Security Assessments
Absolute Security, a pioneer in enterprise resilience, announced that Absolute Secure Endpoint (SE) is now available in the AWS Marketplace, a digital catalogue with thousands of software listings from independent software vendors that make it easy to find, test, buy, and deploy software that runs on Amazon Web Services (AWS). Absolute SE delivers resilient visibility, control, security, and fast recovery across globally distributed PC fleets. As part of the Absolute Resilience Platform,...
CIE Group, a pioneering provider of security and audiovisual solutions, has announced it is now the exclusive UK distributor for VOLO, a leading innovator in cloud-based access control systems. This agreement will see CIE Group supplying VOLO’s comprehensive solution to UK businesses and organisations aiming to enhance security, streamline access management, and gain valuable data-driven insights. VOLO's access control "We are thrilled to be the exclusive distributor for VOLO's in...
Dell Technologies introduces AI innovations that help Dell and Microsoft customers simplify AI adoption, speed deployment and power demanding workloads in multicloud environments. Data protection, cyber resiliency and security advancements help joint customers strengthen their cybersecurity posture. Data protection and services “Organisations modernising their IT strategies to support emerging workloads, like AI, need solutions that help them innovate faster, control costs and pro...
The European Network for Cyber Security (ENCS) announces that IPTO (Independent Power Transmission Operator), Greece's transmission system operator, has officially joined the network as a full member. With this new partnership, IPTO will actively participate in shaping the ENCS's strategy, while benefitting from the extensive cybersecurity knowledge sharing, training, and research available to ENCS members. Reliable transmission of electricity IPTO operates and keeps Greece's high-v...
Hornetsecurity, a global pioneer in cybersecurity solutions, is excited to announce the launch of its DMARC Manager. The advanced tool addresses the complex challenges organisations face in managing DMARC, DKIM, and SPF configurations, especially for those operating across multiple domains. As email threats such as fraud and impersonation attacks continue to rise, the need for robust email authentication practices has never been more critical. DMARC Manager is designed to empower administrators...
Cyware, the pioneering provider of threat intelligence management, low-code/no-code automation, and cyber fusion solutions, announced the appointment of Jawahar Sivasankaran as President, marking a pivotal step in Cyware’s mission to empower organisations with advanced threat intelligence and security solutions. Jawahar brings 25+ years of experience fostering security product innovation, growth leadership, and customer success at Cisco, Splunk, and Appgate. Prior roles of Jawahar...
News
Wesco International, a pioneering provider of business-to-business distribution, logistics services and supply chain solutions, is now making its entroCIM digital solution available globally to help more organisations better monitor and control their building operations using data. entroCIM is a central intelligence manager (CIM) software solution that aggregates data from disparate building devices and systems into a single digital interface. ROI of entroCIM The digital solution also complies with global regulations like the European Union’s GDPR Using entroCIM, building owners and operators can access real-time building system data, schedule maintenance, control building operations and get predictive insights into what’s happening in one or more facilities – all in one place. This can help them manage energy use, reduce maintenance costs, optimise space, improve safety and increase productivity. With its global presence, Wesco Anixter can help organisations deploy and maximise the ROI of entroCIM in any part of the world. The digital solution also complies with global regulations like the European Union’s General Data Protection Regulation (GDPR). Wesco Anixter’s innovation solutions entroCIM is the latest addition to Wesco Anixter’s innovation solutions portfolio, which can help organisations know more and do more by using the connected technologies in their facilities. “Digital solutions like entroCIM combined with Wesco Anixter’s unique position at the centre of the value chain allow us to collaborate and co-innovate with integrators and manufacturers like no one else can,” said Bill Geary, Executive Vice President and General Manager – Communications & Security Solutions, Wesco. Number of devices and systems entroCIM, acquired by Wesco Anixter this year, monitors millions of square feet across data centres Geary added: “The number of devices and systems being connected in buildings is only growing. Together with our partners, we can make the whole of that connected ecosystem greater than the sum of its parts, helping customers gain deeper insights and create more efficient ways of operating.” entroCIM, acquired by Wesco Anixter earlier this year, already monitors millions of square feet across data centres, commercial buildings, airports and universities. IT/OT convergence Through an open API architecture and out-of-the-box connectivity with industry-standard protocols, entroCIM acts as an aggregation layer for multiple operating systems and accelerates IT/OT convergence – helping to drive better visibility for data centre and building operations. Wesco Anixter represents the international go-to-market brand of Wesco and brings to life the company's mission to build, connect, power and protect the world to its customers and supplier partners in the regions of APAC, CALA and EMEA.
Sensor solutions provider HENSOLDT has once again demonstrated its technological capabilities as part of the multinational ‘Timber Express 2024’ exercise. The OPTARION mission support system (German: EUA for Einsatzunterstützungsanlage) successfully integrated NH90 and TIGER helicopters in a secure data link network and connected them to modern command and information systems. Digital command network “Seamless connectivity and the secure exchange of situational information between different weapon systems are crucial for today's hybrid operations on the battlefield,” explains Alex Irmscher, programme manager for ground stations at HENSOLDT. “Thanks to our EUA solutions, it was possible to integrate the aircraft into the Bundeswehr's digital command network without having to modify the weapon system.” SitaWare HQ battle management system Centrepiece of the rally was the news of real-time data between the helicopters and other platforms The centrepiece of the demonstration was the transmission of real-time data between the helicopters and other platforms along the ‘sensor-to-effector’ chain. A special feature was the connection of the platforms to the “SitaWare HQ” battle management system and the real-time integration into Link-16, the standardised tactical data link network used by NATO and partner nations. This networking helps the armed forces to create a unified situation picture and improve decision-making in complex scenarios. OPTARION mission support system A core aspect of the OPTARION mission support system is its ability to increase the operational efficiency and deployment flexibility of the armed forces. In an increasingly network-centric warfare, it enables the linking of different platforms and systems via secure data links, creating a common and dynamic situation picture. Network-centric operations OPTARION is a key component for modern combat operations and provides the armed forces This network-centric operations capability not only improves real-time decision-making, but also ensures a high level of interoperability. This makes OPTARION a key component for modern combat operations and provides the armed forces with the technological basis for successfully operating in complex and rapidly changing threat scenarios. Innovation in the field: EUA NT and modular technology During the exercise, functionalities from the EUA NT (new technologies) modernisation project were already in use. These include the modular radio concept for flexible antenna and radio operation and innovative data network technologies that ensure increased interoperability. What is “Timber Express”? “Timber Express” is an annual multinational exercise that focuses on the cooperation and interoperability of air forces. Various NATO countries take part in this exercise to jointly train the skills needed to lead and coordinate air operations in complex scenarios. The aim is to optimise the networking and data exchange between aircraft and command systems while ensuring the security requirements for the transmission of information.
AMAG Technology is pleased to announce the appointment of Chris Meiter as AMAG Technology's Vice President of Global Business Development for Video Solutions. This new role underscores the organisation’s continued expansion support to its entire technology suite. Chris Meiter comes from Salient Systems, which is a decade-long strategic video partner of AMAG Technology. The appointment of Chris to this new position is a strategic win for both AMAG Technology and Salient Systems, offering enhanced opportunities for collaboration and product evolution that will directly benefit integrator and end-user customers. Growth strategy "We are thrilled to welcome Chris to our commercial leadership team," said AMAG Technology Executive Vice President of Sales, Marketing and Commercial Excellence, Kyle Gordon. "His extensive experience and deep understanding of customer needs in the video market will be instrumental in our growth strategy. Chris’ expertise will allow us to better serve our customers by delivering superior support.” AMAG’s capabilities AMAG Technology’s President, David Sullivan, added, “This new role highlights our commitment to growth and to securing top-tier leadership. With Chris on board, we are not only expanding our leadership team but also investing in a program that prioritises customer needs and emphasises the value we bring with Symmetry CompleteView." "This focus will ensure that our customers feel supported, heard, and confident in AMAG’s capabilities as a video and security solution provider.” AMAG Technology and Salient partnership “Chris Meiter’s new role within Kyle Gordon’s commercial leadership team highlights the strength of the AMAG Technology and Salient partnership." "Chris’ deep knowledge and experience, developed during his time at Salient, will now help AMAG’s global sales team to effectively showcase the Symmetry CompleteView Video Management System,” said Salient Systems CEO, Bob Wilbur. AMAG Technology’s video-selling strategy Meiter established and implemented AMAG Technology’s video-selling strategy and ensure support Chris Meiter will establish and implement AMAG Technology’s video-selling strategy and ensure seamless support for all video-related initiatives. Meiter will work closely with commercial pioneers to develop training programs, empowering the global sales team to demonstrate AMAG Technology’s Symmetry CompleteView Video Management System. He will work with cross-functional teams such as product management, engineering, and marketing to help develop and refine the company’s market approach. Integrated security solutions As the security landscape continues to evolve, both companies are committed to staying ahead of customer needs by leveraging their combined strengths. Together, AMAG Technology and Salient Systems are confident this transition will reinforce their partnership, allowing both companies to deliver innovative, fully integrated security solutions globally.
Axis Communications, as part of its ongoing commitment to fostering a smarter, safer world through the use of advanced surveillance technologies, will preview its latest panoramic cameras at ISC East 2024, the Northeast's premier security and public safety event. Amongst its latest product offerings are two new AI-powered panoramic cameras, the AXIS P3747-PLVE and AXIS P3748-PLVE, which provide expansive coverage for outdoor areas, as well as the capacity to deliver clear imagery in all lighting conditions. PRTZ capabilities Both devices offer remote PRTZ abilities and can be mounted on tops for 360° coverage Both devices offer remote pan, tilt, roll, zoom (PRTZ) capabilities and can be mounted on ceilings for complete 360° coverage, or mounted on corners for 270° coverage. The cameras are also equipped with a deep learning processing unit (DPLU), empowering customers to utilise powerful analytics on the edge to enable intelligent capabilities such as properly identifying, classifying, tracking, and counting humans and vehicles. AXIS P3747-PLVE & AXIS P3748-PLVE Panoramic Cameras While the AXIS PS3747-PLVE offers 4*5 MP at 20 fps per channel, and the AXIS P3748-PLVE offers 4*8 MP at 12.5/15 fps per channel, both cameras share several key characteristics. Both provide customers with the ability to capture clear images over significant distances. The cameras also offer 360° infrared (IR) illumination with individually controllable LEDs and a removable IR cut filter, which assists in providing clear images in wide-ranging lighting conditions, including full daylight, low light, and darkness. Forensic search capabilities Both devices include DPLU, making it likely to run powerful analytics on the edge Both devices also include a DPLU, making it possible to run powerful analytics on the edge to enable advanced actions such as accurate human and vehicle detection. This helps to provide efficient forensic search capabilities in live or recorded video, ensuring organisations are equipped with the surveillance evidence they need to expedite investigations and prevent false claims. AXIS P3747-PLVE and P3748-PLVE cameras Additionally, each camera sensor is capable of running analytics simultaneously, thereby expanding performance and potential use cases. What’s more, the new AXIS P3747-PLVE and P3748-PLVE cameras are designed to be smaller, lighter and consume less power than other PTRZs on the market. Axis will preview the new panoramic cameras—along with its other industry-pioneering video, analytics, audio, intercom, and end-to-end solutions—at ISC East, booth #707. The AXIS P3747-PLVE and P3748-PLVE Panoramic Cameras will be available in Q1.
Cequence Security, a pioneer in API security and bot management announced the launch of its new API Security Assessment Services. Designed to provide immediate, actionable insights into API security risks, these time-bound and fixed services leverage Cequence’s advanced Unified API Protection platform, enabling companies to quickly identify and address security gaps within their existing infrastructure. A clear and comprehensive view As digital transformation accelerates, the reliance on APIs introduces new security challenges. Cequence’s assessment services provide a clear and comprehensive view of an organisation’s API environment, helping identify hidden risks and compliance with internal governance and external regulatory requirements. With quick, SaaS-based onboarding, organisations can easily access vital API protection and benefit from continuous threat detection, machine-learning-powered insights, and actionable recommendations that reinforce API security. API security and bot assessment services “Our API security and bot assessment services are designed to empower organisations with the insights they need to safeguard their digital assets,” said Anil Pochiraju, VP of Customer Success at Cequence. “In today’s threat landscape, it’s no longer enough to simply monitor for attacks; organisations must actively identify and remediate vulnerabilities within their API landscape. Our innovative service provides a comprehensive view of API-based risks, enabling our clients to take informed action.” Key features API Attack Surface Discovery: Discovers the attack surface for a domain and provides visibility into externally accessible API hosts, where APIs are deployed (e.g., cloud IaaS), and how they are protected (by CDNs, Gateways, WAFs, etc.). Edge, infrastructure, and application providers are also discovered and inventoried. API Inventory & Risk: Inventories all known and unknown, internal, external, and third-party APIs, generates OpenAPI specifications for APIs where none exist, analyses OWASP API Top 10 findings, and makes recommendations to mitigate high-risk findings. API Sensitive Data Exposure: Identifies sensitive unencrypted data using ML-based rules with predefined (e.g., credit card and social security numbers) and customisable data patterns. Discovers and assesses API vulnerabilities that could lead to sensitive data exposure. API Security Testing: Performs comprehensive testing to uncover API coding errors and vulnerabilities such as Broken Authentication and Authorisation, Insufficient Logging and Monitoring, Insecure Data Exposure, and Broken Object-Level Authorisation, and generates test plans for up to three high-value, non-production APIs. API Threat Protection: Monitors up to three hosts to detect and assess potential threats to applications and APIs through an easy, passive deployment that doesn’t impact existing infrastructure. Identification of potential vulnerabilities The assessments not only enhance security but also facilitate a culture of continuous improvement Organisations leveraging Cequence’s assessment services can expect faster identification of potential vulnerabilities, along with detailed reports that document findings and recommend actionable steps for remediation. The assessments not only enhance security but also facilitate a culture of continuous improvement within development and operational teams. Clear roadmap “API security is not just a technical challenge; it’s a business imperative,” added Anil Pochiraju. “Our assessment services provide a clear roadmap for organisations to enhance their API security posture, mitigate risks, and ultimately protect their customers’ sensitive data. We are proud to be at the forefront of this critical initiative.” Assessment capabilities As the first company in the API security market to offer such an extensive portfolio of assessment services, Cequence sets itself apart from competitors. This service not only addresses the immediate need to identify API-based vulnerabilities but also offers opportunities for partners to collaborate with Cequence in providing these assessment capabilities to their customers. Availability Discover how Cequence’s API Security and Bot Assessment Services can bolster the organisation’s defences.
ABUS returns to the Safety & Health Expo 2024 to launch its brand-new range of personal protective equipment (PPE), reinforcing its commitment to workplace safety and security. Known for its world-class industrial padlocks, lockout/tagout systems, and key management solutions, ABUS is expanding its product offering to include PPE, addressing the critical need for comprehensive safety measures in the workplace. New PPE line Visitors to stand SH1800 will be able to preview the new PPE line featuring a selection of products, focusing on helmet security to ensure complete protection. "Our return to the Safety & Health Expo marks an exciting chapter for ABUS as we launch our PPE range," said Paul Spencer, Marketing & Commercial Director ABUS UK & Ireland. Integrated safety solutions ABUS will offer the opportunity for visitors to engage with product experts, witness live demonstrations Paul Spencer added: "We have a long-standing reputation for safeguarding property and possessions, and now, with our PPE offering, we’re extending that protection to the most valuable asset in any workplace: its people. We’re eager to present our full portfolio of safety solutions, including this significant new addition, to industry professionals at the Expo." ABUS will offer the opportunity for visitors to engage with product experts, witness live demonstrations, and explore how the company’s integrated safety solutions can enhance workplace security. Legacy of innovation With this new product launch, ABUS continues its mission to provide end-to-end solutions that meet the evolving needs of safety professionals. Paul Spencer concluded: "ABUS is bringing its signature quality and engineering excellence to a new frontier in workplace safety. Our commitment is to ensure that every worker, regardless of their environment, has access to the highest standard of protection. We look forward to discussing opportunities to present our PPE, building strong partnerships and continuing our legacy of innovation and trust in the safety sector at Safety & Health Expo." ABUS is on stand SH1800 at the Safety & Health Expo 2024, taking place on 2 – 4 December, 2024, at Excel, London.
Expert commentary
Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many factors – including building size, shape, type, location, national regulations and more – impact affordability and efficiency calculations. Crucially, the type of access solution a business selects – wired or wireless – impacts total operating costs, including during installation, running and any potential expansion or reconfiguration stages. Wireless installation Wiring premises can be expensive. So, the potential cost savings from choosing wireless digital access begin at the very start. Installation stage is the largest contributor to potential cost savings when businesses go wireless. In calculations for one report, access experts at ASSA ABLOY examined projected costs for a fictional 100-door installation. Labour savings for those who chose wireless over wired locks were 82.5%. Why? Firstly, because wireless installation is much faster. It is also less intrusive. Most wireless locking devices require little or no drilling of the door, whereas wired security needs cabling through and partly around a door – which means not just door damage, but the contracting of specialist electrical installers who may require multiple site visits. These costs add up. Digital access technology Torus aims for the highest level of LEED certification for all its new properties In Poland, for example, developer Torus aims for the highest level of LEED certification for all their new properties around Gdansk. Where possible, they choose products with Environmental Product Declarations (EPDs) and Green Circle documentation, favouring access solutions which reduce their carbon footprint. Wireless digital access technology is a natural choice. “The lack of wiring significantly reduces materials use, reduces costs, and ensures quick installation,” confirms Torus’ Roman Sokolowski. There’s no cabling, which cuts power consumption. There’s less damage to the building fabric and fitters make fewer journeys to and from the site. Adaptable locking solution By choosing a wireless solution, organisations also upgrade building security with little disruption. A wireless system makes it easier to improve security at an existing building via a retrofit process which does not inconvenience staff or disturb work routines. This was one goal at Plexal, a £15 million flexible work environment for London enterprise and academia. Plexal chose battery powered wireless locks integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install ASSA ABLOY Aperio® devices with minimal disruption,” confirms Stewart Johnson, Director at NetNodes. Cost savings with improved energy efficiency Choosing wireless over wired locking can play a vital role in reducing ongoing energy use Choosing wireless over wired locking can play an important role in reducing ongoing energy use – and, therefore, expenditure. Wholesale electricity prices in Europe are approximately double what they were in 2019, according to the IEA’s “Electricity 2024” report. For a variable cost such as energy, where businesses have little control over unit prices, it is critical to control usage, especially if high and/or changeable energy prices become what analysts at ING called “the new normal for business”. Thus, the fact that battery-powered locks consume much less energy than traditional wired solutions is increasingly relevant and important. Additional saving on energy costs Traditional wired door access devices often work via magnets connected permanently to mains electricity. These doors draw power around the clock to remain locked. Wireless locks work differently. They only “wake up” when presented with a credential, to make the access decision. This translates to an additional saving on energy costs during operation: more than 70%, or thousands of euros over a typical access system’s lifetime. Wireless digital access Wireless locks only need a change of their standard battery, which may be rechargeable Related energy and materials costs during in-use stage are also lower. Wireless locks only need a change of their standard battery – which may be rechargeable – typically once every two years. No specialist maintenance is required, saving on specialists and their travel to and from the site(s). By choosing wireless digital access, businesses help protect themselves against these ongoing costs, notably energy price increases and volatility. Cost-efficient flexible working, for staff and facilities managers Perhaps harder to quantify, but equally easy to imagine, the financial benefits of choosing a wireless digital solution are felt in the increased convenience and efficiency of daily operations. In the co-working sector, for example, flexible access to offices is a priority. As “fixed” office space rented by corporations continues to fall, co-working spaces are expected to keep growing, with one estimate suggesting almost 18% CAGR to 2030. To stand out from the competition, the founders of ULab in Alicante sought the latest innovations in access and design to create their 21st-century business centre. Part of the suite of digital access solutions from ASSA ABLOY, a SMARTair® system gave ULab real-time access management via battery-powered locks and Openowä, the Mobile Key solution for SMARTair, without any need to wire doors and other openings. SMARTair TS1000 Web interface With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone; ULab’s security team update their rights over the air. An office manager can perform any operation remotely from the SMARTair TS1000 Web interface. In case of an emergency, they could lock-down the site or open doors remotely, for example. It’s convenient, efficient and boosts ULab’s security, benefiting users and managers. And because of SMARTair’s flexibility, they can comfortably welcome many more than their usual 100 daily users. “In addition to regular daily traffic, weekly traffic can almost multiply by 10 if an event is held,” says Enrique Burgos Pérez, Director at ULab. “We needed an access control system as flexible and convenient as SMARTair.” ASSA ABLOY benchmarking report Choosing wireless locks also adds flexibility – and can reduce costs – when an organisation reconfigures or expands their commercial space. High-quality wireless devices like SMARTair can typically be reinstalled at another opening without impacting reliability. They move to wherever is convenient. If a business is rethinking workspace to encourage flexible or hybrid work patterns, for example, cost efficiencies could be significant. Typical savings on office relocation or expansion are estimated at around 30% with wireless over wired locking, according to the same ASSA ABLOY benchmarking report. Cost efficiency and more control with ASSA ABLOY digital access To refit and improve their student accommodation, managers at the University of St Andrews sought energy- and cost-efficient access control. They chose Aperio, another innovative digital access solution from ASSA ABLOY. Approximately 1,600 doors so far are equipped with battery-powered Aperio escutcheons – without cabling. Aperio devices integrate fully with both the university’s existing central security system and their student ID card. University security managers continue to enjoy the efficiency benefits of monitoring and controlling access from a single point and in real-time, including for doors across multiple buildings. Aperio, another innovative digital access solution from ASSA ABLOY. Benefits of cost-efficiency In comparison to a wired solution, Aperio offers significant cost-efficiency benefits. Devices are wireless, so can be installed with little energy use and no need for wiring to the mains. They consume near-zero energy when idle and run on standard batteries, consuming little power during operation. Through the entire product life-cycle, Aperio combines reliability with cost effectiveness. “Aperio gives us central management and control,” says Pauline Brown, Associate Chief Information Officer at the University of St Andrews, “and contributes to our award-winning track record in energy efficiency.”
As the backbone of community welfare, healthcare facilities cater to crucial public needs from emergency care to specialised medical treatments, and due to its position as a significant facet of the world's critical infrastructure, the healthcare sector faces a multitude of challenges in ensuring patient and visitor security, managing high traffic, and safeguarding sensitive data. Medical sites, such as large hospitals and urgent care clinics, see a wide variety of patients, medical staff, administrative teams, and visitors throughout the day. In addition to protecting patients, visitors, and staff, healthcare environments must protect medical and patient data, ensure immediate response to urgent medical events, and maintain 24/7 operations. Security challenges Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability Addressing the security challenges presented by 24/7 availability and high patient and visitor traffic calls for a merging of technology, processes, and security strategies that go beyond what a typical security infrastructure would look like. Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability, accessibility, and integration capabilities. These advancements address the multifaceted demands of healthcare organisations, ensuring seamless around-the-clock operations while prioritising patient care and safety. Enhancing operational efficiency to save lives Cloud-based access control solutions have revolutionised how healthcare security professionals approach collaboration within medical facilities. These solutions offer unparalleled accessibility and insight into patient and visitor security information and access logs, improving coordination among security teams and leading to more accurate monitoring and response to developing medical events. By managing and operating access control solutions via the cloud, healthcare facilities can implement effective physical security measures while ensuring seamless collaboration among staff to deliver the highest medical care possible to patients across facilities. Physical access controls Cloud-based access control systems allow users to securely access and manage physical access controls Cloud-based access control systems allow multiple users to securely access and manage physical access controls and visitor management data simultaneously, enabling them to keep track of patient movements as they are transferred throughout the facility or between different facilities. For larger hospitals or medical campuses with multiple facilities hosting access controls via the cloud empowers users with the ability to find patients and patient data in an instant, as well as opening the door to collaborate with teams separated by long distances, ensuring all team members have access to the information they need to continue saving lives. Scaling the way to top-notch care Healthcare institutions are constantly growing and changing in response to evolving industry regulations and standards, and the access control solutions these organisations rely on should be able to scale to meet their changing needs. To ensure their access control systems can keep up with these growing demands, healthcare security professionals can invest in access control solutions hosted in the cloud to avoid the tedious hardware constraints that come with traditional on-premises solutions. Cloud solutions offer significant levels of scalability, enabling healthcare organisations to adjust their storage requirements and computing resources based on changing requirements on the fly. This capability for flexibility ensures users can manage large amounts of data without significant upfront investments in hardware. Cloud-based access control solutions Cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access In addition to compliance with changing regulations, cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access control platform across a growing campus or multiple buildings. Larger healthcare facilities typically consist of multiple sites of varying sizes across diverse landscapes, each with distinctive security needs. Systems hosted in the cloud provide scalability and flexibility for user organisations, allowing security teams to modify or expand upon their security infrastructure as needed without spending on costly new hardware. This adaptability is crucial for helping address varying risks over multiple sites, providing security personnel the flexibility they need to ensure patient safety over long distances. Ease of use for security teams To truly understand the value of a cloud-based access control system, healthcare security professionals must consider the long-term savings and ROI these solutions provide by bolstering operational efficiencies and enabling unprecedented scalability. These systems ensure compliance with changing standards and deliver a simplified user experience across platforms, prioritising security and ease of use for security teams across the healthcare sector.
For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common K12 security pain points There’s no one-size-fits-all solution in school district security. School districts may have big plans to implement upgraded security systems but to set out on the right foot, pioneers must have a clear vision of their long-term strategy. When embarking on their security journey, education pioneers often wonder where to start and what exact steps are they need to be taking to identify and address weaknesses. Local K12 and government pioneers are promoting and mandating security assessments to uncover safety gaps on campuses and mitigate these risks with advanced technology solutions. Not only do assessments provide detailed, customisable roadmaps for district pioneers, but they also recommend technologies and funding opportunities to help close threat gaps. K12 school districts are mainly vulnerable to cyber-attacks due to the sensitive nature of student records In today’s climate, schools face a growing number of physical and digital security threats. From a cybersecurity standpoint, K12 school districts are particularly vulnerable to cyber-attacks due to the sensitive nature of student records. However, only one-third of these districts have adequate staffing to address threats effectively. In addition, according to a recent survey from Johnson Controls and Forrester Consulting, security decision-makers are having trouble receiving actionable insights. Nearly two-thirds of respondents said that they struggle to receive information from all necessary systems regarding their security threats. To gain more clarity into what school districts need in terms of security tools and threat mitigation, implementing system-wide monitoring and optimisation can be invaluable. This approach enhances equipment and operational efficiency, while providing necessary resources and expertise for critical patch updates across all systems, strengthening their overall security posture. Achieving a well-rounded security program In the past few years, AI technology has emerged as a trending solution and is generating considerable attention. While the allure of implementing cutting-edge technologies is undeniable, it’s important to recognise that a robust security program hinges on solid access control. Access control technology provides administrators with the means to oversee and regulate entry into facilities, serving as the foundation for basic physical security. The technology helps administrators and staff control access to multiple areas from web-enabled devices, even during lockdowns which is crucial in emergency situations. School district pioneers should utilise available digital risk assessment tools to uncover threat areas Once basic security controls are in place, school districts must address their next set of security pain points and identify which solutions meet their specific needs. This involves identifying and prioritising the highest need and most cost-effective investments that will have the greatest impact on enhancing security measures. To accurately determine which security solutions are needed for a specific environment, school district pioneers should utilise available digital risk assessment tools to uncover threat areas and determine levels of priority. By focusing on these priority areas, districts can allocate their resources and efforts where they are needed most, ensuring maximum effectiveness in mitigating risks and vulnerabilities. Securing funding before approaching deadlines A major challenge for school districts surrounding campus security is identifying and securing the necessary funding to implement solutions aligned with their goals. Leveraging available funding sources is critical, especially considering certain programs are approaching their deadline, like the Elementary and Secondary School Emergency Relief (ESSER) fund. Announced during the pandemic, ESSER is a funding program that has allocated nearly $190 billion in aid to U.S. public school districts to fund projects benefitting the well-being of occupants. Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024 Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024, when schools must attribute all of their funds to assigned contracts. Following this date, pioneers will need to complete all ESSER spending by January 2025 unless approved for an extension into March 2025. As ESSER wanes, school districts are acutely aware of the fiscal cliff in budgets through 2025. However, many states are ramping up grant funding to close the deficit gap. Administrators should become familiar with these grant opportunities at a local and state level. Get started on security plans The time for school district pioneers to act is now. While the safety and well-being of students and staff are always top priorities, it’s crucial to acknowledge that a lack of insight into necessary security upgrades and available funding options will leave districts behind the curve. Seizing the final months of ESSER funding presents an ideal window to address security pain points and build a safer future for K12 facilities. Looking beyond ESSER, pioneers must proactively seek out and leverage other funding avenues to help ensure the continuity of their security efforts and maintain a proactive stance in safeguarding healthy and safe educational environments.
Security beat
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
Collaboration among manufacturers in the physical security industry can result in systems that are easier to install for integrators and that provide a better customer experience for end users. Illustrating the point is the recent collaboration among a turnstile technology company, a supplier of short-range wireless readers/writers, and a biometric business focused on ‘frictionless’ access control. “The more manufacturers collaborate with each other, the more benefits for end users,” says Steve Caroselli, the Chief Executive Officer (CEO) of Orion Entrance Control. Better collaboration means a better user experience We look for opportunities to collaborate and make sure the experience is above and beyond" Steve Caroselli adds, “Better collaboration means a better user experience. We look for opportunities to collaborate and make sure the experience is above and beyond.” Orion’s collaboration with ELATEC RFID Systems and SAFR touchless biometrics by RealNetworks Inc. highlights the advantages of manufacturers working together to ensure technologies operate smoothly in the real world. Taking ownership of the customer experience When Orion Entrance Control provides a SpeedGate swing-glass optical turnstile, they take full ownership of the customer’s experience. That means ensuring the turnstile application operates as it should, regardless of which component of the broader system might be at fault. To the customer experience, a card reader that doesn’t work is the equivalent of a turnstile that doesn’t work. Which component is at fault is irrelevant, and in fact, invisible, to the overall customer experience. Importance of dependable operation of turnstiles As the most visible element in many access control systems, dependable operation of turnstiles reflects positively on the manufacturer and on the entire system. Orion tests various third-party components with their turnstiles To ensure an optimum customer experience, Orion tests various third-party components with their turnstiles, in order to ensure flawless operation before a turnstile is delivered to a customer. Customers buying an Orion turnstile send the card readers they want to use to Orion’s corporate headquarters in Laconia, New Hampshire, USA, where Orion engineers ensure seamless operation. Ensuring optimum customer experience All readers are designed to be bolted to the wall rather than installed inside a turnstile In addition to scenario-based testing, readers are placed inside the turnstile for a streamline appearance, which can be a challenge given the variety of sizes and types of readers a customer might choose. All readers are designed to be bolted to the wall rather than installed inside a turnstile, which complicates adaptation efforts. In short, historically for Orion, ensuring the optimum customer experience involved extra time and effort, although obviously it was worth it. Providing flexibility for any environment Seeking to simplify the process, Orion has found an alternative to using many different types and models of card readers for its turnstiles. Deploying an RFID reader/writer from ELATEC provides flexibility to operate in a variety of card and reader environments, including almost all 125 kHz and 13.56 MHz contactless technologies. The product is compatible with low-frequency (LF), high-frequency (HF), near field communication (NFC) or Bluetooth Low Energy (BLE) signals. An integrated BLE module supports mobile ID and authentication solutions. There is an integrated antenna for LF and HF to ensure excellent contactless performance. ‘Universal’ configuration of the ELATEC reader hardware Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is compatible with any card system. It works with all the access control protocols, including SEOS, OSDP and other open protocols. “We can stock an open SKU and flash the firmware as per the customer requirement,” says Steve Caroselli. The small form factor (around 1 1/2 inches square) of the ELATEC module lends itself to easy installation inside the turnstile housing. Easy availability of the ELATEC readers helps Orion continue to serve customers, despite recent disruptions in the supply chain. And, ELATEC’s reader hardware has earned global certifications that enable Orion to use their products for customers around the world. Testing to ensure smooth operation ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing Before embracing the ELATEC reader module, Orion tested it for several months to ensure compatibility with its turnstiles. ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing and working closely with the Orion team. Everyone in the ELATEC sales and engineering team, right up the company’s C-suite, worked to support Orion during the testing phase. In the end, in addition to other advantages, ELATEC’s detection speed and read range compares favorably to competing technologies. “We move really fast as an organisation, so we are looking for other organisations that move very fast,” says Steve Caroselli, adding “We met with ELATEC one week and had the equipment for testing the next week. We like to work with companies that move fast, and they are culturally aligned with how we do business.” Orion turnstiles with ELATEC TWN4 Palon Compact panel The Orion turnstiles incorporate an ELATEC TWN4 Palon Compact panel, a versatile panel-mount reader designed for integration into third-party products and devices. It supports enhanced interfaces, especially RS-485, and reflects the advantages and integrated tool support of the ELATEC TWN4 family. Orion is implementing SAFR SCAN biometric technology using hardware and software from RealNetworks Inc. “The selection of ELATEC products allows Orion to provide their customers and partners with a flexible RFID reader solution that supports numerous credential options and virtually all transponder technologies,” said Paul Massey, the Chief Executive Officer (CEO) of ELATEC, Inc., adding “This is especially valuable in multi-tenet, multi-credential environments.” Orion works with all the various stakeholders – architects, consultants, integrators, and end users – to ensure total satisfaction with an installation. Biometric technology for ‘frictionless’ access control Orion is also implementing SAFR SCAN biometric technology into their turnstiles using hardware and software from RealNetworks Inc. The facial recognition reader technology, designed for mainstream commercial access control, provides a ‘frictionless’ experience, and allows users to pass through turnstiles at a walk. The system can authenticate up to 30 individuals per minute with 99.9% accuracy, despite varied lighting conditions. SAFR’s system provides a good user experience Orion designed a mounting system to incorporate the biometric reader into their turnstile design Orion designed a mounting system to incorporate the biometric reader into their turnstile design. SAFR’s system provides a good user experience, when it comes to enrollment. On each turnstile, the SAFR technology can operate separate from the ELATEC reader or in conjunction with it for multi-factor authentication in higher-security applications. Innovation for new applications A broad approach to the customer experience reflects Orion’s positioning as a technology company, in addition to being a manufacturer of turnstiles. Their Infinity software is the ecosystem ‘nerve centre’ platform to ensure operation and connected through a single ‘pane of glass.’ The need to protect more entrances beyond the lobby led Orion to develop its recently patented DoorGuard, a LIDAR-based solution that detects each person who passes through a doorway and prevents tailgating (like a turnstile) for applications, such as stairway doors, perimeter doors, data centres, IDF closets, etc. The software mimics the advantages of a turnstile to monitor access control and occupancy. Removing friction during installation and beyond Orion’s Constellation is a presence detection system that uses UWB (ultra-wideband) radar to sense where people are in a building for emergency response and building utilisation applications. “One of our core values is to remove friction and make customers’ lives easier,” says Steve Caroselli, adding “Our people-first philosophy is: What can we do to make your life better? We want to be systematic, and everything must be repeatable in terms of how we react and interact with customers.”
Case studies
Jacksons Fencing has successfully completed the installation of an innovative sound reduction barrier and security fencing system for Matthews Haulage at their Essex logistics facility. The project, completed in 2024, was designed to address the haulage company's dual needs for noise control and site security, providing a durable, compliant, and efficient solution. Robust security Matthews Haulage, a long-established player in the transport and logistics sector, sought to minimise noise pollution generated by its 24-hour operations while protecting its valuable assets. With residential areas and commercial properties nearby, the Essex facility required a solution that not only adhered to stringent environmental noise regulations but also provided robust security against unauthorised access and theft. Expertly engineered The barrier was engineered to meet the dual requirements of sound absorption and site security Jacksons Fencing installed a 3.5 metre high, 141.5-metre-long absorptive sound reduction barrier around the perimeter of the warehouse. The barrier was engineered to meet the dual requirements of sound absorption and site security. Using advanced sound-absorptive materials, the barrier effectively dampens high-frequency noise from haulage and loading activities, preventing it from reaching nearby residential and commercial areas. This noise reduction is crucial in maintaining Matthews Haulage’s compliance with local environmental regulations, helping to reduce noise complaints and strengthen relations with the surrounding community. Certified safety Given its proximity to a busy road, Jacksons Fencing ensured that the barrier met UKCA standards; it is certified as a whole system that complies with strict safety and performance standards necessary for the mitigation of road noise. This UKCA marking guarantees the long-term reliability of the barrier under challenging conditions, including traffic-induced vibrations and environmental stressors, reinforcing Matthews Haulage’s commitment to regulatory compliance and operational resilience. Combining noise reduction with security Beyond noise mitigation, the 3.5-metre-high barrier functions as a robust security fence Beyond noise mitigation, the 3.5-metre-high barrier functions as a robust security fence. Its solid construction provides a strong physical deterrent against unauthorised access, effectively preventing trespassing, theft, or vandalism. Additionally, the height and opacity of the barrier afford the facility excellent privacy and concealment, reducing the chance of opportunistic targeting by blocking the visibility of assets such as vehicles and cargo. Unique requirements Peter Jackson, Managing Director of Jacksons Fencing, commented on the project’s success: "The acoustic barrier we installed is a reflection of our commitment to providing bespoke solutions that not only meet regulatory requirements but also enhance the operational performance of our clients." "Our team worked closely with the client to ensure the barrier met their unique requirements, from regulatory compliance to site-specific security needs. It’s a prime example of how tailored solutions can make a real impact on both operational efficiency and community relations."
World Trade Centre (WTC) Amsterdam is home to more than 300 companies. The commitment of its security team to providing a safe working environment in WTC’s fixed and flexible offices goes without saying. However, building managers wanted more from their access solution. More than just an office space, WTC Amsterdam has complementary onsite facilities, including childcare, a gym, physiotherapy clinic, bar/café, dry cleaning service and more. All its facilities must be cleaned and serviced regularly: they sought a more time-efficient way to manage the many contractors and suppliers who come and go every day. Modern digital solution Modern digital solution would provide better oversight of movement around the building They also hoped a modern digital solution would provide better oversight of movement around the building, including usage data to improve maintenance scheduling. For convenience during installation and day-to-day management they targeted a wire-free solution – for simpler, less disruptive switching of 1,000 doors from mechanical locks to digital access – and intuitive management, allowing for easy changing of individual access authorisations, even at the last minute. Digital access system With all these criteria in mind, WTC Amsterdam managers decided on ASSA ABLOY’s smart key digital access system, eCLIQ. They upgraded doors from mechanical to digital access simply by swapping the existing cylinder for an eCLIQ device. Doors are unlocked by battery-powered user smart keys, with a typical battery lifespan of 10 years. “Providing these doors with wired access control would be a huge job and become costly. Instead, we opted for the eCLIQ solution,” explains Sander Borggreve, Facility Manager at WTC Amsterdam. Concrete improvements in operations Scheduling is further simplified by storing keys with a Traka key management system The ROI in terms of workflow benefits has been significant. “Granting temporary controlled access to third parties is very easy with the eCLIQ system. We can set access for a certain period of time, but we can also revoke it at any time,” says Sander. Scheduling is further simplified by storing keys with a Traka key management system. After removing a key from the cabinet, authorised team members enter it into the adjacent eCLIQ Wall Programming Device. In seconds, the key is issued with its fine-grained access rights – covering both door-by-door and time validity. Maintenance and operations With the eCLIQ system, WTC Amsterdam gained not only control but also insights into usage and user flows. This data now informs maintenance and operations, reducing the overall Total Cost of Ownership for the solution. “eCLIQ works very pleasantly in practice. My employees are very satisfied with how the keys work,” says Rutger Barendse of D&B The Facility Group, who provide security staff for WTC Amsterdam. “It is easy as pie!” adds Sander.
New investment of the highest standard. Three buildings, 69 premises in total. The project wants to ensure consistency in the use of smart home devices for controlling lighting, air conditioning, roller blinds, and more. To achieve this, each apartment is equipped with a Gira G1 smart home panel (KNX system). Additionally, the project is looking for an intercom system that can secure the entrances and integrate seamlessly with Gira G1. The solution Oaza Mokotów is a high-end residential complex offering fully secured and seamless access, thanks to the integration of DNAKE’s intercom system and Gira’s smart home features. This integration allows for centralised management of both intercom and smart home controls through a single panel. Residents can use the Gira G1 to communicate with visitors and remotely unlock doors, significantly simplifying operations and enhancing user convenience. Installed products 902D-B6 10.1” Facial Recognition Android Door Station S615 4.3” Facial Recognition Android Door Station 902C-A Master Station
The building, constructed in 2005, consists of three 12-story towers with a total of 309 residential units. Residents have been experiencing issues with noise and unclear sound, which hinder effective communication and lead to frustration. Additionally, there is an increased need for remote unlocking capabilities. The existing 2-wire system, which supports only basic intercom functions, fails to meet the current needs of the residents. Solution highlights Easy Intercom Retrofitting with Existing Cables Tenant’s Own Choice on Answering Units Installed products S615 4.3” Facial Recognition Android Door Station E211 Audio Indoor Monitor 290M-S8 7” Linux Indoor Monitor (2-wire Version) 902C-A Master Station Cloud Solution - Smart Pro Solution benefits For Installer DNAKE 2-wire IP intercom solution leverages existing wiring, which allows for a quicker and more efficient installation process. This solution helps avoid the costs associated with new cabling and extensive rewiring, keeping project costs down and making the retrofit more economically attractive. For Property Manager The Central Management System (CMS) is an on-premises software solution for managing video intercom systems via the LAN, which has greatly improved the efficiency of property managers. Additionally, with the 902C-A master station, property managers can receive security alarms to take immediate action, and remotely unlock doors for visitors. For Residence Residents can choose their preferred answering unit based on their needs. Options include Linux-based or Android-based indoor monitors, audio-only indoor monitors, or even app-based services without a physical indoor monitor. With DNAKE's cloud service, residents can unlock doors from anywhere, at any time.
In Japan nearly two in five office workers work from home a minimum of once a week, particularly if they work in IT or consultancy, according to Nikkei research undertaken in 2023. When a global IT company announced they would be leasing out four floors in their Tokyo office last year, in response to changing working habits following Covid, G4S approached them to be their security provider. They had already been doing access control and meet and greet at the eight-storey building for the last 10 years. New access control systems Eiki Hata, Representative Director of G4S Secure Solutions Japan, says: “The security requirements for a multiple tenancy building are quite different from a single occupancy. You have more people coming and going, companies have different requirements – more sophisticated and robust protocols are needed.” After being awarded the new contract, G4S doubled its headcount onsite and configured new access control systems for each floor; some of the new tenants wanted to keep their existing passes, which G4S was able to accommodate. Health and safety Security officers are also trained in first aid, which includes administering CPR and using a defibrillator Eiki says that 40% of G4S’s remit is health and safety and they will provide support during natural disasters, such as earthquakes or flooding. This includes checking if there is any damage to the building alongside the facilities team and offering assistance to local residents who may take refuge there. They will also hold regular evacuation drills for the whole building. Security officers are also trained in first aid, which includes administering CPR and using a defibrillator. They will also call for an ambulance if required and direct them once onsite. The officers are also responsible for ensuring everyone shows their ID at reception and all guests are booked in, as per the company’s global policy. Customer service skills Eiki explains: “Japan is one of the safest countries in the world: if you leave your wallet somewhere, it’s likely that you’ll get it back without losing any money." "However, that also means that Japan has a very low awareness of risk and our security officers need to be able to explain why these protocols are in place when questioned. When you just have one company in a building it’s easy to enforce operational rules, but with multiple tenants that’s less easy to do - customer service skills are really important.” Flexibility and adaptability The company is one of a number of multinationals spanning sectors that G4S provides security This company is one of a number of multinationals, spanning various sectors, that G4S provides security for in Japan. Other business lines include close protection and risk consulting. Eiki explains that part of the appeal is that G4S can more readily recruit staff that speak English than local companies, which many multinationals require. He says: “Less than 5% of the Japanese population speak English, we are not like Hong Kong or Singapore which are international hubs in APAC.” Smallest business within G4S Eiki continues: “Another advantage that G4S has is that we can speak to other countries and ask them to share their experiences, helping us to create a seamless security consultancy for our clients.” Eiki says that flexibility and adaptability are other trademarks: “We are the smallest business within G4S; we are growing the business and want to fulfil our clients’ requests even if it’s difficult or not straightforward.”
Mul-T-Lock is working with Charnwood Lock and Key for Loc8me, a premier student accommodation management agency to provide dedicated master key systems enabling secure and efficient access for maintenance of its growing property portfolio. Since its establishment in 2008, Loc8me has grown to have over 6,000 tenants living with them and they manage over 2,500 properties across Loughborough, Bristol, Durham, Newcastle, Nottingham, Leeds, Manchester, Hull, Leicester, Liverpool and Birmingham. Highest level of security Loc8me relies on Charnwood Key to deliver Mul-T-Lock key suites that can simplify access To ensure the ongoing maintenance of properties, Loc8me relies on Charnwood Lock & Key to deliver specialist Mul-T-Lock master key suites that can streamline access for property management processes, while ensuring the highest level of security for residents. Says Raffaele Russo, Founder of Loc8me: “For a lot of students, moving into a student home is a huge step in their independence and we want to make sure we offer the best environment for them. This includes placing a great emphasis on customer service and making them feel truly at home, with all their maintenance needs taken care of." Mul-T-Lock as a master key suite Russo added: “Working with Charnwood Lock & Key enabled us to embrace Mul-T-Lock as a master key suite we could rely on." "We have one set for each of our property developments and our associated landlords, ensuring we can maintain overall security, whilst balancing necessary access for our maintenance teams to ensure our homes are kept to a high standard.” Mul-T-Lock's advanced security solutions Charnwood Lock and Key played a pivotal role in implementing Mul-T-Lock's advanced security solutions for Loc8me's properties. This included considering the flexible security requirements to accommodate the many different sites whilst not compromising on the high level of protection, operational excellence and advanced quality assurance. Says Harry Stafford of Charnwood Lock & Key: “Loc8me places a great emphasis on creating and maintaining the best co-living experiences for students. Maintenance services are naturally key to this success. We had no hesitation in recommending Mul-T-Lock’s renowned master key suites to manage authorised access as and when required." Mul-T-Lock's master key systems Mul-T-Lock's master key systems for student redefine security and comfort in the student sector Stafford added: “The benefits of the system include flexibility for user-friendliness and ease of use, with limited key duplication that we can manage here. With Mul-T-Lock's advanced master key systems in place, Loc8me can effectively manage access control across its growing student housing properties, enhancing security for residents and providing peace of mind for property managers.” Mul-T-Lock's master key systems for student accommodation redefine security and convenience in the student housing sector. Tailored to the unique needs of accommodation providers like loc8me, Mul-T-Lock's solutions offer control and flexibility. Individual sector requirements Jamie Jagpal, Mul-T-Lock’s Product Manager added: “Our bespoke master key systems can be created to suit individual sector requirements, often guided by our long-term partners such as Charnwood Lock & Key." "What Loc8me demonstrates is by creating an established solution, it can evolve with the company’s requirements, especially with its mission to be a major management agency university in the country. We are proud to play a role in enhancing the safety and convenience of such high-end student housing."
Round table discussion
The hospitality industry drives economic growth and development by creating jobs, generating revenue, and initiating a ripple effect to improve profitability throughout the supply chain. The hospitality industry includes a vast number of small businesses, including hotels and restaurants. But what are the security challenges of these businesses, and how is the security marketplace serving those needs? We asked this week's Expert Panel Roundtable: How can technology address the security challenges of the hospitality market?
Retaining top talent is a route to bring innovative ideas and creative solutions to a company. Talent drives product development, improves processes, and helps businesses stay ahead of the competition. In essence, retaining top talent is essential for businesses to remain competitive, innovative, and successful. Unfortunately, staffing shortages are a reality for many corporate players in the security industry, as well as throughout the business community. We asked this week's Expert Panelists: How can physical security organisations attract and retain top talent?
Direct costs such as purchase price and maintenance are important elements in the total cost of ownership (TCO). However, there are others. Elements such as opportunity costs of lost revenue or hidden costs of energy consumption and environmental consequences can also impact the measure of TCO. Costs of training, integration, support, and scalability can also be examined. Considering the security industry impact of TCO, we asked this week's Expert Panel Roundtable: How does/should total cost of ownership (TCO) impact the decision-making process when choosing technologies for security?
White papers
Safeguard Students With New Techniques And Technology
DownloadCybersecurity in keyless access management
DownloadAssessing safety readiness for education campuses
DownloadPreparing your organisation with quality situational awareness
DownloadExpanding video surveillance in the enterprise market
DownloadPalm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download