Security access systems
Sepura confirms that the Secretary of State in the Cabinet Office has revoked the Final Order imposed on Sepura pursuant to section 27 of the National Security and Investment Act 2021. The original order was made by the then Secretary of State for the former Department of Business, Energy and Industrial Strategy. On 27 June 2024, the Secretary of State in the Cabinet Office revoked the Final Order following Sepura’s return to UK ownership. This has the effect of removing all the requireme...
Blackline Safety Corp., a global pioneer in connected safety technology, has announced that it has secured a $1.9 million deal with a South African energy company. The deal is the largest in Blackline’s Middle East & Africa (MEA) region (Rest of World segment) and marks the company’s first significant contract in Africa. The energy company purchased approximately 500 G7c devices for their plant workers and almost 500 G6 devices to protect their contractors while they are on site...
Dragonfly and Vismo announce an integration partnership by which intelligence from Dragonfly’s Security Intelligence & Analysis Service will be available through the Vismo platform. Vismo will have access to Dragonfly’s 19,000 location risk scores and associated detailed intelligence reports and incident data. As a result, users of Vismo’s Locate & Protect App will be better protected when they are on the move. Two complementary capabilities The service combines two...
Arcserve, a major data protection and recovery software company, has been recognised for its excellence in SaaS backup, being named Cloud Backup Company of the Year at the Storage Awards 2024. The award recognised Arcserve as a provider of secure and resilient cloud storage and SaaS protection, highlighting the organisation as a trusted provider of data resilience solutions. Cloud data protection The awards showcase the best technologies, products, and solutions across the storage sector Arc...
RiverSafe, a global cybersecurity, DevOps, and AppSec professional services provider, has partnered with education-based charity - World Vision to improve access to education for children in Africa. World Vision World Vision is a global humanitarian organisation dedicated to improving the lives of children, families, and communities around the world. Focusing on providing education, healthcare, and emergency relief to those in need, they aim to break the cycle of poverty and open doors for a...
As a part of Teleste’s strategy execution, they have entered to an EMS-Partnership with Kyrel Oy from Finland. Through this new collaboration, Teleste aims to ensure continuous high quality, agility, and delivery reliability for our Public Safety and Mobility business unit. Kyrel is well known for its customer-centricity and reliability, values that Teleste shares. This creates a strong foundation for their partnership. Supply chain capabilities Marko Uutela, Director of Operations, Log...
News
Armstrong Fluid Technology has announced that Anish Suthesh Arul has been promoted to Regional Manager for North America. In his new role, he will manage both the US and Canadian Regional Sales Enhancement Centres, Armstrong’s two largest global markets. Arul has been with Armstrong for five years, most recently as an Applications Engineer specialising in project management. Prior roles of Arul Prior to joining Armstrong, he served in a variety of lead roles with the University of Buffalo Engineering and Applied Sciences Department. Arul has a Bachelor of Science degree in Mechanical Engineering from the University of Buffalo and is completing an Executive MBA program.
Fingerprint Cards AB (Fingerprints™) and IN Groupe through SPS brand, a pioneer in contactless and dual interface cards, announce the launch of its secure Component solution for contactless biometric payment cards, supporting global card manufacturers to scale up production of next-generation payment cards. Secure Component solution In line with consumer preferences for contactless, the global biometric payment card market is anticipated to rise at a considerable rate over the coming years. To support mass global adoption, Fingerprints and IN Groupe partnered in November 2023 to simplify the manufacturing process, allowing for increased production by improving reliability and reducing costs. Through the SPS brand of IN Groupe, the next-generation cards are ready for mass global rollout. Contactless biometric payment cards CEO of Fingerprints, Adam Philpott, comments, “Our continuing collaboration with IN Groupe and its SPS brand is supporting the global adoption of secure, convenient, and high-quality biometric payment cards." "The launch of these cards into the market reinforces Fingerprints’ position as the world pioneer in biometrics and commitment to providing innovative solutions that improve our daily lives.” T2 sensor module and software platform T2 offers ultra-low power consumption and is based on STMicroelectronics STPay-Topaz-Bio solution SPS’s cards incorporate Fingerprints’ second-generation T-Shape® (T2) sensor module and software platform, which offers ultra-low power consumption and pioneering biometric performance and is based on STMicroelectronics STPay-Topaz-Bio solution. In 2023 Fingerprints reached the one million sensors shipped milestone specifically for biometric payment cards, highlighting the robust and proven nature of the technology. Cost-effective biometric solutions Jean-Baptiste Leos, Product Director for SPS Banking Products at IN Groupe adds, “As a company with innovation at its core, we are very pleased to have expanded our product offering with Fingerprints’ next-generation biometric technology." "This helps us in our mission to continue innovating and offer secure and cost-effective biometric solutions to our customers. As a part of our offer, Technical support around Card construction, milling, embedding, and certification are key assets for the product deployment and will be our key priority in the coming quarters.”
Espria, the pioneer in digital workspace solutions, will host its next Optimise IT 2024 panel discussion, discussing how IT solutions with integrated AI technologies are best suited to support businesses and operation teams in 2024 and beyond. IT panel discussion Throughout 2024, Espria has hosted discussions on various topics, covering themes such as business peace of mind and business readiness. These discussions have featured key spokespeople from some of their pioneering IT solutions partners. This next discussion will take place on July 18th and will feature insights from Sophos, Gamma, and Xerox. Recently appointed Chief Technology and Revenue Officer - Greg Hawthorn will be joining from Espria, and the discussion will be chaired by Richard Merrin, CEO at Spreckley Partners Limited. Copilot AI Greg Hawthorn commented, "With the launch of Copilot AI tools from Microsoft, businesses need guidance for onboarding and integrating new technologies into their existing operations." He adds, "I am excited to be helping lead the conversation with some of our top industry partners to provide businesses and IT providers alike with a comprehensive overview of AI challenges shared across all industries." IT insights Greg Hawthorn continues, "I am looking forward to collaborating with our partners in providing much-needed perspective and insights about the future of IT solutions as they pertain to the new era of AI." He further said, "As Microsoft Cloud Solutions and Copilot tools form a large part of the AI discussion, I look forward to bringing my previous experience to the conversation as part of my new role at Espria." Cloud industry conversation Enabling the capability of teams with AI and generative AI tools has been a big part of the cloud industry conversation Enabling the capability of teams with AI and generative AI tools has been a big part of the cloud industry conversation – a sentiment shared by frequent Optimise panelist - Lauren Williams, UCaaS and CCaaS specialist at Gamma. Lauren Williams said, "Giving your teams a voice is a key part of business telephony, and only more accessible and important with the proliferation of AI tools. Businesses need a clear road map when it comes to what they want to achieve with their platform of choice, and so these discussions of what tools can best amplify your teams’ voice and what can support operational efficiency are all the more important." Cost-effectiveness Lauren Williams adds, "Upgrading extremely outdated infrastructure has always been a priority, but cost-effectiveness is a key factor for choosing tools that will aid your teams in the best and cheapest way." She continues, "That’s where experts come in – and more reason for conversations like Optimise to help unify and build from one another for integrated customer support."
Matrix, an entity in the Security and Telecom sector, has successfully concluded its participation at SAFE South Expo 2024 in Chennai. Leveraging over three decades of industry expertise, Matrix engaged with industry peers gathered valuable insights, and explored new avenues for collaboration. Technology-centric solutions Matrix remains steadfast in its commitment to delivering technology-centric solutions, prioritising customer satisfaction. This dedication is evident in creating cutting-edge products through in-house research and design efforts. With 40% of the workforce dedicated to continuous innovation via research and development, Matrix has built a comprehensive portfolio of over 60 advanced products across four domains. Its global reach is supported by a robust network of over 4,000 partners, serving a user base of more than 1 million worldwide. Emerging trends and customer preferences The event provided a platform to exchange ideas, forge partnerships, and identify potential areas for innovation Matrix’s sales efforts are conducted exclusively through this extensive partner ecosystem, underscoring commitment to providing top-notch solutions and fostering enduring partnerships in the technology sector. At the expo, Matrix engaged in discussions, seminars, and networking sessions, enhancing its understanding of emerging trends and customer preferences in the safety and security landscape. The event provided a platform to exchange ideas, forge partnerships, and identify potential areas for innovation and growth. Innovation, collaboration, and value Reflecting on the event's insights, Matrix recognises the importance of staying attuned to market dynamics and customer needs. Moving forward, the company plans to increase its participation in similar expos, emphasising its commitment to innovation, fostering industry collaboration, and delivering value to customers. Security and telecom solutions Matrix is committed to ongoing improvement and innovation in the Security and Telecom sector. By actively participating in industry events and leveraging market insights, Matrix strengthens its position as a trusted partner, providing cutting-edge solutions to businesses globally. Kaushal Kadakia, Head of Marketing at Matrix, emphasised the pivotal role of events like the SAFE South Expo in shaping the company’s strategic initiatives. He highlighted the importance of utilising market insights gained from such expos to refine product offerings and improve customer engagement strategies.
Gunnebo Entrance Control is proud to announce its membership in SteelZero, a global initiative uniting organisations to expedite the shift towards a net zero steel industry. By Joining SteelZero, a renowned pioneer in entrance control solutions has pledged to drive demand for low-emission steel, contribute to policy reviews, and foster collective action and knowledge sharing among peers. Low-emission steel Alongside over 40 other businesses that consume more than 10 million tonnes of steel annually, Gunnebo Entrance Control commits to using 50% low-emission steel by 2030 and achieving 100% net zero steel by 2050. Tina Hughan, Gunnebo Entrance Control Global Marketing and Sustainability Director stated, “Becoming a member of SteelZero acknowledges our responsibility to mitigate environmental impact beyond production and operational emissions." Environmental footprint Steel is found in many products in daily use, from cooking utensils to buildings and entrance control solutions “This membership supports our ambition to become a net zero business by 2045. Through our Project Earth initiative, we will continue to evaluate the environmental footprint of the steel we use and collaborate with SteelZero to find ways to reduce it.” Steel is found in many products in daily use, from cooking utensils to buildings and entrance control solutions. Its global production is estimated to account for approximately 7% of the world’s greenhouse gas (GHG) emissions. As such there is a significant need for the steel industry to decarbonise. Low-emission steel alternatives As one of the top five emitting materials in Gunnebo Entrance Control’s purchased goods, reinforced steel accounts for around 20% of total CO2e emissions, highlighting the significant impact of transitioning to low-emission alternatives. Tina concludes, “As part of our commitment, we align with the ResponsibleSteel global definitions of ‘low emission’, ‘near-zero’, and ‘net zero’ steel. This sets a foundational threshold for GHG emissions intensity in steel production, with low emission steel significantly reducing emissions compared to conventional steel.” Sustainable future “By leveraging collective purchasing power and influence, SteelZero sends a strong demand signal to steelmakers, policymakers, and investors, urging the accelerated production of net zero steel." "Gunnebo Entrance Control is excited to be part of this movement, leading the way to a more sustainable future for the steel industry.”
Matrix, a trailblazer in advanced security and telecom solutions, successfully participated in the Police Expo 2024, held on July 4th and 5th at Pragati Maidan, New Delhi. This esteemed event provided a platform for Matrix to unveil its latest innovations in IP Video Surveillance, Access Control, Time-Attendance, and Telecom Solutions to a diverse audience of industry professionals and stakeholders. Advanced security solutions During the Police Expo 2024, Matrix showcased a comprehensive range of security solutions tailored to meet the evolving demands of modern enterprises. Attendees had the opportunity to explore Matrix's newest addition, the Ruggedised IP Camera. Conforming to EN50155 standards, this camera is designed for challenging environments such as roadways and railways, offering exceptional video quality, superior low-light performance, and the ability to capture images of fast-moving vehicles. Bullet and dome cameras Complementing the cameras were Matrix's Network Video Recorders and Enterprise-grade NVRs Additionally, Matrix presented its Project Series and Professional Series Bullet and Dome Cameras. These cameras, renowned for their robust cybersecurity features, adhere to OWASP ASVS 4.0 L2 standards and are verified by STQC, Delhi. Complementing the cameras were Matrix's Network Video Recorders and Enterprise-grade NVRs, integrated with a Video Management System (VMS) for comprehensive video surveillance management. Integrated access control and time-attendance solutions Matrix’s participation also highlighted its innovative Access Control and Time-Attendance solutions. Designed to offer a unified approach to physical access management and accurate workforce monitoring, these solutions include GDPR-compliant systems with the latest feature of WhatsApp integration for real-time alerts and notifications. COSEC ARGO FACE200T A standout product at the expo was the COSEC ARGO FACE200T, a state-of-the-art facial recognition time-attendance terminal. Known for its high accuracy, rapid identification, and extensive user capacity, this terminal supports seamless connectivity options, including Power over Ethernet (PoE) and Ethernet, making it an ideal choice for efficient workforce management. Telecom solutions The exhibit featured IP-PBX systems, Unified Communication servers, and VoIP gateway Matrix, with its extensive expertise in the telecom sector, presented its advanced Telecom Solutions aimed at enhancing business communications and operational efficiency. The exhibit featured IP-PBX systems, Unified Communication servers, and VoIP gateways, all designed to support scalability and deliver reliable communication infrastructure critical for modern enterprises. Strengthening market presence in New Delhi Matrix continues to strengthen its market presence in New Delhi and surrounding regions. The Police Expo 2024 was a strategic opportunity for Matrix to engage with key stakeholders, showcase its comprehensive suite of solutions, and reinforce its commitment to deliver high-quality, dependable, and scalable products. This engagement aligns with Matrix's goal to expand its customer base in this dynamic region. Efficiency and effectiveness Kaushal Kadakia, Head of Marketing at Matrix, expressed his enthusiasm, saying, “We were thrilled to demonstrate the capabilities and applications of our latest products to key personnel in the police forces." "We aimed to highlight how our solutions can significantly enhance the efficiency and effectiveness of law enforcement agencies.”
Expert commentary
As we head into a new year, it’s fair to say that it isn’t easy out there for the security integrator community. That’s understandable given the big ruptures felt in the market for physical security in 2023. Typically, Commercial Real Estate (CRE) landlords are the biggest and most influential buyers of physical security hardware and software, but this is starting to wane as heightened borrowing costs and biting inflation cause real estate valuations to plunge. Building security upgrades A lot of CRE landlords are in a fight for survival which unfortunately doesn't leave much room for budget spend on building security upgrades. This state of affairs is a problem for security integrators with extensive connections in the CRE space. Where do they pivot their services to keep their business growing in 2024? From the conversations I’ve been having with integrators and customers alike over the past few months – the answer is that the growth potential lies in the enterprise space. The trajectory of enterprise IT and physical security Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working It might initially feel unnatural to see the enterprise segment as a potential driver of demand for physical security services and products. Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working habits? These things are true but also present an opportunity for the right physical security proposition. Standardisation of enterprise IT Take efficiency drives as an example. A key element of such efforts is an acceleration towards the standardisation of enterprise IT platforms, hardware, and solutions, using the cloud. What was once a focus on moving on-prem systems and workloads to the cloud has shifted to efforts to keep cloud OpEx costs down by centralising as much as possible. Practically, this means utilising APIs to plug disparate IT applications and services into central platforms that boast a “single pane of glass” view. APIs APIs drive consumption, open new business models, and foster cross-industry partnerships APIs aren’t anything new to enterprises. They drive consumption, open new business models, and foster cross-industry partnerships. However, the use of APIs in the physical security sphere has been surprisingly slow to take off. There are multiple elements to this but a key reason is that some security software products on the market aren’t cloud-based. Adding cloud-based solutions to network Others are cloud-based, however, and these are the solutions that security integrators need in their portfolio to serve the influential enterprise market segment and its approach to IT networks. Selling the value of these solutions requires integrators to take it a step further by speaking the language of the enterprise IT buyer and understanding their goals. The power of cloud-based access control in the enterprise Hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events The continued relevance of physical security for enterprises can’t be understated. After all, hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events – not less. Despite the discourse around office downsizing, the reality for most enterprises is that the office can’t be done away with completely and there’s always going to be growth experienced by successful companies that require an upgrade in physical square footage. Physical security Access control systems that are cloud-based will be preferred by the enterprise to fulfill the essential function of physical security. That’s because they align with the push towards centralisation in the cloud that enterprises are carrying out business-wide. Access control has the potential to result in lots of disparate dashboards and apps. Think video management, license plate recognition, building management software, elevator monitoring, hot desking solutions, guest booking software, room booking functions, and more. Uniting all of these functions in one platform suits enterprise security teams well. Access control solutions Linking employee databases to an IAM solution, or creating seamless experiences by tying access credentials But this only scratches the surface. Access control solutions that can be integrated with hugely popular corporate software applications like Okta, Azure Active Directory, and Google Workspace quickly catch the eyes of enterprise IT security teams by pulling in the same direction as the broader tech stack. Whether it’s applying AI analytics to anomaly detection, linking employee databases to an Identity Access Management (IAM) solution, or creating seamless experiences by tying access credentials to things like meeting room bookings, it’s through APIs that cloud-based access control can thrive in an enterprise setting. Security integrators It’s worth also noting that as enterprises grow, access control gets harder. Managing the access requirements of thousands of employees across a global real estate footprint requires the scale that cloud computing is best placed to bring. Security integrators who can join the dots to make that link are well positioned to pivot toward the enterprise. Broadening horizons Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates This pivot is understandably a daunting prospect but the potential for natural synergy shouldn’t be overlooked. Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates and security anomalies won’t be completely alien to cloud-first enterprises. That’s an opportunity for integrators to upsell more sophisticated security set-ups in a way that they may have found more difficult with CRE clients and prospects. Tailored propositions It would be remiss to avoid mentioning that ‘enterprise’ is a very loose term that encompasses businesses across multiple industry verticals. To better pivot, security integrators need to offer tailored propositions specific to set verticals that cover all bases as opposed to offer, for example, piecemeal alarm or video product solutions. Enterprise industry verticals Security integrators should be weary of all-encompassing narratives in 2024. Whether or not the global economic picture darkens, there are always going to be pockets of growth within certain enterprise industry verticals. Plus, anecdotally, the indicators point to enterprises being the driver of demand for cloud-based access control as we head into the new year. Integrators who can dial into that shift have a lot to gain and nothing to lose.
When a bomb detonated in the Port of Beirut, I had hundreds of employees under my care inside the blast zone. Within just two hours, I was able to determine who was impacted, understand their safety conditions, and share resources for on-the-ground support—all thanks to mobile technology. For Chief Security Officers, receiving calls like these launches a variety of protocols and necessary decision-making with the safety and security of people and assets as a top priority. And these calls are only becoming more common. Dependence on threat intelligence Mobile phones have dominated the post-COVID environment where people work from anywhere Threats ranging from natural disasters to geopolitical conflicts are becoming more frequent and complicate the responsibility organisations have in keeping their people safe. To meet these needs CSO’s are staying ahead of negative outcomes through creating a greater dependence on threat intelligence. In these times, effective, real-time risk management depends on hyper-local data from technology that is accessible, portable, and dynamic–such as cell phones. Mobile phones have revolutionised the way people live and work. They allow us all to walk around with a computer in our pocket, bringing the world to our fingertips and eliminating digital borders for over 90% of the world's population. Mobile phones have dominated the post-COVID environment where people work from anywhere and have geographically distributed teams but are also more vulnerable to threatening events. Mobile-friendly risk management platforms Mobile technology assigns workers with easy entry to data that can help keep them and their teams safe As we approach 2024, many organisations are adopting comprehensive risk management tools that empower personnel across the organisation with the intelligence and knowledge they need to stay safe wherever they are. Mobile-friendly risk management platforms, such as Crisis24 Horizon, provide always-on awareness, on-hand threat intelligence, and immediate communications and distress signalling through location monitoring. Users receive location risk assessments and push notifications directly to their devices about nearby issues and threats no matter if they are on or off the job. While only select risk managers have complete control of the platform and all sensitive employee data is protected through encryption, the app distributes critical intel to foster a culture of shared awareness and responsibility. Thus, mobile technology empowers employees with easy access to information that can help keep them and their teams safe. Creating a culture of mobile technology adoption In the last few years, the world has proven the importance of being well-informed of risks and mitigation plans to minimise harm. However, psychological barriers tend to trump physical barriers when it comes to accessing the vast array of tools our mobile devices offer. World has proven the matter of being well-informed of risks and relief plans to minimise harm Adopting this technology and establishing a culture that enforces risk management across an organisation is a daunting challenge that demands substantial commitment from leadership to be successful. Some companies have tackled this challenge by positioning security technology as part of the organisation’s employee benefits package, such as commuter benefits and health insurance, to encourage people to take advantage of these resources and learn how to use them. Cohesive risk management culture Technology is only as effective as the people whose actions it informs, which is why adoption and integration are so important. When a cohesive risk management culture meets a powerful technology platform, individuals are enabled to receive threat alerts and counter their impacts, letting others know when and how to take the necessary precautions to protect themselves and their team. For more information on mobile technology and other security trends, check out the Global Risk Forecast, an annual report by Crisis24 that provides a comprehensive analysis of key events around the world most likely to affect operations in the coming year.
These days, business is more collaborative, adaptable and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid and cloud systems. Good security is built on solid identity governance and administration (IGA) principles. From ransomware to supply chain intrusions, high-profile cybersecurity events frequently take advantage of weak identity and access management procedures. The Identity Defined Security Alliance found that 84% of organisations experienced an identity-related breach during its one-year study period. Robust IGA system Consequently, organisations need to find best-of-breed solutions for each section of the fabric Some of the most well-known cyber-attacks have not been made possible by a nation-state exploiting a remote zero-day vulnerability; rather, they have been made possible by something as basic as a hacked orphaned account. This resulted in lateral movement from an insecure platform to a high-value system, illegitimate privilege escalation or unsanctioned access to a computer system. To safeguard against such attacks, organisations must be aware of who has access to their systems and apps, and guarantee that access is revoked when it is no longer required. Here, a robust IGA system is helpful. It is not the whole picture, though; IGA is part of a larger identity fabric. A report by KuppingerCole noted that “Identity Fabrics are not necessarily based on a technology, tool or cloud service, but a paradigm for architecting IAM within enterprises.” The report pointed out that the paradigm is created using several tools and services. That’s because, contrary to marketing claims, no one vendor has a platform that provides all the needed elements. Consequently, organisations need to find best-of-breed solutions for each section of the fabric. Threats to the new corporate landscape Due to their exclusion from the corporate firewall and the security culture that comes with working on-site, remote employees and third parties are desirable targets for hackers. The transition to online office suites is another vulnerability that hackers are taking advantage of–for instance, through bogus authentication login dialogues. Additionally, hackers are using technologies like machine learning and artificial intelligence to circumvent current security tactics. A cyberattack powered by AI will imitate human behaviour and develop over time. Even publicly available information might be used by this "weaponised AI" to learn how to get past a target’s defences. CISO and the business users Attackers will finally find an entryway, but firms can protect the new perimeter–their identities It's no longer possible to secure the traditional perimeter. Attackers will eventually find an entryway, but businesses can protect the new perimeter–their identities. To defeat these threats, organisations must look again at identity and access management tools and how they are weighed against the impact on the organisation. Should you mandate multi-factor authentication (MFA) more often and earlier? Should only company-owned devices have access to networks, or should access be restricted to specific business hours or regions? Should access to sensitive information and critical systems be given just temporarily or should it be offered on a task-by-task basis? Both the CISO and the business users they assist should be asking these questions. Staying ahead of threats with identity Access control limits decrease dangers but can come with a cost. If you give your users too much access, your organisation becomes susceptible; if you give them too little, productivity suffers. But there are ways to strike a balance with security, compliance and productivity. More CISOs are turning to Zero Trust–which is based on the principle of maintaining strict access controls and not trusting anyone by default–to protect their systems from new attack types. However, Zero Trust is reliant upon having a thorough and baked-in strategy that underpins it. Other actions that companies can take include implementing automation for identity management, such as automating workflows for approval. This would significantly lessen the administrative burden and friction that security solutions like multifactor authentication (MFA) or time-restricted access to critical systems have on business users. This might include restricting access to particular devices, capping access hours during the day or enforcing MFA based on user behaviour. Identity fabric: Putting it all together Make sure your identity architecture is scalable, secure, and provides a seamless user experience These are just two elements of the identity fabric approach. Most organisations today have implemented pieces of an identity fabric, which is basically an organisation’s identity and access management (IAM) infrastructure and typically includes a mix of modular IAM solutions for multi-cloud and/or hybrid environments. Now, organisations need to define, enhance and develop this infrastructure. They must also institute guiding principles for how it should operate, meet current and future business requirements as well as identity-related cybersecurity challenges. In doing so, businesses can move past identity platforms and adopt an identity fabric perspective. The key is to make identity governance the starting point of your identity fabric strategy, ensuring seamless interoperability within your identity ecosystem. Make sure your identity architecture is scalable, secure, and provides a seamless user experience. Aligning security with business Due to the increase in knowledge workers using the cloud and working remotely, attackers are focusing on this group. These employees are easier to compromise, give access to valuable data and offer more attack targets. Knowledge workers also lack an administrator’s level of security expertise. Therefore, as part of their security fabric strategy, enterprises require a scalable IGA system. It is easier to comply with security and access regulations and takes less time for IT teams to do normal administrative activities when they invest in IGA, a crucial tenet of identity security. CISOs and boards, though, are currently looking at more than identity management. IGA is at the centre of the debate about security and governance. Taking an identity fabric-based approach, with a foundation built on modern, cloud-based IGA, will safeguard identities, increase productivity, and make staff adherence to organisational procedures easier.
Security beat
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritise prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis and prioritisation, and finally, development of mitigation measures.” Safety and security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analysing and prioritising mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements to physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorised individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritise improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders and non-profit organisations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organisations can offer valuable resources, training, and support programmes to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Case studies
Arana Security, a specialist in providing end-to-end security systems for businesses, has chosen Custom Consoles control room desks for a major client in the manufacturing sector. The project includes a main desk and supervisor’s desk from the Custom Consoles SteelBase series plus a MediaWall and auxiliary furniture. Arana Security was founded in 2013 to serve a growing market of smart card solutions and security systems. In 2015 it started to move towards providing clients with the advanced security that biometric technology offers. The company is a globally active service provider specialising in integrated biometric security solutions for the corporate, financial, governmental and logistics sectors. Latest-generation models “This is the most recent of many security-related control room commissions we have worked on over the years,” says Gary Fuller, sales manager at Custom Consoles. “Both SteelBase desks are latest-generation models with blue LED lighting on the underside of the worktop. This style of lighting provides sufficient illumination for staff to concentrate on the monitor displays without distraction while still being able to move around the room easily. It also helps to reduce fatigue during a long or uneventful operating shift." “The main desk is a 4.3-metre wide six-bay unit configured for use by two operators. Each bay is fitted with a lockable front and rear door providing easy access to computer equipment and related cabling. The desktop is 80 cm high and has a 120 cm front-to-back reach. A removable section of the worktop covers a full-desk-width cable tray. Four monitor screens are mounted near the rear edge of the desk. The desk faces directly towards a 3 metre wide MediaWall supporting six large multiscreen monitor video screens forming three wide by two high display grid." Desk worktops Desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors Fuller added: “Situated behind and to the right of the main control desk, the supervisor’s desk is a 1.6-metre wide two-bay SteelBase with dual 24-inch monitor screens, again located near the rear of the worktop. This desk too has blue LED underlighting.” The desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors and side panels. Also provided were a dual-bay control room and crisis room storage units with doors, a 2.2 x 1-metre crisis room meeting table, 24/7 operator chairs, monitor arms plus meeting table chairs. Cable management features Custom Consoles' SteelBase is a high-strength desking system developed to withstand the demands of heavy industry. Built around steel frames with hinged lockable front and rear doors, SteelBase can be configured for use by individual operators or teams of practically any number without the cost and long delivery time usually associated with project-specific furniture. Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs. Predrilled monitor arm mounting points are positioned at the rear upper edge of each bay. Cable management features include a removable worktop section with dual brush strips providing an uninterrupted cable exit for telephones, monitor cables and computer peripherals. Integral cableways allow heavy-duty wiring to be fully concealed within the desk structure while retaining easy access for routine maintenance or adjustment. SteelBase desktops Desktop equipment pods can be specified if required. SteelBase desktops are available in a choice of 120 cm (standard) or 100 cm (SteelBase Lite) front-to-back sizes with a choice of hard-wearing Marmoleum or laminate work surfaces. All elements are guaranteed against component failure for five years of normal use. All elements are guaranteed against component failure for five years of normal use MediaWall is a video and audio monitor support frame system providing a combination of structural rigidity and operational versatility. Flat-screen video displays of practically any size can be mounted in almost any configuration. Video display screens Incorporating height-adjustable horizontal beams and T-slot mounts, MediaWall is fully adjustable to ensure optimal sight lines. Individual or multiple frames can be used in self-supporting mode or coupled directly to the studio wall. Video display screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the monitor panel bezel. Monitor signal and power cables are fully concealed and can enter or leave the structure at any desired point.
The Ampelmännchen (“little traffic light man”) from the former GDR is a cult figure around the globe. For tourists, the shops of AMPELMANN GmbH in Berlin are a big draw. Branches are spread over the entire city, and to reduce the burden of employee and staff key assignments, the company sought to optimise access rights management. At the same time, branch security needed to be state-of-the-art. The CLIQ® access control solution from ASSA ABLOY met all these requirements with flying colours. AMPELMANN GmbH Founder and Owner - Markus Heckhausen sought a locking solution for eight AMPELMANN GmbH branches and a 2,200 m2 logistics centre, to meet the needs of a decentralised branch organisation. This creative company, which manufactures and sells a wide variety of products under the AMPELMANN brand with the Ampelmännchen, did not want a complex system suited only to large companies with thousands of employees. It should be practicable and fast for a company with around 150 employees, yet still be able to secure branches reliably. Easy administration, maximum security Branches must be accessible to customers during opening hours, yet sufficiently secured Small and medium-sized retailers face the same access control challenges as their large competitors. Employees need access to the store, warehouse, and offices, but not every employee should have the same authority. Branches must be accessible to customers during opening hours, yet sufficiently secured after closing time against unauthorised access. Challenges faced Key management is often an elaborate, time-consuming process, even more so when keys are lost or stolen. In such cases, all locking systems must be replaced, which requires more effort and significant costs. AMPELMANN GmbH in Berlin also faced these issues. Its eight branches are located in the best shopping areas in Berlin, each staffed by several employees. External service providers, such as cleaners also need access to the building. A large staff roster and significant distance between branches create a major key management workload. eCLIQ ensures branch security Together with the Berlin locksmith Hinz, AMPELMANN Owner - Markus Heckhauen found a solution in the flexible, decentralised, and reliable electronic locking system from ASSA ABLOY. Uli Hahn, Managing Director of Hinz, has been providing security in and around Berlin for more than 50 years. He says, "The eCLIQ locking system is very powerful and safe compared to conventional systems. It is easy to handle and to assemble. Above all, it enables quick and easy administration of access authorisations, making it the perfect choice for medium-sized companies, such as AMPELMANN." Plug-and-play solution Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software eCLIQ comes as a "plug and play" solution and is ready to use immediately after installation. The system works without cabling, so the extremely compact eCLIQ cylinder can be used in a wide variety of doors at any location. Power is supplied by batteries in each programmable key, which can be changed easily and without tools. A built-in chip makes every electronic key unique. Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software. Robust, durable, and safe In addition to the compact design, the system is characterised by robust, durable, and safe components. An integrated lubricant reservoir ensures the cylinders remain maintenance-free for up to 200,000 cycles. A high-quality processor protects the locking system against manipulation and intelligent attacks. Keys are also highly resistant and waterproof (IP67). eCLIQ cylinders and keys are VdS-certified (BZ +) and comply with the DIN EN 15684 standard for electronic locking systems. A wide range of different cylinder types makes the system suitable for many applications from the company's entrance gate to securing alarm systems, elevators, doors, and cupboards. Convincing solution "Decisive in our choice of eCLIQ was that we could control access authorisations easily and flexibly at any time," explains Markus Heckhausen, adding "If a key is lost, we can easily deactivate it and disable it." eCLIQ even makes time- and location-limited authorisations easy for example, by allowing cleaners to enter only at certain times. The allocation of access authorisations can be coordinated conveniently by individual branch managers, within a system that ensures maximum security for all AMPELMANN GmbH shops.
Jacksons Fencing has recently completed a project with the Kingdom Hall in Hoddesdon, striving to enhance both the safety and visual appeal of its premises. As a place of worship for Jehovah’s Witnesses, the Kingdom Hall is meticulously maintained by its congregants to embody modesty and purpose. Enhancing security and aesthetics The primary goal was to bolster security against unauthorised access, vandalism, and theft, while also complementing the dignified exterior of the place of worship. Recognising the importance of creating a secure yet welcoming environment for congregation members and visitors alike, Jacksons Fencing was entrusted to install vertical bar railings around the building’s perimeter. These railings, coated in black architectural grade polyester powder, were chosen for their security features and aesthetic compatibility with the existing brick façade. The solution The black polyester powder-coated finish was chosen for its longevity and low maintenance The selection of a black polyester powder coating not only ensures durability and weather resistance, but also aligns with the hall’s commitment to sustainability and environmental stewardship, by minimising maintenance needs. Safety and security were paramount concerns for the premises. To prevent unauthorised access, vandalism, and theft, and to safeguard everyone within the premises, the installation of vertical bar railings was deemed essential. Additionally, enhancing the building's exterior aesthetics was a key consideration. The decision to use black polyester powder-coated railings was driven by the ability to harmonise with the brick façade, thereby enhancing the overall sophistication of the hall’s appearance. Jacksons Fencing’s experienced installation team anchored the Barbican Imperial® vertical bar railings to the brick wall, utilising cranked posts for added stability. The black polyester powder-coated finish was chosen for its longevity and low maintenance, reflecting Jehovah’s Witnesses' emphasis on sustainable practices and responsible investments. Ensuring sustainability Environmental stewardship is at the heart of Jehovah’s Witnesses teachings, and this principle guided every aspect of the project. Emphasising quality and longevity reduces lifetime costs and environmental impact by decreasing waste and the need for replacements. Jacksons Fencing’s 25 year guarantee on both steel and timber products further ensured that the fencing and gates were an ideal fit for this project. The power of protection Project not only managed the useful needs of the flock but also enhanced the visual harmony The installation of the vertical bar railings not only delineated clear boundaries but also effectively deterred unauthorised access, ensuring unobstructed views from inside the building to the surroundings and contributing to a safer environment. Through detailed planning, bespoke design, and precise execution, the Kingdom Hall achieved significant advancements in both security and aesthetics. This project not only addressed the practical needs of the congregation but also enhanced the visual harmony of the premises, creating a secure and welcoming environment for all. Well-being of congregation members Peter Jackson, Managing Director, Jacksons Fencing, says “We are proud to have contributed to creating a secure and welcoming environment for the Kingdom Hall in Hoddesdon. In today’s world, ensuring the safety and well-being of congregation members and visitors is more important than ever." "We have worked closely with the congregation to ensure the final solution is fit for purpose now and well into the future. Our products aim to help the community feel safe and secure as they worship and gather.”
Smiths Detection, a global pioneer in threat detection and security screening technologies, announces that it is partnering with Flughafen Zürich AG (Zurich Airport) to trial the use of the industry-pioneering HI-SCAN 6040 CTiX Model S carry-on baggage X-ray scanners and the iLane A20 ATRS, the smart automatic tray return system, at two security lanes in the airport. The 3D images produced by Smiths Detection’s HI-SCAN 6040 CTiX will allow some of Zurich’s 2.7 million monthly passengers to leave their liquids and electronics in their carry-on luggage as they pass through security, resulting in a more convenient and streamlined security screening experience. Installation of CT scanners The iLane ensures a consistent flow of trays and provides a seamless checkpoint journey for passengers In addition to providing more efficient and effective security screening, the HI-SCAN 6040 CTiX is the most energy-efficient scanner of its type available in the market, featuring low noise levels, zero vibration, and a 30% higher belt speed than other CT X-ray scanners – helping to promote a calmer checkpoint. The iLane ensures a consistent flow of trays and provides a seamless checkpoint journey for passengers. Alongside passengers, employees at security checkpoints will also benefit from the installation of CT scanners via the addition of 'remote screening' capabilities. This means that security staff no longer have to check the images of the baggage contents directly next to the devices, but can work from a separate room, facilitating a quieter and more concentrated work environment. Layout of the new security lanes Zurich Airport will test the CT equipment in various configurations over several months, in order to optimise the layout of the new security lanes, with the intention of equipping all 26 lanes with this cutting-edge technology in the future. Although passengers will be able to leave liquids in their bags, the maximum container size of 100 ml and total carry-on size of one-litre rules will remain in place until further notice. Matthew Clark, Vice President (VP) of Commercial, Smiths Detection, commented: "We are delighted that Zurich Airport has selected Smiths Detection to trial the use of this pioneering technology that will enhance security outcomes and improve efficiency, providing a smoother experience for passengers and staff alike."
A major European oil and gas company that acquires, explores, produces and supplies chemical and petroleum products had a cybersecurity challenge. Company leadership wanted a better way to quantify and respond to the industry’s increasing levels of cybersecurity risk. Pioneers were looking for a new way to better understand and improve their company’s OT cybersecurity. As part of this effort, pioneers wanted to compare the company’s current levels of protection against a series of hypothetical attacks to identify gaps. With operations in several locations and a supply chain network of over 1,000 gas stations, auditing and improving the company’s cybersecurity would be no small task. Set of analysis and recommendations The Honeywell csHAZOP solution is designed to deliver a comprehensive set of analysis To help overcome these challenges, the company called in Honeywell and, specifically, its csHAZOP services team to perform a detailed design evaluation based on OT cybersecurity risk. The Honeywell csHAZOP solution is designed to deliver a comprehensive set of analysis and recommendations–it goes beyond the standard cybersecurity vulnerability assessment or IEC 62443 compliance audit by adding deeper analysis that is designed to: Investigate a significant amount of what can go wrong, including approximately 500+ attack scenarios – evaluating these for multiple threat actors and different consequences, Address – via risk assessments – both the likely risk reduction through the regular IT type of countermeasures (AV, firewall, hardening, etc.) and the consequence severity reduction through the implementation of safeguards (e.g., hardwiring critical control signals), Estimate residual risk for each hazard, allowing identification and quantification, making mitigation actionable, Focus on process automation cybersecurity risk (csHAZOP stage 1) or production process cybersecurity risk (by adding csHAZOP stage 2 vs. cybersecurity production risk) to add a higher level of cybersecurity analysis from an OT perspective unique in the industry. Send in the csHAZOP experts Honeywell cyber experts also uncovered some high-risk design deficiencies The Honeywell OT cybersecurity experts worked with the Honeywell proprietary csHAZOP method to uncover several concrete recommendations for immediate remediation and technical design recommendations in the company’s ICS, to be considered in upcoming ICS migrations. Honeywell cyber experts also uncovered some high-risk design deficiencies. The Honeywell csHAZOP framework was used to identify levels of residual risk to determine which security hazard was more critical to address versus others. Honeywell provided targeted guidance on several aspects of the study, using experience from real-world cyber attacks in the industry. Honeywell’s csHAZOP service is one of the few cybersecurity assessments available on the market that is designed to apply counterfactual risk analysis. Honeywell’s csHAZOP report This evaluation now links OT cybersecurity to loss prevention and process safety Given a system’s protective measures, this method helps a company evaluate which cyber attacks (based on countermeasures, security protections and type of threat actor) may succeed. This evaluation directly links OT cybersecurity to loss prevention and process safety. Honeywell’s csHAZOP report for this oil and gas refinery was considered successful by the customer because of its well-defined procedure, the tools Honeywell has specifically designed for OT systems and the team’s experience and efforts in OT cybersecurity. Results of the csHAZOP assessment “The results of the csHAZOP assessment from Honeywell went beyond our expectations. We have received a detailed and analytical cybersecurity hazard and operability report concerning both identified risks and realistic recommendations for remediation." "Additionally, the report is a valuable tool for future upgrades of our systems as well as new projects and the development of an incident response plan. We intend to repeat this assessment periodically, as it is a valuable tool in our continuous efforts to improve security for our systems from the ever-evolving cybersecurity threats,” Major refinery in Europe.
In 1899, the Texas Legislature authorised the formation of the Southwest Texas State Normal School, which opened in San Marcos four years later. At the time, the school’s mission was to prepare Texas public school teachers, but over the years, it has undergone several expansions and name changes to reflect its evolution into the major multi-purpose university Texas State has become. From its humble beginnings located in a single building, Texas State’s original San Marcos campus has grown to cover a 485-acre campus that is home to 267 buildings, as well as an additional 5,038 acres of recreational, instructional, farm and ranch land. The university added a second campus in Round Rock, which has grown from 15 temporary buildings to a 101-acre campus with state-of-the-art facilities. Electronic key control systems Texas State’s student population has kept pace with its physical expansion, growing from 303 in 1903 to more than 35,546 in 2013 – marking the 16th consecutive year of enrolment growth for the university. Texas State reviewed its security policies and chose the need to execute electronic key Anticipating major physical and population growth to continue into the future, Texas State reviewed its security policies and determined the necessity of implementing electronic key control systems in sensitive areas. Based on its size, the understanding was that as many as 85 of these systems could potentially be needed as part of this initiative. Aggressive construction campaign Texas State was faced with a particularly challenging growth-related issue in September 2013, as its freshman enrolment surged to more than 5,000. Like many universities, Texas State requires its freshmen to live on campus, which it sees as a tool for retention. That policy seems to be working, with approximately 80 percent of freshmen living on campus technically returning for the following semester. To accommodate the growing ranks of on-campus residents, the university has pursued an aggressive construction campaign, building a new residence hall complex every two years to house approximately 600 additional students with plans to break ground this fall on a third new housing complex. In all, Texas State spent more than $190 million on new or renovated buildings, with more construction planned into the foreseeable future. Update key management policies Maintenance staff members would often reach for the key to a particular building they needed to access With a large number of individuals requiring access to so many facilities, the university recognised that key management had the potential to become a high-risk issue and determined to become proactive in reducing that risk. Maintenance staff members would often reach for the key to a particular building they needed to access, only to find it was already checked out. They would then be forced to go through the time-consuming – and frustrating – process of determining who had the key last and tracking that person down to retrieve it. The decision was made to update key management policies and practices to make them more efficient and effective. “We’ve been especially happy with the KeyWatcher’s access and reporting capabilities, and the system’s reporting tools make reviewing events and issues incredibly simple,” Kyle Estes Associate Director of Housing for Facilities Services Texas State. Options for key management systems To combat these problems and increase the security and effectiveness of its key management, Texas State charged its University Police Department and other stakeholders with undertaking an extensive review of the available options for key management systems on the market. This exhaustive process involved gathering research from printed materials and online research, having discussions with current customers of the various vendors, and listening to on-site presentations from the companies under consideration. At the conclusion of its review of key control cabinets and systems, Texas State chose KeyWatcher Touch from Morse Watchmans. This exhaustive process involved gathering research from printed materials and online research The main factors that led Texas State to choose KeyWatcher Touch systems were its robust feature set and competitive pricing. The school was also impressed by Morse Watchmans’ receptiveness to its specific needs – a six-digit user ID, for example – and ability to implement changes quickly. Access to support was also a main consideration, so Texas State appreciated that the system was produced domestically by a company with a 130-year history. Enterprise management capability Of the KeyWatcher systems to be implemented, the largest number were to be deployed for Texas State’s Department of Housing and Residential Life, which provides housing and services to approximately 7,000 residents in 25 facilities. The department also operates a facilities service group consisting of 110 full-time employees and a staff of 170 building paraprofessionals. The department also operates a facilities service group consisting of 110 full-time employees Because of the personnel changes the department experiences on an annual basis, the system’s enterprise management capability has been a valuable feature, as have its robust reporting capabilities, says Kyle Estes, Texas State’s Associate Director of Housing Facilities Services. Having keys available in each residence hall for use by maintenance staff has made the department more efficient and reduced their liability; staff no longer need to carry multiple master keys across campus for different buildings. Centralised management features “Because the system automatically generates a log of who has each key, we’ve been able to establish much better employee accountability for key usage,” Estes says. “The ability to set a maximum duration that each key can be checked out and to receive alarms when that limit is exceeded has eliminated the problem of having keys unnecessarily checked out and as a result inaccessible when someone needs them.” Ease of use and centralised control parts fed by the system’s web capabilities All KeyWatcher Touch systems deployed at Texas State are connected to the university’s network and interface with its card access and email systems. The ease of use and centralised management features provided by the system’s network capabilities have streamlined the once cumbersome process of generating reports and reviewing incidents. One particular feature, the ability to access the system from anywhere, has made the system even more effective, Estes says. Earliest adopters of KeyWatcher Touch As one of the earliest adopters of KeyWatcher Touch, the Housing and Facilities Department served as a test case of sorts for the system. Based on the success the department has had, combined with its continued rapid growth and expansion, Texas State University’s 85-system implementation is ongoing. As more systems are added, expansion will be a consideration moving forward, but Estes doesn’t anticipate that being a problem. “We’ve found that expanding these systems is fairly easy and doesn’t involve time-consuming processes that could delay implementation of key management for particularly sensitive areas,” Estes says. “Overall, the system has been very reliable, and the support staff has been very responsive and regularly available to help resolve the very few minor issues we’ve encountered in a timely manner."
Round table discussion
Factors such as stable demand and large contracts make the government market particularly enticing for security companies and professionals. However, entering and thriving in the government market presents a number of challenges. We asked this week's Expert Panel Roundtable: What are the unique aspects of the government market, and how should the industry adapt?
The design of buildings encompasses many elements, from the practical to the aesthetic. Well-designed buildings should be functional, and they can also be beautiful and inspiring. But can security systems and building design coexist and complement each other? We asked this week’s Expert Panel Roundtable: How does building design impact physical security systems -- and vice versa?
The economic fallout of the COVID-19 epidemic was felt in supply chain disruptions, higher prices, and shortages of certain goods. The physical security industry was not spared, although the epidemic also presented opportunities for security companies. Changing access control trends triggered by the pandemic are still reverberating throughout the industry, for example. Four years later, the impact of the pandemic is still being felt in the security market, lingering like the symptoms of "long COVID." We asked this week's Expert Panel Roundtable: Four years after the start of the COVID-19 pandemic, what is its lingering impact on the physical security industry?
Products
White papers
Access control system planning phase 1
DownloadThe truth behind 9 mobile access myths
DownloadMulti-residential access management and security
DownloadGuide for HAAS: New choice of SMB security system
Download2024 trends in video surveillance
DownloadBoost efficiency and streamline security with integrated access control
DownloadAI in security solution
DownloadManaging security in the age of boundaryless working
DownloadThe top 4 reasons to upgrade physical security with the Cloud
DownloadAccess control: The enterprise buyer's guide
DownloadEffectively branding a multifamily property
DownloadIntegrating control access and security
DownloadIdentity and access management
DownloadAccess management in higher education
Download6 good reasons to embrace mobile credentialing
DownloadVideos
Security access systems: Manufacturers & Suppliers
- Vanderbilt Security access systems
- HID Security access systems
- CyberLock Security access systems
- Alpro Security access systems
- ABLOY Security access systems
- Bosch Security access systems
- Software House Security access systems
- CEM Security access systems
- AMAG Security access systems
- Parabit Security access systems
- Honeywell Security Security access systems
- Delta Scientific Security access systems
- Aritech Security access systems
- TESA Security access systems
- ASSA ABLOY - Aperio® Security access systems
- Hikvision Security access systems
- Nedap AEOS Security access systems
- TDSi Security access systems
- Paxton Access Security access systems
- Dahua Technology Security access systems
Honeywell GARD USB threat report 2024
DownloadThe role of artificial intelligence to transform video imaging
DownloadAccess control system planning phase 1
DownloadKey Findings from the 2024 Thales Cloud Security Study
DownloadArtificial intelligence
Download