Visitor management systems
The client is a renowned German global discount supermarket chain and ranks as the sixth largest grocery retailer in the UK, holding a 7.7 percent market share as of August 2023. Headquartered in Wimbledon, London, the company operates over 12,000 stores across every EU member state, as well as in Serbia, Switzerland, the United Kingdom, and the United States. With a large number of locations and diverse door access requirements, the client was facing challenges in managing visitor access acros...
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, announced a new partnership with Access Technology & Integration (AT&I) Systems, an end-to-end systems integrator, to protect U.S. schools and other organisations against gun-related threats. AT&I leverages cloud and AI technology to provide security solutions that grow with an organisation, including access control, gate entr...
Acre security, a global pioneer providing state-of-the-art security systems, announced an initiative as part of its ongoing effort to unify and simplify its product offerings. The rebranding of the SPC intruder detection system to acre Intrusion marks a strategic alignment within the company's streamlined branding framework. This approach also includes acre Access Control and acre Visitor Management solutions, bringing a cohesive identity to the entire portfolio. Identification of acre’s...
Axis Communications celebrated the grand opening of its latest Axis Experience Centre (AEC) in Frisco, Texas on Wednesday, May 8, 2024. The new Dallas-area facility replaces the original Irving AEC location with a larger, state-of-the-art facility built to accommodate the need for a greater Axis presence in North Texas and to better serve customers as the Axis product portfolio expands and its partner ecosystem grows. The space also offers additional meeting space, with plans to expand staffing...
The future of retail security and customer experience is here, and it's powered by facial recognition technology! RecFaces, a provider of facial biometric software solutions, in collaboration with, the Shopping Centre Association of India (SCAI) is ready to host the ‘Face Forward: Revolutionising Safety and Ease at Shopping Centres’ virtual discussion. 22 May 2024 is the date on the agenda for this virtual discussion which will be the engine of change for the APAC and MEN...
Global security manufacturer, Gallagher Security, has announced that support for employee badges in Apple Wallet is available for Gallagher customers in the U.S. with the release of Gallagher Command Centre v9.10. Employee badge in Apple Wallet is fully integrated with Gallagher Command Centre, making it easy for customers to issue and manage access credentials for their employees with in-app provisioning via Gallagher’s Mobile Connect app. Managing credentials with ease O...
News
In an industry-first, Safetrust provisions employee and visitor badges directly into Apple Wallet via an email link or text message, eliminating the need to download an application. This innovative app-free approach ensures a seamless experience for people requiring access to buildings or enterprise IT systems, whether visitors, contractors, or employees. It enables the deployment of mobile credentials in minutes rather than months. Universally compatible credentials “A major barrier to adopting mobile phones for building access has been requiring people to download multiple apps on their iPhones to enter different buildings with various hardware providers,” explained Jason Hart, CEO and Founder of Safetrust. “This app download insanity has increased complexity and costs, resulting in a poor user experience." "Safetrust addresses this challenge by enabling the direct push of physical access credentials into the Apple Wallet via text message or email links, streamlining the user experience. Safetrust’s use of universally compatible credentials across multiple hardware vendors significantly reduces adoption costs for organisations.” Operational support and InfoSec Removing the need for mobile applications eliminates the expenses associated with developing Removing the need for mobile applications eliminates the expenses associated with developing, maintaining, and certifying new applications for credential provisioning. Operational support and InfoSec become much simpler when users are not required to install additional software on their mobile devices for credential provisioning. Security and policy compliance Employee and visitor badges stored in Apple Wallet possess the same high security and policy compliance levels. This includes features such as support for biometric authentication via Face ID and Touch ID, utilisation of the Apple Secure Element even in low-power situations, remote revocation of credentials, and compatibility with external biometric-on-card solutions, among other functionalities. Safetrust’s over-the-air provisioning solution supports a range of functionalities, including full-time and time-limited credentials, visitor and contractor scheduling with start and expiry times, and enterprise login with FIDO2 credentials, ensuring flexibility and security.
Secure Logiq is gearing up for its largest and most dynamic showcase yet at The Security Event 2024 (TSE). Interactive live demonstration Attendees are invited to Stand 5/P75 to experience the future of security technology through immersive and interactive live demonstrations, as well as a highly anticipated 'Big Reveal.' Co-founder Robin Hughes emphasises, "This year, we have gone all out with our biggest stands ever and will be joined by a selection of Technology Partners for a 'not to be missed' immersive and interactive live demonstration." Power of Partnerships: Intelligent Integration Partners on the booth will include 360 Vision Technology, IntelexVision, LenelS2, Milestone Systems, and VCA At the heart of Secure Logiq's showcase is the "Power of Partnerships: Intelligent Integration" initiative, focusing on how selecting the best hardware and software for all components of an enterprise electronic security system can deliver outstanding results. Alongside Secure Logiq's specialist server technology, partners on the booth will include 360 Vision Technology, IntelexVision, LenelS2, Milestone Systems, and VCA, all working seamlessly together in a real-world setting. Optimised designs Hughes highlights, "An integral part of every Enterprise CCTV system in the field is the engine that runs the solution." "Our vast knowledge of not just the IT hardware element of the solution, but the entire ecosystem being deployed, allows us to create optimised designs not available from an IT-centric server company. First and foremost, we are video people, and our customers know that and trust us." Holistic understanding Navigating the complex landscape of security technology requires more than just hardware proficiency or customer support; it demands a holistic understanding of the industry's evolving requirements. Hughes adds, "What sets Secure Logiq apart is our dedication to pre-and post-sales support. We're not just selling hardware; we're empowering our clients with designs and solutions tailored to their needs." Big Reveal "TSE has always been a fantastic event for us, always giving us a quantified return on investment. I’m looking forward to our ‘Big Reveal’ - our amazing System Design Manager, Tonino Schafer, has made a remarkable journey of over 2,000 kilometres from Lithuania to Birmingham to ensure this Big Reveal gets to us safely." "I think it’s going to keep us and our stand buzzing all week!” Secure Logiq invites all visitors to join them at stand 5/P75 from 30th April to 2nd May at the NEC Birmingham and witness the future of security innovation firsthand.
Traka is attending The Workplace Event 2024, where it will be showcasing its latest innovations designed to optimise security and efficiency in processes in the modern-day workplace. RFID technology On stand 3a/G22, the pioneer in intelligent key and asset management solutions will be presenting the latest security technology, including flexible RFID technology, designed as a customisable solution for securely storing personal belongings and equipment. With its RFID technology, users can easily access lockers using their smart cards or tags, providing convenience and peace of mind. Tablet Locker Featuring individual compartments with charging capabilities, it ensures devices are always ready for use Visitors to the stand will also see live demonstrations of Traka’s innovative locker systems such as their pioneering Tablet Locker presenting a compact and secure storage option for valuable assets and mobile devices. Featuring individual compartments with charging capabilities, it ensures devices are always ready for use. Asset management Says Mike Hills, Traka Market Development Manager, “With workplaces transitioning to more hybrid working, facilities of all sizes have to adapt their security proposition to meet new demands." "This includes the management of assets for employees with different access levels and across multiple locations, to accommodate flexible working arrangements." Flexible needs for modern workplaces “Traka is attending The Workplace Event to demonstrate how our solutions are designed to address the evolving security and efficiency needs of modern workplaces." "We look forward to the discussions on how to integrate systems into businesses of all sizes to accommodate bespoke requirements, and supporting site and facility managers looking for flexible ways to support new working arrangements.” L Touch Pro It offers unparalleled control and visibility over key usage and access permissions Traka will also be presenting its popular L Touch Pro as a key management system that combines advanced technology with user-friendly design. Featuring a large touchscreen interface and intuitive software, it offers unparalleled control and visibility over key usage and access permissions. Key and asset management solutions Max Tatford, Traka Market Development Manager added, “With the workplace landscape rapidly evolving, Traka is committed to providing innovative key and asset management solutions that optimise security and efficiency in modern workplaces." “Being at The Workplace Event 2024 highlights our dedication to addressing the shifting demands of today's business environment. We're excited to showcase our latest innovations, and discuss how they can seamlessly integrate into every business, supporting flexible working arrangements and enhancing overall productivity for the benefit of staff, teams, and visitors."
Videx Security, a pioneer in access control and door entry systems, has announced a new 4312 Series entry panel for its VX2300 2-wire video system. This addition highlights Videx's commitment to providing advanced entry solutions that meet the needs of modern residential and commercial buildings. The 4312 Series entry panel, part of the Videx 4000 Series and available in standard vandal-resistant formats, introduces a range of innovative features designed to enhance security and user interaction. Among its key features are a backlit keypad, available with additional alpha keys (A-F) for direct apartment dialling or with name-scrolling keys for ease of use. The panel also boasts a customisable graphical LCD display, providing clear visitor interaction and feedback. 4312 Series panel 4312 Series panel ensures visitors are both seen and heard clearly, announcing call progress Equipped with a wide-angle CMOS camera and voice annunciation capabilities, the 4312 Series panel ensures visitors are both seen and heard clearly, announcing call progress and extending an invitation to enter. This digital panel is designed for versatility, complementing new and existing VX2300 systems and supporting up to 998 apartments. In terms of access control, the panel offers coded access for up to 2800 four to six-digit codes and Mifare proximity for a similar number of users, with an additional layer of security through a combined code+Fob mode. Key features of the intercom panel Key features of the intercom panel include its compact design, wide-angle CMOS camera Rob Sands, Technical Director at Videx, said: “Our new 4312 entry panel integrates cutting-edge features such as Mifare proximity and a wide-angle camera into a compact, vandal-resistant design. This panel not only enhances building security but also offers unparallelled ease of use and visitor interaction, marking a new era for the VX2300 system.” Key features of the intercom panel include its compact design, wide-angle CMOS camera, backlit keys with a graphical LCD display, and voice annunciation for call processing. Notably, the panel is powered directly from the 2-wire bus, simplifying installation by eliminating the need for additional cables. Videx's VX2300 system Videx's VX2300 system is known for its flexibility, allowing integration with a variety of door panels, videophones, video monitors, and concierge units, all through a single pair of cables. The new 4312 panel is customisable and programmable through both its user interface and PC software, featuring USB, RS485, and Wiegand interfaces for comprehensive control.
Invixium, a global pioneer of biometric access control and workforce management solutions announces the appointment of Chris Thompson as the new National Sales Manager to support its expanding North American territory. In this role, Chris will drive sales strategies, nurture key partnerships, secure new opportunities, and expand market presence across North America. With this appointment, Invixium aims to advance its industry leadership and growth trajectory in the Americas. Prior roles of Chris Thompson Chris brings over a decade of experience in sales leadership roles and a proven track record of driving revenue growth in the security industry. Prior to joining Invixium, Chris held sales roles at Pelco, Avigilon, Cintas, and ADT where he excelled at sales execution and keeping customers happy. His extensive background in developing and executing successful sales strategies aligns with Invixium’s mission to expand its presence and deliver innovative solutions that exceed customer expectations. Chris brings over a decade of experience in sales leadership roles and a proven track record “North America is gaining significant traction for us and we’re experiencing a surge in inquiries from this competitive market,” said Shiraz Kapadia, CEO & President at Invixium. "We have a strong solution offering to address real-world problems for enterprises and industries. We’re excited to have Chris on board and are convinced that his expertise will be instrumental in enhancing profitability and competitiveness as we continue to scale and propel our business forward.” Invixium’s success in North America “Invixium’s reputation precedes itself and it’s an incredibly exciting time to join the company,” said Christopher Thompson. “Invixium has established itself as an expert in biometric security providing top-notch access control, workforce, and visitor management solutions all under one roof. I look forward to leveraging my experience to expand their customer base and drive Invixium’s success in North America.” Invixium stands out as the only biometric solutions provider that thrives in the rugged and harsh environments of demanding sectors such as oil and gas, mining, manufacturing, and construction. With a proven track record of global success, Invixium is renowned for its problem-solving approach. Invixium is unparalleled in its commitment to addressing the real-world challenges of its customers.
Schlage®, a pioneering provider of home security and access solutions for over a century, announced that its smart lock integration with Airbnb is now live. From, most Airbnb Hosts with listings in the US and Canada will have seamless access to the industry-pioneering Schlage Encode™ Smart WiFi Lock Family directly within the Airbnb app, improving and simplifying entry and exit logistics for guests. Schlage Encode™ Smart WiFi The new Schlage smart lock integration grants Airbnb Hosts control of the Schlage Encode™ Smart WiFi Deadbolt, Schlage Encode Plus™ Smart WiFi Deadbolt and the Schlage Encode™ Smart WiFi Lever within the Airbnb app. Hosts can now streamline the check-in and checkout process with automatically generated access codes for guests, removing the need to create unique codes for each visitor manually. Hosts simplify the check-in and checkout process with automatically generated access codes for guests Access codes will be shared with the guests at the time of booking—codes are only active during their trip—and are automatically deactivated after checkout. Hosts can extend a guest's reservation as needed in the Airbnb app, and the code will automatically update to remain active through the updated reservation length. Huge benefit to Airbnb "Smart locks are uniquely suited to make life easier for people who rent their property on platforms like Airbnb because they eliminate the need for exchanging physical keys. They provide a level of ease for both Hosts and guests, even when reservations need to be modified or cancelled, and are generally safer than traditional door locks," said Tim Eskew, senior manager of IoT Partnerships at Schlage. "The added peace of mind and convenience will offer a huge benefit to Airbnb Hosts with listings in the U.S. and Canada." New automation experience The Schlage Encode Family of products are well-suited to support Hosts looking to take advantage of this new automation experience within the Airbnb app. With a simple installation process, long battery life and secure and reliable WiFi connection, Schlage locks provide guests with convenient access to homes listed on Airbnb. With advanced notice of property entry requirements and codes, guests will know exactly how and when to enter a property. Both Airbnb guests and Hosts can benefit from the convenience that Schlage locks provide. The new experience is now available to most Hosts with listings in the US and Canada within the Airbnb app. Hosts can learn more about the Schlage Encode Family of products and find a retailer at Schlage.com/smartlocks. Schlage is an Allegion brand.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications. From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physical security systems Hospitals in particular have developed into multi-faceted spaces that house hundreds to thousands of patients, staff and visitors at any one time. In England for example, research has found in the three months leading to June 2023, an average of 44,626 people visited major hospital A&E departments each day, with over 16 million attendances typically recorded over the course of a year-not to mention an additional nine million logged at other minor units. For any building, this level of sustained footfall can request severe security difficulties For any building, this level of sustained footfall can invite severe security tests. With that, the need to deploy effective physical security systems in healthcare is clear. And so, as access control continues to become more readily adopted and new products enter the market, decision-makers are reminded to consider the requirements of their building, ensuring they select the solutions most suited to their settings and budget. Security controlled Patient safety will always remain the top priority in healthcare settings, and where matters of health and social care come into question, a diverse set of professional regulatory bodies are tasked with setting and maintaining high standards. When it comes to healthcare premises specifically, patient security and perimeter security often come hand in hand and are amongst the most pressing of challenges that decision-makers must face. To help address operational planning and potential design concerns in the NHS, the Health Building Note (HBN), provides general design guidance for healthcare buildings under HBN 00-01-citing the use of access control measures as a way of maintaining security and protecting the safety of patients, staff and visitors. Use of access control Hospital buildings control varied levels of access for a number of security purposes Hospital buildings, for example, must control varied levels of access for a number of operational and security purposes. Routine scenarios exist where vulnerable patients are under monitoring and thus refrained from exiting the premises for their own safety, while at the same time, permitted staff must be able to reach their patients and medicines when required. For this, the use of access control is key. Equally, access credentials can also help management teams keep track of those who may be entering or exiting rooms with equipment and pharmaceutical supplies, deterring any unwanted visitors and opportunists in the process. Incorporation of access control systems On a similar note, regulations have set a minimum standard for how personal data should be stored and managed in healthcare environments, giving decision-makers an added responsibility to regulate staff-controlled areas with patient medical records. While instances of personal data breaches are rare, healthcare facilities and professionals are at legal risk should confidential data be found misused or missing. As such, the incorporation of access control systems has become essential in keeping data storage areas secure, with intuitive online systems capable of permitting access to staff with the correct credentials while simultaneously tracking who has requested clearance at digital entry points. HBN guidance Healthcare experts are better fitted to control the sheer volume of people entering and exiting To function effectively, healthcare facilities must always be perceived as safe places by the people who reside within them, and as HBN guidance implies, a unified physical security system can help address key safety and security concerns while enhancing patient and staff experience. Opportunely, access control systems are more accessible and adaptable than ever and combine several technologies such as mechanical locks and automatic doors with electronic access credentials in the form of smartphone apps, badge readers and biometric scanners. By integrating these systems into the building’s existing infrastructure, healthcare professionals are better equipped to control the sheer volume of people entering and exiting the premises without impairing the general flow of movement and coordination around the facility. Better by design Despite the clear benefits offered to healthcare facilities, there are a number of considerations to be mindful of when choosing an access control solution. Poorly implemented systems can have an adverse effect on security and functionality - quickly costing healthcare organisations time and budget to rectify and replace the inadequate products that don’t meet the building’s requirements. For that reason, decision-makers and design teams are reminded that there is no single solution that fits all healthcare buildings. As such, it’s crucial for decision-makers to understand the systems that are being put in place throughout each of the touchpoints in their facility. Clear collaboration is required during periods of specification, where together, teams can ensure the selected product works on all angles, from meeting fire safety and sustainability standards to aesthetics and scalability. Modern access control products Scalability is a key area that decision-makers must review when selecting access control systemsFrequently overlooked, scalability is a key area that decision-makers must review when selecting access control systems. Such is their diverse nature; healthcare facilities can often change and develop as years go by, and by selecting a system that facilitates growth, such as a cloud-based solution-security and efficiency is long-established. While modern access control products are known for seamless integration, there are some systems that may restrict the ability to use different vendors throughout the remainder of the building’s infrastructure. This, in effect, causes a monopolisation of products throughout the estate, which can have an adverse effect on growth by increasing costs and reducing the levels of service associated with the security system already in place. Improve security and safety A scalable and reliable access control system will continue to improve security and safety by adapting to a building’s new requirements-and all while having minimal impact on its operational network. And so, while technology will no doubt continue to influence and transform the access control market, healthcare facilities and their professionals must continue to remain educated on their own systems, ensuring they have the best options in place to keep their patients, staff and visitors safe and secure for years to come.
Security systems represent a significant investment, yet many organisations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance or drive operational efficiencies. Consumption gap When users aren’t tapping into the full power of the solution they bought, they aren’t realising their full return on investment. This creates a consumption gap. It’s a situation that has the potential to go in one of two very different directions. A misreading of a system, its capabilities and functionality can fast result in user discontent Left unchecked a consumption gap can create frustration for system integrators, manufacturers and end users alike. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction. Leading to a greater likelihood that they’ll look to change or focus investment into overlapping and likely competing solutions. Customers’ security goals Addressed appropriately it can help manufacturers, system integrators and end users to build trusted partnerships in which everybody wins. Understandably, systems integrators are primarily focused on installation—delivering reliable solutions that meet customers’ security goals to ensure their long-term success. However, engagement can go beyond deployment. Closing the consumption gap can be a strategic way to differentiate yourself from competitors. The deeper you understand your customer’s business, the better advice you’re able to offer—and the stronger the partnership you form. Why do consumption gaps exist? For customers, finding the time to learn multiple capabilities of a security system can be time-consuming. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks. Often, taking use of new tools and keys takes a backseat to the speed of daily tasks There are many reasons why customers may not be taking full advantage of the features available to them in their security platform. They may feel overwhelmed by a steep learning curve after deployment and might delay diving into the additional system features. Sometimes, there might be a lack of awareness of the technology’s full capabilities, and despite a willingness to learn, there are few options for training. Often, it can simply be they are not aware of the benefits of their system or are too busy with day-to-day and urgent tasks to learn other features. Bridging the consumption gap Systems are built to deal with a wide variety of use cases and broaden market appeal, but the goal isn’t to get everyone to use all the features of every product. You want to guide your customers towards the features and functionality that best meet their needs. This could entail reducing the friction they experience in their day-to-day operations, solving unique issues related to their business, or addressing their most important challenges. Having these conversations with your customers deepens your relationship and can organically open up new revenue streams. Continuous engagement allows you to recommend other relevant products or services that they may find helpful. Customised training plan Customers can learn at their own pace and gradually expand their understanding of their system Furthermore, customers are often not able to implement all features at once. You can help by proposing a plan to gradually evolve systems and processes over time. This could include a customised training plan to get the most value from their investment. Some manufacturers are also now providing learning management tools that system integrators can pass on to their customers. Customers can learn at their own pace and gradually expand their understanding of their system in accordance with their bandwidth. This allows them to get more out of their system. Simplifying deployment With the right software partners, systems integrators can focus on solving customer problems, not reactively troubleshooting issues. Look for manufacturers who offer good support systems for integrators. This includes not only quality technical support but also configuration and training services you can build on. Look for partners that offer tools and consultation services you can use to complement your value-added services, either to spend less time on the basics or for specialised expertise on complex projects. Beyond support and services, one telling sign is the configuration interface and tools that you as an integrator will primarily interact with. Ask yourself whether the manufacturer invests in their back-end tools and their primary user interface. Is there a noticeable difference between these two interfaces in terms of look and feel? Does one feel more dated? Widening consumption gap The harder it is to implement upgrades, the more reticent customers are to make the changes If the end user interface is easy to use but changes on the back end are difficult, the resulting friction can contribute to the widening consumption gap. It can become too time-consuming or difficult to upgrade or make changes to the system. The harder it is to implement upgrades, the more reticent customers are to make the changes. Configuration should be painless. If the system has a solid graphical user interface, you’ll be able to interact with the software in a fluid and intuitive way. When the system is intuitive for both you and your customers, you spend less time on setup and training. You can invest more attention in value-added activities. Conclusion A consumption gap could be a sign that technological innovation is outpacing people's ability to implement them in their day-to-day lives. You can work with your customers to simplify the adoption of the innovations so they can more easily implement them and realise the full value of their investment. By reviewing opportunities to bridge the consumption gap for your customers, you increase the likelihood of growing and renewing your system and service contracts. You also build relationships as a trusted partner. Customers will turn to you when looking to expand their security system and proactively solve new and incipient problems.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Casinos offer several attractive applications for LiDAR, including security and business intelligence. Using laser sensors, the technology can replace the use of surveillance cameras. For casino security, LiDAR can track player movement and provides complete coverage and accuracy that have not been achievable by surveillance cameras. Massive coverage areas can save on costs of sensor deployment versus other technologies. LiDAR and its applications LiDAR is a method for determining ranges by targeting an object with a laser and measuring the time for the reflected light to return to the receiver. LiDAR sensors emit pulsed light waves into a surrounding environment, and the pulses bounce off surrounding objects and return to the sensor. The sensor uses the time it took for each pulse to return to the sensor to calculate the distance it travelled. LiDAR is commonly used in markets such as robotics, terrestrial mapping, autonomous vehicles, and Industrial IoT (Internet of Things). Today, casinos offer a lucrative emerging market for technology. LiDAR tracking enables casino operators to understand the guest path, journey, queue time, count Crowd management LiDAR can contribute to a casino’s guest experience by counting people at doors or in sections of the gaming floor to provide intelligence about crowd size to track occupancy. LiDAR tracking enables casino operators to understand the guest path, journey, queue time, count, and other statistical information by comparing previous time frames to current occupancy levels. This approach allows them to understand digital media advertisement and experience placement. Aid in advertisement “Inside a casino, sensors are deployed like surveillance cameras,” says Gerald Becker, VP of Market Development & Alliances, Quanergy. “But instead of security, they are used to provide anonymous tracking of all people walking through the gaming floor. We can get centimetre-level accuracy of location, direction, and speed of the guests. With this data, we can access the guest journey from the path, dwell count, and several other analytics that provides intelligence to operations and marketing to make better decisions on product placement or advertisement.” Quanergy Quanergy is a U.S.-based company that manufactures its hardware in the USA and develops its 3D perception software in-house. Quanergy has various integrations to third-party technology platforms such as video management systems (VMSs) in security and analytics for operational and business intelligence. Perimeter security Sensors can be mounted to a hotel to monitor for potential objects being thrown off the hotel LiDAR is deployed in both exterior and interior applications. For the exterior of a casino or resort, sensors can be mounted to a hotel to monitor for potential objects being thrown off the hotel, or people in areas where they should not be. For example, they can sense and prevent entrance to rooftops or private areas that are not open to the public. Some clients install sensors throughout the perimeter of private property to safeguard executives and/or a VIP’s place of residence. Flow tracking and queuing capabilities Tracking crowd size can initiate digital signage or other digital experiences throughout the property to route guests to other destinations at the property. It can also help with queue analysis at the reservation/check-in desk or other areas where guests line up to tell operations to open another line to maintain the flow of guests passing. Flow tracking and queuing capabilities help casino operators to understand which games groups of customers frequent and allow for the optimisation of customer routing for increased interaction and playtime on the casino floor, quickly impacting the financial performance and return of the casino. No privacy concerns LiDAR provides a point cloud; its millions of little points in a 3D space create the silhouettes of moving or fixed objects The main hurdle right now is market adoption. LiDAR is an emerging technology that is not so widely known for these new use cases, says Becker. “It will take a little bit of time to educate the market on the vast capabilities that can now be realised in 3D beyond traditional IoT sensors that are available now,” he comments. One benefit of LiDAR is that it poses no risk of personally identifiable information (PII) and therefore no privacy concerns. No PII is captured with the technology. Cameras can capture images and transmit them over the network to other applications. However, LiDAR provides a point cloud; its millions of little points in a 3D space create the silhouettes of moving or fixed objects. IoT security strategy There is a lot of interest from surveillance and security to include marketing and operations, says Becker. “LiDAR will become a part of the IoT security strategy for countless casinos soon. It will be common practice to see LiDAR sensors deployed to augment existing security systems and provide more coverage.” Also, the intelligence gained with the accuracy of tracking guests anonymously provides peace of mind to the visitors that they are not being singled out or uniquely tracked but provides valuable data to the casinos that they have not been able to capture before. “This will help them maximise their operations and strategy for years to come,” says Becker.
Newer facial recognition systems are scalable and provide more accurate results, and the end-user selects the parameters of system performance to suit their own application needs. “We have developed algorithms that can be optimised in various compute environments, whether in a small chip inside an edge device or on a large server device,” says Ido Amidi, Oosto’s Vice President of Products and Business Development. “It all depends on client needs. We can do it all without giving up performance. There is no significant loss in performance across various platforms.” The system’s “containerised environment” operates efficiently in a customer’s IT architecture. Facial recognition implementation Oosto, formerly AnyVision, was founded in 2016 based on deep learning research into facial recognition. The focus has been on how to use face recognition to identify people in real-world scenarios. Products began coming to market in 2017, targeting verticals that involve a need to identify “bad actors” or very important people (VIPs). The implementation of the technology involves the software operating in an on-premise appliance or server The most common implementation of the technology currently involves the software operating in an on-premise appliance or server, with inputs coming from cameras at the edge and outputs going to a network video recorder or access control system. As concepts of the Internet of Things (IoT) trickle down into the security marketplace, edge-based deployments will become more common, supplying real-time actionable information, and avoiding a flood of unstructured video data. Ethical recognition Oosto helps users deploy, set up, and calibrate the system; then, it is managed by the customer based on their needs. Privacy features are built into the system, part of the company’s commitment to “ethical” facial recognition. The technology, in general, has changed a lot since early implementations a decade or so ago failed to perform as promised. Expanded capabilities are fueled by developments in deep learning. Privacy features Facial recognition can help end-users identify people of interest but is specifically designed not to violate anyone’s privacy. There are no databases or watch lists involved; the user typically compiles their selection of “bad actors” against which facial recognition algorithms can be compared. While Oosto provides a valuable tool, the end-user customer decides how to deploy that tool in their business, says Amidi. Oosto's “liveness detection” deploys algorithms to analyse images from video and/or 3-D cameras Liveness detection Recently, Oosto has adapted the approach to provide access control; too, including “liveness detection” that deploys algorithms to analyse images from video and/or 3-D cameras to ensure a presented face is not a printed image or mask. Their latest software release is a single platform aimed at recognising and providing insights into how people behave in physical spaces. New functionality includes the ability to detect unknown individuals entering restricted areas. Neural net algorithm Improved facial recognition functions well even for those wearing masks. A new neural net algorithm improves accuracy when identifying those wearing masks and the system can alert if a person is not wearing a mask (to aid compliance). Expanded video forensics features, designed to expedite investigations, include an ability to do in-depth searches on captured video related to body attributes, colour of clothing, etc. Recognition algorithms How well can Oosto recognise a face among 20 different people on a casino floor? It all depends on variables, such as the number of people, lighting, and angle of view, image quality, and even networking issues. Recognition algorithms are “trained” using data collected from real-world use cases; training takes place in the lab environment. The system can adapt to various lighting conditions, such as in a glass-enclosed lobby in the morning versus in the afternoon. As people enter an area, they may be looking down at their smartphones, for instance, which would mean some of their faces would not be in view. Such variables impact accuracy. Test requirements of a system apply to each specific customer and can be adjusted and tweaked as needed Customisable system Each customer must decide their parameters regarding how to best use the system, with the fewest acceptable number of false alerts, in real-time, and using existing infrastructure. Test requirements of a system apply to each specific customer and the system’s sensitivity and other operational factors can be adjusted and tweaked as needed, including at any time after a system has been installed. Meeting specified application “No customer is alike, so the needs of each customer’s system are unique,” says Amidi. For example, some situations might have a higher tolerance for false alarms, such as when there is an operator available who can make the final decision on whether a face matches. In other situations, such as when there is a missing child, false alerts are a bigger problem, and rapid response is especially of the essence. “What we give customers out of the box applies to any scenario, and customers can tweak the system with the click of a button to meet a specific application,” says Amidi. “We empower our customers to understand the pros and cons so they can react in real-time.” Identity management Oosto can help to enhance the customer experience by identifying important customers Oosto sells through systems integrators and has a partnership program with more than 150 integrators worldwide certified to manage and install systems. Oosto targets Fortune 500-size companies in financial services, gaming, and retail. The system helps to create a safe environment that is devoid of any “bad actors.” Alternatively, Oosto can help to enhance the customer experience by identifying important customers that warrant special treatment. The system also can provide an alert if any unauthorised person enters a restricted zone; that is, anyone who is not an employee, a registered visitor, or a contractor. Understanding technology In many parts of the world, facial recognition is widely accepted and used for applications such as payment and access control. Anxiety about technology, especially in the United States, is based on a lack of understanding. The public needs to “be better educated” on the subject, and Amidi expects the technology to become more socially accepted over time. “It’s a tool, and it needs to be supervised,” says Amidi. “From a technology perspective, we trust the accuracy. It just needs to be better explained.”
Case studies
Completed in 2023, Thanet Parkway Station, the new high-speed rail hub serving the Thanet area in southeast Kent, has implemented a significant infrastructure enhancement: the installation of high-quality parking barriers to optimise accessibility and safety within its premises. Investment in connectivity Thanet Parkway Station, which opened on 31st July 2023, is a testament to the region's commitment to advancing its transportation infrastructure. With a total investment of £44 million secured through a combination of council financing and various building and growth funds, the station addresses the rising demand for efficient connectivity to London and neighbouring towns. Swift and convenient travel Furthermore, its ample car park, boasting space for 293 vehicles, serves as an indispensable "park and ride" facility Featuring two expansive platforms capable of accommodating 12-car trains and strategically situated on the high-speed line through Ashford International, Thanet Parkway Station offers commuters swift journeys to key destinations. Furthermore, its ample car park, boasting space for 293 vehicles, serves as an indispensable "park and ride" facility, alleviating congestion in central Thanet and providing convenient access to the surrounding areas. Enhancing safety and traffic flow To enhance safety and streamline traffic flow within the station's car park and adjoining pedestrian and cycleway, Jacksons Fencing was specified to implement a comprehensive suite of parking barriers and demarcation measures. Warden Swing Barriers were installed along the pedestrian and cycleway to regulate vehicular access. These galvanised steel barriers offer a robust solution, while ensuring ease of operation for maintenance and emergency vehicles. Safeguarding pedestrian pathways Along the same path, Jacksons Fencing’s timber knee rail fencing served as an unobtrusive demarcation device. This fencing solution, constructed from kiln-dried, pressure-treated timber and galvanised steel straps, safeguards grass verges and delineates pedestrian pathways. Ensuring peace of mind Strategically positioned to enforce height restrictions within designated parking areas, Jacksons’ MaxHite parking height restriction barriers were installed. Crafted from galvanised steel and finished in a highly visible yellow polyester powder coating, the barriers provide durable protection against unauthorised access, while facilitating smooth traffic management. Each installed product comes with the assurance of Jacksons Fencing’s 25-year guarantee, symbolising a commitment to quality and sustainability. High-quality, sustainable products Commenting on the project, Peter Jackson, Managing Director of Jacksons Fencing, underscored the transformative impact of the enhanced security measures at Thanet Parkway Station, said "As a local supplier, we’re thrilled to have been involved in this project, and it’s great to see that the developers have invested in high-quality, sustainable products, showcasing this project’s commitment to providing a lasting transport solution for the community." He adds, "Beyond parking, the upgraded access control and increased security measures not only enhance safety, but also foster a profound sense of reassurance and pride in the area for all station users."
A prominent participant in the Central African mining industry, this company focuses on the exploration and extraction of copper and cobalt. Boasting a substantial cobalt reserve and expansive copper assets, it is presently undergoing a significant restructuring to establish itself as a prominent global player in mining. Through strategic collaborations with major entities in the sector, both domestically and internationally, the corporation aims to enhance its competitive standing. An impactful project currently under evaluation aims to achieve an annual copper output of 200,000 tons, underscoring its dedication to expansion and prominence in the worldwide mining landscape. Overview Faced with the necessity for an enhanced attendance management system across widely spread mines and a sizable workforce, the client approached Matrix for a solution. The particular challenge involved consolidating attendance management and facilitating rapid attendance marking for approximately 10,000 users across various mines and the central headquarters. Matrix was enlisted to tackle the challenge, with the client specifically desiring a high-speed face-based attendance system Matrix was enlisted to tackle this challenge, with the client specifically desiring a high-speed face-based attendance system as the primary credential for marking attendance. The collaboration was geared towards achieving a seamless and centralised attendance management process across different mine locations. Client challenges Matrix demonstrated a nimble response to the client's urgent requirements, strengthening their attendance management infrastructure. The challenges encompassed the consolidation of attendance management and are outlined below: Requirement for Centralised Employee Attendance Management: Operating across diverse mining locations, the client encountered difficulties in efficiently handling employee attendance. To address the challenges faced by the mining conglomerate, there was a clear need to implement a centralised solution to streamline and enhance attendance management effectively. Need for an Employee Portal: Another challenge faced by the client was the absence of an easy-to-use platform for attendance and leave management, visible to their employees. Swift Identification of Mine Workers and Employees: There was a critical demand for the rapid identification of employees and mine workers, emphasizing the urgent need to expedite attendance processes. Matrix's solution Matrix efficiently addressed these requirements by offering solutions that enhanced its client's attendance management systems. The company implemented its Instant Face-based Time Attendance Management Solution, delivering the following benefits: Centralised Attendance Management for Streamlined Employees: Matrix provided a comprehensive time attendance solution with centralised management capabilities. This allowed the client to have unified control over employee attendance from various mine locations, simplifying the overall management process. Employee Self-Service Portal for Quick Access to Leave and Attendance Management: In addition to the time-attendance solution, Matrix introduced its employee self-service portal, offering employees convenient ways to update leave information and facilitating smoother leave approval processes. Instant Face Recognition for Seamless Employee Identification: Matrix deployed COSEC ARGO FACE for rapid face recognition. With a recognition speed of less than 0.5 seconds, this device enabled the client to achieve high-speed face-based attendance. This accelerated the attendance marking process across all mine locations. The integration of Matrix's face-based Attendance Solution, along with an instant face recognition door controller, significantly enhanced the client's attendance operations, leading to heightened operational efficiency throughout the organisation. Application scenario Results Instant Face-based Time Attendance Management Solution Employee Self-Service Portal facilitated seamless leave and attendance management for employees Matrix adeptly tackled the intricate challenges faced by this Central African mining entity, elevating attendance management and employee engagement. By implementing the Instant Face-based Time Attendance Management Solution, Matrix not only centralised attendance management across diverse mine locations but also introduced an Employee Self-Service Portal. This portal facilitated seamless leave and attendance management for employees, promoting transparency and efficiency. Operational efficiency The integration of COSEC ARGO FACE ensured rapid face recognition, reducing identification time to less than 0.5 seconds. The holistic solution significantly enhanced operational efficiency, providing the mining company with streamlined attendance processes, improved employee interaction, and heightened overall organisational effectiveness.
RecFaces, an international facial recognition software developer played an indispensable role in promoting and maintaining safety during the Brazilian Carnival 2024. The company's one of the best and highly accurate products, Id-Guard, was applied to secure an open-air carnival and turned out to be a great solution to the security challenges faced. Facial recognition software The cameras equipped with facial recognition software were placed at mobile control checkpoints, which enabled people to move around and take part in live processions happening at the venue. Because of its fast identification ability, smart surveillance, and immediate notification of unwarranted persons present in the audience, facial recognition technology proved to be a good alternative for securing big events and carnivals. Accurate threat detection alerts FRS minimises human error and removes proximity challenges of mobile authentication FRS minimises human error and removes proximity challenges of mobile authentication. In the present-day security landscape, FRS becomes prominent as it contributes to the overall security of big public places, by producing quick but accurate threat detection alerts. Id-Guard's performance Maria Kazhuro, Business Development Director of RecFaces in the LATAM region, expressed pride in Id-Guard's performance, stating, "We are proud to say that our solution has once again performed exceptionally well in supporting security services during a mass outdoor event even under complex conditions of low light, high traffic, masked visitors and crowd." Maria Kazhuro adds, "Confidence in the quality of our facial recognition solutions allows us to look forward to the future with optimism and meet the demands of the most discerning customers. As expected, Id-Guard was vastly praised for being the best solution that elevated the security of the event." Public safety RecFaces will remain in the lead of technological innovation, and thus, it will support and ensure the enhancement of public safety and the well-being of citizens. While Brazilian Carnival 2024 progressed, RecFaces gained a reputation as an indispensable partner ensuring visitors’ safety with its novel facial recognition technology.
Racehall, located in Aarhus and Copenhagen, Denmark, is renowned as the world's longest indoor go-karting track facility, providing an unparalleled experience to all its visitors. Racehall is for everyone, big or small, amateurs or professionals; it is dedicated to ensuring that every aspect of visitors' experience is exceptional. This commitment includes maintaining high standards of quality equipment, prioritising safety, and offering top-notch service. Challenges Ensuring the safety and security of the patrons and the facility is a top priority for Racehall. Given the size and popularity of Racehall’s go-karting tracks, addressing security challenges effectively was imperative. These challenges included: Protecting Racehall’s assets, such as high-end go-karts, valuable equipment, indoor facilities, the outdoor parking lot, and the outdoor fuel tank area. Dealing with limited coverage pioneering to potential blind spots and security vulnerabilities. Addressing the lack of precise data for informed business decisions. Balancing security measures without disrupting the enjoyment of visitors. Maintaining a high level of security without compromising the enjoyable experience, while preventing incidents and enhancing the overall safety of visitors. Solution To overcome the security challenges Racehall faced, Racehall turned to VIVOTEK, the global pioneering IP security solution provider, to implement a comprehensive security system. The project was expertly executed by the trusted partner, ITV Security, under the guidance of CEO Martin Kristensen. Advantage 1: Effective Asset Protection VIVOTEK's security solutions played a vital role in guarding Racehall's valid assets VIVOTEK's security solutions played a crucial role in safeguarding Racehall's valuable assets, including go-karts and equipment. High-resolution video feeds and instant alerts were instrumental in identifying and responding to any suspicious activities, extending to the protection of the outdoor fuel tank area. The explosion-proof camera system provides an added layer of security, allowing continuous monitoring of the fuel tank without compromising safety standards. Advantage 2: Comprehensive 180/360-degree Surveillance VIVOTEK strategically deployed state-of-the-art surveillance cameras across the facility, ensuring complete coverage. The 180-degree surveillance effectively covered expansive areas like the parking lot without blind spots, minimising installation costs. Advantage 3: Optimising Business Performance with Business Intelligence VIVOTEK's people counting camera provided Racehall with invaluable data to make informed decisions for optimising business performance. Strategic planning of staffing levels and tailored promotional activities became more precise, enhancing overall operational efficiency. Advantage 4: Seamless Integration for Uninterrupted Enjoyment VIVOTEK's solution seamlessly blended into the Racehall experience, ensuring that security measures did not compromise the enjoyment of visitors. The installation of high-quality, high-resolution 4K cameras on the track allowed for track racing playback, enhancing the overall experience for visitors without disrupting the entertainment factor. Advantage 5: Efficient Surveillance Management with VAST Security Station (VSS) VIVOTEK's VSS Pro VMS and CMS played a key role in optimising Racehall's safety infrastructure VIVOTEK's VSS Pro Video Management System (VMS) and Central Management System (CMS) played a pivotal role in optimising Racehall's security infrastructure. The VSS Pro VMS/CMS streamlined surveillance management, allowing centralised control and monitoring of multiple cameras across the facility. This centralised approach not only enhanced real-time monitoring capabilities but also facilitated quick responses to security incidents, ensuring a proactive and efficient security system. Results and Customer Feedback "We were absolutely delighted to roll up our sleeves and work closely with Racehall to bring the VIVOTEK surveillance solution into play. It's been a fantastic experience to see how our dedication to crafting tailor-made security solutions has met with Racehall's wishes and needs. We've worked hand in hand to create a safer and more entertaining experience for Racehall's visitors," - Martin Kristensen, CEO of ITV Security. In conclusion, VIVOTEK's partnership with Racehall and ITV Security enabled the comprehensive addressing and overcoming of security challenges in this case. The implementation of VIVOTEK's surveillance solutions has not only elevated the safety and security of the facility but has also played a crucial role in sustaining the joy and excitement that define the Racehall experience. This collaboration helps Racehall take pride in continuing to deliver a world-class go-karting experience for all visitors, prioritising their safety and peace of mind.
360 Vision Technology, the UK manufacturer of ruggedised HD, radar, and thermal PTZ imaging cameras, has been chosen to supply the camera surveillance technology for a historically important English Heritage site, at the Transit Shed, Exeter Quayside. Installed by Select Electrics and specified by Derek Maltby of Global MSC Security, the inclusion of additional CCTV was required to monitor the Exeter Quayside area, covering the canal side, shops, restaurants, bars, and attractions. Security and safety Kevin Tyrrell, CCTV Technical Manager for Select Electrics explains the requirement for an expansion to the current CCTV system, “With accessible funding granted from a successful Safer Streets 2 application, Exeter City Council looked to expand the surveillance coverage of the Quayside area and integrate it into the existing town centre CCTV network, for monitoring at the Exeter City Council control room." “Coverage was required to provide safety and security surveillance in an area that is popular with both locals and visitors. Additionally, as the Quayside includes a canal side, should coverage of the canal be required in an emergency, high-definition footage of any incident here would be advantageous.” High-definition images We required a camera that would provide reliable HD images but also one that would withstand high winds" With all these requirements considered and the tender bid successfully accepted by the council, Select Electrics was selected to implement the expansion of surveillance coverage. “To cope with the harsh conditions to be found at Exeter Quayside, we required a camera that would not only provide reliable high-definition images but also one that would withstand high winds and rain, that can combine to make a difficult operational environment for electronic equipment, such as a CCTV camera,” continues Kevin. Camera applications “We’ve enjoyed a long-term technical relationship with 360 Vision Technology for several years, having employed their camera technology in many varied applications, and based on this experience, we were confident in their ability to provide a camera that could satisfy our demanding requirements.” “Additionally, and further complicating matters regarding the installation of cameras, many parts of the Quayside area are historically important, such as the cobbled areas and streets, as well as the English Heritage-protected Transit Shed, which occupies a large part of the area.” Need for an alternative solution The logistical effects of installing traditional CCTV infrastructure were considered too disruptive and expensive" The centrepiece for many music, dance, and street theatre events held in the area, the Transit Shed is an open-plan building set on cast iron uprights, historically, used to store cargo unloaded from ships. “The historically important parts of the area could not be disturbed,” adds Derek Maltby. “The logistical effects of installing traditional CCTV infrastructure, such as fibre cabling under streets and a network of CCTV cameras on poles was considered too disruptive and prohibitively expensive so an alternative solution needed to be found.” Perfect line-of-sight “We have always had a great relationship with the research and development team at 360 Vision and this project was no different." "We had identified the Transit Shed as a possible location for the siting of a single PTZ camera, where it would have a perfect line-of-sight to all of the areas that required coverage on this project, but we knew that any camera mounted on, or near the Transit Shed would have to meet strict English Heritage requirements, including a specific body colour, to match the exact heritage hue of the Transit Shed, to blend within the historic architecture." Invictus TX wireless camera Very quickly, we determined a solution using the 360 Vision Invictus TX wireless camera" “We outlined the technical requirements and restrictions of the project to the team at 360 Vision and were delighted with their enthusiasm and technical understanding of the demanding requirements of this installation." "Very quickly, we determined a solution using the 360 Vision Invictus TX wireless camera but in a one-off specific colour, specifically matched to blend with the painted roof of the Transit Shed.” Key features of the camera With continuous rotation pan, unobstructed 360-degree view, and 160-degree tilt, the 360 Vision Invictus camera can deliver unhindered views to the control room and for night-time vision, is equipped with on-board LED white light technology. Considering camera performance, unlike many other camera products that utilise ‘belt-drive’ PTZ systems, Invictus incorporates ultra-reliable and extremely quiet Direct Drive mechanisms, resulting in consistent pre-set accuracy and long-term reliability for its installation at the Quayside. HD and ultra-low-light camera imaging The camera is designed to provide trouble-free service in harsh Quayside conditions The Invictus TX’s high-performance, ruggedised PTZ camera with full 1080P HD and ultra-low-light camera imaging technology, made it the perfect choice for deployment in this application. Supplied in a specific green Pantone reference, the camera is designed to provide years of trouble-free service in harsh Quayside conditions and provides comprehensive coverage of the area, at a fraction of the cost of multiple traditional units and associated traditional hard-wired transmission infrastructure. Day and night surveillance “In operation, system operators can instantly switch on the LED white light mounted onboard the Invictus camera, to illuminate the scene and inform people at the Quayside that they are being monitored, both for security and safety purposes, for example, if anyone falls into the water at the Quayside at night,” adds Dennis Cavanagh, Control room Operations Manager, Exeter City Council. “Since the 360 Vision Invictus TX camera has been added into the system, we have had many positive comments from residents and local businesses, complementing the non-invasive nature of the colour-matched camera in the historical surroundings and confirming the feelings of security the camera coverage now provides to the area both during the day and night.” Increase surveillance coverage The combined Invictus TX camera and integrated LED white light technology make it the perfect choice" The Invictus camera on the Transit Shed is part of a wider project to increase surveillance coverage and improve image quality across the Exeter CCTV network, with over 40 cameras already installed to either replace existing cameras or extend coverage to new areas, as part of a rolling programme of improvement made possible by funding from Safer Streets Fund. Jason Wyatt, National Account Manager at 360 Vision Technology says, “The combined Invictus TX camera and integrated LED white light technology makes it the perfect choice for the technically demanding environment at the Exeter Quayside." Surveillance upgrade "Invictus’ ultra-low light technology from 1/1.9’’ ULL sensors also delivers a brighter, crisper, and more defined colour images at night, for the ultimate performance at the Quayside." "We are proud to have delivered a bespoke Invictus camera version in a one-off colour, to enable use on the English Heritage protected Transit Shed, as part of an overall upgrade to the Exeter City Council city-wide CCTV network and its ongoing surveillance upgrade using 360 Vision’s Invictus cameras.”
Gallagher Security is proud to be securing the world’s largest commercial office building as India’s Surat Diamond Bourse (SDB) officially opens its doors this week. Described as a ‘one-stop’ destination for over 65,000 diamond professionals, the newly opened SDB is a 15-storey complex, spread across more than 35 acres, and comprising over 7.1 million square feet of floor space. SDB is the world’s largest single complex, consisting of nine towers and containing an independent customs office, international banking facilities, and diamond-testing laboratories, among other businesses. Surat Diamond Bourse features Gallagher Command Centre was the preferred solution for the SDB project, providing encrypted high-end security" Gautham N.V., Gallagher Head of Sales and Marketing India, says, “Gallagher Security’s award-winning site management platform Command Centre was chosen to secure the complex and provide a seamless, integrated security experience that prioritises security, safety, and convenience for staff and visitors. The Surat Diamond Bourse features more than 700 doors, 650 readers, and multiple system integrations specific to this unique project. Gallagher is proud to be securing the world’s largest office building and we congratulate everyone involved in bringing this project to life.” He adds, “Gallagher Command Centre was the preferred solution for the SDB project, providing encrypted high-end security and cyber protection, a streamlined approach to site management, and seamless third-party integration capabilities including our partner IDEMIA’s biometric readers, Verint C41 command application and single sign on and IT management solutions.” Variety of systems and hardware The official inauguration of SDB took place on December 17th and was officiated by India’s Prime Minister, Shri. Narendra Modi. Trusted to protect some of the world’s most critical infrastructure, the Command Centre is designed to integrate seamlessly with a wide variety of systems and hardware, creating a single operating platform that manages total site security.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Video surveillance has been a dominant factor in the casino market since the 1950s when video replaced the use of elevated walkways that allowed casino security personnel to monitor the gaming floor from above. As technology continues to evolve, we can expect to see more innovative uses of video in the casino market. Beyond video, other technologies are also transforming the casino experience. We asked this week’s Expert Panel Roundtable: How are new technologies impacting the casino surveillance and security market?
An organisation’s security director manages a staff of security personnel, implements and enforces security policies and procedures, and generally ensures the safety of personnel and visitors to the organisation’s premises. Over the years, the role of security director has expanded to include new disciplines such as cybersecurity. More and more, security directors are also taking a “seat at the table” as integral and critical members of a company’s management team. We asked this week’s Expert Panel Roundtable: How is the job of "security director" expanding, and what is the impact on technology?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
White papers
![Guide for HAAS: New choice of SMB security system](https://www.sourcesecurity.com/img/white-papers/612/920x533_1714665429.jpg)
Guide for HAAS: New choice of SMB security system
Download![Access control: The enterprise buyer's guide](https://www.sourcesecurity.com/img/white-papers/612/920x533_1696261120.png)
Access control: The enterprise buyer's guide
Download![Combining access control and intercoms for better security](https://www.sourcesecurity.com/img/white-papers/612/woman-keycard-920x533.jpg)
Combining access control and intercoms for better security
Download![Video technology strategies for hospitals are moving beyond security](https://www.sourcesecurity.com/img/white-papers/612/healthcare-2.jpg)
Video technology strategies for hospitals are moving beyond security
Download![Smart surveillance in the workplace](https://www.sourcesecurity.com/img/white-papers/612/920x533.png)
Smart surveillance in the workplace
Download![Creating a secure and positive healthcare experience](https://www.sourcesecurity.com/img/white-papers/612/asset-image-920x533_1658397645.jpg)
Creating a secure and positive healthcare experience
Download![Top 5 ways to ensure visitor safety and security](https://www.sourcesecurity.com/img/white-papers/612/forge-access-control-920.jpg)
Top 5 ways to ensure visitor safety and security
Download![Beyond security: access control for multi-tenant sites](https://www.sourcesecurity.com/img/white-papers/612/920x533.jpg)
Beyond security: access control for multi-tenant sites
Download![Financial institutions require future-ready physical security technologies](https://www.sourcesecurity.com/img/white-papers/612/financial-security-920x533.jpg)
Financial institutions require future-ready physical security technologies
Download![Is your access control system as secure as you think?](https://www.sourcesecurity.com/img/white-papers/612/HID-asset-7-access-620.jpg)
Is your access control system as secure as you think?
Download![Visitor Management: A Guide to Selecting and Employing a New Solution](https://www.sourcesecurity.com/img/white-papers/612/hid-vms-620x360.jpg)
Visitor Management: A Guide to Selecting and Employing a New Solution
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)