School security
SARGENT, an ASSA ABLOY Group brand known for innovative door lock and hardware solutions, is excited to announce the latest evolution of its 10X Line bored locks now featuring visual status indicators. Designed to provide clear, instantaneous confirmation of a door's locked or unlocked status, these highly visible status indicators enhance users’ security and safety across a wide range of applications. New dimension of interaction "Our new SARGENT 10X Line bored locks with visual status...
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation announced that its AI gun detection and intelligent situational awareness platform has been deployed at Bradley-Bourbonnais Community High School (BBCHS) to mitigate gun-related violence. BBCHS Located in Kankakee County, Illinois, BBCHS educates approximately 1,900 students from Bradley, Bourbonnais, and St. George school districts. The ex...
Digitalisation is reshaping the way individuals live and work. Buildings should be at the centre of this change, streamlining daily interactions with homes, offices, and other workplaces, moving into and around them seamlessly. Everyone who uses a site also needs confidence in its security and safety, not just its efficiency and usability. Connected digital access In addition, connected digital access is a fundamental block in constructing more intelligent buildings. As analysts Omdia...
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced it has achieved substantial growth in the state of Pennsylvania over the last year. The company has more than doubled its footprint in the state, hiring dozens of Pennsylvania veterans, technologists, and skilled employees for high-paying emerging technology jobs with a global impact. With concerns for public safety on the ri...
Durite will use the Road Transport Expo to demonstrate how AI and digital systems are improving road safety – and how this technology can help attract more young people into the industry. Durite, a pioneer in vehicle safety, lighting and auto electrical parts will be showcasing its popular Demo Van on Stand R45, Hall1 at the RTX in Stoneleigh on 4th-6th June. Durite Driver Status Monitoring The vehicle is equipped with a combination of the company's safety innovations, showcas...
Educational institutions are witnessing an ever-growing technology integration, be it interactive whiteboards or online learning platforms. Technology is reshaping how we teach and how students learn. Let’s zoom in on a different branch of technology used in education - video analytics. Imagine a tool that captures video and analyses captured footage using artificial intelligence (AI). Video analytics in K-12 education Video analytics in K-12 education can gain insights...
News
Cohesity, a pioneer in AI-powered data security and management, announced the appointment of Dr. Craig Martell as Chief Technology Officer. In this role, Dr. Martell will bring his deep industry expertise to shape the company's technical vision, incorporating current and evolving industry and customer trends to define and execute a strategic and impactful roadmap for the company’s future. Digital and AI plan growth Dr. Martell brings extensive industry and public sector experience and unprecedented expertise in artificial intelligence (AI) and machine learning, pioneering AI programs for top tech companies since 2013. Dr. Martell most recently served as the Chief Digital and Artificial Intelligence Officer (CDAO) for the U.S. Department of Defence (DoD). The CDAO office was created to elevate digital and AI strategy development and policy formulation In this role, he served as the senior official responsible for accelerating the adoption of data, analytics, digital solutions, and AI functions to generate decision advantage across the department - expertly guiding the DoD through a quickly-changing AI industry. With Dr. Martell as its first pioneer, the CDAO office was created to elevate digital and AI strategy development and policy formulation while ensuring the unity of mission and tighter integration for the department’s enterprise-wide data, AI, and cyber organisations. Prior senior roles of Martell Prior to joining the DoD, Dr. Martell held several senior roles at some of the most recognisable technology companies. At Lyft, he served as Head of Machine Learning, where he designed and built a state-of-the-art machine learning (ML) platform, allowing the Lyft engineering team to quickly create and ship ML models using large-scale, new, and ongoing statistical programs. From 2018 to 2020, Dr. Martell was Head of Machine Intelligence at Dropbox, responsible for all machine learning, including overall vision-setting, drawing from analytics as applied to ML, and clear, concise communication of ML strategy across the organisation. Martell’s proficiency in statistical codes and methods has been shown in his several patents Before then, he led a number of AI teams and market-moving initiatives at LinkedIn. Dr. Martell was also a tenured computer science professor at the Naval Postgraduate School specialising in natural language processing. Dr. Martell’s proficiency in statistical principles and methodologies has been demonstrated in his several patents, including a Hybrid Classification System in 2021 and System and Method for Encrypting Data in Pictorial Data in 2008. Cohesity’s AI-powered innovations “The speed and scale Cohesity has achieved over the last several years is a testament to the incredible technology platform the company has built at the junction of multi-cloud, security and AI for the future of data protection. My role will be to accelerate the innovation internally and the advocacy externally of Cohesity’s AI-powered innovations that are second to none,” said Dr. Martell. “I’m honoured to join Sanjay and the talented team he has put together as we accelerate the company’s course to advance AI and machine learning capabilities critical to addressing key challenges to enterprise data.” Cohesity’s AI roadmap “AI represents a massive competitive opportunity and advantage for Cohesity. Our launch of Cohesity Gaia – with its first-to-market, patent-pending innovations – was the first step in our strategy,” said Sanjay Poonen, president and CEO, Cohesity. “Attracting and hiring an industry pioneer of Craig’s calibre – someone who has been driving an agenda of responsible AI at the highest levels of both public and private sector organisations – rounds out our strong executive leadership team with expertise across security, multicloud, and AI. I expect that Craig’s experience and vision for Cohesity’s AI roadmap will accelerate our lead in this critical area of our business.”
A wider group of customers can now experience the benefits of Dicentis Hybrid Meetings with the latest rollout of this cloud-hosted end-to-end hybrid conference solution. The technology update is part of an ongoing mission of Bosch Building Technologies to meet the rapidly evolving needs of the modern professional conferencing environment. Hybrid meeting environment Dicentis Hybrid Meetings is a fully native end-to-end solution that ticks all the boxes for highly efficient, legally compliant meetings. It combines the best of both worlds with an efficient mix of on-site and remote participants, reflecting the future of conferencing in professional meeting environments. Dicentis Hybrid Meetings is a fully native end-to-end key that ticks all bins for highly efficient The seamless hybrid meeting environment provides everyone with equal participation options in a familiar, easy-to-use software interface to provide the perfect meeting experience. Regardless of their physical location, each participant is fully involved and enjoys the same speech priorities, voting rights, content sharing options and now also a language selection feature with the possibility to select from up to 31 interpretation languages. Secure and data-privacy-compliant This functionality helps to expand the applications where Dicentis Hybrid Meetings can be used. The language selection option allows remote participants for international meetings, inter-governmental gatherings and within multinational organisations to fully engage with the meeting as if they were physically in the room. Dicentis Hybrid Meetings offers specific functions for professional meeting environments such as councils, ministries, and international institutes, to ensure a complete and stable conference workflow. This is centrally controlled over a straightforward, intuitive interface for the chairperson. The solution, which benefits from cloud hosting by Bosch for customers' peace of mind, is secure and data-privacy compliant. Focus on security Dicentis Hybrid Meetings has given its penetration test from the decent usd HeroLab with flying colours The latest phase of the Dicentis Hybrid Meetings rollout has seen the high-security promise from Bosch Building Technologies, backed by industry-standard evaluation and certification. Following an intense period of testing, Dicentis Hybrid Meetings has passed its penetration test from the esteemed usd HeroLab with flying colours, demonstrating its cyber resilience. Receiving this penetration test certificate is living proof of the unwavering commitment to meet the highest standards. Expanded coverage Dicentis Hybrid Meetings is now more accessible to a wider range of customers. The language selection option allows for remote participants to select and listen to available simultaneous interpreter languages (up to 31), making it particularly useful for international meeting environments like conference centres, international institutes as well as rental companies serving multi-lingual meetings. In addition, the number of countries where Dicentis Hybrid Meetings is available has grown. The initial launch of Dicentis Hybrid Meetings focused on eight key European countries: Finland, the Netherlands, Belgium, France, Spain, Germany, the UK and Italy. This has expanded with a further 13 European countries: Portugal, Hungary, Greece, Austria, Switzerland, Denmark, Poland, Romania, Slovenia, Czech Republic, Latvia, Lithuania and Estonia. Preparations are underway to make the solution available in more regions. Training options are now available to support this broader base of potential customers. Online training is available via the Learning Management System from the Bosch Building Technologies Academy, while classroom training can be booked via local sales representatives.
ASIS International, the world’s largest association for security management professionals, has announced its programming lineup for Global Security Exchange (GSX) 2024 with in-person and digital experiences taking place 23-25 September at the Orange County Convention Centre in Orlando, FL and via the online GSX event platform. "Pioneering this year’s Selection Committee has been a privilege," said Dr. Diana M. Concannon, PsyD, PCI, CTM, 2024 GSX Selection Committee Chair. "Our exceptional educational lineup at this year’s event reflects the collective dedication of our globally diverse team of volunteers who served alongside me in a highly rigorous review process. Together, we've meticulously curated over 200 sessions, diving deep into contemporary security challenges, and pioneering innovative solutions. I look forward to connecting with you there!” General session presentations GSX will offer timely general session presentations from acclaimed global keynote speakers. This year’s general session lineup is: Monday 23 September Strategic Diplomacy: Charting Paths in a Rapidly Changing World|Sanna Marin, Former Prime Minister of Finland Marin highlights the indispensable role of democratic alliances in facing significant threats As the youngest Prime Minister globally, Sanna Marin expertly guided Finland through a dynamic geopolitical arena. From navigating the global pandemic to swiftly pioneering Finland into NATO after the Russian invasion of Ukraine and addressing the urgent climate crisis, Ms. Marin’s tenure encapsulates pivotal moments in contemporary history. In this insightful discussion, Marin delves into the intricate facets of key geopolitical challenges, notably the Russian assault on Ukraine and Finland’s consequential entry into NATO. With a keen focus on security and international relations, Marin highlights the indispensable role of democratic alliances in facing significant threats. She articulates strategies for mitigating dependencies on authoritarian regimes while advocating for the reinforcement of partnerships, resilience, and trust as essential components in adapting to the ever-evolving geopolitical landscape. Tuesday 24 September Shields Ready – Why Resilience is the Most Important Security Measure for Critical Infrastructure|Jenn Easterly, Director, Cybersecurity and Infrastructure Security Agency (CISA) Impacts of such malicious cyber activity would likely go beyond network intrusion and data theft The U.S. intelligence community and closest geopolitical allies are in resounding agreement on who is the largest global security threat of the twenty-first century: The People’s Republic of China (PRC). They’ve warned that the PRC is almost certainly capable of launching cyberattacks that could disrupt the critical infrastructure Americans rely on daily, such as oil and gas pipelines, rail systems, and healthcare facilities. The impacts of such malicious cyber activity would likely go beyond network intrusion and data theft – with the potential to jeopardise the physical security of the institutions and the public. And in a Presidential election year, the PRC’s attempts to influence U.S. election operations is anticipated to exceed those already detected from previous cycles. As America’s cyber defence agency and the national coordinator for critical infrastructure security and resilience, CISA is driving proactive risk reduction efforts in the face of these most pressing threats. Join CISA Director Jen Easterly for a discussion on how they can broaden the resilience investments and utilise collaborative partnerships – across industry, government, and communities – to ensure the nation is secure and increase the ability to respond and recover to the ever-evolving threat landscape presented by the greatest adversaries. Wednesday 25 September Leadership and Accountability When It Matters|Commander Kirk Lippold, United States Navy (RET.) Navigating the dual facets of privilege and burden in leadership demands a level of accountability that many aspire to achieve. In the aftermath of a harrowing suicide terrorist attack, Commander Kirk Lippold intricately weaves the principle of integrity into a narrative that extends beyond crisis management. He reveals how this principle fosters a diverse and inclusive environment, empowering his crew with a profound sense of ownership. In this crucible of combat, personal accountability and leadership become guiding principles. Lippold’s “Pillars of Leadership” emerge not only as invaluable business tenets but essential foundations for any team weathering challenges. GSX’s multi-faceted approach Newly announced GSX session lineup includes in-depth looks at timely issues Encompassing 200+ sessions tackling vital issues in the security profession, the newly announced GSX session lineup includes in-depth looks at timely issues within the following focus areas: Crime, Digital Transformation, Information Security, Law and Ethics, Managing Organisations, National Security, Physical and Operational Security, Professional Development, and Risk Management. “GSX is a crucial global gathering for security professionals,” said Cy A. Oatridge, CPP, 2024 ASIS International President. “GSX’s multi-faceted approach with best-in-class education, an industry-pioneering exhibit hall featuring innovative solution providers, ample networking opportunities, and digital programming allows our attendees from across the globe the chance to elevate their knowledge, skills, and networks.” GSX education sessions GSX 2024 will feature multiple pre-conference events on Saturday and Sunday In addition to the conference’s primary programming, GSX 2024 will feature multiple pre-conference events on Saturday and Sunday, including two-day workshops on facility security design and ESRM, APP, CPP, and PSP certification reviews, and Secure Horizons: An Immersive Experience for Senior Security Executives. Sunday’s pre-conference programming will include workshops on ESRM and stakeholder communication, ASIS Volunteers’ Day, and the ASIS Awards of Excellence and the Outstanding Security Performance Awards (OSPAs). GSX education sessions include expert-led deep dives that can improve the practice of security professionals at any stage of their career, covering topics such as artificial intelligence, ESRM best practices, diversity, equity and inclusion (DEI), active assailants and workplace violence, cybersecurity, business continuity and crisis management, crime prevention, and more. All-Access Pass registrants can earn up to 22 CPEs toward their recertification whether they attend the in-person or digital experience. Advanced-level Game Changer session Each day of the conference will also feature an advanced-level Game Changer session designed to explore trends that will shape the security industry’s future. Monday’s session is titled “Knocked Down, Not Knocked Out: Building Organisational Resilience,” Tuesday’s session is “Do You Trust Me? How to Thrive in a Mistrustful Era,” and “When Chaos Reigns: The Critical Role of Security in Global Crises” will cap the game changer sessions on Wednesday. Digital attendees will be able to access online GSX session recordings through 31 December. In-person attendees can add digital access to captured content to their registration. The complete digital session lineup will be announced shortly. More details about the GSX 2024 exhibit hall, which will feature approximately 500 companies highlighting drones, cybersecurity, robotics, and uncrewed systems; Career HQ, which will focus on career development; and the digital programming slate will be announced in the coming weeks.
AlarMax, a pioneering national distributor of security, audiovisual (AV), and low-voltage products, appointed James Ure as vice president of sales and marketing. With rich expertise in product development, business strategy and customer engagement, along with a lifelong enthusiasm for AV technologies, James will be an asset to AlarMax as it continues to grow within the residential and pro AV categories. Prior roles of Ure Driven by a passion he discovered in elementary school, Ure’s versatile AV career spans 35 years. James began his career in 1989 after training in recording engineering. His extensive background includes roles as a concert sound engineer at SoundWorks in Virginia, co-owner and recording engineer at Media Kitchen Studios in California, and house of worship sound systems designer with Point Source Audio. He has also significantly contributed to product development and market strategy for major brands like dbx Professional Audio and BSS at Harman. New AV solutions He played a pivotal role in reintroducing major brands like Electro-Voice and Dynacord Most recently, as a Key Account Manager for Distribution with the Bosch Group, he played a pivotal role in reintroducing major brands like Electro-Voice and Dynacord to commercial and installed sound markets across 46 states. “Jim embodies the spirit of AlarMax and joins our team at an incredibly exciting time, with more customers than ever hungry to enhance their product mixes with new AV solutions,” said Randy Hall, president at AlarMax. “With his many years of hands-on sound engineering, service and training expertise, and unrelenting curiosity for the AV category, Jim will be a valuable addition to our team as we continue to expand and push the boundaries of cross-category innovation.” AlarMax’s strategic commitment “Joining AlarMax is the perfect opportunity to delve deeper into my passion for AV technologies while contributing to the company’s legacy of excellence in customer service, product support and technology experiences,” said Ure. “I look forward to supporting the company’s growth and bringing exceptional value and innovation to the growing AlarMax community in this role.” James’s appointment reflects AlarMax’s strategic commitment to enhancing its leadership team and driving sustainable growth across its business segments.
Metrasens, a provider of advanced detection systems for security and safety applications, is pleased to announce its partnership with the Central Indiana Educational Service Centre (CIESC), which provides cooperative purchasing programmes for member school districts across Indiana. Through this partnership, CIESC member schools, as well as 270 other districts that are members of other Education Service Centres (ESC) across Indiana, can purchase Metrasens Ultra weapons detection systems through the CIESC Cooperative Contracts programme. Ultra weapons detection systems This collaboration empowers all school districts in Indiana that are a member of their ESC with readily available, discounted contracts for Metrasens Ultra weapons detection systems. By tapping into the CIESC Cooperative Contracts product and service procurement programme, schools can avoid the costs and administrative complexities associated with initiating their request for proposal (RFP) process. Safety and security solutions “We are happy to welcome Metrasens as an approved vendor and integral part of our Cooperative Contract purchasing service,” said Kelly Taylor, Director of Cooperative programmes. “This collaboration enables our member schools to access Metrasens’ cutting-edge technology when evaluating safety and security solutions. We value the contribution of the Metrasens Ultra, a pivotal weapons detection system that empowers our member schools to prioritise the safety of students, staff, and the broader community.” Proactive and accurate approach Portable and easy to operate, Metrasens Ultra allows for efficient and respectful screening Metrasens epitomises a proactive and accurate approach to identifying potential risks within educational settings. Trusted by school districts nationwide, Metrasens Ultra systems play a vital role in weapons detection at extracurricular events and vape detection within school premises. Harnessing magnetic detection technology, Metrasens Ultra is designed with safety in mind for all individuals, including pregnant women and those with medical conditions, operating with a passive search method. Portable and easy to operate, Metrasens Ultra allows for efficient and respectful screening, ensuring a secure environment without hindering access. Invaluable dual-functionality tool “We are excited to be working with Central Indiana Educational Service Centre and to provide our support to their member school districts in achieving their safety and security objectives,” said Chris Arbeitman, Vice President of Market and Business Development at Metrasens. “Metrasens Ultra stands as an invaluable dual-functionality tool, seamlessly integrating weapons and vape detection capabilities into a school’s security infrastructure. It achieves a delicate balance between effectiveness and non-invasiveness, enhancing existing layers of protection.”
Nuke From Orbit, a UK fintech startup, has unveiled findings from its latest research report, ‘Evolving smartphone usage and the growing threat to consumers’. The report sheds light on a concerning trend in smartphone thefts, indicating that in 62% of cases in the UK, the repercussions extend far beyond the initial loss of the device. Digital theft victims According to the research, not only were respondents' social media and email accounts accessed, but one in four individuals also fell victim to digital wallet theft, resulting in monetary losses. Alarmingly, the study reveals that one in five respondents experienced compromised personal bank accounts through unauthorised access via mobile banking apps. Mobile safety risks The alarming findings come amid the evolving boom in smartphone usage and the growing identity threat The alarming findings come amid the evolving boom in smartphone usage and the growing identity threat that users face. Although smartphones were created to simplify life with their many functions, this convenience has also made consumers more vulnerable to risk despite increased security features on devices and apps. Other key findings 78% of the respondents use their smartphones for mobile banking, 85% for accessing email, 71% for managing social media, and 51% for a digital wallet, indicating that cybercriminals can easily access their data from a single mobile device. However, nearly half (45%) are in the habit of using the same PIN to gain access to the phone and multiple apps, services, and bank cards. 58% are aware that bank cards stored in a digital phone wallet can be used with your smartphone PIN to bypass biometrics. Three in four (74%) showed interest in a service that enables them to cancel bank cards, and block access to banking apps, SIM cards, email, social media, and more, all in a single activation. James O’Sullivan, CEO and founder of Nuke From Orbit commented, “Biometrics were introduced to make smartphones more secure because the frequency with which you need to input a PIN is greatly reduced, but our research shows this has led to some complacency." Instant data security "Criminals are returning to old-school shoulder surfing tactics, that made ATMs a nightmare to access the phones they then steal to commit secondary crimes." "As an industry, we need to provide smartphone users with the highest level of protection by harnessing technology for instant data security when their devices are compromised.” Product Security Act Consumer technology products meet mandatory security requirements to protect against cyberattacks A legislation that will contribute to the fight against such threats is The UK Product Security and Telecommunications Infrastructure (Product Security) Act, which will come into effect on the 29th of April. The Act will ensure that consumer technology products meet mandatory security requirements to protect against cyberattacks. Data protection Businesses including banks will be accountable for protecting customer data as the regulation mandates them to set safety measures such as minimum default password requirements and providing information on reporting security issues. With so much interconnectivity, and even authenticator apps and one-time passcodes utilising the same device, smartphones are at the heart of the challenge this legislation is designed to tackle. Protecting the digital identities “The Act is relevant for all businesses in the mobile ecosystem, including banks, fintechs, and online service providers. Service providers are responsible for ensuring they do everything possible to protect consumers when the worst happens." "Our research suggests that currently, they are not doing enough. Nuke From Orbit is on a mission to support such service providers in protecting the digital identities of individuals and putting them back in control of their data swiftly when their smartphones are stolen.” Addition protection Lawrence Brown, Senior Insights Manager at KAM, the research company responsible for conducting the research, added, “Many security measures are preventative, which alongside good user behaviours, decrease the dangers [to consumers] and are, of course, encouraged." "However, when reactive measures such as tracking and remote locking software can be disabled after the theft, there is a vulnerability gap that requires additional protection.” Digital panic button Nuke From Orbit offers a unique digital panic button, allowing individuals to block access to various services and accounts all at once if their smartphone is stolen. This world’s first solution fixes a significant vulnerability and adds a higher level of data protection and privacy in the mobile security market.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common K12 security pain points There’s no one-size-fits-all solution in school district security. School districts may have big plans to implement upgraded security systems but to set out on the right foot, pioneers must have a clear vision of their long-term strategy. When embarking on their security journey, education pioneers often wonder where to start and what exact steps are they need to be taking to identify and address weaknesses. Local K12 and government pioneers are promoting and mandating security assessments to uncover safety gaps on campuses and mitigate these risks with advanced technology solutions. Not only do assessments provide detailed, customisable roadmaps for district pioneers, but they also recommend technologies and funding opportunities to help close threat gaps. K12 school districts are mainly vulnerable to cyber-attacks due to the sensitive nature of student records In today’s climate, schools face a growing number of physical and digital security threats. From a cybersecurity standpoint, K12 school districts are particularly vulnerable to cyber-attacks due to the sensitive nature of student records. However, only one-third of these districts have adequate staffing to address threats effectively. In addition, according to a recent survey from Johnson Controls and Forrester Consulting, security decision-makers are having trouble receiving actionable insights. Nearly two-thirds of respondents said that they struggle to receive information from all necessary systems regarding their security threats. To gain more clarity into what school districts need in terms of security tools and threat mitigation, implementing system-wide monitoring and optimisation can be invaluable. This approach enhances equipment and operational efficiency, while providing necessary resources and expertise for critical patch updates across all systems, strengthening their overall security posture. Achieving a well-rounded security program In the past few years, AI technology has emerged as a trending solution and is generating considerable attention. While the allure of implementing cutting-edge technologies is undeniable, it’s important to recognise that a robust security program hinges on solid access control. Access control technology provides administrators with the means to oversee and regulate entry into facilities, serving as the foundation for basic physical security. The technology helps administrators and staff control access to multiple areas from web-enabled devices, even during lockdowns which is crucial in emergency situations. School district pioneers should utilise available digital risk assessment tools to uncover threat areas Once basic security controls are in place, school districts must address their next set of security pain points and identify which solutions meet their specific needs. This involves identifying and prioritising the highest need and most cost-effective investments that will have the greatest impact on enhancing security measures. To accurately determine which security solutions are needed for a specific environment, school district pioneers should utilise available digital risk assessment tools to uncover threat areas and determine levels of priority. By focusing on these priority areas, districts can allocate their resources and efforts where they are needed most, ensuring maximum effectiveness in mitigating risks and vulnerabilities. Securing funding before approaching deadlines A major challenge for school districts surrounding campus security is identifying and securing the necessary funding to implement solutions aligned with their goals. Leveraging available funding sources is critical, especially considering certain programs are approaching their deadline, like the Elementary and Secondary School Emergency Relief (ESSER) fund. Announced during the pandemic, ESSER is a funding program that has allocated nearly $190 billion in aid to U.S. public school districts to fund projects benefitting the well-being of occupants. Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024 Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024, when schools must attribute all of their funds to assigned contracts. Following this date, pioneers will need to complete all ESSER spending by January 2025 unless approved for an extension into March 2025. As ESSER wanes, school districts are acutely aware of the fiscal cliff in budgets through 2025. However, many states are ramping up grant funding to close the deficit gap. Administrators should become familiar with these grant opportunities at a local and state level. Get started on security plans The time for school district pioneers to act is now. While the safety and well-being of students and staff are always top priorities, it’s crucial to acknowledge that a lack of insight into necessary security upgrades and available funding options will leave districts behind the curve. Seizing the final months of ESSER funding presents an ideal window to address security pain points and build a safer future for K12 facilities. Looking beyond ESSER, pioneers must proactively seek out and leverage other funding avenues to help ensure the continuity of their security efforts and maintain a proactive stance in safeguarding healthy and safe educational environments.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritise prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis and prioritisation, and finally, development of mitigation measures.” Safety and security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analysing and prioritising mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements to physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorised individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritise improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders and non-profit organisations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organisations can offer valuable resources, training, and support programmes to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
GSX 2022 this week in Atlanta highlights the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Risk-based decisions “I really just do physical security.” That used to be a common phrase in the industry, but no more. In addition to ‘upskilling,’ security practitioners also need to speak the language of business and to insert the concepts of security into that language. Fast changes in security are challenging today’s professionals to keep up. The GSX education sessions seek to meet the need. Embracing ESRM includes a complete change in the thinking and approach to security Among the topics at the GSX conference is ESRM (Enterprise Security Risk Management), a security approach that focuses on risk-based decisions and partnerships with asset owners. It’s an approach that requires a holistic view of security risk. Embracing ESRM includes a complete change in the thinking and approach to security. Rather than seeking ‘approval’ for security decisions, security professionals identify risks and possible mitigation strategies and present them to management. Shaping access control Activity in the exhibit hall was brisk on the first day, which was heartening to those who attended a vastly downsized show last year in Orlando. At this show, there is even carpeting. Trends lead the lively discussions at GSX. In a presentation on the show floor Monday, manufacturer Brivo shared top trends that are shaping access control. The trends include: Hybrid work is here to stay. Some 60% of respondents to a Brivo survey said access control is extremely or very important to the hybrid work model. Providing immense value to an organisation, access data helps to manage occupancy and is part of the larger discussion of facility utilisation. Data analytics is ‘mission critical.’ Combining data from multiple sources, including access control, becomes powerful when leveraged using artificial intelligence (AI) and machine learning tools. Applications such as anomaly detection help companies improve operations. Some 65% of respondents to the Brivo survey say integrating access control with other technologies is an important trend. Keeping people healthy Other trends identified by Brivo include mobile credentialing and security centralisation (cloud) Other trends identified by Brivo include mobile credentialing and security centralisation (cloud). Among other exhibitors, Johnson Controls is focusing in their booth on solutions, not products, including the convergence of physical security into the digital space. The OpenBlue system is a digital platform that incorporates security, HVAC, fire/life safety, and building operations in a single platform that is the ‘nerve center’ of an organisation. Increasingly, the areas ‘security’ is responsible for are expanding. During the COVID pandemic, for example, security had to embrace a role in keeping people healthy (as well as safe). The challenges of the pandemic accelerated the OpenBlue portfolio as more security professionals expanded their role. Security operations centre “Moving into the digital space, and digitising what used to be a security operations center, enables us to increase automation and enable security operations to respond more quickly,” said Kenneth Poole, Johnson Controls’ Vice President, National Accounts, North America Building Solutions. Security directors are responsible for things they have never been responsible for before" “Surprisingly a lot of customers are being forced into new areas,” Poole added. “Security directors are responsible for things they have never been responsible for before.” Poole says he is encouraged by the willingness of ‘old school’ security directors to embrace the new reality. Azena’s approach to supplying edge-based camera applications on an ‘app store’ is gaining momentum. Several new applications are being announced at GSX, among the 110 apps on the Azena app store. Apps can be loaded onto Azena-enabled cameras manufactured by Bosch, Hanwha, Vivotek, BST, TopView, and Ability. Video management system Azena has simplified the integration of its app solutions, enabling developers to make only slight changes to an app and ensure it is compatible with the largest video management system (VMS) platforms, including Milestone, Genetec, and NX Witness. A wizard on the camera enables simplified mapping of data analytics to events in a VMS system. New applications in the Azena app store include video sensors to prevent ‘bed fall’ accidents in hospitals and healthcare facilities, incidents that can cost $35,000 on average and account for $34 billion in the United States in a year. The app identifies video signs of an imminent bed fall, such as excessive movement in bed. The analytics run inside the camera and the video feed doesn’t leave the device, so there are no privacy concerns. An Azena app is installed in a camera mounted on ‘Yellow,’ the ‘robot dog’ manufactured by Boston Dynamics Effectiveness of metal detectors Another new application is gun detection that can augment the effectiveness of metal detectors. Also, an Azena app is installed in a camera mounted on ‘Yellow,’ the ‘robot dog’ manufactured by Boston Dynamics and configured for security applications by Prosegur. An Azena app is installed in a Vivotek AI box on the back of the dog; it can detect fire, smoke, and moved luggage. Azena apps for flare and leak detection are becoming more popular in the oil and gas industries, and there are camera apps that can monitor tank levels. Cisco Meraki is introducing two new camera models at GSX, with 4K and 4MP options, a terabyte of storage for 4K, and 256Gb of storage for 4MP. Air quality sensors The cameras will allow most customers to record 30 to 90 days of video in the camera at the edge The cameras will allow most customers to record 30 to 90 days of video in the camera at the edge. Also at the show, they introduced a push button and air quality sensors that are easy to incorporate into a Cisco Meraki application. Cisco Meraki also offers a dashboard that is integrated with the rest of the product portfolio to enable users to view devices on the same interface and in the same ‘pane of glass.’ For physical security users, there is the Meraki Vision Portal, which enables physical security users to run a more effective investigation. Features include a floor plan view and the ability to switch among multiple cameras. Users can instantly search videos using ‘motion search’ to easily find an event in a video.
Case studies
Metrasens, a recognised pioneer in advanced detection systems for security and safety applications, announced its selection by the Fort Worth Independent School District (FWISD) in bolstering safety measures for graduation ceremonies and extracurricular events. Serving nearly 75,000 students across 140 schools, FWISD conducted a meticulous internal assessment of various technologies, ultimately selecting Metrasens as the preferred solution. FWISD deployed six Metrasens Ultra systems during its 2024 graduation ceremonies. The deployments strengthened safety protocols while synergizing with existing security measures, underscoring the district's unwavering commitment to safety as evidenced by its comprehensive security and safety policies. Fort Worth ISD graduations "We are confident in our choice of Metrasens Ultra to elevate our extracurricular safety efforts," said Daniel Garcia, Safety & Security Executive Director at Fort Worth ISD. "With regards to Fort Worth ISD graduations and other ceremonies, it's paramount that students, faculty, and visiting families feel assured and confident as they come together to commemorate these special occasions." "As we open our facilities to families, it's essential to offer reassurance that Metrasens Ultra systems provide a completely safe solution for all members of our school community." Metrasens Ultra systems The passive nature of Metrasens Ultra systems adds an additional layer of safety for all Metrasens Ultra, renowned for its cutting-edge sensor technology, swiftly and accurately pinpointing potential threats such as concealed weapons, all without emitting any harmful radiation. Its versatility enables effortless transition between indoor and outdoor settings, while its portability ensures convenient setup and relocation between facilities, without necessitating physical contact. The passive nature of Metrasens Ultra systems adds an additional layer of safety for all, including individuals with medical implants or expectant mothers. Moreover, the systems' sleek design and portability seamlessly align with the steadfast commitment to ensuring the safety of all attendees. Advanced detection technology "We are honoured to have been chosen by Fort Worth ISD to implement our advanced detection technology at their extracurricular events," said Chris Arbeitman, Vice President of Market and Business Development at Metrasens. "The district's dedication to safety aligns perfectly with our mission to provide innovative solutions that meet the diverse security needs of our customers."
In 1899, the Texas Legislature authorised the formation of the Southwest Texas State Normal School, which opened in San Marcos four years later. At the time, the school’s mission was to prepare Texas public school teachers, but over the years, it has undergone several expansions and name changes to reflect its evolution into the major multi-purpose university Texas State has become. From its humble beginnings located in a single building, Texas State’s original San Marcos campus has grown to cover a 485-acre campus that is home to 267 buildings, as well as an additional 5,038 acres of recreational, instructional, farm and ranch land. The university added a second campus in Round Rock, which has grown from 15 temporary buildings to a 101-acre campus with state-of-the-art facilities. Electronic key control systems Texas State’s student population has kept pace with its physical expansion, growing from 303 in 1903 to more than 35,546 in 2013 – marking the 16th consecutive year of enrolment growth for the university. Texas State reviewed its security policies and chose the need to execute electronic key Anticipating major physical and population growth to continue into the future, Texas State reviewed its security policies and determined the necessity of implementing electronic key control systems in sensitive areas. Based on its size, the understanding was that as many as 85 of these systems could potentially be needed as part of this initiative. Aggressive construction campaign Texas State was faced with a particularly challenging growth-related issue in September 2013, as its freshman enrolment surged to more than 5,000. Like many universities, Texas State requires its freshmen to live on campus, which it sees as a tool for retention. That policy seems to be working, with approximately 80 percent of freshmen living on campus technically returning for the following semester. To accommodate the growing ranks of on-campus residents, the university has pursued an aggressive construction campaign, building a new residence hall complex every two years to house approximately 600 additional students with plans to break ground this fall on a third new housing complex. In all, Texas State spent more than $190 million on new or renovated buildings, with more construction planned into the foreseeable future. Update key management policies Maintenance staff members would often reach for the key to a particular building they needed to access With a large number of individuals requiring access to so many facilities, the university recognised that key management had the potential to become a high-risk issue and determined to become proactive in reducing that risk. Maintenance staff members would often reach for the key to a particular building they needed to access, only to find it was already checked out. They would then be forced to go through the time-consuming – and frustrating – process of determining who had the key last and tracking that person down to retrieve it. The decision was made to update key management policies and practices to make them more efficient and effective. “We’ve been especially happy with the KeyWatcher’s access and reporting capabilities, and the system’s reporting tools make reviewing events and issues incredibly simple,” Kyle Estes Associate Director of Housing for Facilities Services Texas State. Options for key management systems To combat these problems and increase the security and effectiveness of its key management, Texas State charged its University Police Department and other stakeholders with undertaking an extensive review of the available options for key management systems on the market. This exhaustive process involved gathering research from printed materials and online research, having discussions with current customers of the various vendors, and listening to on-site presentations from the companies under consideration. At the conclusion of its review of key control cabinets and systems, Texas State chose KeyWatcher Touch from Morse Watchmans. This exhaustive process involved gathering research from printed materials and online research The main factors that led Texas State to choose KeyWatcher Touch systems were its robust feature set and competitive pricing. The school was also impressed by Morse Watchmans’ receptiveness to its specific needs – a six-digit user ID, for example – and ability to implement changes quickly. Access to support was also a main consideration, so Texas State appreciated that the system was produced domestically by a company with a 130-year history. Enterprise management capability Of the KeyWatcher systems to be implemented, the largest number were to be deployed for Texas State’s Department of Housing and Residential Life, which provides housing and services to approximately 7,000 residents in 25 facilities. The department also operates a facilities service group consisting of 110 full-time employees and a staff of 170 building paraprofessionals. The department also operates a facilities service group consisting of 110 full-time employees Because of the personnel changes the department experiences on an annual basis, the system’s enterprise management capability has been a valuable feature, as have its robust reporting capabilities, says Kyle Estes, Texas State’s Associate Director of Housing Facilities Services. Having keys available in each residence hall for use by maintenance staff has made the department more efficient and reduced their liability; staff no longer need to carry multiple master keys across campus for different buildings. Centralised management features “Because the system automatically generates a log of who has each key, we’ve been able to establish much better employee accountability for key usage,” Estes says. “The ability to set a maximum duration that each key can be checked out and to receive alarms when that limit is exceeded has eliminated the problem of having keys unnecessarily checked out and as a result inaccessible when someone needs them.” Ease of use and centralised control parts fed by the system’s web capabilities All KeyWatcher Touch systems deployed at Texas State are connected to the university’s network and interface with its card access and email systems. The ease of use and centralised management features provided by the system’s network capabilities have streamlined the once cumbersome process of generating reports and reviewing incidents. One particular feature, the ability to access the system from anywhere, has made the system even more effective, Estes says. Earliest adopters of KeyWatcher Touch As one of the earliest adopters of KeyWatcher Touch, the Housing and Facilities Department served as a test case of sorts for the system. Based on the success the department has had, combined with its continued rapid growth and expansion, Texas State University’s 85-system implementation is ongoing. As more systems are added, expansion will be a consideration moving forward, but Estes doesn’t anticipate that being a problem. “We’ve found that expanding these systems is fairly easy and doesn’t involve time-consuming processes that could delay implementation of key management for particularly sensitive areas,” Estes says. “Overall, the system has been very reliable, and the support staff has been very responsive and regularly available to help resolve the very few minor issues we’ve encountered in a timely manner."
Koning Willem I College in north-east Brabant, The Netherlands offers various educational and integration programmes. In total, around 18,000 students take 250 courses at its 16 locations. Modern educational institution A new location on Onderwijsboulevard in 's-Hertogenbosch was designed to be a model modern educational institution, including its access control. The imposing new building has modern rooms that provide opportunities for consultation, collaboration in small and large groups, presentations, and individual work. Access to these spaces required a flexible and modern locking solution ideally with as few keys as possible. Employees and students must feel welcome and safe. Need for an easily integrated system Dependable security was needed for all kinds of valuable learning materials and sensitive information Dependable security was needed for all kinds of valuable learning materials and sensitive information. “Easy integration with the existing access control system without additional software,” was the goal, according to Alex te Pas, functional manager of facilities management information systems. Keyless access for improved security and management “Within our organisation, we want to phase out the use of keys,” he says. “Because when employees left, we noticed that people often forgot to turn in keys or tokens. In the event of an audit, we then have a problem." Wireless Aperio locks The college chose Aperio locks which are easy to integrate wirelessly with their existing Nedap AEOS access control system. No additional software is needed: wireless Aperio locks communicate via Aperio Hubs which handle secure, real-time communication between locks and the AEOS system. This way, college security staff have full control over access and can quickly revoke anyone’s access rights. Saves time and costs The ongoing cost of using these battery-powered locks is also much lower than for equivalent wired electronic locks Because Aperio devices run on batteries, rather than mains power, there was no need to make any major adjustments to the doors. This saves both time and cost during installation. The ongoing cost of using these battery-powered locks is also much lower than for equivalent wired electronic locks, which require an ‘always on’ connection to the power grid to maintain secure status. Aperio E100 Escutcheon The college chose the Aperio E100 Escutcheon to secure doors throughout the building. The E100 offers a convenient combination of free exit from the inside with automatic locking on closure from the outside. It comes in a variety of specifications to fit different door security levels or everyday usage, including a version with PINpad which adds another level of control. 2-factor authentication With the additional PIN code, the risk of unauthorised access via a found or stolen pass is minimised. “We wanted to provide our technical rooms with 2-factor authentication. So here we chose Aperio locks with PIN code capability,” adds te Pas. Extending an AEOS system with Aperio wireless devices Nedap’s versatile AEOS access control system integrates seamlessly with a broad range of Aperio Nedap’s versatile AEOS access control system integrates seamlessly with a broad range of Aperio devices. End-users can get even more out of an existing Nedap AEOS system by integrating Aperio cylinders, escutcheons, handles, and more, online and/or offline, giving security managers control over traffic to and through more areas at their premises. Multiple device support Nedap integration supports multiple devices from the Aperio range, including the award-winning wireless handle (H100), escutcheon (E100), cylinder (C100), and security lock (L100). Aperio devices are available for almost any interior or exterior door, including wooden and glass doors, as well as fire doors. Online integration with AEOS can use different interfaces (RS485 / IP), connecting lock and system via hubs that control up to 16 locks. AEOS software A full set of powerful functions and events is made available for any Aperio device within the AEOS interface, including door or battery status and tamper detection. AEOS software manages everything, eliminating unproductive tasks including any need to duplicate data entry saving time, and extending control without hassle for building users or administrators.
Named one of Money magazine’s Best Colleges in America 2023, Fairfax-based Geoge Mason University (Mason) is the largest public research university in the Commonwealth of Virginia. Its 10,000 faculty and staff provide classes and support services across three regional campuses, an international branch campus in Songdo, South Korea, and five instructional sites. With more than 40,000 students hailing from all 50 states and 130 countries and a six-year graduation rate that is well above the national average, Mason continues a rapid upward enrollment trajectory that saw headcount and credit hours increase by nearly 2 percent in Spring 2022 and Fall 2023 applications rise by 11 percent. R1 research university In addition to a heavy emphasis on diversity – U.S. News and World Report named it the state’s best public university for diversity and innovation – Mason is a pioneer in technology and research with 40 percent of its students majoring in STEM fields. It is also the youngest nationally ranked R1 research university, a top 10 public university for cybersecurity programmes, and a top 20 public university for five different engineering and education online programmes. University's challenge Providing an exceptional experience had to balance with the need to maintain public access to appropriate services Mason’s rapid growth requires it to embrace system-wide innovation, particularly when it comes to providing a safe, secure university environment for students, faculty, and staff. Providing an exceptional experience had to balance with the need to maintain public access to appropriate services, as well as the convenience of contactless entry and the ability to act quickly when credentials were lost, or stolen or the user’s status with the university changed. Goal “We have a very open campus. Most of our doors are unlocked from 7 AM until 11 PM and we have a public library, so we need to make sure access control isn’t in the way. On the other side, we need to make sure that if something does happen, we can react quickly to unfolding scenarios,” said Daniel W. Anthes, Director of Technology Services, at George Mason University. “The goal is to make it safe, easy, and seamless for people to navigate campus.” Case study Mason had already implemented a card-based access control solution featuring HID® Seos credentialling technology, HID OMNIKEY® chips, HID Asure ID card printing software, HID FARGO® printers, and HID Signo™ card readers. Photo identification cards were encoded with appropriate credentials allowing the holder to access everything from parking to residence and dining halls to facilities and services, including data centres, libraries, and shops by simply tapping or swiping. “Eventually, we reached the point that the switch to mobile credentialling was a straightforward next phase. This would make it easier for staff and students to get where they needed to be without having to fumble with a set of keys,” said Anthes. HID's solution HID Mobile Access lets any compatible mobile device – smartphones, tablets, or wearables – be used as a credential Mason again turned to HID and Atrium, deploying the HID Mobile Access® solution with Seos as the underlying credential technology. Atrium provisions and manages the lifecycle of the HID Mobile Access credentials. HID Mobile Access lets any compatible mobile device – smartphones, tablets, or wearables – be used as a credential to securely access doors, gates, networks, and more. It significantly increases convenience and boosts operational efficiency without compromising security. HID Mobile Access Because Mason had Signo readers already in place, deployment of HID Mobile Access required just a simple upgrade. Importantly, while mobile access eliminates the need for physical access cards, the highly versatile Signo readers support the widest range of credential technologies via native Bluetooth, Near Field Communication (NFC), and Apple Wallet – meaning those who choose to can continue using their physical ID cards until they are ready to transition to mobile access. Seamless integration “Once you get them using the technology, at that point the realisation hits that this phone access is awesome. Or you can use your Apple watch and never even pull your phone from your pocket. There are a lot of things you have to navigate when considering credentials." "Fortunately, the HIDand Atrium Campus partnership offers the complete solution, bundled together and working seamlessly in the way I expected. The seamlessness of the mobile credential and how quickly they can get where they need to be with their phone or wearable is cool to see in action,” said Anthes. Final results Mason’s more than 50,000 students, faculty, and staff can leverage mobile credentials at any campus In addition to access to approximately 7,000 doors across its campus locations, Mason’s more than 50,000 students, faculty, and staff can leverage mobile credentials at any campus cash register, printer, copy machine, and retail and recreational facility. Mobile access will increase the convenience factor exponentially for students, for example enabling express check-in for residence halls at the start 2024-25 school year which will let students bypass queues that in the past were hundreds deep and go straight to their dorm rooms. Mason Mobile ID Mason Mobile ID has also driven a significant drop in the issuance of temporary and replacement cards, saving both the university and students time, money, and frustration. Students can also easily switch credentials to a new wearable or mobile device, eliminating the need to have this done in person – a significant convenience when Apple released its iPhone 15 shortly after Mason transitioned to mobile access. Safety standpoint “We are only two months in, so there are a lot of benefits we have yet to see with Mason Mobile ID, but I’m excited about what we’ve already started noticing in terms of students engaging faster with their peers and community." "The police department also absolutely loves the wearables from a public safety standpoint, because they can get through the doors a whole lot faster than they could with the traditional cards or when they had to fumble with keys,” said Anthes. Operational efficiency Going forward, Mason is exploring expanding mobile access to shuttle buses, which would also allow them to track utilisation data, and for more special events access. “New technology like mobile access is how Mason improves operations, so if there is an opportunity, I will certainly push to have HID involved. There are a lot of things you have to navigate when considering credentials. Fortunately, the HID and Atrium Campus partnership offers the complete solution, bundled together and working seamlessly in the way I expected,” said Anthes.
When students come to study at the prestigious Les Roches Marbella campus in Spain, they are not just attending one of the world’s major hospitality business schools, they are also enveloped in extraordinary innovation and sophisticated living to mirror the exceptional experiences they are being prepared to facilitate in their future careers. Real-life training site The institution aims to serve up “academic rigor with a twist of innovation and entrepreneurship” to its 1,000+ students from all corners of the planet who collectively represent more than 80 nationalities. This real-life training site for elite hospitality professionals must offer an authentic, hands-on experience to its students — one that reflects the luxurious living and progressive comforts expected from high-end hospitality properties and their employees. Digital badge One particular aspect they sought to enrich was integrating “digital badge” access across the coastal Mediterranean To ensure Les Roches is always ahead of the curve and a model campus when it comes to exemplary learning based on cutting-edge technologies, administrators wanted to evolve its mobile ecosystem. One particular aspect they sought to enrich was integrating “digital badge” access across their coastal Mediterranean property in Spain. Project objective The project’s objective was to migrate to a mobile credentials-based system where a student’s plastic access card is replaced by a digital ID on a smartphone. This would serve as the verification for daily physical access and digital touchpoints (e.g., building access, vending machines, restaurant reservations, etc.). This effort would also allow the school to steer digital transformation and student efficiencies throughout its security and administrative functions. Catering to student experience “Everything here is about the student experience,” said Mano Soler, Director of Student Services and Operations at Les Roches Marbella. “It is our main driver and the reason we embrace and foster innovation because innovation makes our students’ lives easier and supports their well-being through secure technology. The students will eventually leave this campus and, in turn, take that know-how and excellence into the world with them.” Case study challenge The team wanted a mobile solution to fit specific campus requirements such as swift access For 10 years, Les Roches Marbella relied on an RFID (radio frequency identification) card-based system to identify and grant access to students. This was a fundamental tool that nearly 1,000 individuals needed to have with them at all times to validate themselves day in and day out. Supporting their quest for digital transformation, as part of the school’s Spark incubator programme, the leadership team wanted a mobile solution to fit specific campus requirements such as swiftly granting/removing accesses, avoiding disruption when students lose/forget cards, and accommodating a multi-system environment. Need for a mobile credentials-based system Management also wanted to drive improvements through back-office processes and procedures to save time and resources and enhance everyday life on campus through modern technology. One of the most pressing factors for this particular mobile initiative was to achieve higher efficiency around the school’s new student intake registration/check-in process each semester. Loading ID credentials individually onto RFID cards, then printing each of the 1,000+ cards, meant corrections along the way were inevitable. System re-adaptation Yet, the transition to mobile didn’t come without a series of obstacles and serious considerations. Each touchpoint where a card was to be replaced with smartphone technology required deep analysis and complex integration work, specifically involving seven to eight different brands whose products were already deployed throughout the premises (e.g., printers, vending machines, security technologies, door access, laundry facilities, parking garages and more). Les Roches required an access partner with solutions compatible with the many other products already in play within its existing infrastructure, and an ability to successfully address former system re-adaptation. iOS and Android support The mobile technology needed to support both Android and iOS phones, as well as physical card technology In addition, the mobile technology needed to support both Android and iOS phones, as well as physical card technology (the RFID ecosystem would remain intact for non-student purposes and serve as a migration path for other areas not yet mobile). The school wanted a single company to supply both the hardware and software elements. And, as a higher education establishment with upscale expectations and an outstanding reputation, the Les Roches decision-makers required a proven partner of this same ilk. HID solution To transform technologies and reach new degrees of onsite productivity and novel amenities, Les Roches Marbella selected HID for its unmatched mobile access portfolio. As a market pioneer in trusted identification and authentication, and with a network of partnerships that spans the globe, HID’s experts designed a system to meet each requirement from the school resulting in a tremendous collection of 40+ access points featuring mobile identification, app, portal, and reader technologies. Mobile components from HID The integration project was completed within an accelerated time frame to ensure it was in place before students set foot onto campus that fall. HID components that comprise this robust mobile ecosystem include HID OMNIKEY® readers and reader modules (OMNIKEY 5427, OMNIKEY 5127CK Mini, OMNIKEY 5127 Reader Core), HID Signo™ access control readers, HID Seos® mobile credentials, Aperio® locks from ASSA ABLOY and Aero™ X100 door modules. HID access technologies With a slight tap or wave of their smartphone, students interact easily with the mobile ecosystem and via the digital Seos credential to authenticate themselves as they move throughout the property each day. HID access technologies are embedded in: Parking garage systems Building entrances Vending machines Laundry facilities Printers Point-of-sale at restaurants/on-campus eateries Restaurant access control Class attendance tracking Dorm room door locks Mobile-first world “You cannot discount the value of mobile when it comes to today’s student populations,” said Soler. “It is their way of life. They were ‘born digital’ and they have an expectation when it comes to smart living, for them, it’s a mobile-first world. We get it. We embrace it. And, we intend to attract and retain students by offering them an unparalleled educational experience while here in Marbella.” Efficiencies and integration “We not only transformed our campus with epic mobile access technology but also drove important efficiencies and integration into everything we touched." "The value and inventiveness HIDexperts contributed to constructing this complicated mobile ecosystem is completely in line with our ongoing quest to ensure that innovation is at the heart of the Les RochesWay of Life," said Carlos Diez de la LastraGeneral Manager Les Roches Marbella. Results achieved HID credentials available via a smartphone make scaling individual access up and down significantly easier Tying back to one of the original reasons for this mobile initiative, registration check-ins are streamlined, and Les Roches Marbella has gained immediate improvements around this important event that takes place each semester. 100% of students use the mobile access system on campus. Students register digitally with the option to do so in-person, ahead of time, or remotely with no human interaction. HID credentials available via a smartphone make scaling individual access up and down significantly easier for IT, faculty, and students. A unique, homegrown handheld tool On a case-by-case basis, Les Roches Marbella is already finding ways to apply its in-house ingenuity to foster disruptive thinking. The school used 3D printers to design a customised case to house phones/tablets alongside HID access modules creating a unique, homegrown handheld tool that easily allows campus security personnel to check IDs as required. This safety support tool came about when there was no suitable offering available on the market to meet the school’s specific needs for security checkpoints. Automated student attendance tracking The flexibility and power of HID components enabled the team to re-imagine and invent an original Les Roches security product to, as always, improve the student experience. Many new use cases are in the works to fuel future “wins” across the premises. Automated student attendance tracking is already at the beginning of each class period and serves as another way to further support and protect students. Mini computers and readers were installed in each classroom so students could use their mobile ID (via their smartphone) to mark attendance. API-based interfaces, Aero door module When students go back to their dorm rooms any time, each door loc is integrated with the Aero door module All is handled by a web application running on the mini-computer that pushes and pulls data to/from the Les Roches Absences application in real time through API-based interfaces. And, when students go back to their dorm rooms any time, each door loc is integrated with the Aero door module, providing them with a seamless experience across the entire campus. Mobile authentication and verification “Our eyes are wide open to all the possibilities afforded by the marvelous world of mobile authentication and verification, and each week we come up with new ideas for the continued transformation we have in motion on our campus,” said Juan Luis Velasco, IT Manager at Les Roches Marbella. “Our students love this newfound convenience, and our staff members are reaping the benefits of this technology overhaul.” Best-in-class mobile access system Les Roches Marbella has a best-in-class mobile access system that squarely aligns with the school’s wider objective to be an example of innovation and excellence in global hospitality training both within its own brand family, as well as within the broader realm of higher education. Beyond elevating the student experience through the convenience of mobile IDs and strengthening security when it comes to student safety and mobile ID verification, Les Roches Marbella has an extremely efficient, flexible, and scalable solution that can grow with them as technologies evolve and digital trends continue to transform and connect us all to an international degree. Benefits of digital transformation “This is a story about the value of mobile and any size campus in any sector of education can benefit from the digital transformation angles when it comes to campus business,” said Velasco. “But the most rewarding aspect truly is connecting to our students in a way that’s important, convenient, and meaningful to them keeping them connected and secure via a device that’s already an extension of their existence.”
Dahua Technology Indonesia has donated a Dahua DeepHub Smart Interactive Board to the Faculty of Economics and Business (FEB) at Universitas Gadjah Mada (UGM), demonstrating the company’s commitment to supporting the advancement of education in Indonesia. The Country Director of Dahua Technology Indonesia, Royce Ouyang, expressed his gratitude for this charitable opportunity during the handover event held at the Alumni Hall of FEB UGM on March 14. Royce Ouyang said, "We are pleased to contribute to the development of education in Indonesia. We hope this 75” Dahua DeepHub Smart Interactive Whiteboard can enhance students' learning experience, enabling them to be more interactive and innovative in class and be in line with the latest developments abroad." Artillery of sophisticated features The 75” Dahua DeepHub Smart Interactive Whiteboard is a valuable cutting-edge device The 75” Dahua DeepHub Smart Interactive Whiteboard is a valuable cutting-edge device. Its package includes the smart interactive whiteboard, plug-in USB camera, 11th generation i5 processor 8GB+256GB, activated Windows 11 Pro, as well as a mobile stand and wireless screen sharing cable. This intelligent device is equipped with an artillery of sophisticated features, including a 4K screen, eight quick access buttons, fast charging, fast file sharing, the ability to switch between Android and Windows, a high-resolution camera, wireless screen sharing with various devices, and other advanced functions that enable smoother and more collaborative interaction in the classroom. Dahua DeepHub Smart Interactive Whiteboard The Dean of FEB UGM, Prof. Dr. Didi Achjari, M.Com., Ak., CA, expressed his appreciation for the generous donation, stating that the device will not only bring a more collaborative learning experience for their students, but also support various educational activities, research, and community service at FEB UGM. "We are committed to utilising it as best as possible to improve the quality of education in our environment," he said. "The support of advanced devices such as the Dahua DeepHub Smart Interactive Whiteboard facilitates FEB's academic community in adopting innovative teaching methods. Thus, it can improve student absorption and prepare them to face future challenges," said Gumilang Aryo Sahadewo, SE., M.A., Ph.D., Vice Dean of FEB UGM. He also stated that the use of the Dahua DeepHub Smart Interactive Whiteboard is expected to enhance the interaction between lecturers and students and facilitate collaboration in the learning process. Industrial sector and education In addition, this equipment can also support the development of innovative and technology-oriented curricula. "With this equipment, we hope that FEB UGM can continue to strengthen its existence as a pioneering educational centre that innovates and is competitive," he added. With the donation of Dahua DeepHub Smart Interactive Whiteboard to FEB Universitas Gadjah Mada, Dahua took a positive step towards strengthening the relationship between the industrial sector and education, empowering the youth of now and enabling a smarter society and better living.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Physical security is a large market overall, encompassing a range of diverse vertical markets, each with its own set of challenges and opportunities. The success of the security industry overall depends on the ability of companies and technologies to meet the specific needs of each vertical market. Some markets offer more lucrative opportunities than others. We asked this week’s Expert Panel Roundtable: Which vertical markets have the greatest potential for growth for physical security systems?
In the United States, they are called licence plate recognition (LPR) systems. In Europe, the more common term is automated licence number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle colour, type, make and model. We asked this week’s Expert Panel Roundtable: What's new with licence plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![Access management in higher education](https://www.sourcesecurity.com/img/white-papers/612/access-management-920x533.png)
Access management in higher education
Download![School security checklist](https://www.sourcesecurity.com/img/white-papers/612/920x533_1695989334.jpg)
School security checklist
Download![Why SAAS Security Platform is more popular in American SMEs](https://www.sourcesecurity.com/img/white-papers/612/920x533_1692699667.png)
Why SAAS Security Platform is more popular in American SMEs
Download![Safeguard Students With New Techniques And Technology](https://www.sourcesecurity.com/img/white-papers/612/milestone-k-12-ebook-mockup-2023-920x533.jpeg)
Safeguard Students With New Techniques And Technology
Download![Assessing safety readiness for education campuses](https://www.sourcesecurity.com/img/white-papers/612/education-1-920x533.jpg)
Assessing safety readiness for education campuses
Download![The critical role of access control in K-12 school security](https://www.sourcesecurity.com/img/white-papers/612/aa-us-1-920-x-533.jpg)
The critical role of access control in K-12 school security
Download![Protecting dormitory residents and assets](https://www.sourcesecurity.com/img/white-papers/612/aiphone-920.jpg)
Protecting dormitory residents and assets
Download![School security moves to the cloud](https://www.sourcesecurity.com/img/white-papers/612/cloudvue-school-security-920.jpg)
School security moves to the cloud
Download![Physical access control in higher education](https://www.sourcesecurity.com/img/white-papers/612/hid-access-control.png)
Physical access control in higher education
Download![6 questions to ask when choosing a security system](https://www.sourcesecurity.com/img/white-papers/612/hanhwa8.jpg)
6 questions to ask when choosing a security system
Download![How end-to-end video security solutions can help your organisation with social distancing](https://www.sourcesecurity.com/img/white-papers/612/vaion-social-distancing-920x533.jpg)
How end-to-end video security solutions can help your organisation with social distancing
Download![Building a safe ecosystem for visitors post COVID-19](https://www.sourcesecurity.com/img/white-papers/612/indigo-vision-920.jpg)
Building a safe ecosystem for visitors post COVID-19
Download![Schooling the market on education security](https://www.sourcesecurity.com/img/white-papers/612/vanderbilt-920x533.jpg)
Schooling the market on education security
Download![Modern, flexible access control secures HafenCity University](https://www.sourcesecurity.com/img/white-papers/612/hamburg-university-case-study-920.jpg)
Modern, flexible access control secures HafenCity University
Download![How to keep students safe on campus](https://www.sourcesecurity.com/img/white-papers/612/hid-education-620.jpg)
How to keep students safe on campus
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)