Security Assessments
Allegion US, a pioneer in security technology, solutions and services, is proud to announce a strategic alliance with Atrium Campus, renowned for their cloud native campus card solutions for the higher education vertical. The two companies are establishing a formal partnership to revolutionise access control, credentialing, and campus one-card solutions. Together, they aim to deliver an unparalleled, seamless experience for college and university campuses. Mobile-first approach Driven b...
Trend Micro Incorporated, a global cybersecurity pioneer, revealed a continued annual decline in its Cyber Risk Index (CRI) score. The figure stood at an average of 38.4 for the year, down by 6.2 points from 2023. The data shows a clear trend that organisations leveraging proactive security approaches are seeing measurable risk reduction. Proactive security with AI Rachel Jin, chief enterprise platform officer at Trend Micro: “Trend customers are embracing our vision for proa...
System Surveyor, the pioneer in digital site surveys and system design, announced the promotion of Maureen Carlson to President. Carlson, who will continue to oversee System Surveyor’s diverse growth initiatives, will now take on broader responsibilities for the organisation's operations while working alongside CEO Chris Hugman. Carlson's vision and leadership Carlson has successfully led the company's marketing, sales, and go-to-market strategies Carlson has successfully led the compa...
AtlasIED, a pioneer in the AV and security industries, is returning to the Passenger Terminal Expo 2025, where it will exhibit in a shared booth with Nanolumens, Omnivex, and Sittig. AtlasIED will showcase its comprehensive transportation technology solutions at the show, including its renowned GLOBALCOM communications platform. Attendees are invited to experience these solutions in person at booth #9901. AtlasIED’s GLOBALCOM As a trusted communications provider in the transportation se...
Continuing its global expansion plan Integrity360 has acquired pioneer cyber security specialist Holiseum headquartered in Paris, France. The terms of the transaction were not disclosed. The acquisition will enable Integrity360 to accelerate its growth in France and continental Europe and significantly provide a new and exciting services practice focused on Operational Technology (“OT”) and Internet of Things (“IoT”) technologies which complement Integrity360&rsquo...
India is among the world’s fastest-growing data centre markets. Hands-on specification support provided by specialists in access and security management technologies can help data centre architects, construction companies, project managers and other stakeholders work smarter in this complex field – and stay ahead of their competitors. When Edifice was designing a new data centre in Hyderabad, for example, security was clearly a top priority. By working with access experts at ASSA AB...
News
Amthal Group Companies has appointed Richard Parker as its new Group Head of Sales. With over three decades of experience in the fire and security industry, Richard brings a wealth of expertise in sales leadership, business development and strategic growth to the company. Richard joins Amthal from Walker Fire UK Ltd., where he served as Group Sales Manager UK, successfully building and pioneering high-performing sales teams while driving business expansion across multiple sectors. Prior roles of Richard Richard will lead Amthal Group Companies’ sales functions, with a focus on sustainable revenue growth Prior to that, he spent 30 years at Chubb Fire & Security, holding senior leadership roles, including Account Director, Sales Director, and National Accounts Sales Manager. His impressive track record includes exceeding revenue targets, pioneering multi-disciplined teams and implementing strategic sales initiatives to enhance customer retention and market penetration. In his new role, Richard will oversee Amthal Group Companies’ sales operations, with a focus on driving sustainable revenue growth, strengthening client relationships, and further positioning Amthal as a pioneer in the fire and security industry. Outstanding service and solutions Commenting on his appointment, Richard said: “Joining Amthal presents a great opportunity to apply my experience in sales leadership and business development in an ambitious and growing organisation." "My focus will be on aligning the sales strategy with the company’s vision, developing long-term customer relationships, and ensuring our team delivers outstanding service and solutions.” Amthal’s growth objectives Amthal Group Companies’ CEO Jamie Allam added: “Richard’s experience and leadership in sales strategy align well with Amthal’s growth objectives. We look forward to his contributions in enhancing our sales operations and driving sustainable success for the company.” Richard’s appointment marks a significant step forward for Amthal Group Companies as it continues to expand its presence in the life safety and security technologies sector, delivering high-quality, tailored solutions to clients across the UK.
Threat Evolution, an advanced cybersecurity training and consulting platform, has officially achieved Cyber Essentials certification, reinforcing its commitment to helping businesses strengthen their digital security. Part of the Magenta Security Services family of businesses, which is a pioneer in sustainable security solutions, Threat Evolution provides cutting-edge cybersecurity training and consulting services designed to mitigate cyber risks. Common entry point for cyber threats Threat Evolution is now positioned to assist clients in obtaining their own Cyber Essentials accreditation Threat Evolution was launched to address the increasing cybersecurity vulnerabilities businesses face due to human error—the most common entry point for cyber threats. The platform empowers employees, contractors, and organisations to recognise and mitigate cyber risks effectively, strengthening overall resilience. With its newly acquired Cyber Essentials certification, Threat Evolution is now positioned to assist clients in obtaining their own Cyber Essentials accreditation. This UK government-backed certification helps organisations implement best practices to defend against common cyber threats. Threat Evolution’s comprehensive cybersecurity services Cybersecurity Training Platforms: Interactive, industry-specific training modules designed to enhance awareness and resilience against cyber-attacks. Penetration Testing: Expert-led testing to identify and address vulnerabilities before they can be exploited. Vulnerability Scanning Services: Ongoing security assessments to detect and remediate weaknesses. Cyber Essentials Certification Assistance: Support for businesses seeking to obtain their Cyber Essentials accreditation, helping them meet required security standards. Consulting Services: Tailored guidance from experienced cybersecurity professionals to strengthen security postures. Sustainable approach to digital security Magenta Security achieved carbon-zero status three years ahead of schedule in 2022 With the support of Magenta Security Services, a company with over 25 years of experience in security solutions, Threat Evolution brings the same innovative and sustainable approach to digital security as Magenta does to physical security. Magenta Security, recognised for its sustainability leadership, achieved carbon-zero status three years ahead of schedule in 2022 and continues to set industry benchmarks. Cyber Essentials accreditation Abbey Petkar, Managing Director of Magenta Security Services, stated: “Our mission has always been to provide our clients with complete security solutions." "Threat Evolution ensures businesses are protected and prepared against cyber threats. By also assisting clients in obtaining their own Cyber Essentials accreditation, we are extending our commitment to security beyond just our own organisation.” Advocate for green solutions Magenta Security has been widely recognised for its innovative and sustainable business practices Magenta Security has been widely recognised for its innovative and sustainable business practices, winning the Sustainable Business Award in both 2023 and 2024. Abbey Petkar remains a vocal advocate for green solutions within the security industry and regularly speaks at industry events. “Threat Evolution represents our vision of an advanced, sustainable security solution that protects both physical and digital environments,” added Petkar. Threat Evolution website Petkar added: “By combining expert-led cybersecurity services with comprehensive training, we are helping businesses build a secure and resilient digital future.” The Threat Evolution website can be found at the website, serving as the primary hub for cybersecurity training, resources, and updates.
The International Maritime Cyber Security Organisation (IMCSO), an independent maritime standards organisation, has released its cybersecurity testing methodology for those maritime vessels looking to assess their risk and join the Cyber Risk Registry, a risk register database maintained by the IMCSO. The methodology aims to provide IMCSO-accredited cyber consultants and the senior maritime personnel they will be assessing with standardised testing by outlining test scope and the language to be used to ensure tests are planned, executed and reported effectively. Quality of cyber risk assessments “Currently there is no standard in the maritime sector for governing the quality of cyber risk assessments. This methodology will set a precedent by providing a set of criteria that assessors must observe when on engagement and against which maritime security can be measured." "It is a very big step forward in normalising both expectations and requirements in the maritime space,” said Campbell Murray, CEO at the IMCSO. Guide for cybersecurity practitioners The methodology stipulates the needs under which the cybersecurity checks will be carried out The methodology stipulates the conditions under which the cybersecurity assessments will be carried out. It acts as a legal and practical guide for cybersecurity practitioners who must adhere to the standards as a condition of their inclusion on the approved suppliers list, otherwise known as the Certified Supplier Registry, held by the IMCSO. The Captain and crew undergoing the assessment will also be required to abide by the methodology and undergo pre-assessment training to become cyber-ready in order to better understand the process and its findings. Operational technology standards Testing will assess security across ten categories under the umbrella term of Operational Technology (OT), i.e., the hardware and software needed to monitor and control the physical processes of the ship. These include navigation, propulsion, electrical systems, communication, safety systems, cargo handling, environmental systems, and maintenance systems, human factors, and regulatory and compliance issues. The assessment may be carried out at sea, onshore or a combination of the two. Currently, the only OT standards available to the sector are those associated with the manufacturing industry and very few directly assess OT. Cybersecurity posture In addition, it can often be difficult for shipping companies to objectively assess their OT suppliers In addition, it can often be difficult for shipping companies to objectively assess their OT suppliers, as Murray explains: “Third parties and the shipping companies share a dependency, with joint goals and integrated operations." "Yet, with supply chain attacks on the rise, they represent a real risk to operations. This can strain the relationship but by applying a systematic approach through a standardised risk assessment, the company can rely upon the process to vet the cybersecurity posture of their suppliers for them.” Key components of the IMCSO security testing methodology Pre-Requisites: Rules of engagement, authorisation, scope of work, objectives, zones of testing. Scope of Work: Outlines the project details and goals, signed by both parties. Rules of Engagement: Guidelines for testing, including permitted hours and restrictions. Authorisation and Legal Considerations: Compliance with laws and written stakeholder approval. Testing Methodology: The approach used (e.g., black-box, white-box). Deliverables: Expected outputs, such as reports and recommendations. Timelines: Start and end dates, with key milestones. Communication Plan: Points of contact and reporting protocols. Risk Management and Contingency Planning: Plans to mitigate potential risks like downtime or data loss. Confidentiality and Data Handling: Protecting sensitive data and results Testing Activity: Performed by qualified personnel, with prompt reporting of critical issues. Reporting: Clear and categorised reporting of security findings, including solutions. Report Delivery: Secure and confidential delivery of the final report. Cyber risk of the vessel Reports will take a practical method with clear advice made in response to any security issues Reports will take a practical approach with clear recommendations made in response to any of security issues or vulnerabilities. Outputs will be standardised under the methodology using qualitative metrics and this consistency will ensure the results for each vessel are comparable. The results will be used to profile the cyber risk of the vessel, the status of which will be recorded in the Cyber Risk Registry. Cyber risk trends within the maritime sector Shipowners are sensitive about sharing their vessel's data. The Cyber Risk Registry will serve as a valuable resource for stakeholders and relevant parties, including port authorities, insurance companies, and association partners, by providing insights into cyber risk trends within the maritime sector. Additionally, it will support the broader industry—including the IMO, shipbuilders, management companies, and industry associations—by offering a trusted registry of vendors, qualified practitioners, and service providers to help vessels strengthen their cyber resilience and mitigate risks effectively.
Building Intelligence, a provider of solutions that securely streamline vendor, vehicle, and visitor access, announces a pioneer transition to support its next phase of growth. The new pioneer structure will help the company scale operations and refine its organizational strategy to pursue new growth opportunities. Focusing on expansion Championing innovation and partnership with strategic growth and market-defining innovationFounder Jeffrey Friedman will assume the role of Chief Evangelist, focusing on business development, innovation, and strategic partnerships. Marc Rubner has been appointed CEO and will lead the company's strategic growth, driving market-defining innovation, financial performance, and expansion. Advancing security solutions "We're grateful for Jeff's leadership and dedication to Building Intelligence. His vision has driven the company's growth and supported the development of vehicle, vendor, and visitor management solutions that ensure higher levels of security and drive efficiencies,” said Warren Haber, Chairman of the Board of Building Intelligence. “As we move into this next chapter, we're excited to welcome Marc to the business. With expertise in technology and strong leadership skills, he has a track record of creating long-term value. Under his direction, we'll continue innovating and strengthening our market position to meet the evolving needs of our clients and partners." Shaping secure solutions Building Intelligence will drive innovation, enhance safety, and shape the future of secure, scalable solutions worldwideUnder Rubner’s leadership, Building Intelligence will continue to deliver secure, scalable, and cutting-edge solutions that enhance safety and efficiency for clients worldwide. Friedman will amplify the company’s vision further, deepen engagement with clients and partners, and spearhead new opportunities that will drive industry advancements. A vision for growth “This transition represents a strategic step forward and ensures that Building Intelligence continues to lead the industry while strengthening our foundation for long-term success,” Friedman said. “I am excited to focus on expanding our market reach, driving innovation, and supporting Marc as he leads the company into the future.” Experienced leadership With more than 30 years of leadership experience, Rubner has guided organizations through transformation across multiple industries. He previously served as Founder and CEO of GreenStation Consulting and as CEO of DonorDrive. Market strategies expert Earlier, as Vice President, Product Management and Marketing, Community Engagement and Campus Enablement at Blackboard, he led go-to-market strategies for the organization, a pioneering provider of access control and identity management in the higher education segment. Building the next phase "I'm honored to join Building Intelligence at such an exciting time,” Rubner said. “Businesses continue to face challenges with securing and optimizing their facilities, from the lobby to the loading dock, and there is a significant opportunity to solve these problems through technology.” “I'm eager to drive the company forward, unlock significant value, and collaborate with our customers and partners as we embark on building our next phase of acceleration."
Integrated Access Control and Security manufacturer TDSi announces the launch of GARDiS Software Version 3. This substantial software update provides a raft of new features and functionality. Along with several new integrations with popular security platforms from providers, all designed to meet the latest and most prominent needs of security operators. GARDiS 3 enhancements GARDiS 3 redefines access control with powerful enhancements and seamless integrations GARDiS 3 introduces a range of powerful enhancements designed to make access control management even more intuitive and efficient and is packed with features designed to streamline operations and save valuable time. The latest version also includes advanced reporting and setup tools, providing deeper insights into access events and security trends. Building management systems Additionally, expanded third-party integrations ensure seamless compatibility with a wider range of security and building management systems. The update also features a new streamlined licensing process which is designed to automatically appear within the TDSi Product Registration Site, allowing for quicker, more secure license activation. Key enhancements in GARDiS 3 GARDiS 3 makes it easier than ever to deploy, manage, and scale sophisticated access control solutions With these enhancements, GARDiS 3 makes it easier than ever to deploy, manage, and scale sophisticated access control solutions. There have been enhancements to many areas of system setup such as Streamlined Controller Addition, Improved Door Access Configuration and Conditional Output Configuration. All of which are designed to make GARDiS easier to use and faster to deploy. There is also now the option to add a Multifactor Authentication license module to further enhance system sign-on security. Secure alarm system integration Feedback from Installers and End Users has helped refine many aspects of the user interface, for example it is now possible to automatically import and update people via scheduled uploads, and bulk upload credentials for the first time, along with allowing additional user info fields to be added. Also driven by feedback, there are several additions to the existing highly customisable GARDiS reporting tools, the Cause & Effect engine now allows the use of equipment effects when creating custom reports and it is also now possible to send instant reports via CSV, Text, or email. GARDiS version 3 upgrade Software Development Manager Tina Baker commented, “GARDiS version 3 is the biggest upgrade to our popular secure access platform so far and we are delighted to unveil the full set of exciting new features.” “Which are based on a considerable amount of customer and installer feedback, along with in-depth research and development. We believe these new features add considerable additional flexibility, usability, and value to our customers in meeting the evolving demands of their security needs.” Expanded security integrations GARDiS 3 also adds integration with a number of popular security and CCTV platforms GARDiS 3 also adds integration with a number of popular security and CCTV platforms from Braxos, Dahua, Hikvision, Panasonic and Vanderbilt. Integration with the Braxos Building Management platform adds a host of business system options. Braxos acts as a middleware connector which offers over 200 connection options via the Braxos Bridge, including Lift Control, Visitor Management and other Business Systems for PropTech. New CCTV Integrations with Panasonic, Dahua and Hikvision’s HikCentral CCTV platforms add Video Integration with Liveview, Video Playback and Video Verification. Additionally, the Panasonic integration also adds PTZ functionality. Vanderbilt alarm system integration Vanderbilt Intruder Alarm System Integration enables the operator to add an intruder panel within GARDiS, along with user zones (single PIR or sensor) and groups (multiple defined PIR/Sensors), Arm/Disarm Group, Inhibit individual zones/sensors, and to add all groups and zones to site plans within GARDiS, for easy intruder topography and monitoring. TDSi’s GARDiS 3 is available to the GARDiS Pro Software page on the TDSi Website for the full rundown of everything new in GARDiS 3.
Skills for Security has continued its collaboration with WorldSkills UK for the 2025 season, announcing the Electronic Security and Fire competitions will be merged into a single category. This strategic move aims to enhance the competition’s impact, broadening the scope for participants to demonstrate expertise in both electronic security and fire safety systems. By integrating these two crucial areas, the competition better mirrors the evolving demands, ensuring future professionals are equipped with comprehensive skills to meet industry needs. Integrated fire safety and security Says Darrell Gilmour, Director of Technical Training at Skills for Security: “By combining the Electronic Security and Fire competitions, we are ensuring that competitors develop a well-rounded skill set that reflects today’s integrated fire safety and security industry. We believe this evolution will benefit both competitors and the sector as a whole.” Applications for the competition will open at 9:00 AM on 3rd March 2025 and close on 17th March 2025. The National Qualifiers will be held at The Security Event (TSE) on the Skills for Security stand (5/D130) across three dates, bringing together 36 of the most talented competitors from across the UK. Range of training opportunities Skills for Security will also be actively engaging with attendees at the key industry event Skills for Security will also be actively engaging with attendees at the key industry event, highlighting the wide range of training opportunities and initiatives available to support talent development within the fire safety and security sector. David Scott, Managing Director of Skills for Security, added: “It is always a pleasure to host the competition qualifiers at The Security Event, where we can demonstrate the incredible skills and talent emerging." Next generation of security professionals Scott added: "Skills for Security remains committed to nurturing the next generation of security professionals, and this competition is a real opportunity to highlight the importance of continuous training and development in our sector.” The competition is sponsored by the CSL Group, The Security Event and Texecom. With additional support from Eaton, Yuasa Battery, NSI, SSAIB, Fenix Monitoring, Honeywell and Dahua, all of whom are dedicated to supporting excellence and innovation within the fire safety and security sector. The Security Event is taking place 8 – 10 April at NEC Birmingham.
Amthal Group Companies has appointed Richard Parker as its new Group Head of Sales. With over three decades of experience in the fire and security industry, Richard brings a wealth of expertise in sales leadership, business development and strategic growth to the company. Richard joins Amthal from Walker Fire UK Ltd., where he served as Group Sales Manager UK, successfully building and pioneering high-performing sales teams while driving business expansion across multiple sectors. Prior roles of Richard Richard will lead Amthal Group Companies’ sales functions, with a focus on sustainable revenue growth Prior to that, he spent 30 years at Chubb Fire & Security, holding senior leadership roles, including Account Director, Sales Director, and National Accounts Sales Manager. His impressive track record includes exceeding revenue targets, pioneering multi-disciplined teams and implementing strategic sales initiatives to enhance customer retention and market penetration. In his new role, Richard will oversee Amthal Group Companies’ sales operations, with a focus on driving sustainable revenue growth, strengthening client relationships, and further positioning Amthal as a pioneer in the fire and security industry. Outstanding service and solutions Commenting on his appointment, Richard said: “Joining Amthal presents a great opportunity to apply my experience in sales leadership and business development in an ambitious and growing organisation." "My focus will be on aligning the sales strategy with the company’s vision, developing long-term customer relationships, and ensuring our team delivers outstanding service and solutions.” Amthal’s growth objectives Amthal Group Companies’ CEO Jamie Allam added: “Richard’s experience and leadership in sales strategy align well with Amthal’s growth objectives. We look forward to his contributions in enhancing our sales operations and driving sustainable success for the company.” Richard’s appointment marks a significant step forward for Amthal Group Companies as it continues to expand its presence in the life safety and security technologies sector, delivering high-quality, tailored solutions to clients across the UK.
Threat Evolution, an advanced cybersecurity training and consulting platform, has officially achieved Cyber Essentials certification, reinforcing its commitment to helping businesses strengthen their digital security. Part of the Magenta Security Services family of businesses, which is a pioneer in sustainable security solutions, Threat Evolution provides cutting-edge cybersecurity training and consulting services designed to mitigate cyber risks. Common entry point for cyber threats Threat Evolution is now positioned to assist clients in obtaining their own Cyber Essentials accreditation Threat Evolution was launched to address the increasing cybersecurity vulnerabilities businesses face due to human error—the most common entry point for cyber threats. The platform empowers employees, contractors, and organisations to recognise and mitigate cyber risks effectively, strengthening overall resilience. With its newly acquired Cyber Essentials certification, Threat Evolution is now positioned to assist clients in obtaining their own Cyber Essentials accreditation. This UK government-backed certification helps organisations implement best practices to defend against common cyber threats. Threat Evolution’s comprehensive cybersecurity services Cybersecurity Training Platforms: Interactive, industry-specific training modules designed to enhance awareness and resilience against cyber-attacks. Penetration Testing: Expert-led testing to identify and address vulnerabilities before they can be exploited. Vulnerability Scanning Services: Ongoing security assessments to detect and remediate weaknesses. Cyber Essentials Certification Assistance: Support for businesses seeking to obtain their Cyber Essentials accreditation, helping them meet required security standards. Consulting Services: Tailored guidance from experienced cybersecurity professionals to strengthen security postures. Sustainable approach to digital security Magenta Security achieved carbon-zero status three years ahead of schedule in 2022 With the support of Magenta Security Services, a company with over 25 years of experience in security solutions, Threat Evolution brings the same innovative and sustainable approach to digital security as Magenta does to physical security. Magenta Security, recognised for its sustainability leadership, achieved carbon-zero status three years ahead of schedule in 2022 and continues to set industry benchmarks. Cyber Essentials accreditation Abbey Petkar, Managing Director of Magenta Security Services, stated: “Our mission has always been to provide our clients with complete security solutions." "Threat Evolution ensures businesses are protected and prepared against cyber threats. By also assisting clients in obtaining their own Cyber Essentials accreditation, we are extending our commitment to security beyond just our own organisation.” Advocate for green solutions Magenta Security has been widely recognised for its innovative and sustainable business practices Magenta Security has been widely recognised for its innovative and sustainable business practices, winning the Sustainable Business Award in both 2023 and 2024. Abbey Petkar remains a vocal advocate for green solutions within the security industry and regularly speaks at industry events. “Threat Evolution represents our vision of an advanced, sustainable security solution that protects both physical and digital environments,” added Petkar. Threat Evolution website Petkar added: “By combining expert-led cybersecurity services with comprehensive training, we are helping businesses build a secure and resilient digital future.” The Threat Evolution website can be found at the website, serving as the primary hub for cybersecurity training, resources, and updates.
The International Maritime Cyber Security Organisation (IMCSO), an independent maritime standards organisation, has released its cybersecurity testing methodology for those maritime vessels looking to assess their risk and join the Cyber Risk Registry, a risk register database maintained by the IMCSO. The methodology aims to provide IMCSO-accredited cyber consultants and the senior maritime personnel they will be assessing with standardised testing by outlining test scope and the language to be used to ensure tests are planned, executed and reported effectively. Quality of cyber risk assessments “Currently there is no standard in the maritime sector for governing the quality of cyber risk assessments. This methodology will set a precedent by providing a set of criteria that assessors must observe when on engagement and against which maritime security can be measured." "It is a very big step forward in normalising both expectations and requirements in the maritime space,” said Campbell Murray, CEO at the IMCSO. Guide for cybersecurity practitioners The methodology stipulates the needs under which the cybersecurity checks will be carried out The methodology stipulates the conditions under which the cybersecurity assessments will be carried out. It acts as a legal and practical guide for cybersecurity practitioners who must adhere to the standards as a condition of their inclusion on the approved suppliers list, otherwise known as the Certified Supplier Registry, held by the IMCSO. The Captain and crew undergoing the assessment will also be required to abide by the methodology and undergo pre-assessment training to become cyber-ready in order to better understand the process and its findings. Operational technology standards Testing will assess security across ten categories under the umbrella term of Operational Technology (OT), i.e., the hardware and software needed to monitor and control the physical processes of the ship. These include navigation, propulsion, electrical systems, communication, safety systems, cargo handling, environmental systems, and maintenance systems, human factors, and regulatory and compliance issues. The assessment may be carried out at sea, onshore or a combination of the two. Currently, the only OT standards available to the sector are those associated with the manufacturing industry and very few directly assess OT. Cybersecurity posture In addition, it can often be difficult for shipping companies to objectively assess their OT suppliers In addition, it can often be difficult for shipping companies to objectively assess their OT suppliers, as Murray explains: “Third parties and the shipping companies share a dependency, with joint goals and integrated operations." "Yet, with supply chain attacks on the rise, they represent a real risk to operations. This can strain the relationship but by applying a systematic approach through a standardised risk assessment, the company can rely upon the process to vet the cybersecurity posture of their suppliers for them.” Key components of the IMCSO security testing methodology Pre-Requisites: Rules of engagement, authorisation, scope of work, objectives, zones of testing. Scope of Work: Outlines the project details and goals, signed by both parties. Rules of Engagement: Guidelines for testing, including permitted hours and restrictions. Authorisation and Legal Considerations: Compliance with laws and written stakeholder approval. Testing Methodology: The approach used (e.g., black-box, white-box). Deliverables: Expected outputs, such as reports and recommendations. Timelines: Start and end dates, with key milestones. Communication Plan: Points of contact and reporting protocols. Risk Management and Contingency Planning: Plans to mitigate potential risks like downtime or data loss. Confidentiality and Data Handling: Protecting sensitive data and results Testing Activity: Performed by qualified personnel, with prompt reporting of critical issues. Reporting: Clear and categorised reporting of security findings, including solutions. Report Delivery: Secure and confidential delivery of the final report. Cyber risk of the vessel Reports will take a practical method with clear advice made in response to any security issues Reports will take a practical approach with clear recommendations made in response to any of security issues or vulnerabilities. Outputs will be standardised under the methodology using qualitative metrics and this consistency will ensure the results for each vessel are comparable. The results will be used to profile the cyber risk of the vessel, the status of which will be recorded in the Cyber Risk Registry. Cyber risk trends within the maritime sector Shipowners are sensitive about sharing their vessel's data. The Cyber Risk Registry will serve as a valuable resource for stakeholders and relevant parties, including port authorities, insurance companies, and association partners, by providing insights into cyber risk trends within the maritime sector. Additionally, it will support the broader industry—including the IMO, shipbuilders, management companies, and industry associations—by offering a trusted registry of vendors, qualified practitioners, and service providers to help vessels strengthen their cyber resilience and mitigate risks effectively.
Building Intelligence, a provider of solutions that securely streamline vendor, vehicle, and visitor access, announces a pioneer transition to support its next phase of growth. The new pioneer structure will help the company scale operations and refine its organizational strategy to pursue new growth opportunities. Focusing on expansion Championing innovation and partnership with strategic growth and market-defining innovationFounder Jeffrey Friedman will assume the role of Chief Evangelist, focusing on business development, innovation, and strategic partnerships. Marc Rubner has been appointed CEO and will lead the company's strategic growth, driving market-defining innovation, financial performance, and expansion. Advancing security solutions "We're grateful for Jeff's leadership and dedication to Building Intelligence. His vision has driven the company's growth and supported the development of vehicle, vendor, and visitor management solutions that ensure higher levels of security and drive efficiencies,” said Warren Haber, Chairman of the Board of Building Intelligence. “As we move into this next chapter, we're excited to welcome Marc to the business. With expertise in technology and strong leadership skills, he has a track record of creating long-term value. Under his direction, we'll continue innovating and strengthening our market position to meet the evolving needs of our clients and partners." Shaping secure solutions Building Intelligence will drive innovation, enhance safety, and shape the future of secure, scalable solutions worldwideUnder Rubner’s leadership, Building Intelligence will continue to deliver secure, scalable, and cutting-edge solutions that enhance safety and efficiency for clients worldwide. Friedman will amplify the company’s vision further, deepen engagement with clients and partners, and spearhead new opportunities that will drive industry advancements. A vision for growth “This transition represents a strategic step forward and ensures that Building Intelligence continues to lead the industry while strengthening our foundation for long-term success,” Friedman said. “I am excited to focus on expanding our market reach, driving innovation, and supporting Marc as he leads the company into the future.” Experienced leadership With more than 30 years of leadership experience, Rubner has guided organizations through transformation across multiple industries. He previously served as Founder and CEO of GreenStation Consulting and as CEO of DonorDrive. Market strategies expert Earlier, as Vice President, Product Management and Marketing, Community Engagement and Campus Enablement at Blackboard, he led go-to-market strategies for the organization, a pioneering provider of access control and identity management in the higher education segment. Building the next phase "I'm honored to join Building Intelligence at such an exciting time,” Rubner said. “Businesses continue to face challenges with securing and optimizing their facilities, from the lobby to the loading dock, and there is a significant opportunity to solve these problems through technology.” “I'm eager to drive the company forward, unlock significant value, and collaborate with our customers and partners as we embark on building our next phase of acceleration."
Integrated Access Control and Security manufacturer TDSi announces the launch of GARDiS Software Version 3. This substantial software update provides a raft of new features and functionality. Along with several new integrations with popular security platforms from providers, all designed to meet the latest and most prominent needs of security operators. GARDiS 3 enhancements GARDiS 3 redefines access control with powerful enhancements and seamless integrations GARDiS 3 introduces a range of powerful enhancements designed to make access control management even more intuitive and efficient and is packed with features designed to streamline operations and save valuable time. The latest version also includes advanced reporting and setup tools, providing deeper insights into access events and security trends. Building management systems Additionally, expanded third-party integrations ensure seamless compatibility with a wider range of security and building management systems. The update also features a new streamlined licensing process which is designed to automatically appear within the TDSi Product Registration Site, allowing for quicker, more secure license activation. Key enhancements in GARDiS 3 GARDiS 3 makes it easier than ever to deploy, manage, and scale sophisticated access control solutions With these enhancements, GARDiS 3 makes it easier than ever to deploy, manage, and scale sophisticated access control solutions. There have been enhancements to many areas of system setup such as Streamlined Controller Addition, Improved Door Access Configuration and Conditional Output Configuration. All of which are designed to make GARDiS easier to use and faster to deploy. There is also now the option to add a Multifactor Authentication license module to further enhance system sign-on security. Secure alarm system integration Feedback from Installers and End Users has helped refine many aspects of the user interface, for example it is now possible to automatically import and update people via scheduled uploads, and bulk upload credentials for the first time, along with allowing additional user info fields to be added. Also driven by feedback, there are several additions to the existing highly customisable GARDiS reporting tools, the Cause & Effect engine now allows the use of equipment effects when creating custom reports and it is also now possible to send instant reports via CSV, Text, or email. GARDiS version 3 upgrade Software Development Manager Tina Baker commented, “GARDiS version 3 is the biggest upgrade to our popular secure access platform so far and we are delighted to unveil the full set of exciting new features.” “Which are based on a considerable amount of customer and installer feedback, along with in-depth research and development. We believe these new features add considerable additional flexibility, usability, and value to our customers in meeting the evolving demands of their security needs.” Expanded security integrations GARDiS 3 also adds integration with a number of popular security and CCTV platforms GARDiS 3 also adds integration with a number of popular security and CCTV platforms from Braxos, Dahua, Hikvision, Panasonic and Vanderbilt. Integration with the Braxos Building Management platform adds a host of business system options. Braxos acts as a middleware connector which offers over 200 connection options via the Braxos Bridge, including Lift Control, Visitor Management and other Business Systems for PropTech. New CCTV Integrations with Panasonic, Dahua and Hikvision’s HikCentral CCTV platforms add Video Integration with Liveview, Video Playback and Video Verification. Additionally, the Panasonic integration also adds PTZ functionality. Vanderbilt alarm system integration Vanderbilt Intruder Alarm System Integration enables the operator to add an intruder panel within GARDiS, along with user zones (single PIR or sensor) and groups (multiple defined PIR/Sensors), Arm/Disarm Group, Inhibit individual zones/sensors, and to add all groups and zones to site plans within GARDiS, for easy intruder topography and monitoring. TDSi’s GARDiS 3 is available to the GARDiS Pro Software page on the TDSi Website for the full rundown of everything new in GARDiS 3.
Skills for Security has continued its collaboration with WorldSkills UK for the 2025 season, announcing the Electronic Security and Fire competitions will be merged into a single category. This strategic move aims to enhance the competition’s impact, broadening the scope for participants to demonstrate expertise in both electronic security and fire safety systems. By integrating these two crucial areas, the competition better mirrors the evolving demands, ensuring future professionals are equipped with comprehensive skills to meet industry needs. Integrated fire safety and security Says Darrell Gilmour, Director of Technical Training at Skills for Security: “By combining the Electronic Security and Fire competitions, we are ensuring that competitors develop a well-rounded skill set that reflects today’s integrated fire safety and security industry. We believe this evolution will benefit both competitors and the sector as a whole.” Applications for the competition will open at 9:00 AM on 3rd March 2025 and close on 17th March 2025. The National Qualifiers will be held at The Security Event (TSE) on the Skills for Security stand (5/D130) across three dates, bringing together 36 of the most talented competitors from across the UK. Range of training opportunities Skills for Security will also be actively engaging with attendees at the key industry event Skills for Security will also be actively engaging with attendees at the key industry event, highlighting the wide range of training opportunities and initiatives available to support talent development within the fire safety and security sector. David Scott, Managing Director of Skills for Security, added: “It is always a pleasure to host the competition qualifiers at The Security Event, where we can demonstrate the incredible skills and talent emerging." Next generation of security professionals Scott added: "Skills for Security remains committed to nurturing the next generation of security professionals, and this competition is a real opportunity to highlight the importance of continuous training and development in our sector.” The competition is sponsored by the CSL Group, The Security Event and Texecom. With additional support from Eaton, Yuasa Battery, NSI, SSAIB, Fenix Monitoring, Honeywell and Dahua, all of whom are dedicated to supporting excellence and innovation within the fire safety and security sector. The Security Event is taking place 8 – 10 April at NEC Birmingham.


Expert commentary
Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many factors – including building size, shape, type, location, national regulations and more – impact affordability and efficiency calculations. Crucially, the type of access solution a business selects – wired or wireless – impacts total operating costs, including during installation, running and any potential expansion or reconfiguration stages. Wireless installation Wiring premises can be expensive. So, the potential cost savings from choosing wireless digital access begin at the very start. Installation stage is the largest contributor to potential cost savings when businesses go wireless. In calculations for one report, access experts at ASSA ABLOY examined projected costs for a fictional 100-door installation. Labour savings for those who chose wireless over wired locks were 82.5%. Why? Firstly, because wireless installation is much faster. It is also less intrusive. Most wireless locking devices require little or no drilling of the door, whereas wired security needs cabling through and partly around a door – which means not just door damage, but the contracting of specialist electrical installers who may require multiple site visits. These costs add up. Digital access technology Torus aims for the highest level of LEED certification for all its new properties In Poland, for example, developer Torus aims for the highest level of LEED certification for all their new properties around Gdansk. Where possible, they choose products with Environmental Product Declarations (EPDs) and Green Circle documentation, favouring access solutions which reduce their carbon footprint. Wireless digital access technology is a natural choice. “The lack of wiring significantly reduces materials use, reduces costs, and ensures quick installation,” confirms Torus’ Roman Sokolowski. There’s no cabling, which cuts power consumption. There’s less damage to the building fabric and fitters make fewer journeys to and from the site. Adaptable locking solution By choosing a wireless solution, organisations also upgrade building security with little disruption. A wireless system makes it easier to improve security at an existing building via a retrofit process which does not inconvenience staff or disturb work routines. This was one goal at Plexal, a £15 million flexible work environment for London enterprise and academia. Plexal chose battery powered wireless locks integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install ASSA ABLOY Aperio® devices with minimal disruption,” confirms Stewart Johnson, Director at NetNodes. Cost savings with improved energy efficiency Choosing wireless over wired locking can play a vital role in reducing ongoing energy use Choosing wireless over wired locking can play an important role in reducing ongoing energy use – and, therefore, expenditure. Wholesale electricity prices in Europe are approximately double what they were in 2019, according to the IEA’s “Electricity 2024” report. For a variable cost such as energy, where businesses have little control over unit prices, it is critical to control usage, especially if high and/or changeable energy prices become what analysts at ING called “the new normal for business”. Thus, the fact that battery-powered locks consume much less energy than traditional wired solutions is increasingly relevant and important. Additional saving on energy costs Traditional wired door access devices often work via magnets connected permanently to mains electricity. These doors draw power around the clock to remain locked. Wireless locks work differently. They only “wake up” when presented with a credential, to make the access decision. This translates to an additional saving on energy costs during operation: more than 70%, or thousands of euros over a typical access system’s lifetime. Wireless digital access Wireless locks only need a change of their standard battery, which may be rechargeable Related energy and materials costs during in-use stage are also lower. Wireless locks only need a change of their standard battery – which may be rechargeable – typically once every two years. No specialist maintenance is required, saving on specialists and their travel to and from the site(s). By choosing wireless digital access, businesses help protect themselves against these ongoing costs, notably energy price increases and volatility. Cost-efficient flexible working, for staff and facilities managers Perhaps harder to quantify, but equally easy to imagine, the financial benefits of choosing a wireless digital solution are felt in the increased convenience and efficiency of daily operations. In the co-working sector, for example, flexible access to offices is a priority. As “fixed” office space rented by corporations continues to fall, co-working spaces are expected to keep growing, with one estimate suggesting almost 18% CAGR to 2030. To stand out from the competition, the founders of ULab in Alicante sought the latest innovations in access and design to create their 21st-century business centre. Part of the suite of digital access solutions from ASSA ABLOY, a SMARTair® system gave ULab real-time access management via battery-powered locks and Openowä, the Mobile Key solution for SMARTair, without any need to wire doors and other openings. SMARTair TS1000 Web interface With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone; ULab’s security team update their rights over the air. An office manager can perform any operation remotely from the SMARTair TS1000 Web interface. In case of an emergency, they could lock-down the site or open doors remotely, for example. It’s convenient, efficient and boosts ULab’s security, benefiting users and managers. And because of SMARTair’s flexibility, they can comfortably welcome many more than their usual 100 daily users. “In addition to regular daily traffic, weekly traffic can almost multiply by 10 if an event is held,” says Enrique Burgos Pérez, Director at ULab. “We needed an access control system as flexible and convenient as SMARTair.” ASSA ABLOY benchmarking report Choosing wireless locks also adds flexibility – and can reduce costs – when an organisation reconfigures or expands their commercial space. High-quality wireless devices like SMARTair can typically be reinstalled at another opening without impacting reliability. They move to wherever is convenient. If a business is rethinking workspace to encourage flexible or hybrid work patterns, for example, cost efficiencies could be significant. Typical savings on office relocation or expansion are estimated at around 30% with wireless over wired locking, according to the same ASSA ABLOY benchmarking report. Cost efficiency and more control with ASSA ABLOY digital access To refit and improve their student accommodation, managers at the University of St Andrews sought energy- and cost-efficient access control. They chose Aperio, another innovative digital access solution from ASSA ABLOY. Approximately 1,600 doors so far are equipped with battery-powered Aperio escutcheons – without cabling. Aperio devices integrate fully with both the university’s existing central security system and their student ID card. University security managers continue to enjoy the efficiency benefits of monitoring and controlling access from a single point and in real-time, including for doors across multiple buildings. Aperio, another innovative digital access solution from ASSA ABLOY. Benefits of cost-efficiency In comparison to a wired solution, Aperio offers significant cost-efficiency benefits. Devices are wireless, so can be installed with little energy use and no need for wiring to the mains. They consume near-zero energy when idle and run on standard batteries, consuming little power during operation. Through the entire product life-cycle, Aperio combines reliability with cost effectiveness. “Aperio gives us central management and control,” says Pauline Brown, Associate Chief Information Officer at the University of St Andrews, “and contributes to our award-winning track record in energy efficiency.”
As the backbone of community welfare, healthcare facilities cater to crucial public needs from emergency care to specialised medical treatments, and due to its position as a significant facet of the world's critical infrastructure, the healthcare sector faces a multitude of challenges in ensuring patient and visitor security, managing high traffic, and safeguarding sensitive data. Medical sites, such as large hospitals and urgent care clinics, see a wide variety of patients, medical staff, administrative teams, and visitors throughout the day. In addition to protecting patients, visitors, and staff, healthcare environments must protect medical and patient data, ensure immediate response to urgent medical events, and maintain 24/7 operations. Security challenges Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability Addressing the security challenges presented by 24/7 availability and high patient and visitor traffic calls for a merging of technology, processes, and security strategies that go beyond what a typical security infrastructure would look like. Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability, accessibility, and integration capabilities. These advancements address the multifaceted demands of healthcare organisations, ensuring seamless around-the-clock operations while prioritising patient care and safety. Enhancing operational efficiency to save lives Cloud-based access control solutions have revolutionised how healthcare security professionals approach collaboration within medical facilities. These solutions offer unparalleled accessibility and insight into patient and visitor security information and access logs, improving coordination among security teams and leading to more accurate monitoring and response to developing medical events. By managing and operating access control solutions via the cloud, healthcare facilities can implement effective physical security measures while ensuring seamless collaboration among staff to deliver the highest medical care possible to patients across facilities. Physical access controls Cloud-based access control systems allow users to securely access and manage physical access controls Cloud-based access control systems allow multiple users to securely access and manage physical access controls and visitor management data simultaneously, enabling them to keep track of patient movements as they are transferred throughout the facility or between different facilities. For larger hospitals or medical campuses with multiple facilities hosting access controls via the cloud empowers users with the ability to find patients and patient data in an instant, as well as opening the door to collaborate with teams separated by long distances, ensuring all team members have access to the information they need to continue saving lives. Scaling the way to top-notch care Healthcare institutions are constantly growing and changing in response to evolving industry regulations and standards, and the access control solutions these organisations rely on should be able to scale to meet their changing needs. To ensure their access control systems can keep up with these growing demands, healthcare security professionals can invest in access control solutions hosted in the cloud to avoid the tedious hardware constraints that come with traditional on-premises solutions. Cloud solutions offer significant levels of scalability, enabling healthcare organisations to adjust their storage requirements and computing resources based on changing requirements on the fly. This capability for flexibility ensures users can manage large amounts of data without significant upfront investments in hardware. Cloud-based access control solutions Cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access In addition to compliance with changing regulations, cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access control platform across a growing campus or multiple buildings. Larger healthcare facilities typically consist of multiple sites of varying sizes across diverse landscapes, each with distinctive security needs. Systems hosted in the cloud provide scalability and flexibility for user organisations, allowing security teams to modify or expand upon their security infrastructure as needed without spending on costly new hardware. This adaptability is crucial for helping address varying risks over multiple sites, providing security personnel the flexibility they need to ensure patient safety over long distances. Ease of use for security teams To truly understand the value of a cloud-based access control system, healthcare security professionals must consider the long-term savings and ROI these solutions provide by bolstering operational efficiencies and enabling unprecedented scalability. These systems ensure compliance with changing standards and deliver a simplified user experience across platforms, prioritising security and ease of use for security teams across the healthcare sector.
For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common K12 security pain points There’s no one-size-fits-all solution in school district security. School districts may have big plans to implement upgraded security systems but to set out on the right foot, pioneers must have a clear vision of their long-term strategy. When embarking on their security journey, education pioneers often wonder where to start and what exact steps are they need to be taking to identify and address weaknesses. Local K12 and government pioneers are promoting and mandating security assessments to uncover safety gaps on campuses and mitigate these risks with advanced technology solutions. Not only do assessments provide detailed, customisable roadmaps for district pioneers, but they also recommend technologies and funding opportunities to help close threat gaps. K12 school districts are mainly vulnerable to cyber-attacks due to the sensitive nature of student records In today’s climate, schools face a growing number of physical and digital security threats. From a cybersecurity standpoint, K12 school districts are particularly vulnerable to cyber-attacks due to the sensitive nature of student records. However, only one-third of these districts have adequate staffing to address threats effectively. In addition, according to a recent survey from Johnson Controls and Forrester Consulting, security decision-makers are having trouble receiving actionable insights. Nearly two-thirds of respondents said that they struggle to receive information from all necessary systems regarding their security threats. To gain more clarity into what school districts need in terms of security tools and threat mitigation, implementing system-wide monitoring and optimisation can be invaluable. This approach enhances equipment and operational efficiency, while providing necessary resources and expertise for critical patch updates across all systems, strengthening their overall security posture. Achieving a well-rounded security program In the past few years, AI technology has emerged as a trending solution and is generating considerable attention. While the allure of implementing cutting-edge technologies is undeniable, it’s important to recognise that a robust security program hinges on solid access control. Access control technology provides administrators with the means to oversee and regulate entry into facilities, serving as the foundation for basic physical security. The technology helps administrators and staff control access to multiple areas from web-enabled devices, even during lockdowns which is crucial in emergency situations. School district pioneers should utilise available digital risk assessment tools to uncover threat areas Once basic security controls are in place, school districts must address their next set of security pain points and identify which solutions meet their specific needs. This involves identifying and prioritising the highest need and most cost-effective investments that will have the greatest impact on enhancing security measures. To accurately determine which security solutions are needed for a specific environment, school district pioneers should utilise available digital risk assessment tools to uncover threat areas and determine levels of priority. By focusing on these priority areas, districts can allocate their resources and efforts where they are needed most, ensuring maximum effectiveness in mitigating risks and vulnerabilities. Securing funding before approaching deadlines A major challenge for school districts surrounding campus security is identifying and securing the necessary funding to implement solutions aligned with their goals. Leveraging available funding sources is critical, especially considering certain programs are approaching their deadline, like the Elementary and Secondary School Emergency Relief (ESSER) fund. Announced during the pandemic, ESSER is a funding program that has allocated nearly $190 billion in aid to U.S. public school districts to fund projects benefitting the well-being of occupants. Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024 Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024, when schools must attribute all of their funds to assigned contracts. Following this date, pioneers will need to complete all ESSER spending by January 2025 unless approved for an extension into March 2025. As ESSER wanes, school districts are acutely aware of the fiscal cliff in budgets through 2025. However, many states are ramping up grant funding to close the deficit gap. Administrators should become familiar with these grant opportunities at a local and state level. Get started on security plans The time for school district pioneers to act is now. While the safety and well-being of students and staff are always top priorities, it’s crucial to acknowledge that a lack of insight into necessary security upgrades and available funding options will leave districts behind the curve. Seizing the final months of ESSER funding presents an ideal window to address security pain points and build a safer future for K12 facilities. Looking beyond ESSER, pioneers must proactively seek out and leverage other funding avenues to help ensure the continuity of their security efforts and maintain a proactive stance in safeguarding healthy and safe educational environments.
Security beat
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
Collaboration among manufacturers in the physical security industry can result in systems that are easier to install for integrators and that provide a better customer experience for end users. Illustrating the point is the recent collaboration among a turnstile technology company, a supplier of short-range wireless readers/writers, and a biometric business focused on ‘frictionless’ access control. “The more manufacturers collaborate with each other, the more benefits for end users,” says Steve Caroselli, the Chief Executive Officer (CEO) of Orion Entrance Control. Better collaboration means a better user experience We look for opportunities to collaborate and make sure the experience is above and beyond" Steve Caroselli adds, “Better collaboration means a better user experience. We look for opportunities to collaborate and make sure the experience is above and beyond.” Orion’s collaboration with ELATEC RFID Systems and SAFR touchless biometrics by RealNetworks Inc. highlights the advantages of manufacturers working together to ensure technologies operate smoothly in the real world. Taking ownership of the customer experience When Orion Entrance Control provides a SpeedGate swing-glass optical turnstile, they take full ownership of the customer’s experience. That means ensuring the turnstile application operates as it should, regardless of which component of the broader system might be at fault. To the customer experience, a card reader that doesn’t work is the equivalent of a turnstile that doesn’t work. Which component is at fault is irrelevant, and in fact, invisible, to the overall customer experience. Importance of dependable operation of turnstiles As the most visible element in many access control systems, dependable operation of turnstiles reflects positively on the manufacturer and on the entire system. Orion tests various third-party components with their turnstiles To ensure an optimum customer experience, Orion tests various third-party components with their turnstiles, in order to ensure flawless operation before a turnstile is delivered to a customer. Customers buying an Orion turnstile send the card readers they want to use to Orion’s corporate headquarters in Laconia, New Hampshire, USA, where Orion engineers ensure seamless operation. Ensuring optimum customer experience All readers are designed to be bolted to the wall rather than installed inside a turnstile In addition to scenario-based testing, readers are placed inside the turnstile for a streamline appearance, which can be a challenge given the variety of sizes and types of readers a customer might choose. All readers are designed to be bolted to the wall rather than installed inside a turnstile, which complicates adaptation efforts. In short, historically for Orion, ensuring the optimum customer experience involved extra time and effort, although obviously it was worth it. Providing flexibility for any environment Seeking to simplify the process, Orion has found an alternative to using many different types and models of card readers for its turnstiles. Deploying an RFID reader/writer from ELATEC provides flexibility to operate in a variety of card and reader environments, including almost all 125 kHz and 13.56 MHz contactless technologies. The product is compatible with low-frequency (LF), high-frequency (HF), near field communication (NFC) or Bluetooth Low Energy (BLE) signals. An integrated BLE module supports mobile ID and authentication solutions. There is an integrated antenna for LF and HF to ensure excellent contactless performance. ‘Universal’ configuration of the ELATEC reader hardware Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is compatible with any card system. It works with all the access control protocols, including SEOS, OSDP and other open protocols. “We can stock an open SKU and flash the firmware as per the customer requirement,” says Steve Caroselli. The small form factor (around 1 1/2 inches square) of the ELATEC module lends itself to easy installation inside the turnstile housing. Easy availability of the ELATEC readers helps Orion continue to serve customers, despite recent disruptions in the supply chain. And, ELATEC’s reader hardware has earned global certifications that enable Orion to use their products for customers around the world. Testing to ensure smooth operation ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing Before embracing the ELATEC reader module, Orion tested it for several months to ensure compatibility with its turnstiles. ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing and working closely with the Orion team. Everyone in the ELATEC sales and engineering team, right up the company’s C-suite, worked to support Orion during the testing phase. In the end, in addition to other advantages, ELATEC’s detection speed and read range compares favorably to competing technologies. “We move really fast as an organisation, so we are looking for other organisations that move very fast,” says Steve Caroselli, adding “We met with ELATEC one week and had the equipment for testing the next week. We like to work with companies that move fast, and they are culturally aligned with how we do business.” Orion turnstiles with ELATEC TWN4 Palon Compact panel The Orion turnstiles incorporate an ELATEC TWN4 Palon Compact panel, a versatile panel-mount reader designed for integration into third-party products and devices. It supports enhanced interfaces, especially RS-485, and reflects the advantages and integrated tool support of the ELATEC TWN4 family. Orion is implementing SAFR SCAN biometric technology using hardware and software from RealNetworks Inc. “The selection of ELATEC products allows Orion to provide their customers and partners with a flexible RFID reader solution that supports numerous credential options and virtually all transponder technologies,” said Paul Massey, the Chief Executive Officer (CEO) of ELATEC, Inc., adding “This is especially valuable in multi-tenet, multi-credential environments.” Orion works with all the various stakeholders – architects, consultants, integrators, and end users – to ensure total satisfaction with an installation. Biometric technology for ‘frictionless’ access control Orion is also implementing SAFR SCAN biometric technology into their turnstiles using hardware and software from RealNetworks Inc. The facial recognition reader technology, designed for mainstream commercial access control, provides a ‘frictionless’ experience, and allows users to pass through turnstiles at a walk. The system can authenticate up to 30 individuals per minute with 99.9% accuracy, despite varied lighting conditions. SAFR’s system provides a good user experience Orion designed a mounting system to incorporate the biometric reader into their turnstile design Orion designed a mounting system to incorporate the biometric reader into their turnstile design. SAFR’s system provides a good user experience, when it comes to enrollment. On each turnstile, the SAFR technology can operate separate from the ELATEC reader or in conjunction with it for multi-factor authentication in higher-security applications. Innovation for new applications A broad approach to the customer experience reflects Orion’s positioning as a technology company, in addition to being a manufacturer of turnstiles. Their Infinity software is the ecosystem ‘nerve centre’ platform to ensure operation and connected through a single ‘pane of glass.’ The need to protect more entrances beyond the lobby led Orion to develop its recently patented DoorGuard, a LIDAR-based solution that detects each person who passes through a doorway and prevents tailgating (like a turnstile) for applications, such as stairway doors, perimeter doors, data centres, IDF closets, etc. The software mimics the advantages of a turnstile to monitor access control and occupancy. Removing friction during installation and beyond Orion’s Constellation is a presence detection system that uses UWB (ultra-wideband) radar to sense where people are in a building for emergency response and building utilisation applications. “One of our core values is to remove friction and make customers’ lives easier,” says Steve Caroselli, adding “Our people-first philosophy is: What can we do to make your life better? We want to be systematic, and everything must be repeatable in terms of how we react and interact with customers.”
Case studies
New investment of the highest standard. Three buildings, 69 premises in total. The project wants to ensure consistency in the use of smart home devices for controlling lighting, air conditioning, roller blinds, and more. To achieve this, each apartment is equipped with a Gira G1 smart home panel (KNX system). Additionally, the project is looking for an intercom system that can secure the entrances and integrate seamlessly with Gira G1. The solution Oaza Mokotów is a high-end residential complex offering fully secured and seamless access, thanks to the integration of DNAKE’s intercom system and Gira’s smart home features. This integration allows for centralised management of both intercom and smart home controls through a single panel. Residents can use the Gira G1 to communicate with visitors and remotely unlock doors, significantly simplifying operations and enhancing user convenience. Installed products 902D-B6 10.1” Facial Recognition Android Door Station S615 4.3” Facial Recognition Android Door Station 902C-A Master Station
The building, constructed in 2005, consists of three 12-story towers with a total of 309 residential units. Residents have been experiencing issues with noise and unclear sound, which hinder effective communication and lead to frustration. Additionally, there is an increased need for remote unlocking capabilities. The existing 2-wire system, which supports only basic intercom functions, fails to meet the current needs of the residents. Solution highlights Easy Intercom Retrofitting with Existing Cables Tenant’s Own Choice on Answering Units Installed products S615 4.3” Facial Recognition Android Door Station E211 Audio Indoor Monitor 290M-S8 7” Linux Indoor Monitor (2-wire Version) 902C-A Master Station Cloud Solution - Smart Pro Solution benefits For Installer DNAKE 2-wire IP intercom solution leverages existing wiring, which allows for a quicker and more efficient installation process. This solution helps avoid the costs associated with new cabling and extensive rewiring, keeping project costs down and making the retrofit more economically attractive. For Property Manager The Central Management System (CMS) is an on-premises software solution for managing video intercom systems via the LAN, which has greatly improved the efficiency of property managers. Additionally, with the 902C-A master station, property managers can receive security alarms to take immediate action, and remotely unlock doors for visitors. For Residence Residents can choose their preferred answering unit based on their needs. Options include Linux-based or Android-based indoor monitors, audio-only indoor monitors, or even app-based services without a physical indoor monitor. With DNAKE's cloud service, residents can unlock doors from anywhere, at any time.
In Japan nearly two in five office workers work from home a minimum of once a week, particularly if they work in IT or consultancy, according to Nikkei research undertaken in 2023. When a global IT company announced they would be leasing out four floors in their Tokyo office last year, in response to changing working habits following Covid, G4S approached them to be their security provider. They had already been doing access control and meet and greet at the eight-storey building for the last 10 years. New access control systems Eiki Hata, Representative Director of G4S Secure Solutions Japan, says: “The security requirements for a multiple tenancy building are quite different from a single occupancy. You have more people coming and going, companies have different requirements – more sophisticated and robust protocols are needed.” After being awarded the new contract, G4S doubled its headcount onsite and configured new access control systems for each floor; some of the new tenants wanted to keep their existing passes, which G4S was able to accommodate. Health and safety Security officers are also trained in first aid, which includes administering CPR and using a defibrillator Eiki says that 40% of G4S’s remit is health and safety and they will provide support during natural disasters, such as earthquakes or flooding. This includes checking if there is any damage to the building alongside the facilities team and offering assistance to local residents who may take refuge there. They will also hold regular evacuation drills for the whole building. Security officers are also trained in first aid, which includes administering CPR and using a defibrillator. They will also call for an ambulance if required and direct them once onsite. The officers are also responsible for ensuring everyone shows their ID at reception and all guests are booked in, as per the company’s global policy. Customer service skills Eiki explains: “Japan is one of the safest countries in the world: if you leave your wallet somewhere, it’s likely that you’ll get it back without losing any money." "However, that also means that Japan has a very low awareness of risk and our security officers need to be able to explain why these protocols are in place when questioned. When you just have one company in a building it’s easy to enforce operational rules, but with multiple tenants that’s less easy to do - customer service skills are really important.” Flexibility and adaptability The company is one of a number of multinationals spanning sectors that G4S provides security This company is one of a number of multinationals, spanning various sectors, that G4S provides security for in Japan. Other business lines include close protection and risk consulting. Eiki explains that part of the appeal is that G4S can more readily recruit staff that speak English than local companies, which many multinationals require. He says: “Less than 5% of the Japanese population speak English, we are not like Hong Kong or Singapore which are international hubs in APAC.” Smallest business within G4S Eiki continues: “Another advantage that G4S has is that we can speak to other countries and ask them to share their experiences, helping us to create a seamless security consultancy for our clients.” Eiki says that flexibility and adaptability are other trademarks: “We are the smallest business within G4S; we are growing the business and want to fulfil our clients’ requests even if it’s difficult or not straightforward.”
VIVOTEK, the global pioneering security solution provider, has played a pivotal role in enhancing campus safety at CDO Newton, a renowned educational institution in Sint-Niklaas, Belgium, that helps guide students in taking their first steps toward the job market. As CDO Newton expanded its facilities, ensuring the security of students, staff, and visitors across a larger, more dynamic campus became increasingly challenging. To address this, CDO Newton turned to VIVOTEK's state-of-the-art AI security solutions to provide a scalable, comprehensive security system that offers maximum coverage, advanced AI capabilities, and improved operational efficiency. Challenges CDO Newton's previous security infrastructure was unable to effectively monitor all areas CDO Newton's previous security infrastructure was unable to effectively monitor all areas of its expanding campus. It lacked full coverage and had blind spots, while system administrators spent long hours manually searching footage. Additionally, the time-consuming manual video review process hindered the quick identification and response to potential incidents. The institution needed a solution that would: old and outdated. Provide comprehensive coverage with minimal blind spots. Enable efficient monitoring and management using AI-driven technology. Be scalable to accommodate future growth and evolving security needs. Reduce the total cost of ownership by minimising the number of cameras required and simplifying maintenance. VIVOTEK, in collaboration with trusted partners Educorner bvba and Optima Networks, provided a powerful solution that addressed these challenges head-on. By combining VIVOTEK’s AI-powered cameras with a user-friendly video management platform, the solution ensured enhanced campus security, and a more efficient overall system. Solutions VIVOTEK’s security technology played a central role in transforming CDO Newton’s security infrastructure. A carefully planned deployment saw the installation of a range of VIVOTEK cameras, complemented by Network Optix Video Management System(VMS) and VIVOTEK's Deep Search Plugin, to provide an integrated and effective solution. Key components of the system included: 12MP 360-Degree Fisheye Cameras: These cameras deliver panoramic coverage, eliminating blind spots and reducing the number of cameras needed. With their wide coverage area, they also minimise installation and maintenance costs, offering a highly cost-effective long-term solution. 5MP 180-Degree Panoramic Cameras: Ideal for areas requiring broad, high-definition coverage, these cameras ensure clear, distortion-free footage across key zones. 89-v2 Fixed Dome Cameras: These cameras were strategically placed to secure high-risk areas, delivering clear, AI-powered analytics that support enhanced object detection and incident management. Network Optix VMS and VIVOTEK Deep Search Plugin: Integrated into the system, these tools significantly enhance usability, enabling security personnel to quickly search and identify objects and individuals within large video datasets using advanced AI-based filters. Key benefits to CDO Newton Comprehensive Coverage with Cost Savings: VIVOTEK’s combination of 360-degree and 180-degree panoramic cameras ensures wide coverage of CDO Newton’s campus, reducing the need for additional cameras. This translates to lower installation and maintenance costs while still providing robust security coverage. AI-Powered Object Detection and Real-Time Alerts: Equipped with VIVOTEK’s Edge AI technology, the system’s advanced object recognition capabilities detect unusual trespassing in restricted areas or unauthorised vehicles parked in no-parking zones. This ensures security staff can investigate and intervene promptly, minimising risks and enhancing overall campus safety. Intuitive Video Management: The integration of VIVOTEK’s Deep Search Plugin with Network Optix VMS provides a user-friendly interface that allows security staff to easily manage and monitor live footage, conduct investigations, and access historical data. This streamlined process reduces the need for extensive training and enhances operational efficiency. Scalability for Future Growth: The modular nature of the system ensures that it can be expanded to meet the future needs of CDO Newton as the campus continues to grow. Additional cameras can be easily added without significant disruption to existing operations, ensuring that the institution’s evolving security requirements are met. Results and customer feedback VIVOTEK, in collaboration with local partners Educorner bvba and Optima Networks, successfully implemented an efficient security solution at CDO Newton. This exciting example demonstrates the integration of innovative technology and expertise to create a secure, scalable, and cost-effective system, providing a safer learning environment for both campus management and students. VIVOTEK continuously offers the most trusted cutting-edge security solutions to its customers and deeply develops various vertical markets in the future, including the educational sector that fosters knowledge.
Jacksons Fencing has successfully completed the installation of an innovative sound reduction barrier and security fencing system for Matthews Haulage at their Essex logistics facility. The project, completed in 2024, was designed to address the haulage company's dual needs for noise control and site security, providing a durable, compliant, and efficient solution. Robust security Matthews Haulage, a long-established player in the transport and logistics sector, sought to minimise noise pollution generated by its 24-hour operations while protecting its valuable assets. With residential areas and commercial properties nearby, the Essex facility required a solution that not only adhered to stringent environmental noise regulations but also provided robust security against unauthorised access and theft. Expertly engineered The barrier was engineered to meet the dual requirements of sound absorption and site security Jacksons Fencing installed a 3.5 metre high, 141.5-metre-long absorptive sound reduction barrier around the perimeter of the warehouse. The barrier was engineered to meet the dual requirements of sound absorption and site security. Using advanced sound-absorptive materials, the barrier effectively dampens high-frequency noise from haulage and loading activities, preventing it from reaching nearby residential and commercial areas. This noise reduction is crucial in maintaining Matthews Haulage’s compliance with local environmental regulations, helping to reduce noise complaints and strengthen relations with the surrounding community. Certified safety Given its proximity to a busy road, Jacksons Fencing ensured that the barrier met UKCA standards; it is certified as a whole system that complies with strict safety and performance standards necessary for the mitigation of road noise. This UKCA marking guarantees the long-term reliability of the barrier under challenging conditions, including traffic-induced vibrations and environmental stressors, reinforcing Matthews Haulage’s commitment to regulatory compliance and operational resilience. Combining noise reduction with security Beyond noise mitigation, the 3.5-metre-high barrier functions as a robust security fence Beyond noise mitigation, the 3.5-metre-high barrier functions as a robust security fence. Its solid construction provides a strong physical deterrent against unauthorised access, effectively preventing trespassing, theft, or vandalism. Additionally, the height and opacity of the barrier afford the facility excellent privacy and concealment, reducing the chance of opportunistic targeting by blocking the visibility of assets such as vehicles and cargo. Unique requirements Peter Jackson, Managing Director of Jacksons Fencing, commented on the project’s success: "The acoustic barrier we installed is a reflection of our commitment to providing bespoke solutions that not only meet regulatory requirements but also enhance the operational performance of our clients." "Our team worked closely with the client to ensure the barrier met their unique requirements, from regulatory compliance to site-specific security needs. It’s a prime example of how tailored solutions can make a real impact on both operational efficiency and community relations."
World Trade Centre (WTC) Amsterdam is home to more than 300 companies. The commitment of its security team to providing a safe working environment in WTC’s fixed and flexible offices goes without saying. However, building managers wanted more from their access solution. More than just an office space, WTC Amsterdam has complementary onsite facilities, including childcare, a gym, physiotherapy clinic, bar/café, dry cleaning service and more. All its facilities must be cleaned and serviced regularly: they sought a more time-efficient way to manage the many contractors and suppliers who come and go every day. Modern digital solution Modern digital solution would provide better oversight of movement around the building They also hoped a modern digital solution would provide better oversight of movement around the building, including usage data to improve maintenance scheduling. For convenience during installation and day-to-day management they targeted a wire-free solution – for simpler, less disruptive switching of 1,000 doors from mechanical locks to digital access – and intuitive management, allowing for easy changing of individual access authorisations, even at the last minute. Digital access system With all these criteria in mind, WTC Amsterdam managers decided on ASSA ABLOY’s smart key digital access system, eCLIQ. They upgraded doors from mechanical to digital access simply by swapping the existing cylinder for an eCLIQ device. Doors are unlocked by battery-powered user smart keys, with a typical battery lifespan of 10 years. “Providing these doors with wired access control would be a huge job and become costly. Instead, we opted for the eCLIQ solution,” explains Sander Borggreve, Facility Manager at WTC Amsterdam. Concrete improvements in operations Scheduling is further simplified by storing keys with a Traka key management system The ROI in terms of workflow benefits has been significant. “Granting temporary controlled access to third parties is very easy with the eCLIQ system. We can set access for a certain period of time, but we can also revoke it at any time,” says Sander. Scheduling is further simplified by storing keys with a Traka key management system. After removing a key from the cabinet, authorised team members enter it into the adjacent eCLIQ Wall Programming Device. In seconds, the key is issued with its fine-grained access rights – covering both door-by-door and time validity. Maintenance and operations With the eCLIQ system, WTC Amsterdam gained not only control but also insights into usage and user flows. This data now informs maintenance and operations, reducing the overall Total Cost of Ownership for the solution. “eCLIQ works very pleasantly in practice. My employees are very satisfied with how the keys work,” says Rutger Barendse of D&B The Facility Group, who provide security staff for WTC Amsterdam. “It is easy as pie!” adds Sander.
New investment of the highest standard. Three buildings, 69 premises in total. The project wants to ensure consistency in the use of smart home devices for controlling lighting, air conditioning, roller blinds, and more. To achieve this, each apartment is equipped with a Gira G1 smart home panel (KNX system). Additionally, the project is looking for an intercom system that can secure the entrances and integrate seamlessly with Gira G1. The solution Oaza Mokotów is a high-end residential complex offering fully secured and seamless access, thanks to the integration of DNAKE’s intercom system and Gira’s smart home features. This integration allows for centralised management of both intercom and smart home controls through a single panel. Residents can use the Gira G1 to communicate with visitors and remotely unlock doors, significantly simplifying operations and enhancing user convenience. Installed products 902D-B6 10.1” Facial Recognition Android Door Station S615 4.3” Facial Recognition Android Door Station 902C-A Master Station
The building, constructed in 2005, consists of three 12-story towers with a total of 309 residential units. Residents have been experiencing issues with noise and unclear sound, which hinder effective communication and lead to frustration. Additionally, there is an increased need for remote unlocking capabilities. The existing 2-wire system, which supports only basic intercom functions, fails to meet the current needs of the residents. Solution highlights Easy Intercom Retrofitting with Existing Cables Tenant’s Own Choice on Answering Units Installed products S615 4.3” Facial Recognition Android Door Station E211 Audio Indoor Monitor 290M-S8 7” Linux Indoor Monitor (2-wire Version) 902C-A Master Station Cloud Solution - Smart Pro Solution benefits For Installer DNAKE 2-wire IP intercom solution leverages existing wiring, which allows for a quicker and more efficient installation process. This solution helps avoid the costs associated with new cabling and extensive rewiring, keeping project costs down and making the retrofit more economically attractive. For Property Manager The Central Management System (CMS) is an on-premises software solution for managing video intercom systems via the LAN, which has greatly improved the efficiency of property managers. Additionally, with the 902C-A master station, property managers can receive security alarms to take immediate action, and remotely unlock doors for visitors. For Residence Residents can choose their preferred answering unit based on their needs. Options include Linux-based or Android-based indoor monitors, audio-only indoor monitors, or even app-based services without a physical indoor monitor. With DNAKE's cloud service, residents can unlock doors from anywhere, at any time.
In Japan nearly two in five office workers work from home a minimum of once a week, particularly if they work in IT or consultancy, according to Nikkei research undertaken in 2023. When a global IT company announced they would be leasing out four floors in their Tokyo office last year, in response to changing working habits following Covid, G4S approached them to be their security provider. They had already been doing access control and meet and greet at the eight-storey building for the last 10 years. New access control systems Eiki Hata, Representative Director of G4S Secure Solutions Japan, says: “The security requirements for a multiple tenancy building are quite different from a single occupancy. You have more people coming and going, companies have different requirements – more sophisticated and robust protocols are needed.” After being awarded the new contract, G4S doubled its headcount onsite and configured new access control systems for each floor; some of the new tenants wanted to keep their existing passes, which G4S was able to accommodate. Health and safety Security officers are also trained in first aid, which includes administering CPR and using a defibrillator Eiki says that 40% of G4S’s remit is health and safety and they will provide support during natural disasters, such as earthquakes or flooding. This includes checking if there is any damage to the building alongside the facilities team and offering assistance to local residents who may take refuge there. They will also hold regular evacuation drills for the whole building. Security officers are also trained in first aid, which includes administering CPR and using a defibrillator. They will also call for an ambulance if required and direct them once onsite. The officers are also responsible for ensuring everyone shows their ID at reception and all guests are booked in, as per the company’s global policy. Customer service skills Eiki explains: “Japan is one of the safest countries in the world: if you leave your wallet somewhere, it’s likely that you’ll get it back without losing any money." "However, that also means that Japan has a very low awareness of risk and our security officers need to be able to explain why these protocols are in place when questioned. When you just have one company in a building it’s easy to enforce operational rules, but with multiple tenants that’s less easy to do - customer service skills are really important.” Flexibility and adaptability The company is one of a number of multinationals spanning sectors that G4S provides security This company is one of a number of multinationals, spanning various sectors, that G4S provides security for in Japan. Other business lines include close protection and risk consulting. Eiki explains that part of the appeal is that G4S can more readily recruit staff that speak English than local companies, which many multinationals require. He says: “Less than 5% of the Japanese population speak English, we are not like Hong Kong or Singapore which are international hubs in APAC.” Smallest business within G4S Eiki continues: “Another advantage that G4S has is that we can speak to other countries and ask them to share their experiences, helping us to create a seamless security consultancy for our clients.” Eiki says that flexibility and adaptability are other trademarks: “We are the smallest business within G4S; we are growing the business and want to fulfil our clients’ requests even if it’s difficult or not straightforward.”
VIVOTEK, the global pioneering security solution provider, has played a pivotal role in enhancing campus safety at CDO Newton, a renowned educational institution in Sint-Niklaas, Belgium, that helps guide students in taking their first steps toward the job market. As CDO Newton expanded its facilities, ensuring the security of students, staff, and visitors across a larger, more dynamic campus became increasingly challenging. To address this, CDO Newton turned to VIVOTEK's state-of-the-art AI security solutions to provide a scalable, comprehensive security system that offers maximum coverage, advanced AI capabilities, and improved operational efficiency. Challenges CDO Newton's previous security infrastructure was unable to effectively monitor all areas CDO Newton's previous security infrastructure was unable to effectively monitor all areas of its expanding campus. It lacked full coverage and had blind spots, while system administrators spent long hours manually searching footage. Additionally, the time-consuming manual video review process hindered the quick identification and response to potential incidents. The institution needed a solution that would: old and outdated. Provide comprehensive coverage with minimal blind spots. Enable efficient monitoring and management using AI-driven technology. Be scalable to accommodate future growth and evolving security needs. Reduce the total cost of ownership by minimising the number of cameras required and simplifying maintenance. VIVOTEK, in collaboration with trusted partners Educorner bvba and Optima Networks, provided a powerful solution that addressed these challenges head-on. By combining VIVOTEK’s AI-powered cameras with a user-friendly video management platform, the solution ensured enhanced campus security, and a more efficient overall system. Solutions VIVOTEK’s security technology played a central role in transforming CDO Newton’s security infrastructure. A carefully planned deployment saw the installation of a range of VIVOTEK cameras, complemented by Network Optix Video Management System(VMS) and VIVOTEK's Deep Search Plugin, to provide an integrated and effective solution. Key components of the system included: 12MP 360-Degree Fisheye Cameras: These cameras deliver panoramic coverage, eliminating blind spots and reducing the number of cameras needed. With their wide coverage area, they also minimise installation and maintenance costs, offering a highly cost-effective long-term solution. 5MP 180-Degree Panoramic Cameras: Ideal for areas requiring broad, high-definition coverage, these cameras ensure clear, distortion-free footage across key zones. 89-v2 Fixed Dome Cameras: These cameras were strategically placed to secure high-risk areas, delivering clear, AI-powered analytics that support enhanced object detection and incident management. Network Optix VMS and VIVOTEK Deep Search Plugin: Integrated into the system, these tools significantly enhance usability, enabling security personnel to quickly search and identify objects and individuals within large video datasets using advanced AI-based filters. Key benefits to CDO Newton Comprehensive Coverage with Cost Savings: VIVOTEK’s combination of 360-degree and 180-degree panoramic cameras ensures wide coverage of CDO Newton’s campus, reducing the need for additional cameras. This translates to lower installation and maintenance costs while still providing robust security coverage. AI-Powered Object Detection and Real-Time Alerts: Equipped with VIVOTEK’s Edge AI technology, the system’s advanced object recognition capabilities detect unusual trespassing in restricted areas or unauthorised vehicles parked in no-parking zones. This ensures security staff can investigate and intervene promptly, minimising risks and enhancing overall campus safety. Intuitive Video Management: The integration of VIVOTEK’s Deep Search Plugin with Network Optix VMS provides a user-friendly interface that allows security staff to easily manage and monitor live footage, conduct investigations, and access historical data. This streamlined process reduces the need for extensive training and enhances operational efficiency. Scalability for Future Growth: The modular nature of the system ensures that it can be expanded to meet the future needs of CDO Newton as the campus continues to grow. Additional cameras can be easily added without significant disruption to existing operations, ensuring that the institution’s evolving security requirements are met. Results and customer feedback VIVOTEK, in collaboration with local partners Educorner bvba and Optima Networks, successfully implemented an efficient security solution at CDO Newton. This exciting example demonstrates the integration of innovative technology and expertise to create a secure, scalable, and cost-effective system, providing a safer learning environment for both campus management and students. VIVOTEK continuously offers the most trusted cutting-edge security solutions to its customers and deeply develops various vertical markets in the future, including the educational sector that fosters knowledge.
Jacksons Fencing has successfully completed the installation of an innovative sound reduction barrier and security fencing system for Matthews Haulage at their Essex logistics facility. The project, completed in 2024, was designed to address the haulage company's dual needs for noise control and site security, providing a durable, compliant, and efficient solution. Robust security Matthews Haulage, a long-established player in the transport and logistics sector, sought to minimise noise pollution generated by its 24-hour operations while protecting its valuable assets. With residential areas and commercial properties nearby, the Essex facility required a solution that not only adhered to stringent environmental noise regulations but also provided robust security against unauthorised access and theft. Expertly engineered The barrier was engineered to meet the dual requirements of sound absorption and site security Jacksons Fencing installed a 3.5 metre high, 141.5-metre-long absorptive sound reduction barrier around the perimeter of the warehouse. The barrier was engineered to meet the dual requirements of sound absorption and site security. Using advanced sound-absorptive materials, the barrier effectively dampens high-frequency noise from haulage and loading activities, preventing it from reaching nearby residential and commercial areas. This noise reduction is crucial in maintaining Matthews Haulage’s compliance with local environmental regulations, helping to reduce noise complaints and strengthen relations with the surrounding community. Certified safety Given its proximity to a busy road, Jacksons Fencing ensured that the barrier met UKCA standards; it is certified as a whole system that complies with strict safety and performance standards necessary for the mitigation of road noise. This UKCA marking guarantees the long-term reliability of the barrier under challenging conditions, including traffic-induced vibrations and environmental stressors, reinforcing Matthews Haulage’s commitment to regulatory compliance and operational resilience. Combining noise reduction with security Beyond noise mitigation, the 3.5-metre-high barrier functions as a robust security fence Beyond noise mitigation, the 3.5-metre-high barrier functions as a robust security fence. Its solid construction provides a strong physical deterrent against unauthorised access, effectively preventing trespassing, theft, or vandalism. Additionally, the height and opacity of the barrier afford the facility excellent privacy and concealment, reducing the chance of opportunistic targeting by blocking the visibility of assets such as vehicles and cargo. Unique requirements Peter Jackson, Managing Director of Jacksons Fencing, commented on the project’s success: "The acoustic barrier we installed is a reflection of our commitment to providing bespoke solutions that not only meet regulatory requirements but also enhance the operational performance of our clients." "Our team worked closely with the client to ensure the barrier met their unique requirements, from regulatory compliance to site-specific security needs. It’s a prime example of how tailored solutions can make a real impact on both operational efficiency and community relations."
World Trade Centre (WTC) Amsterdam is home to more than 300 companies. The commitment of its security team to providing a safe working environment in WTC’s fixed and flexible offices goes without saying. However, building managers wanted more from their access solution. More than just an office space, WTC Amsterdam has complementary onsite facilities, including childcare, a gym, physiotherapy clinic, bar/café, dry cleaning service and more. All its facilities must be cleaned and serviced regularly: they sought a more time-efficient way to manage the many contractors and suppliers who come and go every day. Modern digital solution Modern digital solution would provide better oversight of movement around the building They also hoped a modern digital solution would provide better oversight of movement around the building, including usage data to improve maintenance scheduling. For convenience during installation and day-to-day management they targeted a wire-free solution – for simpler, less disruptive switching of 1,000 doors from mechanical locks to digital access – and intuitive management, allowing for easy changing of individual access authorisations, even at the last minute. Digital access system With all these criteria in mind, WTC Amsterdam managers decided on ASSA ABLOY’s smart key digital access system, eCLIQ. They upgraded doors from mechanical to digital access simply by swapping the existing cylinder for an eCLIQ device. Doors are unlocked by battery-powered user smart keys, with a typical battery lifespan of 10 years. “Providing these doors with wired access control would be a huge job and become costly. Instead, we opted for the eCLIQ solution,” explains Sander Borggreve, Facility Manager at WTC Amsterdam. Concrete improvements in operations Scheduling is further simplified by storing keys with a Traka key management system The ROI in terms of workflow benefits has been significant. “Granting temporary controlled access to third parties is very easy with the eCLIQ system. We can set access for a certain period of time, but we can also revoke it at any time,” says Sander. Scheduling is further simplified by storing keys with a Traka key management system. After removing a key from the cabinet, authorised team members enter it into the adjacent eCLIQ Wall Programming Device. In seconds, the key is issued with its fine-grained access rights – covering both door-by-door and time validity. Maintenance and operations With the eCLIQ system, WTC Amsterdam gained not only control but also insights into usage and user flows. This data now informs maintenance and operations, reducing the overall Total Cost of Ownership for the solution. “eCLIQ works very pleasantly in practice. My employees are very satisfied with how the keys work,” says Rutger Barendse of D&B The Facility Group, who provide security staff for WTC Amsterdam. “It is easy as pie!” adds Sander.


Round table discussion
By all accounts, technology development is moving at a rapid pace in today's markets, including the physical security industry. However, market uptake of the newest technologies may lag, whether because of a lack of clear communication or not enough education of potential customers. We asked this week's Expert Panel Roundtable: How can the industry do a better job of promoting emerging technologies in physical security environments?
The hospitality industry drives economic growth and development by creating jobs, generating revenue, and initiating a ripple effect to improve profitability throughout the supply chain. The hospitality industry includes a vast number of small businesses, including hotels and restaurants. But what are the security challenges of these businesses, and how is the security marketplace serving those needs? We asked this week's Expert Panel Roundtable: How can technology address the security challenges of the hospitality market?
Retaining top talent is a route to bring innovative ideas and creative solutions to a company. Talent drives product development, improves processes, and helps businesses stay ahead of the competition. In essence, retaining top talent is essential for businesses to remain competitive, innovative, and successful. Unfortunately, staffing shortages are a reality for many corporate players in the security industry, as well as throughout the business community. We asked this week's Expert Panelists: How can physical security organisations attract and retain top talent?
White papers

Assessing safety readiness for education campuses
Download
Preparing your organisation with quality situational awareness
Download
Expanding video surveillance in the enterprise market
Download
Safeguard Students With New Techniques And Technology
Download
Cybersecurity in keyless access management
Download
Assessing safety readiness for education campuses
Download
Preparing your organisation with quality situational awareness
Download
Expanding video surveillance in the enterprise market
Download
Safeguard Students With New Techniques And Technology
Download
Cybersecurity in keyless access management
Download
Assessing safety readiness for education campuses
Download


Using artificial intelligence (AI) to automate physical security systems
Download
A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
The truth behind 9 mobile access myths
Download
Access control system planning phase 2
Download