Wireless security
Interface Systems, a pioneering managed service provider of security, actionable insights, and purpose-built networks for multi-location businesses, has identified key security and technology trends that will shape retail and restaurant security in 2025. As threats evolve and technology accelerates, Interface anticipates a convergence of AI, advanced video analytics, and smarter monitoring solutions to drive more proactive and efficient business security systems. Growing sophistication of reta...
Gunnebo Entrance Control has launched a downloadable white paper investigating why businesses should encourage active commuting. With active transport (walking and cycling) making it onto the decarbonisation agenda for the first time at COP29, ‘Encouraging Healthier Commuting’, looks at the positive environmental and health benefits of cycle commuting and how employers can encourage it as a way of travelling to work. Secure entrance control solutions Revealing the boost to heath,...
adCAPTCHA, the specialist security verification platform, has partnered with the agency Wild Parrot to reach 99 percent bot stoppage across its web platforms. Wild Parrot, a dynamic web builder agency, faced bot infiltration across their web platforms, disrupting user experiences and compromising security for numerous Wild Parrot clients. Impact of bot-driven activities Wild Parrot selected adCAPTCHA for its proven track record and innovative path to blocking bot activity This widespread iss...
OSI Systems, Inc. (the “Company” or “OSI Systems”) announced that its Security division received an order for approximately $27 million to provide a range of checkpoint and hold baggage screening solutions to an international customer. Aviation security products Among the systems to be delivered are the RTT® 110 (Real Time Tomography) explosive detection system for screening hold baggage, Orion® 920CT (Computed Tomography) checkpoint screening system integrate...
Siemens is showcasing its vision for the future where data, AI and software-defined automation will converge to enable unprecedented flexibility, optimisation and continuous improvement across the world’s industries, for companies of any size. This ambition is at the heart of Siemens' presence at CES 2025, the world's most influential tech event. Siemens – the global pioneer in industrial software –demonstrated how its technologies are empowering customers to take bold leaps i...
ZBeta, a pioneer in delivering comprehensive physical security consulting services, announced that Jaret Alexander has been appointed Vice President of Design Services. In this role, he leads ZBeta's technical and operational teams, driving strategic growth and operational excellence. He ensures teams are equipped to deliver high-quality, innovative solutions, while fostering leadership development, optimising processes, and working to position the organisation for long-term success. Pri...
News
DICE Corporation is thrilled to announce the promotion of Jennifer Balash to Senior Vice President and Head of Global Sales. This announcement follows the recent retirement of Avi Lupo, a long-time industry veteran who served as Executive Vice President overseeing sales and business development. In her new role, Jen will lead and oversee DICE’s Internal and External Sales Teams on a global scale, driving the company’s mission to deliver the most advanced AI-driven automation and video event management solutions worldwide. DICE toward ambitious goals “Jen’s proven track record and her 16 years of dedication to DICE make her the ideal pioneer for this role,” said Clifford Dice, President & CEO of DICE Corporation. Clifford Dice adds, “Her exceptional leadership, strategic vision, and commitment to innovation have already made a tremendous impact. I am confident that she will continue to propel DICE toward achieving our ambitious global goals.” A proven pioneer with a legacy of excellence Jen joined DICE Corporation in 2009 as a member of the sales department Jen joined DICE Corporation in 2009 as a member of the sales department. Over the years, she has excelled in roles spanning multiple departments, including her most recent position as Director of Project and Account Management. In this capacity, Jen successfully managed new system installations and deployments while pioneering DICE’s National Accounts division, achieving record-high revenue for the division over the past three years. Jen’s appointment reflects her unwavering dedication and the trust placed in her to lead DICE’s global sales strategy into the future. Looking ahead As Senior Vice President and Head of Global Sales, Jen will play a critical role in shaping DICE Corporation’s expansion and reinforcing its position as a major firm in the security and automation industries.
ISC West 2025 opens registration with its premier sponsor, the Security Industry Association (SIA). Taking place March 31–April 4 (SIA Education@ISC: March 31–April 3|Exhibit Hall: April 2-4) at The Venetian Expo in Las Vegas, ISC West will feature an additional day of education for the first time in the event’s history. Now spanning four days, SIA Education@ISC returns bigger and more impactful than ever. The expanded program features over 110 sessions led by 220 industry experts, providing insights into AI & digital transformation, cybersecurity & IT, IT for physical security, and security design. Forefront of security innovation ISC West offers an unparalleled opportunity to experience the forefront of security innovation Attendees and exhibitors alike will gain the critical expertise needed to navigate the security industry’s evolving landscape. With over 750 exhibitors, ISC West offers an unparalleled opportunity to experience the forefront of security innovation. The expansive show floor represents a convergence of established industry pioneers and pioneering startups, presenting a diverse array of cutting-edge solutions and products. The exhibit hall will also feature the return of popular attractions such as The Bridge, Career Zone, Cyber Hub, and SIA NPS display area, alongside exciting new areas set to be unveiled in the new year. Future of security "ISC West is more than just a trade show; it’s the heartbeat of the security industry,” said Mary Beth Shaughnessy, Event Vice President. “With the largest education program in our history and an impressive roster of exhibitors, ISC West continues to define innovation, foster connections, and offer solutions to the challenges of today and tomorrow. It is a must-attend event for those who drive the future of security." Three dynamic keynotes The live performance will feature a show-stopping act, with the talent reveal scheduled for January The Main Stage at ISC West will also serve as a hub for thought leadership and networking, hosting three dynamic keynotes presented by visionary pioneers. Adding to the excitement, the Main Stage will once again host the highly anticipated ISC West Concert on Wednesday, April 2 at 5 p.m. After wowing attendees and exhibitors in 2024, this high-energy event promises a night filled with entertainment, community, and celebration. The live performance will feature a show-stopping act, with the talent reveal scheduled for January. SIA’s on-site training courses “ISC West is an event that is not to be missed in our industry, and SIA is proud to be the premier sponsor of this top-quality event each year,” said SIA CEO Don Erickson. “In addition to discovering a variety of innovative technologies, ISC West attendees have access to enriching and impactful education, hear from top experts in security and can enjoy an array of engaging events at the show. We look forward to seeing you for 2025 ISC West offerings, including the robust SIA Education at ISC West conference program, the renowned SIA New Products and Solutions Awards, SIA’s on-site training courses on security project management, cybersecurity and interoperability and our slate of networking, professional growth and membership events.” Steps to reduce environmental footprint With a multi-year goal of diverting 90% or more of event material waste from landfills, ISC West is steadfast in its commitment to sustainability. Building on the success of 2024, where 77% of event waste was recycled or composted, ISC West continues to take significant steps to reduce its environmental footprint. By collaborating with exhibitors and attendees, they aim to adopt greener practices, minimise waste, and make strides toward a more sustainable future. Further information about education, programming, and premier speakers will be announced soon. For the most up-to-date information or any additional questions, please visit the ISC West website.
IDEMIA Public Security North America, the provider of secure and trusted biometric-based solutions, in partnership with the West Virginia Division of Motor Vehicles (DMV), is proud to announce the launch of the next generation of mobile ID (MID) in the state. West Virginia residents will have access to enhanced security and convenience when presenting their ID for airport security screening, age-restricted products, and other identity checks. West Virginia mID app The West Virginia mID app, available for free download from the Apple App Store or Google Play, allows residents to store and manage their identification credentials on their smartphones, incorporating advanced encryption and biometric authentication to protect personal information. West Virginia Residents can use the app to verify their identities directly from their mobile phones at TSA PreCheck® Checkpoints at participating airports across the country. Digital solution West Virginia residents can also expect to see mobile ID expand to OEM wallets in the future This digital solution is designed to streamline interactions with government agencies, businesses, and various service providers, offering a modern method of identification. West Virginia residents can also expect to see mobile ID expand to OEM wallets in the future. Convenient, digital, and secure services "Under the Leadership of Governor Justice and Secretary Wriston, the West Virginia DMV has continued to offer faster, more convenient, digital, and secure services for the citizens of West Virginia." "Having the opportunity to provide the State of West Virginia with a Mobile ID will only enhance the citizen experience by moving the State in a direction that keeps us moving forward with more advanced technology," said Everett Frazier, Commissioner for the West Virginia Division of Motor Vehicles. Privacy and interoperability The app is designed to conform to the ISO standard for ISO 18013-5 offering a high level of assurance As an advanced and secure identity credential, the West Virginia mID app was created with IDEMIA’s patented technologies, robust security features, and a focus on privacy and interoperability at the forefront of the technology. The app is also designed to conform to the International Organization for Standardization (ISO) standard for the mobile driving license (ISO 18013-5), offering a high level of assurance that West Virginia residents and relying parties of mobile ID can trust. Contactless alternative IDs "I’m excited that we have worked with West Virginia to bring their residents an efficient and contactless alternative to physical IDs. It is also secure as only mobile ID holders can unlock their app using their biometrics or a personal six-digit PIN, ensuring exclusive access," said Donnie Scott, CEO of IDEMIA Public Security North America "Even better users have full control over when and with whom they share their information, giving them more privacy compared to traditional physical credentials. They can decide to share complete personal information, or for example, just their birth date when making an age-restricted purchase." Mobile ID The launch of mobile ID in West Virginia demonstrates IDEMIA’s ongoing efforts to advance digital identity and solutions for public and private sector use. Arizona, Delaware, Iowa, Mississippi, and New York are additional states that have rolled out IDEMIA’s mobile ID technology, with more states to launch later this year.
Robotic Assistance Devices, Inc. (RAD), a subsidiary of Artificial Intelligence Technology Solutions, Inc., is gearing up for the deployment of its revolutionary solution, SARA™ (Speaking Autonomous Responsive Agent). Designed to enhance the efficiency and effectiveness of Global Security Operations Centres (GSOCs), SARA leverages advanced AI capabilities to automate traditionally costly and labour-intensive monitoring tasks. SARA: Built to transform security operations SARA represents the next step in RAD’s mission to redefine security monitoring. By combining intelligent response systems with seamless integration into existing infrastructures, SARA is poised to deliver a scalable, high-performing alternative to traditional GSOC staffing models. Its core functionalities include: Cost Optimisation: By automating routine tasks, SARA offers the potential to significantly reduce operational costs, freeing up resources for higher-level strategic needs. Incident Escalation: SARA autonomously evaluates and manages escalations, ensuring precise and timely communication to designated parties. Promotional offer for RAD customers RAD is offering its existing customers four months of complimentary access to SARA To support the introduction of SARA, RAD is offering its existing customers four months of complimentary access to SARA when they act before March 31, 2025. This promotion underscores RAD’s commitment to empowering its customers with innovative solutions that drive measurable value. Experience SARA firsthand RAD invites security professionals, property managers, and industry pioneers to schedule private demonstrations of SARA to explore its capabilities. Demonstrations are tailored to showcase how SARA can integrate seamlessly into its existing security frameworks while delivering operational improvements. Innovative solution for security operations “We are excited to bring SARA to the market as an innovative solution for security operations,” said Steve Reinharz, CEO/CTO of AITX and RAD. “As we finalise preparations for its release, we are confident that SARA will address critical pain points in monitoring and response, enabling organisations to enhance their security capabilities with efficiency and precision.” Discover the future of security RAD solutions are specially designed to provide cost savings to firms of between 35%-80% AITX, through its subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the nearly $50 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. RAD solutions are specifically designed to provide cost savings to businesses of between 35%-80% when compared to the industry’s existing and costly manned security guarding and monitoring model. Mobile robotic solutions RAD delivers these tremendous cost savings via a suite of stationary and mobile robotic solutions that complement and, at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics and software platforms are developed in-house. RAD has a prospective sales pipeline of over 35 Fortune 500 companies and numerous other client opportunities. RAD expects to continue to attract new business as it converts its existing sales opportunities into deployed clients generating a recurring revenue stream. Each Fortune 500 client has the potential of making numerous reorders over time.
Securitas Technology, a world pioneer and global provider of security, health, and safety technologies, is proud to announce the acquisition of Sonitrol New Orleans. This strategic move underscores Securitas Technology’s ongoing commitment to innovation, client-centric solutions, and expanding its geographic footprint to better serve clients across North America. Securitas Technology portfolio Sonitrol New Orleans, known for its expertise and pioneering Sonitrol audio sensor technology, now joins the Securitas Technology portfolio. With this acquisition, Securitas Technology strengthens its position as one of the largest providers of Sonitrol solutions in North America. “This acquisition aligns with our focus to deliver cutting-edge security solutions while keeping our clients at the centre of everything we do. We are proud to welcome the talented Sonitrol New Orleans team to Securitas Technology and look forward to driving technology innovation that adds value for our clients,” said Tony Byerly, Global President and CEO, Securitas Technology. Advanced security technology Sonitrol’s rich legacy of innovation dates back over 60 years, with achievements such as false alarms Sonitrol’s rich legacy of innovation dates back over 60 years, with achievements such as reducing false alarms and enhancing verified responses. Together, Securitas Technology and Sonitrol New Orleans will combine their expertise, leveraging advanced security technology for clients in North America. “This partnership brings together two pioneers in the security industry, blending Sonitrol’s unique capabilities with Securitas Technology’s expansive technology resources,” said Kevin Engelhardt, President North America, Securitas Technology. Innovative solutions Engelhardt added: “It marks a significant milestone in our journey to provide innovative solutions that safeguard what matters most to our clients.” Securitas Technology continues to enhance its offerings and maintain a strong focus on sustainability, innovation, and excellence in client service.
PureTech Systems Inc., a pioneer in geospatial AI-boosted video analytics for wide-area perimeter and border security, announced the successful completion of system acceptance testing at a major U.S. metropolitan rapid transit agency. The testing demonstrated the company’s capability to address a significant safety and operational challenge: detecting debris and items on transit tracks to mitigate disruptions and enhance commuter safety. PureTech's RIDS Solution PureTech's RIDS for Rapid Transit agencies proved to be a game-changer by detecting obstacles The rapid transit agency sought a reliable, time-tested solution to combat recurring issues with objects coming onto the tracks—posing risks to passenger safety, causing costly delays, and disrupting the efficiency of the transit system. PureTech's RIDS Solution for Rapid Transit agencies, powered by its patented, geospatial AI-boosted video analytics, proved to be a game-changer by accurately detecting obstacles on the tracks in real-time. PureTech Systems’ commitment “This testing underscores PureTech Systems’ commitment to innovation in protecting critical infrastructure and enhancing public safety,” said Larry Bowe, President of PureTech Systems Inc. “The successful testing demonstrates our ability to provide precise, reliable, and scalable solutions for the unique challenges faced by rapid transit agencies.” Key highlights of the system High Precision Detection: The RIDS system achieved exceptional accuracy in identifying and locating obstacles on the tracks with nearly zero nuisance detections, even in high-traffic and low-visibility conditions. Real-Time Alerts: Operators receive immediate notifications, enabling rapid response and minimising operational disruptions. Seamless Integration: The system seamlessly integrates into the transit agency’s existing infrastructure, ensuring operational continuity. PureTech Systems’ reputation The successful testing reinforces PureTech Systems’ reputation as a trusted provider of innovative solutions for critical infrastructure protection. As urban areas continue to rely on rapid transit systems, the ability to proactively address track safety challenges will play an increasingly vital role in ensuring the smooth and safe operation of these essential services.
Expert commentary
In the past, security and IT teams operated independently, but today collaboration is critical. Modern security systems rely on various devices and systems that are linked to internal and external networks. Without IT involvement, physical security can become a weak point for cybersecurity. Although these groups have made headway in partnering up to ensure the successful implementation of new solutions, often there’s still a disconnect. Differing skills, priorities, and unique ways of thinking have contributed to siloed ways of working. Unified security technologies Thankfully, solutions do exist to help improve coordination between teams and departments Other factors can also make collaboration more difficult. Budget limitations and staff turnover may result in a lack of specialised security training among operators, who don’t know which stakeholders to engage or when. Staff may be willing to collaborate, but do they know who should be alerted when there’s an event? If everyone is alerted to everything, those who don’t need that information will eventually start to tune out. Thankfully, solutions do exist to help improve coordination between teams and departments. Unified security technologies can enhance collaboration, streamline communication, and improve response times. This enables cross-functional teams to respond faster, make better decisions, and work together to enhance overall security. IT and physical security teams Physical security teams are experts at identifying and mitigating physical threats to the organisation. IT teams know the ins and outs of keeping systems and networks secure. Both roles and skill sets are critical to securing the enterprise, but siloed operations create barriers to effective collaboration. Because IT and physical security teams have different mandates, meeting the needs of both can be tricky. In some organisations, different departments or specialties also have their own reporting structure and may have different ways of working. Silos may even exist within departments. Overcoming challenges to collaboration Addressing these challenges is the first step toward improving collaboration For example, floor security, dispatchers, investigators, and loss prevention specialists may be used to operating independently in their day-to-day routines. They may not always share data or involve each other in decision-making. Pioneers of these departments are used to being in charge of their domains and may resist initiatives that appear to threaten this independence. Addressing these challenges is the first step toward improving collaboration. Organisations need effective tools to filter out the noise and ensure that the right people get the information that’s relevant to them every time. There are tools available to help teams collaborate effectively, stay accountable for completing tasks, and keep track of what’s been done while maintaining departmental goals and objectives. The right technology can help break down silos The first step to improve collaboration is to break down silos between your security systems. Choosing a unified security platform creates a solid foundation for cross-functional collaboration. It ensures that your physical security and IT teams are reading from the same database. Everyone can see potential risks across both digital systems and physical sites. Unified security solutions centralise monitoring, alarm management, and reporting in a single interface. This helps security teams manage incidents, run investigations, and oversee all security policies. Risks of real-time cybersecurity Data from security systems can be useful to analyse and improve operations and customer experience Within the same platform, IT experts can have a comprehensive view of real-time cybersecurity risks. They can also implement a single data protection and privacy strategy across all locations. Built-in cybersecurity tools help to standardise encryptions, multi-factor authentications, user privileges, and more across the enterprise. In many organisations, colleagues from other departments also find great value in having access to this information. Data from security systems can be useful to analyse and improve operations, customer experience, facilities management, and more. There are many ways to collaborate using a unified security system. Depending on your goals and operating procedures, you have different ways to go about it. The starting point is always to simply get everyone on the same page. Leveraging technology for more effective collaboration A unified security software platform can not only manage your video surveillance, access control, automatic licence plate recognition (ALPR), and other physical security systems, but also data from many other kinds of IoT devices and databases. The volume of data is immense, but thankfully these systems can offer ways to filter out the noise and keep operators focused on the most relevant data for their work. Being able to quickly gather, analyse, and share data with other team members can make or break an emergency response. In one case, an attack at a convention centre was thwarted after a team member monitoring social media mentions of an event noticed threats published online. When security operators were alerted, they were able to use video analytics to identify the suspect at the event. Using a unified security platform, the operators were able to send the camera view to other team members near the suspect. In the end, they were able to stop the attack through multi-departmental collaboration. Right security platform The right security platform can also help you drive more effective and proactive operational decision-making The right security platform can also help you drive more effective and proactive operational decision-making. When bringing datasets from disparate systems together, it's easier to discover relationships and make changes to business operations. For example, in a retail environment, combining access control, heat maps, and point of sale (POS) data can provide insights into customer activity. This kind of data may be used for things like loss prevention, but it can also be helpful to improve customer experience by improving traffic flow or directing staff toward the busiest areas of the store. The importance of automation One of the most important ways a unified security platform can optimise operations and encourage collaboration is to leverage automation to prioritise and triage alerts. This reduces false alarms and streamlines emergency responses. The reality today is that security operators aren’t always specialists. In K-12 school campuses, for example, the person monitoring the system is often an administrator or teacher. A non-specialist operator may be comfortable using the system in their day-to-day routine, but what about when the unexpected happens? If they don’t know what to do in an emergency, precious time may be wasted while they look up written instructions or call a colleague to help. Instead of keeping your SOPs in a paper binder, you can digitise them so that your security platform guides operators. They immediately have the steps to follow in an emergency. The system can even automatically alert internal or external stakeholders if certain conditions are met. Pros of automation Automation may also reduce false alarms. Nuisance alerts are a real problem for many organisations because they pull resources away from important tasks. When there are many false alarms, operators can also become desensitised to them, which slows response in a real emergency. Nuisance alerts are a real issue for many corps because they pull help away from vital tasks There are several ways that a unified security platform reduces false alarms. When data from multiple systems is brought into the same platform, a door-forced-open event can be cross-referenced with footage from nearby cameras or motion sensors. The system is programmed to do this automatically and issue a priority alert if there’s both a door forced open and motion detected in a restricted zone. Or, when a door open alert happens, the system can direct operators to first check nearby cameras and then decide whether or not to send a security guard to investigate. Every organisation is unique and automations will reflect that. Stadiums or public transit may want to automate notifications to stakeholders’ phones, change the message on a digital marquee, or broadcast a public announcement when there’s something to communicate. In a school context, perhaps there is a panic button under the front desk, which triggers a threat alert. When the button is pressed, all classroom doors are locked from the outside. Teachers can get a text message notification warning them about the threat, and local police are alerted instantly. Practical steps for building a collaborative security environment As exciting as it can be to explore the possibilities of new technologies, it’s important to have realistic expectations. Start with small steps and simplify as much as possible. Operators require time and training to adapt to new systems, and teams that have been working independently may need time to develop rapport and trust with each other. When adopting new technologies, a phased approach is often best to avoid overwhelming staff. If staff are resistant to change, focus on understanding their perspective: what are they trying to accomplish? What motivates them? What are they afraid of? Once you understand what’s driving their objections, you can come up with solutions to work through concerns. In today's rapidly evolving security landscape, fostering collaboration between physical security and IT teams is no longer a luxury—it's a necessity. By breaking down silos, leveraging integrated security technologies, and embracing data-driven decision-making, organisations can significantly enhance their operational efficiency and response capabilities.
In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security professionals aren’t doing their job unless they take all possible precautions to lock down unauthorised access to camera systems, access control platforms, intercoms, and other network-based security devices and solutions. Let’s explore the many steps companies should take throughout their security technologies’ lifecycle – from choosing a vendor all the way through device decommissioning – to avoid making the common mistakes that leave systems, and the networks they reside on, vulnerable to attack and sabotage. Prepurchase phase: Laying the groundwork for cybersecurity 1. Conduct a Vendor Risk Assessment IT departments often rely on the same Vendor Risk Assessment criteria they use for evaluating IT equipment manufacturers when considering the suitability of physical security vendors. While commonalities exist between how to assess these disparate solutions, there are also differences that require distinct scrutiny. For example, device endpoints within physical security systems run on custom Linux Kernels and therefore do not utilise standard Linux distributions like Red Hat, Ubuntu, or Debian. IT divisions often rely on the same Vendor Risk Assessment criteria they use for evaluating IT kit A comprehensive evaluation should examine how each security solutions manufacturer handles its software development life cycles. Ideally, vendors should adhere to a recognised framework when developing both their platform management and device-specific software. In 2021, Executive Order 14028 made it a bit easier for companies to evaluate vendors by providing guidelines for evaluating software security, the practices of the software developer, and methods to demonstrate conformance with secure practices, specifically referencing the NIST SP 800-218 Secure Software Development Framework. In short, a good vendor should have documentation that explains everything it’s doing to address cybersecurity from development, through releases and ongoing maintenance. 2. Obtain Software Update Schedules The frequency with which manufacturers update their software varies. Each company is different. If you’re their customer, it shouldn't matter whether the vendor schedules updates every six months, three months, or more often than that. What does matter is that you know what to expect and have a plan for how to deal with that reality. For example, if updates only occur every six months, under what conditions are patches released to address vulnerabilities that emerge between updates? Customers must understand how often they'll be updating the software on their devices and ensure they have the resources to make it happen. Make sure stakeholders agree, upfront, who will be performing the software updates. Will it be the integrator who installed the system, the physical security system staff, the IT team, or the end user? Keeping an entire system current is a huge challenge, but a non-negotiable responsibility. Manufacturers who don't issue frequent releases and patches put the onus on customers to handle mitigation efforts on their own. In these instances, IT departments must be prepared to employ network segmentation, firewalls, security whitelists/blacklists, and other methods to protect their systems until a patch is released. If a company's security team has typically updated firmware only when something breaks, these additional responsibilities most likely require greater collaboration with IT departments and a shift in how security systems are managed. 3. Know the Warranty Terms and Duration of Software Support Organisations should understand the warranty policies for the devices they purchase Organisations should understand the warranty policies for the devices they purchase. Even more important is knowing when a device's software support will expire. Software support should extend well beyond hardware coverage. For example, if a camera has a five-year hardware warranty, customers should reasonably expect an additional five years of software support. When that period ends, companies must plan on replacing the device – even if it still works well. Without software updates, the device lacks vulnerability support and becomes too risky to remain on the network. Manufacturers should be transparent about their warranty and software support policies, helping organisations plan for device replacements that align with cybersecurity needs. 4. Request a Software Bill of Materials (SBOM) During the pre-discovery process, customers should request a Software Bill of Materials (SBOM) that provides a detailed inventory of the software running on each device, including open-source components. By revealing what software is "under the hood," the SBOM allows IT departments to be vigilant in protecting the company's systems from exposed vulnerabilities. For example, a customer should understand how Transport Layer Security (TLS) is being handled to secure a security solution's web server if it’s an open-source component like OpenSSL. 5. Assess Vulnerability Disclosure Practices CNA manufacturers represent the gold standard in cybersecurity practices Understanding how a manufacturer handles vulnerabilities is essential. Ideally, they should be a Certified Naming Authority (CAN) and report common vulnerabilities and exposures (CVEs) to national vulnerability databases such as NIST and MITRE. Doing so automatically includes any disclosed vulnerabilities associated with their devices in vulnerability scanners' databases. CNA manufacturers represent the gold standard in cybersecurity practices, but most security manufacturers do not reach this level. At a minimum, the vendors you choose to work with should have an email notification system in place to alert customers to new vulnerabilities. Remember – email notifications are only as reliable as the employees managing them, so investigate whether the manufacturer has a strong track record of keeping up with such communications. Ask to speak with customer references who have been using the solution for an extended period to ensure the vendor is diligent in its communications. Configuration phase: Ensuring a secure setup 1. Use Hardening Guides Once a device is purchased, configuring it securely is the next critical step. Manufacturers should publish hardening guides that detail the security controls available for their products and recommended practices for implementation. Between the features offered by the vendor and your company's own cybersecurity policies, make sure all possible encryption options are activated. Using HTTPS is vital for ensuring secure communication with devices. Many physical security devices default to HTTP to accommodate customer-specific network topologies and certificate management. Failing to implement HTTPS can leave sensitive metadata unencrypted and vulnerable to interception. 2. Consider Advanced Encryption Protocols Protocols are necessary to protect video data in transit from cameras to the VMS Some solutions offer built-in encryption protocols, like MACsec, which makes it impossible for data to be compromised as it is transmitted over the network. HTTPS is still necessary to secure the connection to the devices’ webservice, but while customers set up and configure their devices, MACsec will keep network data safe. Additionally, if you want to encrypt video streams, consider protocols such as Secure Real-Time Transport Protocol (SRTP), which secures the transmission of audio and video data over the Internet, or tunnelling methods like Secure Socket Tunnelling Protocol (SSTP), which encapsulate data packets for safe transmission between two points, even if the network is insecure. Such protocols are necessary to protect video data in transit from cameras to the Video Management System (VMS). Encryption should also extend to the VMS hard drive where video is stored. There are different methodologies to do that, but ultimately the goal is to encrypt data in transit and in storage. 3. Implement Remote Syslog In the case of a breach, each device maintains a set of logs that are useful for forensic investigations. However, if a device gets hacked, its log may not be accessible. Best practices dictate that companies should set up a remote Syslog server that maintains a copy of all device logs within a central repository. In addition to providing redundant data for investigations, a Syslog offers IT systems an efficient way to look for anomalies. Cybersecurity teams will receive immediate notification for events like unsuccessful login attempts so they can quickly figure out what's happening. Who is trying to log in? Why on that particular device? 4. Practice Healthy Password Hygiene Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions One of the most basic and yet overlooked aspects of cybersecurity is the failure to manage user accounts meticulously. Many organisations use the same username and password for all security devices because it's simply too cumbersome to manage a network of devices in which each requires a separate, unique login. It's assumed that the system's primary administrators are the only ones who know the universal password. However, the system becomes vulnerable if anyone within this select group leaves the company and the password isn't changed or deleted right away. Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions. This approach ensures that employees throughout a company are each assigned a unique login credential that they use for any systems they use throughout the organisation. When they leave, their passwords and access are universally terminated along with their accounts. If SSO is not an option, regular password changes and prompt account deactivation are critical. Decommissioning phase: Securely retiring devices At some point, physical security devices will reach the end of their useful life. When that time comes, companies must take care in how they dispose of their devices. A good vendor will provide guidance on how to clear memory chipsets and restore factory defaults. Improper decommissioning can lead to severe risks. For example, if an improperly decommissioned device is sold on the secondary market or retrieved from a dumpster, an attacker could gain access to sensitive network configurations and use this information for malicious purposes. Conclusion Deploying physical security solutions involves more than just securing buildings and assets; it also requires robust measures to protect against cybersecurity threats. From assessing vendors and understanding update policies to configuring devices securely and managing decommissioning processes, each step presents potential pitfalls that, if overlooked, could expose organisations to significant risks. By incorporating the techniques discussed into their deployment protocols, organisations can ensure their physical security solutions provide comprehensive physical and digital protection.
Digital access control has well-known benefits over traditional security, of course, but also costs attached to each stage of its lifetime. However, these costs are not fixed. Many factors – including building size, shape, type, location, national regulations and more – impact affordability and efficiency calculations. Crucially, the type of access solution a business selects – wired or wireless – impacts total operating costs, including during installation, running and any potential expansion or reconfiguration stages. Wireless installation Wiring premises can be expensive. So, the potential cost savings from choosing wireless digital access begin at the very start. Installation stage is the largest contributor to potential cost savings when businesses go wireless. In calculations for one report, access experts at ASSA ABLOY examined projected costs for a fictional 100-door installation. Labour savings for those who chose wireless over wired locks were 82.5%. Why? Firstly, because wireless installation is much faster. It is also less intrusive. Most wireless locking devices require little or no drilling of the door, whereas wired security needs cabling through and partly around a door – which means not just door damage, but the contracting of specialist electrical installers who may require multiple site visits. These costs add up. Digital access technology Torus aims for the highest level of LEED certification for all its new properties In Poland, for example, developer Torus aims for the highest level of LEED certification for all their new properties around Gdansk. Where possible, they choose products with Environmental Product Declarations (EPDs) and Green Circle documentation, favouring access solutions which reduce their carbon footprint. Wireless digital access technology is a natural choice. “The lack of wiring significantly reduces materials use, reduces costs, and ensures quick installation,” confirms Torus’ Roman Sokolowski. There’s no cabling, which cuts power consumption. There’s less damage to the building fabric and fitters make fewer journeys to and from the site. Adaptable locking solution By choosing a wireless solution, organisations also upgrade building security with little disruption. A wireless system makes it easier to improve security at an existing building via a retrofit process which does not inconvenience staff or disturb work routines. This was one goal at Plexal, a £15 million flexible work environment for London enterprise and academia. Plexal chose battery powered wireless locks integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install ASSA ABLOY Aperio® devices with minimal disruption,” confirms Stewart Johnson, Director at NetNodes. Cost savings with improved energy efficiency Choosing wireless over wired locking can play a vital role in reducing ongoing energy use Choosing wireless over wired locking can play an important role in reducing ongoing energy use – and, therefore, expenditure. Wholesale electricity prices in Europe are approximately double what they were in 2019, according to the IEA’s “Electricity 2024” report. For a variable cost such as energy, where businesses have little control over unit prices, it is critical to control usage, especially if high and/or changeable energy prices become what analysts at ING called “the new normal for business”. Thus, the fact that battery-powered locks consume much less energy than traditional wired solutions is increasingly relevant and important. Additional saving on energy costs Traditional wired door access devices often work via magnets connected permanently to mains electricity. These doors draw power around the clock to remain locked. Wireless locks work differently. They only “wake up” when presented with a credential, to make the access decision. This translates to an additional saving on energy costs during operation: more than 70%, or thousands of euros over a typical access system’s lifetime. Wireless digital access Wireless locks only need a change of their standard battery, which may be rechargeable Related energy and materials costs during in-use stage are also lower. Wireless locks only need a change of their standard battery – which may be rechargeable – typically once every two years. No specialist maintenance is required, saving on specialists and their travel to and from the site(s). By choosing wireless digital access, businesses help protect themselves against these ongoing costs, notably energy price increases and volatility. Cost-efficient flexible working, for staff and facilities managers Perhaps harder to quantify, but equally easy to imagine, the financial benefits of choosing a wireless digital solution are felt in the increased convenience and efficiency of daily operations. In the co-working sector, for example, flexible access to offices is a priority. As “fixed” office space rented by corporations continues to fall, co-working spaces are expected to keep growing, with one estimate suggesting almost 18% CAGR to 2030. To stand out from the competition, the founders of ULab in Alicante sought the latest innovations in access and design to create their 21st-century business centre. Part of the suite of digital access solutions from ASSA ABLOY, a SMARTair® system gave ULab real-time access management via battery-powered locks and Openowä, the Mobile Key solution for SMARTair, without any need to wire doors and other openings. SMARTair TS1000 Web interface With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone With SMARTair and Openow, workspace residents can carry virtual keys on their smartphone; ULab’s security team update their rights over the air. An office manager can perform any operation remotely from the SMARTair TS1000 Web interface. In case of an emergency, they could lock-down the site or open doors remotely, for example. It’s convenient, efficient and boosts ULab’s security, benefiting users and managers. And because of SMARTair’s flexibility, they can comfortably welcome many more than their usual 100 daily users. “In addition to regular daily traffic, weekly traffic can almost multiply by 10 if an event is held,” says Enrique Burgos Pérez, Director at ULab. “We needed an access control system as flexible and convenient as SMARTair.” ASSA ABLOY benchmarking report Choosing wireless locks also adds flexibility – and can reduce costs – when an organisation reconfigures or expands their commercial space. High-quality wireless devices like SMARTair can typically be reinstalled at another opening without impacting reliability. They move to wherever is convenient. If a business is rethinking workspace to encourage flexible or hybrid work patterns, for example, cost efficiencies could be significant. Typical savings on office relocation or expansion are estimated at around 30% with wireless over wired locking, according to the same ASSA ABLOY benchmarking report. Cost efficiency and more control with ASSA ABLOY digital access To refit and improve their student accommodation, managers at the University of St Andrews sought energy- and cost-efficient access control. They chose Aperio, another innovative digital access solution from ASSA ABLOY. Approximately 1,600 doors so far are equipped with battery-powered Aperio escutcheons – without cabling. Aperio devices integrate fully with both the university’s existing central security system and their student ID card. University security managers continue to enjoy the efficiency benefits of monitoring and controlling access from a single point and in real-time, including for doors across multiple buildings. Aperio, another innovative digital access solution from ASSA ABLOY. Benefits of cost-efficiency In comparison to a wired solution, Aperio offers significant cost-efficiency benefits. Devices are wireless, so can be installed with little energy use and no need for wiring to the mains. They consume near-zero energy when idle and run on standard batteries, consuming little power during operation. Through the entire product life-cycle, Aperio combines reliability with cost effectiveness. “Aperio gives us central management and control,” says Pauline Brown, Associate Chief Information Officer at the University of St Andrews, “and contributes to our award-winning track record in energy efficiency.”
Security beat
Casinos face multiple security issues caused by potential bad actors, everything from cheating to vandalism, from theft to vagrancy. A new intelligent technology can monitor for specific keywords and behaviours. The technology scans the entire casino premises constantly for potential threats and notifies key personnel when they happen. Casinos are among the environments deploying the OpticSense system by Huvr Inc., which uses special fibre optic technology called an interferometer to secure large areas. Imagine a very sensitive loop made of fibre-optic cables placed around the perimeter of a facility. System’s artificial intelligence Basically, it converts the entire facility into a highly sensitive microphone, detecting any slight disturbances, such as an unusual movement or sound. When the system senses something out of the ordinary, it immediately triggers cameras to look at the disturbance and record a short video. The system’s artificial intelligence (AI) then analyses both the sound and video to determine what's happening. It compiles a detailed report and immediately sends the information to security teams. OpticSense OpticSense can hear, see, and analyse potential threats automatically before they get out of control. “This makes it possible for fewer people to do more,” says Herman C. DeBoard III, CEO and Founder of Huvr Inc, adding “When you don’t need as many personnel to monitor video feeds and analyse data, you can drastically reduce your labour costs. Best of all, when you optimise your resource allocation, your security teams can respond more effectively to each threat.” The system’s AI analyses sound and video to define what's happening. Combining fibre optics and AI Huvr was originally designed as a platform to provide immersive virtual travel experiences Huvr was originally designed as a platform to provide immersive virtual travel experiences. However, with the acquisition of OpticSense and Grip Places, the company pivoted to integrate advanced fibre-optic technology and AI-driven analytics into a comprehensive security system. The system’s artificial intelligence and fibre-optic interferometer technology work together to detect and analyse real-time threats. When the Fibre Optic Ring Interferometer (FoRi) detects even minute audio abnormalities, it triggers AI analysis. In split seconds, the AI directs cameras to record 60 seconds of video, compiles a detailed report, and then texts the real-time intelligence to security teams and authorities. Intelligent security solutions The growing need for intelligent security solutions can help to drive Huvr's entry into the security marketplace. Advanced technology enables the company to meet the increasing concerns surrounding public safety and the growing need for real-time threat analysis. The AI system classifies each detected anomaly according to its severity and stores data from various incidents to improve its risk assessment abilities over time. This continuous learning enables the AI to become more adept at accurately identifying and responding to threats specific to the casino environment. AI system classifies each detected anomaly according to its severity. Simple and discreet installation The system involves installing fibre optic cables around the casino’s perimeter The system involves installing fibre optic cables around the casino’s perimeter. It’s a simple job that typically requires less than a day. “These cables allow the casino to establish a smart perimeter detection system without significant infrastructure alterations,” says DeBoard Casinos typically employ upwards of 6,000 cameras, but human security teams cannot feasibly monitor all the incoming data at once. Huvr's OpticSense product becomes like the brain of the casino, constantly monitoring disturbances and responding in real time. Huvr’s fibre optic cables Huvr’s advanced detection algorithms work in tandem with a casino’s existing camera infrastructure, simply adding a layer of security that converts traditional security measures into an intelligent system that continuously monitors and analyses video footage. With Huvr’s fibre optic cables easily hidden or buried and the server roughly the size of a shoe box, the system is designed to be extremely discreet. It can be operated by a single person using a small handheld device. The security system is simple to scale and manage without disrupting casino operations. Security system is simple to work without disrupting casino operations. Autonomy boosts productivity Huvr automates surveillance and anomaly detection to decrease the load on security teams Autonomy is an important aspect of this new technology. Traditional security systems have required constant human monitoring, but Huvr automates surveillance and anomaly detection to decrease the load on security teams. “Without any human direction, Huvr detects minute disturbances, triggering the AI system to direct cameras and analyse video footage instantaneously,” says DeBoard. He adds, “The intelligent system rapidly monitors every anomaly and accurately decides which present potential threats. When it detects an issue, it compiles a detailed report that includes the number of individuals involved, their appearances, direction of movement, and licence plates. It takes only seconds to text this report to security teams and authorities.” Applications beyond casinos Beyond casinos, Huvr already provides proactive security in a wide variety of settings. In banks, the system monitors parking lots and ATM machines for suspicious activity. In large stadiums, it proactively detects target words such as “help” or “gun.” In schools, Huvr’s fibre optic ring interferometer secures campuses against unauthorised intrusions. In hospitals, it alerts medical staff when patients need immediate care. In airport terminals, it monitors for suspicious behaviour. In restaurants or construction sites, the system learns to monitor for safety violations and health hazards. Smart perimeters around critical infrastructure The fibre optic cables also form smart perimeters around critical infrastructure like power grids, cell towers, and bridges to watch for physical disturbances or tampering. “Because the system can be customised to each new environment and can learn quickly, the applications are virtually limitless,” says DeBoard. {##Poll1728555696 - Do you believe AI-driven perimeter detection systems will significantly reduce security labour costs?##}
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defences against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defences. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasises the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognising the need for continuous improvement and adaptation to evolving threats. Recognising the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognise the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defences. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defence against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorised infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defences of our nation’s critical infrastructure.”
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
Case studies
In a hyperconnected world, a lack of proactive communication can disrupt operations significantly, particularly in access control and time-attendance management. With over 2 billion global users, WhatsApp stands as a powerhouse in dynamic communication. This widely popular messaging platform provides a seamless way to streamline notifications and approvals, enabling real-time interactions and swift decision-making. Benefits of integration Matrix not only boosts efficiency and productivity but also fortifies security and HR operations Matrix, renowned for its cutting-edge access control and time-attendance solutions, harnesses the power of WhatsApp to redefine proactiveness. By seamlessly connecting essential workplace systems with a globally trusted communication platform, organisations can achieve unparalleled convenience and reliability in managing workforce operations. Through WhatsApp integration, Matrix not only boosts efficiency and productivity but also fortifies security and HR operations. This ensures that critical access and attendance data are managed with exceptional precision and responsiveness. To maximise the benefits of this integration, it's crucial to understand the steps required to seamlessly connect WhatsApp with the Matrix COSEC system. Matrix COSEC notifications Integrating WhatsApp with COSEC ensures instant and seamless notifications for attendance approvals, access events, and other important updates. This integration simplifies the way employees and management interact by streamlining the process of receiving and responding to time-attendance notifications. Be it leave approvals, late arrivals, or early departures, the integration ensures timely updates to all relevant stakeholders, enabling quick and informed decision-making. WhatsApp integration with COSEC Input these details into the Alert Message Configuration within the Admin Module of COSEC To enable WhatsApp integration with COSEC for alerts and notifications, start by creating a WhatsApp Business account through the Meta Developer Portal. Gather the required details, including the Permanent Access Token, Phone Number ID, WhatsApp Business Account ID, App ID, and Security Token. Input these details into the Alert Message Configuration within the Admin Module of COSEC. Then, specify the types of alerts they wish to receive on WhatsApp and validate the setup by sending test alerts to ensure everything functions smoothly. Team's attendance and access events with WhatsApp integration Receiving real-time updates on a team's attendance and access control events via WhatsApp offers unmatched convenience. Managers and HR personnel can instantly access attendance records, detect access control violations, and review unusual entries directly on their devices. This streamlined approach eliminates the hassle of switching between systems, ensuring immediate access to essential information and enabling quicker responses. With attendance and security event notifications delivered straight to WhatsApp, managers achieve full visibility into attendance trends and security incidents. Proactive approach Integration boosts active efficiency by centralising touch and streamlining access to critical data Daily summaries of these events enhance organisational transparency, enabling swift resolution of attendance discrepancies and rapid responses to potential security breaches. This integration boosts operational efficiency by centralising communication and streamlining access to critical data. Managers can make timely decisions, whether addressing attendance issues or responding to access violations, with alerts delivered directly to WhatsApp. By ensuring key information is readily available, this proactive approach enhances efficiency and responsiveness throughout the organisation. Integration in time-attendance and access control systems Advanced communication integration for notifications and alerts in time-attendance and access control systems will leverage cutting-edge technologies to enhance efficiency and security. Below are some of the key potential advancements: Anomaly Detection Capabilities: AI-driven algorithms will analyse regular attendance and access patterns to identify anomalies, such as unusual entry times or unauthorised access attempts. These irregularities can be instantly flagged and notified to security personnel or administrators in real-time for prompt action. Personalized Notifications: AI-powered customisation will enable role-based notifications tailored to individual preferences and responsibilities. For instance, management may receive strategic alerts related to security breaches or policy violations, while employees are notified of attendance updates or access approvals, ensuring relevant and focused communication. Predictive Maintenance Alerts: Leveraging predictive analytics, the system can anticipate maintenance needs for attendance and access control systems. Administrators will receive timely notifications about potential issues, allowing them to address concerns proactively before they impact operations. Implementing these advanced features will rely on robust API frameworks, secure data handling practices, and intuitive user interfaces to effectively manage notifications and alerts. With these foundations in place, these developments can significantly improve operational efficiency and security while delivering a superior user experience for time-attendance and access control systems. Revolutionising workplace control with WhatsApp integration The integration of WhatsApp with Matrix time-attendance and access control solutions is set to transform workplace management like never before. This cutting-edge integration delivers real-time notifications and streamlines approval processes, offering unparalleled ease in monitoring and managing workforce dynamics. The result? Enhanced productivity, operational efficiency, and a more connected organisation. Discover how Matrix’s innovative integration solutions can elevate the security and management systems.
Gunes Park Evleri is a modern residential community situated in the vibrant city of Istanbul, Turkey. To enhance security and convenience for its residents, the community has implemented the DNAKE IP video intercom system throughout the premises. This state-of-the-art system provides an integrated security solution that allows residents to enjoy a seamless and secure living experience. The solution DNAKE smart intercom system provides residents with easy and flexible access through a variety of methods, including facial recognition, PIN codes, IC/ID cards, Bluetooth, QR codes, temporary keys, and more. This multi-faceted approach ensures unparalleled convenience and peace of mind for users. Each entry point is equipped with the advanced DNAKE S615 Facial Recognition Android Door Station, which guarantees secure access while streamlining entry processes. Smart Pro mobile application A 902C-A master station is commonly installed in every guard room, facilitating real-time communication Residents can grant access to visitors not only through the E216 Linux-based indoor monitor, typically installed in each apartment, but also via the Smart Pro mobile application, which allows for remote access anytime and anywhere, adding an extra layer of flexibility. Additionally, a 902C-A master station is commonly installed in every guard room, facilitating real-time communication. Security personnel can receive instant updates on security events or emergencies, engage in two-way conversations with residents or visitors, and grant access as needed. This interconnected system can link multiple zones, enhancing monitoring capabilities and response times across the property, ultimately bolstering overall safety and security. Coverage: 18 Blocks with 868 Apartments Installed products: S615 4.3" Facial Recognition Android Video Door Station 902C-A Master Station E216 7" Linux-based Indoor Monitor DNAKE Smart Pro APP
The Kent İncek project, a residential complex located in the heart of Ankara, has recently implemented DNAKE's advanced IP intercom solutions to enhance security and convenience for its 198 households in two blocks. Kent Incek offers privilege in its social facilities as well as in its green areas, providing residents with a healthy living environment that includes an indoor swimming pool and fitness centre. The solution DNAKE IP intercom products are designed to meet the evolving needs of modern residential complexes DNAKE IP intercom products are designed to meet the evolving needs of modern residential complexes, providing a range of features that are both practical and user-friendly. At the Kent İncek project, DNAKE's IP intercom solutions have been integrated into the existing security system, allowing for seamless communication between residents and visitors. The intercoms offer crystal-clear audio and video quality, ensuring that every interaction is clear and secure. Door entry methods of the 902D-A9 Installed and ready to upgrade door entry, the 4.3-inch SIP video door phone 902D-A9 offers crisp, clear visuals for video calls and access control. Users can effortlessly navigate through an intuitive interface, facilitating seamless and smart living experiences. The device offers multiple ways to grant access to authorised personnel, making it a versatile and efficient solution for residential properties. One of the primary door entry methods is through video calling, which allows users to remotely communicate with visitors and grant or deny access in real time. One of the primary door entry methods is through video calling, which allows users to remotely communicate with visitors and grant or deny access in real time. This feature ensures that only authorised individuals can enter the premises, adding an extra layer of security to the property. In addition to video calling, the 902D-A9 also supports access control through various authentication methods, such as facial recognition, PIN code, or RFID card. Overall, the door entry methods of the 902D-A9 combine cutting-edge technology with user-friendly design, making it an effective and convenient solution for controlling access to any property. Advanced features and sleek design While the state-of-the-art door station secures the entry of the home, the 7-inch indoor monitor offers an extra layer of safety While the state-of-the-art door station secures the entrance of the home, the seven-inch indoor monitor offers an additional layer of protection. The seven-inch indoor monitor, renowned for its advanced features and sleek design, has been embraced by homeowners seeking to upgrade their security systems. With crystal-clear high-definition resolution and remote access capabilities, this monitor provides comprehensive security and convenient communication for families. Additionally, after connecting the indoor monitor to IP cameras, remote monitoring and control capabilities allow users to stay informed and in control of their home's security. Monitoring and management Another vital component of the door entry system is the master station 902C-A, a command centre placed on the table of the guard room. Elegantly designed and crafted for ease of use, this station sits on the table of the guard room, ready to spring into action at a moment's notice. This advanced device not only streamlines the monitoring and management of the community but also offers a plethora of features that elevate the community's protection to the next level. One of its standout capabilities is its ability to receive calls from both the door station and indoor monitor. Comprehensive coverage and protection In addition to its transmission capability, the master station assigns them to unlock doors remotely With a simple press of a button, the property manager or security person can communicate with visitors or tenants easily. In addition to its communication capability, the master station also empowers them to unlock doors remotely. The master station serves as the central hub for managing alarms and messages. Moreover, this remarkable device's ability to integrate with 16 IP cameras transforms it into a powerful surveillance hub, providing unparalleled situational awareness. With a full view of the community, the property manager can keep tabs on multiple locations simultaneously, ensuring comprehensive coverage and protection. The result "We are thrilled to have our IP intercom products selected for the Kent İncek project," said the spokesperson for DNAKE. "Our solutions are designed to provide the highest level of security and convenience, and we're confident that they will meet the needs of the project's residents." The installation of DNAKE's IP intercom products at the Kent İncek project is a testament to the growing demand for advanced security solutions in Turkey. With DNAKE's IP intercom solutions in place, residents of Kent İncek can rest assured that their security is in good hands. The cutting-edge technology will not only enhance their daily lives but also provide peace of mind, knowing that their homes and families are well protected.
DNAKE, a pioneering provider of smart intercom solutions, has established long-term partnerships with top real estate companies in China and global markets over the past decades. Country Garden Holdings Company Limited (stock code: 2007.HK) is one of China’s largest residential property developers, capitalising on the rapid urbanisation of the country. As of August 2020, the Group ranked 147th on the Fortune Global 500 list. With a focus on centralised management and standardisation, Country Garden operates across various sectors, including property development, construction, interior decoration, property investment, and the development and management of hotels. DNAKE's smart intercom solutions Their commitment to quality and innovation aligns perfectly with DNAKE's smart intercom solutions, providing enhanced security, communication, and convenience for residents and property managers alike. By integrating DNAKE's smart intercom system into their developments, Country Garden not only elevates the living experience for residents but also reinforces their reputation as a forward-thinking leader in the real estate industry. Dive in Country Garden's residential projects to discover the strengths of the DNAKE smart intercom system.
A newly built, small, intimate building with 26 high-standard apartments. It features two staircases and two passages with access control between the underground garage and the staircases. DNAKE IP intercom solution Limited apartments often signify a sense of exclusivity and high-end living. DNAKE IP video intercom solution delivers both security and convenience for modern residential living. The 902D-B6 offers a hands-free and contactless entry experience. Access control is installed at entry points between the underground garage and staircases to enhance security. Residents can unlock doors using both the E216 indoor monitor and the mobile application.
Silverstein Properties, a pioneering real estate development, investment, and management firm, and its partners SwiftConnect, Allegion, and Kastle, announced they are live with resident keys in Apple Wallet for all apartment units at a multi-family housing location: Silverstein’s Silver Towers residential property at 606 West 42nd Street in New York City. Silverstein’s residential tenants now have an easy and secure way to add a resident key to Apple Wallet to access the apartment building and unlock their homes with a simple tap of an iPhone or Apple Watch—thus eliminating the need to use a traditional, physical key. Resident key in Apple Wallet The rollout of keys in Apple Wallet marks an important milestone for the U.S. real estate industry “We’re excited to make it easy for our residents to use their resident key in Apple Wallet to get into their buildings, homes, and common areas, which builds upon our previous offering to office tenants who use their employee badge in Apple Wallet to access offices and shared spaces including lounges, cafes, conference facilities, and yoga studios,” said Tal Kerret, President of Silverstein Properties. The rollout of keys in Apple Wallet marks an important milestone for the U.S. real estate industry, as property owners and employers reimagine the home and workplace experience for residents, office tenants, and employees. SwiftConnect’s success: Enhance security for residents “The Silver Towers project builds on SwiftConnect’s success in delivering seamless access via NFC wallets across the most iconic commercial real estate properties in New York and beyond,” said Matt Kopel, co-CEO and President of SwiftConnect. “We are excited to once again partner with Silverstein Properties and to extend our leadership into the multi-family housing market. Now, residents can easily access their personal spaces with their iPhone and Apple Watch, and property teams are able to enhance security for their residents—while also automating the process of managing keys and access.” Modern access-control solution SwiftConnect integrates with the Kastle Access Control platform; Schlage® mobile credentials To provide residential tenants with this experience, SwiftConnect integrates with the Kastle Access Control platform; Schlage® mobile credentials; and access control devices from Allegion™, as well as all other necessary business platforms and systems to create a unified digital network for hassle-free mobile access. “Kastle is thrilled to be a partner on the Silver Tower project, leveraging Kastle’s robust and proven access-control products to create a modern access-control solution that delivers an unparalleled experience both property owners and residents can trust,” said Haniel Lynn, CEO of Kastle. Schlage mobile-enabled wireless locks “We are excited to work with SwiftConnect and play an important role in Silver Tower's resident key in Apple Wallet multifamily housing deployment,” said Mark Casey, Vice President of National Electronic Sales of Allegion. “Resident Keys in Apple Wallet—alongside our Schlage mobile credentials and Schlage mobile-enabled wireless locks—not only enhances security and convenience for residents, but also exemplifies our commitment to driving the future of seamless access and smart apartment technology.” How seamless access works at Silver Towers Tenants can add their resident key to Apple Wallet after an initial set-up through Silverstein’s Inspire app, using SwiftConnect’s AccessCloud platform. Once added, tenants can hold their iPhone or Apple Watch near a door reader or smart lock for seamless access to the apartment building, their home, and shared fitness and amenity spaces. With Express Mode, tenants don’t need to wake or unlock their device to use their resident key—they can simply hold their device near a reader and go. If an iPhone needs to be charged, they can still use their device to access their apartment and amenity spaces with Power Reserve. Resident key in Apple Wallet takes full advantage of the privacy and security features already built into iPhone and Apple Watch. Data is encrypted and protected against tampering and theft, and Apple cannot see when and where a resident uses a home key in Wallet. Silverstein’s holistic customer experience program The new offering falls under Inspire, Silverstein’s holistic customer experience program that reshapes how, when, and where the company’s customers live and work. Inspire brings hospitality services, social and wellness programming, data-driven workplace technology, and a flexible workspace solution under one umbrella. Since its inception 67 years ago, Silverstein Properties has been recognised for driving innovative technology adoption to enhance the tenant experience. The company has built a reputation for developing exceptional projects, enhancing local communities, providing outstanding services to customers and partners, and driving innovation within the industry.
Round table discussion
Trust is the foundation of successful relationships between buyers and sellers in the security marketplace. Trust facilitates collaboration, reduces risk, improves decision-making, and ultimately drives business growth and profitability. Transactions often involve significant investments, and trust minimises the perceived risk for buyers, making them more likely to commit to a purchase. Our Expert Panellists weigh in on the subject of trust in response to this week’s Roundtable: A security end user asks: How trustworthy are integrators and/or manufacturers?
The security marketplace has its share of buzzwords, which are words or phrases that become popular and widely used in a specific industry. Buzzwords can be useful for conveying complex ideas quickly, but they can also be misused or misunderstood. Within a specific industry, such as security, buzzwords can create a sense of shared understanding and belonging. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the security industry?
By all accounts, technology development is moving at a rapid pace in today's markets, including the physical security industry. However, market uptake of the newest technologies may lag, whether because of a lack of clear communication or not enough education of potential customers. We asked this week's Expert Panel Roundtable: How can the industry do a better job of promoting emerging technologies in physical security environments?
Products
White papers
Access control: The enterprise buyer's guide
DownloadA step-by-step checklist for choosing an intercom system
DownloadThe wireless access control report 2023
DownloadCybersecurity in keyless access management
DownloadWireless Access Control eBook
DownloadWireless security: Cut costs without cutting corners
DownloadMaking your surveillance cyber secure
DownloadHow to keep students safe on campus
DownloadNetwork Security Redefined: IP-Enabled Access Control
DownloadMobile Access - What you need to know
DownloadThe evolution of cards and credentials in physical access
DownloadVideos
Wireless security: Manufacturers & Suppliers
- ASSA ABLOY - Aperio® Wireless security
- Honeywell Security Wireless security
- CLIQ - ASSA ABLOY Wireless security
- DSC Wireless security
- Climax Technology Wireless security
- Ajax Wireless security
- Dahua Technology Wireless security
- Senstar Wireless security
- Vanderbilt Wireless security
- Visonic Wireless security
- ASSA ABLOY Wireless security
- OPTEX Wireless security
- Pyronix Wireless security
- Bosch Wireless security
- Verkada Wireless security
- RISCO Group Wireless security
- Kantech Wireless security
- Paxton Access Wireless security
- D-Link Wireless security
The key to unlocking K12 school safety grants
Download5 surprising findings from OT vulnerability assessments
DownloadPhysical access control
DownloadHoneywell GARD USB threat report 2024
DownloadPalm vein recognition
Download