are developed in cooperation with all the companies that are Zigbee Alliance members. Another route is the certification transfer programme, in which a company chooses a certified white-label product, becomes a member of the Alliance, and then rebrands the product while retaining the certification. “It helps them get products on the market quickly while they build their own knowledge base,” says Harros. “All our work is focused on standardising the behaviour and functionality of products and making sure everyone is following the same standard to get interoperability,” says Harros. “Members all contribute to the standards.”
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organisations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organisation’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetise the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organisation. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organisations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organisations, not technology. If we truly understand the risks to the organisation, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organisations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organisations.
Case studies
Marshalls Landscape Protection, part of hard landscaping manufacturer Marshalls plc, has designed and supplied Hostile Vehicle Mitigation (HVM) solutions as part of a development commemorating Sikh soldiers who fought during the First World War, in Smethwick, West Midlands. Sandwell Metropolitan Borough Council was approached by the Smethwick Guru Nanak Gurdwara (GNG) temple, with a proposal to commemorate the centenary of the end of the First World War by creating a statue of a WW1 Sikh warrior. Supporting the proposal, the council has also created a paved public area and a new green space as a setting for the statue – meaning the development not only functions as a memorial but provides a new space for the local community to enjoy, enhancing the public realm. Potential vehicle collisions Having impressed on previous projects, and possessing a wealth of industry experience and expertise, Marshalls Landscape Protection was asked by Sandwell Council to be involved with the development. To discuss this involvement is Dominic Renney, Specification Development Manager at Marshalls: “We were brought in to design and develop a number of protective elements for the project, and to support the council with technical direction.” Marshalls Landscape Protection was asked by Sandwell Council to be involved with the development During discussions between Marshalls and the council, it was decided that because the project is located next to two main roads, the design should include protection against potential vehicle collisions. Dominic explained the considerations that were made: “Being a place of memorial, we were fully aware that we had to protect the site as unobtrusively as possible. In agreement with the council, we specified products that would guarantee safety against vehicular threats discreetly, helping to keep people safe, not scared®.” Red reflective band To protect the site against potential threats, Marshalls’ RhinoGuard® Protective Bollards, part of its Hostile Vehicle Mitigation (HVM) product portfolio, were used to enclose the majority of the site’s perimeter. Specified in a stainless-steel finish with a red reflective band, the bollards are fully crash tested in accordance with the BSI PAS 68 standard, capable of stopping a 7.5-tonne lorry traveling at 40mph completely in its tracks. To introduce some additional greenery to the development, and to break up the perimeter, Marshalls cast concrete BellitGiove Planters were also specified. Manufactured using polished brown porphyry precious stone, the planters provided an elegant and visually appealing means to add shrubbery into the environment. Providing technical support The memorial site and green space have become a hub for the local community to pay their respects Responsible for installing these products, was R W Services Contractors Ltd. Speaking on his experience during the project is John Hallahan, Commercial Manager at R W Services Contractors Ltd: “We have installed Marshalls’ products many times before this project and we never have any issues. That was true again in this instance, it was a very straightforward and neat job. Marshalls were on hand throughout the installation to provide technical support when it was needed and were more than happy to offer advice. This was really helpful and made the installation far easier for us.” In the time since its completion, the memorial site and green space have become a hub for the local community to pay their respects and enjoy the public realm. Offering his thoughts on the project is Steven Wall, Senior Engineer at Sandwell Council, saying: “The project has been a huge success, providing a fitting space to commemorate the brave sacrifice made by Indian and Southern Asian soldiers who fought during the Great War. We are very happy with the products and services provided by Marshalls and believe they have complimented the statue and surrounding site perfectly.”
In 1959, eight dairies in the Parmigiano Reggiano area founded the CCS Consorzio Caseifici Sociali. Over the years, the business has expanded to include the production and maturing of Parmigiano Reggiano. In 1995, the Granterre Consortium was established, bringing together the entire Parmigiano Reggiano dairy chain, and then almost ten years later, in 2004, control of Parmareggio Spa was acquired. In 2019 Bonterre Spa, the holding company under which the control of Parmareggio Spa and Grandi Salumifici Italiani Spa (controlled by UNIBON) was established. Fire detection system Then in 2021, Agriform Sca (pioneer in the production of Grana Padano PDO and the main Veneto PDOs such as Asiago, Piave, Montasio, and Monte Veronese) merged with Parmareggio Spa to create the first Italian company in the world of PDO cheeses and cemented this new company as the pioneer in the Italian food industry. Hochiki was the appointed manufacturer to supply the life safety system and devices In 2021, the site at Sommacampagna required an upgrade of the fire detection system. Hochiki was the appointed manufacturer to supply the life safety system and devices due to their experience and expertise in the Italian fire safety market. Within food production sites, the temperature and humidity inside the environment must be carefully controlled to comply with food hygiene laws, and because of this, these sites can be notoriously complex buildings to design and install fire safety systems for. Fire detection system The customer was looking for a high-performance fire detection system that would not be affected by these environmental factors, and most importantly avoid false alarms which can halt production and cost the company thousands of Euros for every minute the site is not fully operational. The installation team also needed to pay particular attention to the installation of cables and piping. As a specialist in aged cheese production, it was imperative that the delicate work of the cheese wheels and the hot marking of the upper layer of the Parmesan rind was not affected during the installation project. One of the benefits of Hochiki products to this project was the ease of installation and ease of use of the devices which had minimal impact on the business. Life safety system The flexibility of the Hochiki ESP protocol made it possible, through the CHQ-SZM2/SCI Zone Modules" To meet the requirements of the project, the installer NET Technologies Srl chose Hochiki’s pioneer system L@titude to be the brain of the life safety system. This innovative fire detection technology combines the very latest hardware and software to produce a control and indication system which is powerful and sophisticated, yet simple to use and understand via a graphical interface. Mirko Corsini, Project Manager at Hochiki Italia said: "The installer chose Hochiki’s L@titude panel together with our SPC-ET beam smoke detectors, which are characterised by low power consumption at rest and incorporate a sophisticated algorithm of automatic compensation to environmental changes. The technical features of these products make them perfect for meeting the needs of this type of food processing environment. The flexibility of the Hochiki ESP protocol made it possible, through the CHQ-SZM2/SCI Zone Modules, to integrate conventional detectors (SPC-ET) as if they were addressable devices, without having to use auxiliary power supplies that would have required additional cables and batteries." Short circuit isolators Detectors with short circuit isolators were installed to ensure the system complied with the requirements of UNI EN 9795, which states that a short-circuit isolator must be installed for each room/compartment. This detector removes the need to use Ionisation Smoke Sensors in many applications Intelligent Photoelectric Smoke detector with SCI incorporates Hochiki's newest High Performance Chamber Technology. This detector removes the need to use Ionisation Smoke Sensors in many applications. This also allows the sensor threshold level to be increased, thereby improving the signal to noise ratio, and reducing the likelihood of false alarms. Throughout the site Intelligent Loop-Powered Wall Sounder Beacons and Visual Alarm Devices were installed to ensure a fully compliant and state of the art fire safety system. Fire detection system Commenting on the project, Fabrizio Bergamin, Technical Coordinator at the installer company NET Technologies srl, said: "We chose Hochiki devices and system because of the technical characteristics and reliability that this brand offers, as well as a wide range of products that fully meet market demands. Post commissioning of the project, the operating conditions envisaged in the design phase have been amply met. Over the course of the next year, there will be further implementations of the fire detection system at the Parmareggio production site, with distributed intelligence solutions or with several autonomous and networked L@titude control panels.” “During the project we have had to deal with several technical design studios to solve various kinds of system problems; a fundamental role, together with the products they offer, is played by the Hochiki Italia technical support. They have responded competently to regulatory and design aspects, as well as proposed solutions for particular applications."
With 1,300 cameras recording 24/7 and more than 1,000 investigations to process per year, Massachusetts General Hospital’s security team was not able to keep up with the vast amounts of recorded video. Now, BriefCam Syndex Pro for fast video review, search and analysis, embedded within a Milestone XProtect video management software (VMS) platform is making efficient and effective video investigation possible. Existing IP network Massachusetts General Hospital’s (MGH) Police, Security and Outside Services Department provides some security services to many other Partners hospitals and facilities. Following its recent digital conversion, unified on the Milestone XProtect VMS platform, MGH’s security team was able to expand camera coverage by adding new Axis network cameras directly to the existing IP network. MGH’s security team was able to expand camera coverage by adding new Axis network cameras directly “The number of investigations we were doing was taking huge amounts of time in terms of reviewing video, and that was really a waste of time,” said Bonnie Michelman, MGH Executive Director of Police, Security and Outside Services and Consultant for Partners Healthcare. Enterprise risk management The hospital environment presents unique challenges to security, Michelman points out. MGH’s 17-acre urban campus, comprising 29 contiguous and 14 separate buildings (including underground and freestanding garage facilities), is complex. The security team must also take into account not only the main location, but also dozens of satellite facilities around the Boston area. “We can’t cover all of these facilities with security staff,” said Michelman. “We need to augment heavily with very good, state-of-the-art technology that allows us to combine our intelligence, labour, policies, and procedures, in order to create a better holistic approach to enterprise risk management.” Highly volatile population MGH’s security team at the same time is challenged by the clinical team’s need for increased efficiency Charged with creating a safe environment, MGH’s security team at the same time is challenged by the clinical team’s need for increased efficiency through lowering the length of stay and moving patients through the hospital as quickly as possible. The 24-hour Emergency Room, with its anxious, highly volatile population presents challenges of its own. In addition, patient elopement and patient wandering – unauthorised departures from the medical facility, whether intentional or unintentional – pose liability threats that can be very damaging to a hospital. Remote satellite locations A unified system was required to balance the video surveillance needs of a busy hospital campus with remote satellite locations while upholding the highest level of security possible, maintaining operational flow, and providing customer satisfaction that includes expectations of privacy. The BriefCam solution ties in seamlessly with the Milestone video management solution Michelman, together with MGH Senior Manager, Systems and Technology Robert Leahy, decided on the Milestone XProtect VMS platform. The camera count was increased from 400 to 1,300, and standardised with Axis network cameras connected directly to the IP network. To deal with the marked increase in video data, MGH’s team chose BriefCam Syndex Pro, a powerful set of tools intended to reduce the time and effort needed to conduct video reviews, post-event video investigation, and real-time video monitoring. The BriefCam solution ties in seamlessly with the Milestone video management solution, providing efficient workflow for investigators. Providing efficient workflow According to Michelman, BriefCam has already proven invaluable. A two-year-long ROI examination of video surveillance use at MGH has shown a progressive rise in success rates with the use of video in incident investigations. “I see BriefCam as a very important part of our toolbox of excellent practices for protecting what is a very complex environment of tangible and intangible assets,” said Michelman. BriefCam Syndex Pro’s ability to present video metadata in graphic visualisation format, such as bar graphs, pie charts, and the like, has opened up new realms of possibilities to extend the role of CCTV video beyond security into organisational efficiency and more informed, data-driven decision making. Safeguarding hospital community Now we can manage the content and we can see trends, which in turn can drive redeployment of resources" “In the past, there might have been things that would have been a ‘nice to do,’ but we couldn’t do it because we didn’t have resources to watch many hours of video,” said Michelman. “Now we can manage the content and we can see trends, which in turn can drive redeployment of resources, and by extension, facilitate a better investigative focus and success.” BriefCam Syndex Pro embedded within Milestone XProtect VMS platform is helping MGH in its mission to effectively and efficiently protect and safeguard the hospital community. Michelman said: “We’re happy with these products, but it’s not just about the quality of the technology, it’s about the quality of the partnership. You know, it’s easy to sell a product, but to sustain it, service it, and be there after it is in is really very critical for us.”
TPV Group has deployed Xerafy's Roswell rugged RFID tags in its manufacturing process to improve efficiency and visibility in its manufacturing processes. TPV Group supplies body and chassis assemblies, seats and seat components, engine gaskets, and automated guided vehicle (AGV) solutions to automotive manufacturers. The company operates five production sites in Slovenia as well as one in Serbia and has more than 1,200 employees. Automatic identification integrator The company engaged Slovenian automatic identification integrator LEOSS d.o.o. to develop a new RFID-based system to improve TPV’s production and packaging processes. The solution replaced an existing barcode-based system that required more manual effort from employees on the manufacturing floor. The company engaged LEOSS d.o.o. to develop a new RFID-based system “In order to create a solution that would meet TPV’s requirements, we had to select RFID transponders that could operate while mounted on metal carriers and that would be resistant to the effects of chemicals and high temperatures,” said Franci Nadles, Owner of LEOSS. “We also needed to program and configure the fixed RFID readers to avoid cross-reading of the carriers, and develop software that can capture data from the RFID tags and send it to the various control systems that TPV uses in its production processes.” Closed-loop system TPV Group has implemented Xerafy’s RFID transponders with fixed readers and antennas as part of a closed-loop system, so the tags are only read on TPV’s production line as they circulate throughout the facility. The tags are attached to customised product carriers in which various metal parts are suspended. These carriers are transported throughout the production facility both on special carts and an overhead conveyor belt. Different components may be loaded on each carrier simultaneously but must be harmonised so the parameters of technological procedures for each production phase are the same for each carrier. Automated guided vehicles TPV envisions the RFID tags forming the basis for a ‘smart factory’ that is completely automated Information about the parts on the carrier and production management details are entered into the system as the parts are loaded, and associated with the RFID transponder. A robotic system manages where the carriers are sent for processing using the RFID tag data and automated guided vehicles (AGVs). Eventually, TPV envisions the RFID tags forming the basis for a ‘smart factory’ that is completely automated. Because the RFID tags provide high visibility and accuracy, the employees who package the products at the end of production always receive the appropriate product control and packaging instructions. Surviving high temperatures The Xerafy Roswell tags have also ensured that TPV can provide full track-and-trace capabilities throughout the production process. During manufacturing, the parts travel through a number of harsh treatment processes, including pre-treatment of the surface, cataphoresis coating, drying at 180 degrees Celsius, and powder coating. The Roswell tags are highly resistant to these processes throughout repeated production cycles and can be kept in service over a long period of time. The Roswell UHF tags have a read range on the metal of up to 5 meters and can survive high temperatures up to 250 degrees Celsius. They are also resistant to paint and chemical exposure.
The time and cost to trace more than 300,000 surgical instruments used in the Charité CFM Facility Management have been a big challenge for a long time. Instruments are easily mixed up even when they are sterilised or laser engraved, and devices can be difficult to read when contaminated. Also, it is not easy to service the instruments properly or document the product lifecycle. In February 2016, Charité finally found the solution and successfully deployed a ground-breaking surgical instrument tracking system that uses Xerafy autoclavable RFID. Stress during transport Sadmir Oasmancevic, Department Head, and Stefan Preuss, Team Leader of the Instruments Management and Central Sterile Supply Team explain that the hospital launched two pilot projects to test RFID transponders applied to the surgical instruments with specialised adhesive. The transponders are read during the preparation process, as they are added to the cleaning devices, and in packaging prior to sterilisation. The facility did rigorous testing which included chemicals, mechanical stress during transport, material expansion during high temperatures, etc, to ensure the durability and performance of the attached Xerafy tags during at least 500 sterilisation cycles. Iodine-containing substances The adhesive must also hold the RFID transponder permanently without the risk of it becoming dislodged The adhesive was also carefully selected. “Firstly, the adhesive used must be biocompatible. Any risk to the patient from the adhesive must be completely eliminated,” said Osmancevic. The adhesive must also hold the RFID transponder permanently without the risk of it becoming dislodged. “We were able to test all the treatment processes that were used throughout the usual life cycle in test scenarios. There were no problems. In real operation, the instruments come in contact with blood, saline, and iodine-containing substances. We do not anticipate that this will affect the adhesion, but we will observe this closely.” Developing RFID devices Osmancevic also mentioned that the adhesive used did not affect the product approval as the medical instrument was not been structurally modified, and they have maintained close contact with instrument manufacturers to validate this. Furthermore, the new tagged surgical instruments did not influence the use of the product, and the doctors and staff who used the tagged tools every day were able to confirm this. “In sterilisation, we have demonstrated that we can bring higher quality to processes by using RFID. And it gets further. The opening of a new CFM building in 2017 will be based on further employment of developing RFID devices,” noted Osmancevic.
A new large scale social housing complex, developed by Metroman Ltd, has joined forces with Videx UK to install a state-of-the-art door entry system for its residents. The London based development is split into 11 apartment blocks - Anika House and Jasleen Court - and fitted with Videx’s flagship VX2200 door entry system along with Videx MiAccess access control and hands-free video monitors. Suitable entry system Installer Dave Abrams, who owns DA & Son, was asked to recommend a suitable entry system that not only provided first rate security but was also easy for residents to use and convenient too. As well as meeting residents’ needs, the system also had to meet specific regulations, including Secured by Design (SBD), a police initiative for designing out crime to improve the safety and security of where people live. SBD’s product-based accreditation scheme - the Police Preferred Specification - provides a recognised standard for all security products that can deter and reduce crime. The Videx VX2200 system is one product that has the accreditation. Convenient door entry The VX2200 panel is also fitted with Videx’s standalone offline proximity system The VX2200 panel is also fitted with Videx’s standalone offline proximity system, MiAccess which enables the use of remote management of the access control system including adding and removing access key fobs, for example if a fob stops working, needs replaced or a new user needs to be added, a visit to the development isn’t needed. Dave Abrams said: “I recommended the Videx VX2200 as I have installed the system several times before and it’s a great kit for secure and convenient door entry. Being SBD accredited also means that it’s a system that actively deters and reduces anti-social crime such as vandalism. Videx has a long-standing reputation of providing first class products with lifelong support. I know if there’s any issue with the system, it will be quickly and easily resolved through the Videx tech team. The post installation customer support really is second to none.” Maximum-security benefits The VX2200 is a preferred choice for a wide range of residential developments across the UK including social housing because of its ease of use and maximum-security benefits it provides. The VX2200 is a preferred choice for a wide range of residential developments It can cater for a wide range of buildings from 1-way systems to much larger systems that include up to 1,000 apartments making its flexibility a very attractive choice for secure and convenient entry on a large range of projects. Mabs Alam, Regional Sales Manager for London and South East at Videx UK, said: “Not only is the VX2200 a highly versatile entry system, it’s also accredited by Secured by Design, a key police initiative for designing out physical crime meaning it has been tested to the highest of security standards.” Ensuring maximum security “Because of the integrated MiAccess, residents simply need a programmed fob to gain access to their home and if they lose or misplace a fob, it can be reprogrammed remotely with another one easily and quickly by a management team.” “This means the system requires minimum maintenance and there’s no routine software upgrades needed either. What’s more there’s no moving parts, just the video handsets in each of the individual apartments. It’s such an easy to use and effective system and one of our most popular entry choices for residential developments in particular. The addition of MiAccess makes the system even more easy to use and maintain while ensuring maximum security.”
Products
Round table discussion
In-person training sessions were mostly canceled during the worst of the COVID-19 pandemic. However, the need for training continued, and in some cases increased, as the security industry sought to adapt to the changing business climate of a global emergency. So how well did we as an industry adjust? We asked this week’s Expert Panel Roundtable: How has security industry training changed in the last year?
During the coronavirus lockdown, employees worked from home in record numbers. But the growing trend came with a new set of security challenges. We asked this week’s Expert Panel Roundtable: What is the impact of the transition to remote working/home offices on the security market?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
Videos
Ruggedized products: Manufacturers & Suppliers
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download