Security Assessments
Integrated Access Control and Security manufacturer TDSi announces the launch of GARDiS Software Version 3. This substantial software update provides a raft of new features and functionality. Along with several new integrations with popular security platforms from providers, all designed to meet the latest and most prominent needs of security operators. GARDiS 3 enhancements GARDiS 3 redefines access control with powerful enhancements and seamless integrations GARDiS 3 introduces a range of...
Skills for Security has continued its collaboration with WorldSkills UK for the 2025 season, announcing the Electronic Security and Fire competitions will be merged into a single category. This strategic move aims to enhance the competition’s impact, broadening the scope for participants to demonstrate expertise in both electronic security and fire safety systems. By integrating these two crucial areas, the competition better mirrors the evolving demands, ensuring future professionals are...
Amthal Group Companies has appointed Richard Parker as its new Group Head of Sales. With over three decades of experience in the fire and security industry, Richard brings a wealth of expertise in sales leadership, business development and strategic growth to the company. Richard joins Amthal from Walker Fire UK Ltd., where he served as Group Sales Manager UK, successfully building and pioneering high-performing sales teams while driving business expansion across multiple sectors. Prior roles...
Threat Evolution, an advanced cybersecurity training and consulting platform, has officially achieved Cyber Essentials certification, reinforcing its commitment to helping businesses strengthen their digital security. Part of the Magenta Security Services family of businesses, which is a pioneer in sustainable security solutions, Threat Evolution provides cutting-edge cybersecurity training and consulting services designed to mitigate cyber risks. Common entry point for cyber threats Threat E...
The International Maritime Cyber Security Organisation (IMCSO), an independent maritime standards organisation, has released its cybersecurity testing methodology for those maritime vessels looking to assess their risk and join the Cyber Risk Registry, a risk register database maintained by the IMCSO. The methodology aims to provide IMCSO-accredited cyber consultants and the senior maritime personnel they will be assessing with standardised testing by outlining test scope and the language...
Video security systems have become a critical asset across industries, with pioneers confident in their systems’ resilience against cyber threats. Research from Hanwha Vision Europe shows that more than nine in 10 security and IT managers in the UK, France, Germany, Spain, and Italy believe their video systems are well-protected. Security practices Overall, confidence is high across different organisation sizes, countries, and sectors. In Italy, confidence reaches 97%, while Spain...
News
Sectigo, a pioneer in digital certificates and automated Certificate Lifecycle Management (CLM), announced the purchase of Entrust’s public certificate business, marking a transformative milestone in the company’s history. This strategic move significantly expands Sectigo’s enterprise business, doubling its footprint and reinforcing its position as a pioneer in delivering trusted digital security solutions. New opportunities for Sectigo The acquisition unlocks new growth options for Sectigo to provide enhanced CLM abilities The acquisition unlocks new growth opportunities for Sectigo to provide enhanced CLM capabilities to a broader customer base while offering a clear path for businesses to prepare for the challenges of shorter certificate lifespans and postquantum cryptography (PQC). "We are excited to welcome Entrust public certificate customers and partners to the Sectigo family. We are committed to providing them with the exceptional support and service that defines our reputation," said Kevin Weiss, chief executive officer at Sectigo. Sectigo’s cloud-native CLM solutions Weiss added: "At Sectigo, we understand that automating certificate management requires focused solutions. That’s why more than 2,700 partners and hundreds of thousands of customers, from SMBs to Fortune 100 global enterprises, trust us to deliver seamless, scalable Certificate Lifecycle Management solutions in today’s rapidly evolving and increasingly complex digital environment." As the internet shifts toward greater automation, shortened certificate lifespans, and quantum cryptography readiness, Sectigo’s cloud-native CLM solutions are uniquely positioned to deliver industry-pioneering value and performance to meet each of those needs. Entrust’s public certificate customers Entrust’s public certificate clients and allies will gain a seamless transition and uninterrupted operations With a proven track record of leadership in public trust and an unwavering commitment to the highest certificate standards—bolstered by a record five chair positions within the CA/Browser Forum—Entrust’s public certificate customers and partners will gain a seamless transition and uninterrupted business operations. Further, Sectigo brings all its customers a decisive edge in quantum preparedness, empowering them to future-proof their businesses against the challenges of tomorrow. Level of service and support “We have had a long history in the public certificate business, so it was important to us to find the right provider for our customers,” said Todd Wilkinson, president and CEO of Entrust. “Sectigo is a trusted industry pioneer with a strong track record of compliance and hundreds of thousands of customers worldwide." "We are working together to make the transition as easy as possible for our customers and are confident that their reputation as a certificate authority and commitment to delivering a high level of service and support will serve our customers well." Benefits of Sectigo’s platform Sectigo is also committed to working closely with partners to ensure seamless continuity of service This acquisition significantly broadens Sectigo’s total addressable market, reinforcing its vision of being the trusted partner for protecting the digital infrastructures of organisations worldwide. As a highly reputable CA with a partner-friendly makeup, Sectigo is also committed to working closely with partners to ensure seamless continuity of service while helping them maximise the capabilities and benefits of Sectigo’s platform. Transformative growth opportunity for Sectigo "Certificate Lifecycle Management is an attractive, rapidly growing segment of the identity market, with enduring growth tailwinds and a forecasted market size of greater than $8 billion by 2029," said Travis Pearson, managing director at GI Partners, a private investment firm and the majority shareholder of Sectigo. "This acquisition presents a transformative growth opportunity for Sectigo, positioning the company for substantial expansion and reinforcing its leadership as one of the world’s most trusted certificate authorities."
Absolute Security, the pioneer in enterprise resilience, announced that the Absolute Resilience Platform has expanded to provide customers with integrated, resilient, and automated patch management, vulnerability scanning and remediation, workflow automation and remote “one-click” endpoint rehydration. Unified with existing Absolute capabilities, this single-platform approach delivers needed security and risk capabilities, reduces the cost of endpoint management, and improves resilience across endpoints and critical security and IT controls to ensure your enterprise remains always on, fully operational, and protected against threats and disruptions. Absolute’s expanded platform "Organisations struggle to respond to costly outages and security failures caused by complex and fragile tools. Resilience data we analysed from millions of PCs shows that almost a third of the time, top security controls and management tools fail to maintain levels of efficacy and compliance needed to defend against attacks and recover from disruptions,” said John Herrema, Chief Product Officer at Absolute Security. “Absolute’s expanded platform offers a simplified, cost-effective, and improved approach to endpoint security and management. Telemetry we look at demonstrates that when underpinned with Absolute resilience, customers’ mission-critical IT and security applications meet compliance and performance standards close to 100 percent of the time.” Gartner's two recent reports Absolute’s expanded forum now leads on both these trends by integrating living and new endpoint security Gartner has pointed out in two recent reports that Security Consolidation and Embedded Resilience are gaining ground as enterprise imperatives: Simplify Cybersecurity With a Platform Consolidation Framework, March 26, 2024; and Leadership Vision for 2025: Security and Risk Management, Jan. 13, 2025. Absolute’s expanded platform now leads on both these trends by integrating existing and new endpoint security, risk, and management solutions on a single, hardware-embedded resilience platform. In addition to existing visibility, control, application resilience, and self-healing, new modules include: Patch: Sophisticated patching and scanning automatically detects devices with OS or software vulnerabilities, eliminating manual IT operations and ensuring end users stay protected and productive. This module supports OS and security patching for Windows, Mac, Linux, and hundreds of leading third-party applications. Remediate: Comprehensive, automated scanning and monitoring for OS and security vulnerabilities, misconfigurations, and authorisation issues finds and remediates exposures before they are exploited. This module includes a library of thousands of prebuilt remediation workflows that can be customised or extended using a simple no-code workflow builder to meet unique enterprise requirements without the need for highly technical and error-prone scripting. Automate: Intuitive, no-code workflow builder defines and automates endpoint and server management and security, identifies behavioural and device status changes in real-time, and executes self-healing workflows to eliminate configuration drift to ensure endpoints and servers stay secure, compliant, and performant. Rehydrate: Within minutes, this remote, one-click innovation can restore remote and hybrid PC fleets to full operational capacity following a ransomware attack or IT incident, even when the device OS and other security and management tools are crashing, compromised, or corrupted. IT and security teams “Managing and securing PC fleets has become increasingly challenging. Juggling disparate, manual technologies places strain on IT and security teams, creates security and compliance blind spots, and introduces complexity that can bring business to a halt,” said Nima Jouyandeh, MIS – Infrastructure and Network, Kingston Technology. “As long-time Syxsense customers, we are excited by the prospect of having access to a more robust consolidated platform. The opportunity to simplify management, gain a full view of our endpoint infrastructure, automate processes, and ensure that we remain secure, compliant, and resilient against attacks, threats, and incidents is definitely compelling.” The new modules are available now in the Resilience, Resilience for Security, and Resilience for Automation editions.
Commvault, a pioneer provider of cyber resilience and data protection solutions for the hybrid cloud, announced a new integration with the CrowdStrike Falcon® cybersecurity platform. The collaboration leverages CrowdStrike’s rich security data and world-class threat intelligence within the Commvault Cloud, delivering layered threat detection and fast data recovery for joint customers. AI-native CrowdStrike Falcon CrowdStrike prevents and detects malicious activity or a suspicious event, officials can view the alert Commvault’s integration with the AI-native CrowdStrike Falcon platform marks a significant step forward in addressing the rapidly evolving cyber threats. By adding another layer of enriched threat insights from the Falcon platform within Commvault Cloud, organisations can gain faster, more comprehensive visibility to streamline incident response, helping customers achieve continuous business, even in the face of sophisticated attacks. When CrowdStrike prevents and detects malicious activity or a suspicious event, administrators can view the alert in Commvault Cloud, run Threat Scan to check for threats, and rapidly restore affected data to a previous, known-good state. Commvault’s commitment The collaboration underscores Commvault’s commitment to proactively addressing the needs of modern enterprises and delivering solutions that enhance both cyber resilience and continuous business. “The average organisation has seen 8 cyber incidents in the last year, 4 of which are considered major. At Commvault, we are committed to empowering businesses with the tools they need to not only safeguard their data but to enhance their overall cyber resilience,” said Alan Atkinson, Chief Partner Officer, Commvault. Key benefits of the integrated solution Atkinson added: “By partnering with CrowdStrike, we are combining our deep expertise in cyber resilience with their advanced threat detection capabilities, empowering our joint customers with faster response times and a stronger cyber resilience posture.” The integrated solution from Commvault and CrowdStrike leverages real-time threat intelligence from the Falcon platform, with Commvault Cloud’s cloud-first cyber resilience capabilities. The key benefits of the integrated solution include: Proactive Threat Detection: CrowdStrike’s Indicators of Compromise (IOCs) and AI-driven insights are designed to help businesses identify threats earlier, enabling faster response time and mitigation. Accelerated Clean Data Recovery: Organisations can rapidly recover clean data by identifying the last known clean version, minimising downtime and maintaining continuity – critical as recent global research shows 62% of respondents say either downtime or data loss associated with attacks has been disruptive. Streamlined Operations: The integration enables seamless collaboration between SecOps and ITOps teams, enhancing response and recovery processes through a unified workflow. Continuous Business: By reducing response times and downtime, the solution helps enterprises maintain critical operations even during sophisticated cyberattacks. This latest collaboration with CrowdStrike builds on Commvault’s growing ecosystem of pioneering security partners. Together with CrowdStrike, Commvault continues to push the boundaries of what’s possible in threat detection, mitigation, and recovery, helping customers maintain business operations in the face of growing cyberattacks.
ASSA ABLOY has acquired InVue, a US-based provider of precision-engineered connected asset protection and access control solutions. The company enables tailor-made security solutions to a broad spectrum of industries and retailers. Access control and asset protection "I am very pleased to welcome the InVue team to ASSA ABLOY. This acquisition delivers on our strategy to grow our business through adding complementary products and solutions to our core business,” says Nico Delvaux, President and CEO of ASSA ABLOY. “InVue is a global technology provider at the forefront of innovative security solutions for protecting assets in the retail business. InVue is an excellent addition to Global Solutions, the acquisition will expand our core capabilities across access control and asset protection globally. I look forward to working with InVue’s successful and experienced team,” says Stephanie Ordan, Executive Vice President and Head of Global Technologies business unit Global Solutions. InVue InVue was founded in 1986 and has some 260 employees. The main office is located in Charlotte, North Carolina, US. Sales for 2024 amounted to about MUSD 165 (approx. MSEK 1,850) with a strong EBIT margin. The acquisition will be accretive to EPS from the start.
IDEMIA India Foundation, the Corporate Social Responsibility (CSR) arm of IDEMIA, a global pioneer in cryptography and biometric technologies, proudly announces its collaboration with Microsoft in India to introduce an in-depth industry-demand technology skills development initiative aimed at empowering underserved youth with globally recognised cloud and AI certifications. In-depth skilling programme IDEMIA India Foundation runs an in-depth skilling programme focused on bridging the digital and economic divide for underprivileged youth, with a special emphasis on women participants, to help them build careers in the latest technology, with more than 50% representation in the programmes. Through this partnership, IDEMIA India Foundation will offer Microsoft Certified courses on Cloud and Artificial Intelligence (AI) to equip participating youth with critical technology skills including training on digital productivity, software development, IT support, cloud computing, data management, data analysis, and artificial intelligence. Domain-specific training initiatives The certifications offer a strategic blend of foundational and advanced courses tailored to specific domains This programme is designed to enhance the employability and earning potential of qualifying more than 500 candidates enrolled in IDEMIA India Foundation’s domain-specific training initiatives in a year. The certification programmes offer a strategic blend of foundational and advanced courses tailored to specific domains, ensuring participants gain industry-relevant expertise. Master Data Management For Master Data Management, the courses include Microsoft Office 365 and Microsoft Azure AI Fundamentals, equipping learners with essential tools for efficient data handling. The IT Help Desk track focuses on system administration and cloud-based solutions, addressing critical IT support needs. For those in Data Analysis, the programme provides Associate Analyst certification and Data Analysis Fundamentals to build analytical proficiency. Each course integrates theoretical learning with practical, hands-on training, preparing candidates to excel in the workforce. Sustainable socio-economic development "This partnership with Microsoft reflects our shared vision of fostering secure and sustainable socio-economic development by addressing critical workforce challenges through technology and innovation," said Matthew Foxton, Regional President of IDEMIA India. "By providing these globally recognised certifications, we aim to equip participants with in-demand skills, enhancing their employability and unlocking better career opportunities." Transformative initiative "Moreover, this initiative encourages a culture of lifelong learning, empowering individuals to adapt and thrive in an ever-evolving industry landscape." "We extend our heartfelt thanks to Microsoft for their shared vision and partnership in making this transformative initiative possible. Strategic corporate partnerships like this are key to accelerating positive social impact." ADVANTA(I)GE India 2030 "At Microsoft, we believe in the power of technology to transform lives and bridge societal divides. This partnership with IDEMIA India Foundation underscores our commitment under ADVANTA(I)GE India 2030 to equip the next generation with industry-demand skills including AI skills to succeed in the AI-enabled economy," said Manju Dhasmana, India's Senior Director, Corporate Social Responsibility. "By combining Microsoft’s expertise in the latest technology certifications with IDEMIA’s commitment to inclusive development, we aim to create opportunities that empower underprivileged youth to achieve their full potential." Training and certification It begins with a pre-assessment to evaluate candidates and place them in suitable courses The programme follows a structured execution strategy to ensure effective training and certification. It begins with a pre-assessment to evaluate candidates and place them in suitable courses. The curriculum integrates domain-specific training with Microsoft certifications, delivered by expert, certified trainers. Final assessments Upon completion, participants undergo final assessments to earn official Microsoft certifications, validating their skills and readiness for the workforce. IDEMIA India Foundation has allocated funds to cover training costs, while the curriculum and certification will be provided by Microsoft, ensuring a high return on investment through enhanced employability and professional growth.
Award-winning global security manufacturer, Gallagher Security, announces the appointment of Kusania Cairns as Business Development Manager, bolstering its commitment to building strong customer relationships and delivering exceptional value to Channel Partners. Kusania Cairns Kusania joins Gallagher with over 20 years of experience in sales and IT, including a proven track record in leadership roles and account management. Her career spans positions at leading resellers and distributors, where she gained deep expertise in managing customer relationships and channel strategies. Most recently, Kusania served as National Partner Manager at Westcon-Comstor, where she led a team of account managers across New Zealand, driving strategic partnerships and key account growth. Maximising security “I’m thrilled to join Gallagher and focus on strengthening our relationships with Channel Partners and End Users in the South Island,” Kusania says. “This role allows me to specialise in Gallagher’s world-class solutions and help customers uncover new ways to maximise the value of their security systems.” Work experience Her passion for fostering trust and enabling partner success aligns seamlessly with Gallagher’s vision Kusania’s extensive IT background equips her to navigate the evolving landscape of cybersecurity and cloud-based solutions, an area where IT expertise is increasingly critical to effective decision-making in security. Her passion for fostering trust and enabling partner success aligns seamlessly with Gallagher’s vision. Delivering exceptional results “What excites me most is working closely with Channel Partners to understand their unique needs and helping them grow their businesses,” Kusania explains. “Gallagher’s innovative solutions, from access control to software licensing, offer immense opportunities to create stickier, more valuable customer relationships. I’m eager to champion these products and ensure our partners can deliver exceptional results to their customers.” Customer-centric philosophy Brad Small, Regional Manager for New Zealand Sales, emphasises the significance of Kusania’s appointment, “The strength and success of our team lies in our collective ability to form trusted, long-term relationships with our partners and End Users." "Kaz puts people first and shares our customer-centric philosophy, making her a natural fit for our team and I can’t wait to count her successes as she settles into her role.” Tailored solutions Kusania’s appointment reflects Gallagher’s dedication to empowering its partners and customers by delivering tailored solutions and unlocking the full potential of security systems. Her customer-first philosophy and wealth of experience make her a valuable addition to Gallagher’s South Island team. Kusania joined Gallagher Security on 13 January 2025 and is based in Christchurch.


Expert commentary
Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many factors – including building size, shape, type, location, national regulations and more – impact affordability and efficiency calculations. Crucially, the type of access solution a business selects – wired or wireless – impacts total operating costs, including during installation, running and any potential expansion or reconfiguration stages. Wireless installation Wiring premises can be expensive. So, the potential cost savings from choosing wireless digital access begin at the very start. Installation stage is the largest contributor to potential cost savings when businesses go wireless. In calculations for one report, access experts at ASSA ABLOY examined projected costs for a fictional 100-door installation. Labour savings for those who chose wireless over wired locks were 82.5%. Why? Firstly, because wireless installation is much faster. It is also less intrusive. Most wireless locking devices require little or no drilling of the door, whereas wired security needs cabling through and partly around a door – which means not just door damage, but the contracting of specialist electrical installers who may require multiple site visits. These costs add up. Digital access technology Torus aims for the highest level of LEED certification for all its new properties In Poland, for example, developer Torus aims for the highest level of LEED certification for all their new properties around Gdansk. Where possible, they choose products with Environmental Product Declarations (EPDs) and Green Circle documentation, favouring access solutions which reduce their carbon footprint. Wireless digital access technology is a natural choice. “The lack of wiring significantly reduces materials use, reduces costs, and ensures quick installation,” confirms Torus’ Roman Sokolowski. There’s no cabling, which cuts power consumption. There’s less damage to the building fabric and fitters make fewer journeys to and from the site. Adaptable locking solution By choosing a wireless solution, organisations also upgrade building security with little disruption. A wireless system makes it easier to improve security at an existing building via a retrofit process which does not inconvenience staff or disturb work routines. This was one goal at Plexal, a £15 million flexible work environment for London enterprise and academia. Plexal chose battery powered wireless locks integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install ASSA ABLOY Aperio® devices with minimal disruption,” confirms Stewart Johnson, Director at NetNodes. Cost savings with improved energy efficiency Choosing wireless over wired locking can play a vital role in reducing ongoing energy use Choosing wireless over wired locking can play an important role in reducing ongoing energy use – and, therefore, expenditure. Wholesale electricity prices in Europe are approximately double what they were in 2019, according to the IEA’s “Electricity 2024” report. For a variable cost such as energy, where businesses have little control over unit prices, it is critical to control usage, especially if high and/or changeable energy prices become what analysts at ING called “the new normal for business”. Thus, the fact that battery-powered locks consume much less energy than traditional wired solutions is increasingly relevant and important. Additional saving on energy costs Traditional wired door access devices often work via magnets connected permanently to mains electricity. These doors draw power around the clock to remain locked. Wireless locks work differently. They only “wake up” when presented with a credential, to make the access decision. This translates to an additional saving on energy costs during operation: more than 70%, or thousands of euros over a typical access system’s lifetime. Wireless digital access Wireless locks only need a change of their standard battery, which may be rechargeable Related energy and materials costs during in-use stage are also lower. Wireless locks only need a change of their standard battery – which may be rechargeable – typically once every two years. No specialist maintenance is required, saving on specialists and their travel to and from the site(s). By choosing wireless digital access, businesses help protect themselves against these ongoing costs, notably energy price increases and volatility. Cost-efficient flexible working, for staff and facilities managers Perhaps harder to quantify, but equally easy to imagine, the financial benefits of choosing a wireless digital solution are felt in the increased convenience and efficiency of daily operations. In the co-working sector, for example, flexible access to offices is a priority. As “fixed” office space rented by corporations continues to fall, co-working spaces are expected to keep growing, with one estimate suggesting almost 18% CAGR to 2030. To stand out from the competition, the founders of ULab in Alicante sought the latest innovations in access and design to create their 21st-century business centre. Part of the suite of digital access solutions from ASSA ABLOY, a SMARTair® system gave ULab real-time access management via battery-powered locks and Openowä, the Mobile Key solution for SMARTair, without any need to wire doors and other openings. SMARTair TS1000 Web interface With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone; ULab’s security team update their rights over the air. An office manager can perform any operation remotely from the SMARTair TS1000 Web interface. In case of an emergency, they could lock-down the site or open doors remotely, for example. It’s convenient, efficient and boosts ULab’s security, benefiting users and managers. And because of SMARTair’s flexibility, they can comfortably welcome many more than their usual 100 daily users. “In addition to regular daily traffic, weekly traffic can almost multiply by 10 if an event is held,” says Enrique Burgos Pérez, Director at ULab. “We needed an access control system as flexible and convenient as SMARTair.” ASSA ABLOY benchmarking report Choosing wireless locks also adds flexibility – and can reduce costs – when an organisation reconfigures or expands their commercial space. High-quality wireless devices like SMARTair can typically be reinstalled at another opening without impacting reliability. They move to wherever is convenient. If a business is rethinking workspace to encourage flexible or hybrid work patterns, for example, cost efficiencies could be significant. Typical savings on office relocation or expansion are estimated at around 30% with wireless over wired locking, according to the same ASSA ABLOY benchmarking report. Cost efficiency and more control with ASSA ABLOY digital access To refit and improve their student accommodation, managers at the University of St Andrews sought energy- and cost-efficient access control. They chose Aperio, another innovative digital access solution from ASSA ABLOY. Approximately 1,600 doors so far are equipped with battery-powered Aperio escutcheons – without cabling. Aperio devices integrate fully with both the university’s existing central security system and their student ID card. University security managers continue to enjoy the efficiency benefits of monitoring and controlling access from a single point and in real-time, including for doors across multiple buildings. Aperio, another innovative digital access solution from ASSA ABLOY. Benefits of cost-efficiency In comparison to a wired solution, Aperio offers significant cost-efficiency benefits. Devices are wireless, so can be installed with little energy use and no need for wiring to the mains. They consume near-zero energy when idle and run on standard batteries, consuming little power during operation. Through the entire product life-cycle, Aperio combines reliability with cost effectiveness. “Aperio gives us central management and control,” says Pauline Brown, Associate Chief Information Officer at the University of St Andrews, “and contributes to our award-winning track record in energy efficiency.”
As the backbone of community welfare, healthcare facilities cater to crucial public needs from emergency care to specialised medical treatments, and due to its position as a significant facet of the world's critical infrastructure, the healthcare sector faces a multitude of challenges in ensuring patient and visitor security, managing high traffic, and safeguarding sensitive data. Medical sites, such as large hospitals and urgent care clinics, see a wide variety of patients, medical staff, administrative teams, and visitors throughout the day. In addition to protecting patients, visitors, and staff, healthcare environments must protect medical and patient data, ensure immediate response to urgent medical events, and maintain 24/7 operations. Security challenges Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability Addressing the security challenges presented by 24/7 availability and high patient and visitor traffic calls for a merging of technology, processes, and security strategies that go beyond what a typical security infrastructure would look like. Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability, accessibility, and integration capabilities. These advancements address the multifaceted demands of healthcare organisations, ensuring seamless around-the-clock operations while prioritising patient care and safety. Enhancing operational efficiency to save lives Cloud-based access control solutions have revolutionised how healthcare security professionals approach collaboration within medical facilities. These solutions offer unparalleled accessibility and insight into patient and visitor security information and access logs, improving coordination among security teams and leading to more accurate monitoring and response to developing medical events. By managing and operating access control solutions via the cloud, healthcare facilities can implement effective physical security measures while ensuring seamless collaboration among staff to deliver the highest medical care possible to patients across facilities. Physical access controls Cloud-based access control systems allow users to securely access and manage physical access controls Cloud-based access control systems allow multiple users to securely access and manage physical access controls and visitor management data simultaneously, enabling them to keep track of patient movements as they are transferred throughout the facility or between different facilities. For larger hospitals or medical campuses with multiple facilities hosting access controls via the cloud empowers users with the ability to find patients and patient data in an instant, as well as opening the door to collaborate with teams separated by long distances, ensuring all team members have access to the information they need to continue saving lives. Scaling the way to top-notch care Healthcare institutions are constantly growing and changing in response to evolving industry regulations and standards, and the access control solutions these organisations rely on should be able to scale to meet their changing needs. To ensure their access control systems can keep up with these growing demands, healthcare security professionals can invest in access control solutions hosted in the cloud to avoid the tedious hardware constraints that come with traditional on-premises solutions. Cloud solutions offer significant levels of scalability, enabling healthcare organisations to adjust their storage requirements and computing resources based on changing requirements on the fly. This capability for flexibility ensures users can manage large amounts of data without significant upfront investments in hardware. Cloud-based access control solutions Cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access In addition to compliance with changing regulations, cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access control platform across a growing campus or multiple buildings. Larger healthcare facilities typically consist of multiple sites of varying sizes across diverse landscapes, each with distinctive security needs. Systems hosted in the cloud provide scalability and flexibility for user organisations, allowing security teams to modify or expand upon their security infrastructure as needed without spending on costly new hardware. This adaptability is crucial for helping address varying risks over multiple sites, providing security personnel the flexibility they need to ensure patient safety over long distances. Ease of use for security teams To truly understand the value of a cloud-based access control system, healthcare security professionals must consider the long-term savings and ROI these solutions provide by bolstering operational efficiencies and enabling unprecedented scalability. These systems ensure compliance with changing standards and deliver a simplified user experience across platforms, prioritising security and ease of use for security teams across the healthcare sector.
For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common K12 security pain points There’s no one-size-fits-all solution in school district security. School districts may have big plans to implement upgraded security systems but to set out on the right foot, pioneers must have a clear vision of their long-term strategy. When embarking on their security journey, education pioneers often wonder where to start and what exact steps are they need to be taking to identify and address weaknesses. Local K12 and government pioneers are promoting and mandating security assessments to uncover safety gaps on campuses and mitigate these risks with advanced technology solutions. Not only do assessments provide detailed, customisable roadmaps for district pioneers, but they also recommend technologies and funding opportunities to help close threat gaps. K12 school districts are mainly vulnerable to cyber-attacks due to the sensitive nature of student records In today’s climate, schools face a growing number of physical and digital security threats. From a cybersecurity standpoint, K12 school districts are particularly vulnerable to cyber-attacks due to the sensitive nature of student records. However, only one-third of these districts have adequate staffing to address threats effectively. In addition, according to a recent survey from Johnson Controls and Forrester Consulting, security decision-makers are having trouble receiving actionable insights. Nearly two-thirds of respondents said that they struggle to receive information from all necessary systems regarding their security threats. To gain more clarity into what school districts need in terms of security tools and threat mitigation, implementing system-wide monitoring and optimisation can be invaluable. This approach enhances equipment and operational efficiency, while providing necessary resources and expertise for critical patch updates across all systems, strengthening their overall security posture. Achieving a well-rounded security program In the past few years, AI technology has emerged as a trending solution and is generating considerable attention. While the allure of implementing cutting-edge technologies is undeniable, it’s important to recognise that a robust security program hinges on solid access control. Access control technology provides administrators with the means to oversee and regulate entry into facilities, serving as the foundation for basic physical security. The technology helps administrators and staff control access to multiple areas from web-enabled devices, even during lockdowns which is crucial in emergency situations. School district pioneers should utilise available digital risk assessment tools to uncover threat areas Once basic security controls are in place, school districts must address their next set of security pain points and identify which solutions meet their specific needs. This involves identifying and prioritising the highest need and most cost-effective investments that will have the greatest impact on enhancing security measures. To accurately determine which security solutions are needed for a specific environment, school district pioneers should utilise available digital risk assessment tools to uncover threat areas and determine levels of priority. By focusing on these priority areas, districts can allocate their resources and efforts where they are needed most, ensuring maximum effectiveness in mitigating risks and vulnerabilities. Securing funding before approaching deadlines A major challenge for school districts surrounding campus security is identifying and securing the necessary funding to implement solutions aligned with their goals. Leveraging available funding sources is critical, especially considering certain programs are approaching their deadline, like the Elementary and Secondary School Emergency Relief (ESSER) fund. Announced during the pandemic, ESSER is a funding program that has allocated nearly $190 billion in aid to U.S. public school districts to fund projects benefitting the well-being of occupants. Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024 Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024, when schools must attribute all of their funds to assigned contracts. Following this date, pioneers will need to complete all ESSER spending by January 2025 unless approved for an extension into March 2025. As ESSER wanes, school districts are acutely aware of the fiscal cliff in budgets through 2025. However, many states are ramping up grant funding to close the deficit gap. Administrators should become familiar with these grant opportunities at a local and state level. Get started on security plans The time for school district pioneers to act is now. While the safety and well-being of students and staff are always top priorities, it’s crucial to acknowledge that a lack of insight into necessary security upgrades and available funding options will leave districts behind the curve. Seizing the final months of ESSER funding presents an ideal window to address security pain points and build a safer future for K12 facilities. Looking beyond ESSER, pioneers must proactively seek out and leverage other funding avenues to help ensure the continuity of their security efforts and maintain a proactive stance in safeguarding healthy and safe educational environments.
Security beat
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
Collaboration among manufacturers in the physical security industry can result in systems that are easier to install for integrators and that provide a better customer experience for end users. Illustrating the point is the recent collaboration among a turnstile technology company, a supplier of short-range wireless readers/writers, and a biometric business focused on ‘frictionless’ access control. “The more manufacturers collaborate with each other, the more benefits for end users,” says Steve Caroselli, the Chief Executive Officer (CEO) of Orion Entrance Control. Better collaboration means a better user experience We look for opportunities to collaborate and make sure the experience is above and beyond" Steve Caroselli adds, “Better collaboration means a better user experience. We look for opportunities to collaborate and make sure the experience is above and beyond.” Orion’s collaboration with ELATEC RFID Systems and SAFR touchless biometrics by RealNetworks Inc. highlights the advantages of manufacturers working together to ensure technologies operate smoothly in the real world. Taking ownership of the customer experience When Orion Entrance Control provides a SpeedGate swing-glass optical turnstile, they take full ownership of the customer’s experience. That means ensuring the turnstile application operates as it should, regardless of which component of the broader system might be at fault. To the customer experience, a card reader that doesn’t work is the equivalent of a turnstile that doesn’t work. Which component is at fault is irrelevant, and in fact, invisible, to the overall customer experience. Importance of dependable operation of turnstiles As the most visible element in many access control systems, dependable operation of turnstiles reflects positively on the manufacturer and on the entire system. Orion tests various third-party components with their turnstiles To ensure an optimum customer experience, Orion tests various third-party components with their turnstiles, in order to ensure flawless operation before a turnstile is delivered to a customer. Customers buying an Orion turnstile send the card readers they want to use to Orion’s corporate headquarters in Laconia, New Hampshire, USA, where Orion engineers ensure seamless operation. Ensuring optimum customer experience All readers are designed to be bolted to the wall rather than installed inside a turnstile In addition to scenario-based testing, readers are placed inside the turnstile for a streamline appearance, which can be a challenge given the variety of sizes and types of readers a customer might choose. All readers are designed to be bolted to the wall rather than installed inside a turnstile, which complicates adaptation efforts. In short, historically for Orion, ensuring the optimum customer experience involved extra time and effort, although obviously it was worth it. Providing flexibility for any environment Seeking to simplify the process, Orion has found an alternative to using many different types and models of card readers for its turnstiles. Deploying an RFID reader/writer from ELATEC provides flexibility to operate in a variety of card and reader environments, including almost all 125 kHz and 13.56 MHz contactless technologies. The product is compatible with low-frequency (LF), high-frequency (HF), near field communication (NFC) or Bluetooth Low Energy (BLE) signals. An integrated BLE module supports mobile ID and authentication solutions. There is an integrated antenna for LF and HF to ensure excellent contactless performance. ‘Universal’ configuration of the ELATEC reader hardware Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is compatible with any card system. It works with all the access control protocols, including SEOS, OSDP and other open protocols. “We can stock an open SKU and flash the firmware as per the customer requirement,” says Steve Caroselli. The small form factor (around 1 1/2 inches square) of the ELATEC module lends itself to easy installation inside the turnstile housing. Easy availability of the ELATEC readers helps Orion continue to serve customers, despite recent disruptions in the supply chain. And, ELATEC’s reader hardware has earned global certifications that enable Orion to use their products for customers around the world. Testing to ensure smooth operation ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing Before embracing the ELATEC reader module, Orion tested it for several months to ensure compatibility with its turnstiles. ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing and working closely with the Orion team. Everyone in the ELATEC sales and engineering team, right up the company’s C-suite, worked to support Orion during the testing phase. In the end, in addition to other advantages, ELATEC’s detection speed and read range compares favorably to competing technologies. “We move really fast as an organisation, so we are looking for other organisations that move very fast,” says Steve Caroselli, adding “We met with ELATEC one week and had the equipment for testing the next week. We like to work with companies that move fast, and they are culturally aligned with how we do business.” Orion turnstiles with ELATEC TWN4 Palon Compact panel The Orion turnstiles incorporate an ELATEC TWN4 Palon Compact panel, a versatile panel-mount reader designed for integration into third-party products and devices. It supports enhanced interfaces, especially RS-485, and reflects the advantages and integrated tool support of the ELATEC TWN4 family. Orion is implementing SAFR SCAN biometric technology using hardware and software from RealNetworks Inc. “The selection of ELATEC products allows Orion to provide their customers and partners with a flexible RFID reader solution that supports numerous credential options and virtually all transponder technologies,” said Paul Massey, the Chief Executive Officer (CEO) of ELATEC, Inc., adding “This is especially valuable in multi-tenet, multi-credential environments.” Orion works with all the various stakeholders – architects, consultants, integrators, and end users – to ensure total satisfaction with an installation. Biometric technology for ‘frictionless’ access control Orion is also implementing SAFR SCAN biometric technology into their turnstiles using hardware and software from RealNetworks Inc. The facial recognition reader technology, designed for mainstream commercial access control, provides a ‘frictionless’ experience, and allows users to pass through turnstiles at a walk. The system can authenticate up to 30 individuals per minute with 99.9% accuracy, despite varied lighting conditions. SAFR’s system provides a good user experience Orion designed a mounting system to incorporate the biometric reader into their turnstile design Orion designed a mounting system to incorporate the biometric reader into their turnstile design. SAFR’s system provides a good user experience, when it comes to enrollment. On each turnstile, the SAFR technology can operate separate from the ELATEC reader or in conjunction with it for multi-factor authentication in higher-security applications. Innovation for new applications A broad approach to the customer experience reflects Orion’s positioning as a technology company, in addition to being a manufacturer of turnstiles. Their Infinity software is the ecosystem ‘nerve centre’ platform to ensure operation and connected through a single ‘pane of glass.’ The need to protect more entrances beyond the lobby led Orion to develop its recently patented DoorGuard, a LIDAR-based solution that detects each person who passes through a doorway and prevents tailgating (like a turnstile) for applications, such as stairway doors, perimeter doors, data centres, IDF closets, etc. The software mimics the advantages of a turnstile to monitor access control and occupancy. Removing friction during installation and beyond Orion’s Constellation is a presence detection system that uses UWB (ultra-wideband) radar to sense where people are in a building for emergency response and building utilisation applications. “One of our core values is to remove friction and make customers’ lives easier,” says Steve Caroselli, adding “Our people-first philosophy is: What can we do to make your life better? We want to be systematic, and everything must be repeatable in terms of how we react and interact with customers.”
Case studies
VIVOTEK, the global pioneering security solution provider, has played a pivotal role in enhancing campus safety at CDO Newton, a renowned educational institution in Sint-Niklaas, Belgium, that helps guide students in taking their first steps toward the job market. As CDO Newton expanded its facilities, ensuring the security of students, staff, and visitors across a larger, more dynamic campus became increasingly challenging. To address this, CDO Newton turned to VIVOTEK's state-of-the-art AI security solutions to provide a scalable, comprehensive security system that offers maximum coverage, advanced AI capabilities, and improved operational efficiency. Challenges CDO Newton's previous security infrastructure was unable to effectively monitor all areas CDO Newton's previous security infrastructure was unable to effectively monitor all areas of its expanding campus. It lacked full coverage and had blind spots, while system administrators spent long hours manually searching footage. Additionally, the time-consuming manual video review process hindered the quick identification and response to potential incidents. The institution needed a solution that would: old and outdated. Provide comprehensive coverage with minimal blind spots. Enable efficient monitoring and management using AI-driven technology. Be scalable to accommodate future growth and evolving security needs. Reduce the total cost of ownership by minimising the number of cameras required and simplifying maintenance. VIVOTEK, in collaboration with trusted partners Educorner bvba and Optima Networks, provided a powerful solution that addressed these challenges head-on. By combining VIVOTEK’s AI-powered cameras with a user-friendly video management platform, the solution ensured enhanced campus security, and a more efficient overall system. Solutions VIVOTEK’s security technology played a central role in transforming CDO Newton’s security infrastructure. A carefully planned deployment saw the installation of a range of VIVOTEK cameras, complemented by Network Optix Video Management System(VMS) and VIVOTEK's Deep Search Plugin, to provide an integrated and effective solution. Key components of the system included: 12MP 360-Degree Fisheye Cameras: These cameras deliver panoramic coverage, eliminating blind spots and reducing the number of cameras needed. With their wide coverage area, they also minimise installation and maintenance costs, offering a highly cost-effective long-term solution. 5MP 180-Degree Panoramic Cameras: Ideal for areas requiring broad, high-definition coverage, these cameras ensure clear, distortion-free footage across key zones. 89-v2 Fixed Dome Cameras: These cameras were strategically placed to secure high-risk areas, delivering clear, AI-powered analytics that support enhanced object detection and incident management. Network Optix VMS and VIVOTEK Deep Search Plugin: Integrated into the system, these tools significantly enhance usability, enabling security personnel to quickly search and identify objects and individuals within large video datasets using advanced AI-based filters. Key benefits to CDO Newton Comprehensive Coverage with Cost Savings: VIVOTEK’s combination of 360-degree and 180-degree panoramic cameras ensures wide coverage of CDO Newton’s campus, reducing the need for additional cameras. This translates to lower installation and maintenance costs while still providing robust security coverage. AI-Powered Object Detection and Real-Time Alerts: Equipped with VIVOTEK’s Edge AI technology, the system’s advanced object recognition capabilities detect unusual trespassing in restricted areas or unauthorised vehicles parked in no-parking zones. This ensures security staff can investigate and intervene promptly, minimising risks and enhancing overall campus safety. Intuitive Video Management: The integration of VIVOTEK’s Deep Search Plugin with Network Optix VMS provides a user-friendly interface that allows security staff to easily manage and monitor live footage, conduct investigations, and access historical data. This streamlined process reduces the need for extensive training and enhances operational efficiency. Scalability for Future Growth: The modular nature of the system ensures that it can be expanded to meet the future needs of CDO Newton as the campus continues to grow. Additional cameras can be easily added without significant disruption to existing operations, ensuring that the institution’s evolving security requirements are met. Results and customer feedback VIVOTEK, in collaboration with local partners Educorner bvba and Optima Networks, successfully implemented an efficient security solution at CDO Newton. This exciting example demonstrates the integration of innovative technology and expertise to create a secure, scalable, and cost-effective system, providing a safer learning environment for both campus management and students. VIVOTEK continuously offers the most trusted cutting-edge security solutions to its customers and deeply develops various vertical markets in the future, including the educational sector that fosters knowledge.
Jacksons Fencing has successfully completed the installation of an innovative sound reduction barrier and security fencing system for Matthews Haulage at their Essex logistics facility. The project, completed in 2024, was designed to address the haulage company's dual needs for noise control and site security, providing a durable, compliant, and efficient solution. Robust security Matthews Haulage, a long-established player in the transport and logistics sector, sought to minimise noise pollution generated by its 24-hour operations while protecting its valuable assets. With residential areas and commercial properties nearby, the Essex facility required a solution that not only adhered to stringent environmental noise regulations but also provided robust security against unauthorised access and theft. Expertly engineered The barrier was engineered to meet the dual requirements of sound absorption and site security Jacksons Fencing installed a 3.5 metre high, 141.5-metre-long absorptive sound reduction barrier around the perimeter of the warehouse. The barrier was engineered to meet the dual requirements of sound absorption and site security. Using advanced sound-absorptive materials, the barrier effectively dampens high-frequency noise from haulage and loading activities, preventing it from reaching nearby residential and commercial areas. This noise reduction is crucial in maintaining Matthews Haulage’s compliance with local environmental regulations, helping to reduce noise complaints and strengthen relations with the surrounding community. Certified safety Given its proximity to a busy road, Jacksons Fencing ensured that the barrier met UKCA standards; it is certified as a whole system that complies with strict safety and performance standards necessary for the mitigation of road noise. This UKCA marking guarantees the long-term reliability of the barrier under challenging conditions, including traffic-induced vibrations and environmental stressors, reinforcing Matthews Haulage’s commitment to regulatory compliance and operational resilience. Combining noise reduction with security Beyond noise mitigation, the 3.5-metre-high barrier functions as a robust security fence Beyond noise mitigation, the 3.5-metre-high barrier functions as a robust security fence. Its solid construction provides a strong physical deterrent against unauthorised access, effectively preventing trespassing, theft, or vandalism. Additionally, the height and opacity of the barrier afford the facility excellent privacy and concealment, reducing the chance of opportunistic targeting by blocking the visibility of assets such as vehicles and cargo. Unique requirements Peter Jackson, Managing Director of Jacksons Fencing, commented on the project’s success: "The acoustic barrier we installed is a reflection of our commitment to providing bespoke solutions that not only meet regulatory requirements but also enhance the operational performance of our clients." "Our team worked closely with the client to ensure the barrier met their unique requirements, from regulatory compliance to site-specific security needs. It’s a prime example of how tailored solutions can make a real impact on both operational efficiency and community relations."
World Trade Centre (WTC) Amsterdam is home to more than 300 companies. The commitment of its security team to providing a safe working environment in WTC’s fixed and flexible offices goes without saying. However, building managers wanted more from their access solution. More than just an office space, WTC Amsterdam has complementary onsite facilities, including childcare, a gym, physiotherapy clinic, bar/café, dry cleaning service and more. All its facilities must be cleaned and serviced regularly: they sought a more time-efficient way to manage the many contractors and suppliers who come and go every day. Modern digital solution Modern digital solution would provide better oversight of movement around the building They also hoped a modern digital solution would provide better oversight of movement around the building, including usage data to improve maintenance scheduling. For convenience during installation and day-to-day management they targeted a wire-free solution – for simpler, less disruptive switching of 1,000 doors from mechanical locks to digital access – and intuitive management, allowing for easy changing of individual access authorisations, even at the last minute. Digital access system With all these criteria in mind, WTC Amsterdam managers decided on ASSA ABLOY’s smart key digital access system, eCLIQ. They upgraded doors from mechanical to digital access simply by swapping the existing cylinder for an eCLIQ device. Doors are unlocked by battery-powered user smart keys, with a typical battery lifespan of 10 years. “Providing these doors with wired access control would be a huge job and become costly. Instead, we opted for the eCLIQ solution,” explains Sander Borggreve, Facility Manager at WTC Amsterdam. Concrete improvements in operations Scheduling is further simplified by storing keys with a Traka key management system The ROI in terms of workflow benefits has been significant. “Granting temporary controlled access to third parties is very easy with the eCLIQ system. We can set access for a certain period of time, but we can also revoke it at any time,” says Sander. Scheduling is further simplified by storing keys with a Traka key management system. After removing a key from the cabinet, authorised team members enter it into the adjacent eCLIQ Wall Programming Device. In seconds, the key is issued with its fine-grained access rights – covering both door-by-door and time validity. Maintenance and operations With the eCLIQ system, WTC Amsterdam gained not only control but also insights into usage and user flows. This data now informs maintenance and operations, reducing the overall Total Cost of Ownership for the solution. “eCLIQ works very pleasantly in practice. My employees are very satisfied with how the keys work,” says Rutger Barendse of D&B The Facility Group, who provide security staff for WTC Amsterdam. “It is easy as pie!” adds Sander.
New investment of the highest standard. Three buildings, 69 premises in total. The project wants to ensure consistency in the use of smart home devices for controlling lighting, air conditioning, roller blinds, and more. To achieve this, each apartment is equipped with a Gira G1 smart home panel (KNX system). Additionally, the project is looking for an intercom system that can secure the entrances and integrate seamlessly with Gira G1. The solution Oaza Mokotów is a high-end residential complex offering fully secured and seamless access, thanks to the integration of DNAKE’s intercom system and Gira’s smart home features. This integration allows for centralised management of both intercom and smart home controls through a single panel. Residents can use the Gira G1 to communicate with visitors and remotely unlock doors, significantly simplifying operations and enhancing user convenience. Installed products 902D-B6 10.1” Facial Recognition Android Door Station S615 4.3” Facial Recognition Android Door Station 902C-A Master Station
The building, constructed in 2005, consists of three 12-story towers with a total of 309 residential units. Residents have been experiencing issues with noise and unclear sound, which hinder effective communication and lead to frustration. Additionally, there is an increased need for remote unlocking capabilities. The existing 2-wire system, which supports only basic intercom functions, fails to meet the current needs of the residents. Solution highlights Easy Intercom Retrofitting with Existing Cables Tenant’s Own Choice on Answering Units Installed products S615 4.3” Facial Recognition Android Door Station E211 Audio Indoor Monitor 290M-S8 7” Linux Indoor Monitor (2-wire Version) 902C-A Master Station Cloud Solution - Smart Pro Solution benefits For Installer DNAKE 2-wire IP intercom solution leverages existing wiring, which allows for a quicker and more efficient installation process. This solution helps avoid the costs associated with new cabling and extensive rewiring, keeping project costs down and making the retrofit more economically attractive. For Property Manager The Central Management System (CMS) is an on-premises software solution for managing video intercom systems via the LAN, which has greatly improved the efficiency of property managers. Additionally, with the 902C-A master station, property managers can receive security alarms to take immediate action, and remotely unlock doors for visitors. For Residence Residents can choose their preferred answering unit based on their needs. Options include Linux-based or Android-based indoor monitors, audio-only indoor monitors, or even app-based services without a physical indoor monitor. With DNAKE's cloud service, residents can unlock doors from anywhere, at any time.
In Japan nearly two in five office workers work from home a minimum of once a week, particularly if they work in IT or consultancy, according to Nikkei research undertaken in 2023. When a global IT company announced they would be leasing out four floors in their Tokyo office last year, in response to changing working habits following Covid, G4S approached them to be their security provider. They had already been doing access control and meet and greet at the eight-storey building for the last 10 years. New access control systems Eiki Hata, Representative Director of G4S Secure Solutions Japan, says: “The security requirements for a multiple tenancy building are quite different from a single occupancy. You have more people coming and going, companies have different requirements – more sophisticated and robust protocols are needed.” After being awarded the new contract, G4S doubled its headcount onsite and configured new access control systems for each floor; some of the new tenants wanted to keep their existing passes, which G4S was able to accommodate. Health and safety Security officers are also trained in first aid, which includes administering CPR and using a defibrillator Eiki says that 40% of G4S’s remit is health and safety and they will provide support during natural disasters, such as earthquakes or flooding. This includes checking if there is any damage to the building alongside the facilities team and offering assistance to local residents who may take refuge there. They will also hold regular evacuation drills for the whole building. Security officers are also trained in first aid, which includes administering CPR and using a defibrillator. They will also call for an ambulance if required and direct them once onsite. The officers are also responsible for ensuring everyone shows their ID at reception and all guests are booked in, as per the company’s global policy. Customer service skills Eiki explains: “Japan is one of the safest countries in the world: if you leave your wallet somewhere, it’s likely that you’ll get it back without losing any money." "However, that also means that Japan has a very low awareness of risk and our security officers need to be able to explain why these protocols are in place when questioned. When you just have one company in a building it’s easy to enforce operational rules, but with multiple tenants that’s less easy to do - customer service skills are really important.” Flexibility and adaptability The company is one of a number of multinationals spanning sectors that G4S provides security This company is one of a number of multinationals, spanning various sectors, that G4S provides security for in Japan. Other business lines include close protection and risk consulting. Eiki explains that part of the appeal is that G4S can more readily recruit staff that speak English than local companies, which many multinationals require. He says: “Less than 5% of the Japanese population speak English, we are not like Hong Kong or Singapore which are international hubs in APAC.” Smallest business within G4S Eiki continues: “Another advantage that G4S has is that we can speak to other countries and ask them to share their experiences, helping us to create a seamless security consultancy for our clients.” Eiki says that flexibility and adaptability are other trademarks: “We are the smallest business within G4S; we are growing the business and want to fulfil our clients’ requests even if it’s difficult or not straightforward.”


Round table discussion
By all accounts, technology development is moving at a rapid pace in today's markets, including the physical security industry. However, market uptake of the newest technologies may lag, whether because of a lack of clear communication or not enough education of potential customers. We asked this week's Expert Panel Roundtable: How can the industry do a better job of promoting emerging technologies in physical security environments?
The hospitality industry drives economic growth and development by creating jobs, generating revenue, and initiating a ripple effect to improve profitability throughout the supply chain. The hospitality industry includes a vast number of small businesses, including hotels and restaurants. But what are the security challenges of these businesses, and how is the security marketplace serving those needs? We asked this week's Expert Panel Roundtable: How can technology address the security challenges of the hospitality market?
Retaining top talent is a route to bring innovative ideas and creative solutions to a company. Talent drives product development, improves processes, and helps businesses stay ahead of the competition. In essence, retaining top talent is essential for businesses to remain competitive, innovative, and successful. Unfortunately, staffing shortages are a reality for many corporate players in the security industry, as well as throughout the business community. We asked this week's Expert Panelists: How can physical security organisations attract and retain top talent?
White papers

Safeguard Students With New Techniques And Technology
Download
Cybersecurity in keyless access management
Download
Assessing safety readiness for education campuses
Download
Preparing your organisation with quality situational awareness
Download
Expanding video surveillance in the enterprise market
Download


A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
Security practices for hotels
Download
2025 Trends in video surveillance
Download
Maximising security and performance
Download