Mobile Access Trends
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications. From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physical security systems Hospitals in particular have developed into multi-faceted spaces that house hundreds to thousands of patients, staff and visitors at any one time. In England for example, research has found in the three months leading to June 2023, an average of 44,626 people visited major hospital A&E departments each day, with over 16 million attendances typically recorded over the course of a year-not to mention an additional nine million logged at other minor units. For any building, this level of sustained footfall can request severe security difficulties For any building, this level of sustained footfall can invite severe security tests. With that, the need to deploy effective physical security systems in healthcare is clear. And so, as access control continues to become more readily adopted and new products enter the market, decision-makers are reminded to consider the requirements of their building, ensuring they select the solutions most suited to their settings and budget. Security controlled Patient safety will always remain the top priority in healthcare settings, and where matters of health and social care come into question, a diverse set of professional regulatory bodies are tasked with setting and maintaining high standards. When it comes to healthcare premises specifically, patient security and perimeter security often come hand in hand and are amongst the most pressing of challenges that decision-makers must face. To help address operational planning and potential design concerns in the NHS, the Health Building Note (HBN), provides general design guidance for healthcare buildings under HBN 00-01-citing the use of access control measures as a way of maintaining security and protecting the safety of patients, staff and visitors. Use of access control Hospital buildings control varied levels of access for a number of security purposes Hospital buildings, for example, must control varied levels of access for a number of operational and security purposes. Routine scenarios exist where vulnerable patients are under monitoring and thus refrained from exiting the premises for their own safety, while at the same time, permitted staff must be able to reach their patients and medicines when required. For this, the use of access control is key. Equally, access credentials can also help management teams keep track of those who may be entering or exiting rooms with equipment and pharmaceutical supplies, deterring any unwanted visitors and opportunists in the process. Incorporation of access control systems On a similar note, regulations have set a minimum standard for how personal data should be stored and managed in healthcare environments, giving decision-makers an added responsibility to regulate staff-controlled areas with patient medical records. While instances of personal data breaches are rare, healthcare facilities and professionals are at legal risk should confidential data be found misused or missing. As such, the incorporation of access control systems has become essential in keeping data storage areas secure, with intuitive online systems capable of permitting access to staff with the correct credentials while simultaneously tracking who has requested clearance at digital entry points. HBN guidance Healthcare experts are better fitted to control the sheer volume of people entering and exiting To function effectively, healthcare facilities must always be perceived as safe places by the people who reside within them, and as HBN guidance implies, a unified physical security system can help address key safety and security concerns while enhancing patient and staff experience. Opportunely, access control systems are more accessible and adaptable than ever and combine several technologies such as mechanical locks and automatic doors with electronic access credentials in the form of smartphone apps, badge readers and biometric scanners. By integrating these systems into the building’s existing infrastructure, healthcare professionals are better equipped to control the sheer volume of people entering and exiting the premises without impairing the general flow of movement and coordination around the facility. Better by design Despite the clear benefits offered to healthcare facilities, there are a number of considerations to be mindful of when choosing an access control solution. Poorly implemented systems can have an adverse effect on security and functionality - quickly costing healthcare organisations time and budget to rectify and replace the inadequate products that don’t meet the building’s requirements. For that reason, decision-makers and design teams are reminded that there is no single solution that fits all healthcare buildings. As such, it’s crucial for decision-makers to understand the systems that are being put in place throughout each of the touchpoints in their facility. Clear collaboration is required during periods of specification, where together, teams can ensure the selected product works on all angles, from meeting fire safety and sustainability standards to aesthetics and scalability. Modern access control products Scalability is a key area that decision-makers must review when selecting access control systemsFrequently overlooked, scalability is a key area that decision-makers must review when selecting access control systems. Such is their diverse nature; healthcare facilities can often change and develop as years go by, and by selecting a system that facilitates growth, such as a cloud-based solution-security and efficiency is long-established. While modern access control products are known for seamless integration, there are some systems that may restrict the ability to use different vendors throughout the remainder of the building’s infrastructure. This, in effect, causes a monopolisation of products throughout the estate, which can have an adverse effect on growth by increasing costs and reducing the levels of service associated with the security system already in place. Improve security and safety A scalable and reliable access control system will continue to improve security and safety by adapting to a building’s new requirements-and all while having minimal impact on its operational network. And so, while technology will no doubt continue to influence and transform the access control market, healthcare facilities and their professionals must continue to remain educated on their own systems, ensuring they have the best options in place to keep their patients, staff and visitors safe and secure for years to come.
Security systems represent a significant investment, yet many organisations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance or drive operational efficiencies. Consumption gap When users aren’t tapping into the full power of the solution they bought, they aren’t realising their full return on investment. This creates a consumption gap. It’s a situation that has the potential to go in one of two very different directions. A misreading of a system, its capabilities and functionality can fast result in user discontent Left unchecked a consumption gap can create frustration for system integrators, manufacturers and end users alike. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction. Leading to a greater likelihood that they’ll look to change or focus investment into overlapping and likely competing solutions. Customers’ security goals Addressed appropriately it can help manufacturers, system integrators and end users to build trusted partnerships in which everybody wins. Understandably, systems integrators are primarily focused on installation—delivering reliable solutions that meet customers’ security goals to ensure their long-term success. However, engagement can go beyond deployment. Closing the consumption gap can be a strategic way to differentiate yourself from competitors. The deeper you understand your customer’s business, the better advice you’re able to offer—and the stronger the partnership you form. Why do consumption gaps exist? For customers, finding the time to learn multiple capabilities of a security system can be time-consuming. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks. Often, taking use of new tools and keys takes a backseat to the speed of daily tasks There are many reasons why customers may not be taking full advantage of the features available to them in their security platform. They may feel overwhelmed by a steep learning curve after deployment and might delay diving into the additional system features. Sometimes, there might be a lack of awareness of the technology’s full capabilities, and despite a willingness to learn, there are few options for training. Often, it can simply be they are not aware of the benefits of their system or are too busy with day-to-day and urgent tasks to learn other features. Bridging the consumption gap Systems are built to deal with a wide variety of use cases and broaden market appeal, but the goal isn’t to get everyone to use all the features of every product. You want to guide your customers towards the features and functionality that best meet their needs. This could entail reducing the friction they experience in their day-to-day operations, solving unique issues related to their business, or addressing their most important challenges. Having these conversations with your customers deepens your relationship and can organically open up new revenue streams. Continuous engagement allows you to recommend other relevant products or services that they may find helpful. Customised training plan Customers can learn at their own pace and gradually expand their understanding of their system Furthermore, customers are often not able to implement all features at once. You can help by proposing a plan to gradually evolve systems and processes over time. This could include a customised training plan to get the most value from their investment. Some manufacturers are also now providing learning management tools that system integrators can pass on to their customers. Customers can learn at their own pace and gradually expand their understanding of their system in accordance with their bandwidth. This allows them to get more out of their system. Simplifying deployment With the right software partners, systems integrators can focus on solving customer problems, not reactively troubleshooting issues. Look for manufacturers who offer good support systems for integrators. This includes not only quality technical support but also configuration and training services you can build on. Look for partners that offer tools and consultation services you can use to complement your value-added services, either to spend less time on the basics or for specialised expertise on complex projects. Beyond support and services, one telling sign is the configuration interface and tools that you as an integrator will primarily interact with. Ask yourself whether the manufacturer invests in their back-end tools and their primary user interface. Is there a noticeable difference between these two interfaces in terms of look and feel? Does one feel more dated? Widening consumption gap The harder it is to implement upgrades, the more reticent customers are to make the changes If the end user interface is easy to use but changes on the back end are difficult, the resulting friction can contribute to the widening consumption gap. It can become too time-consuming or difficult to upgrade or make changes to the system. The harder it is to implement upgrades, the more reticent customers are to make the changes. Configuration should be painless. If the system has a solid graphical user interface, you’ll be able to interact with the software in a fluid and intuitive way. When the system is intuitive for both you and your customers, you spend less time on setup and training. You can invest more attention in value-added activities. Conclusion A consumption gap could be a sign that technological innovation is outpacing people's ability to implement them in their day-to-day lives. You can work with your customers to simplify the adoption of the innovations so they can more easily implement them and realise the full value of their investment. By reviewing opportunities to bridge the consumption gap for your customers, you increase the likelihood of growing and renewing your system and service contracts. You also build relationships as a trusted partner. Customers will turn to you when looking to expand their security system and proactively solve new and incipient problems.
Latest Access control news
Camden Door Controls is pleased to announce that its CX-DE1200 Series of single and double door delayed egress magnetic locks are now available with a full complement of system accessories and mounting devices to provide a comprehensive solution for all applications. Available accessories include sounder, speaker station, reset switch, signage, and mounting devices. The CX-DE1200 magnetic locks are designed to provide the best performance and value in healthcare, childcare, retail, and institutional applications. Industrial and commercial applications An important add-on accessory is Camden’s CX-DE502SO LED Sounder Annunciator for both audio and visual distinction. It is designed for industrial and commercial applications where both audible and visual indication is required. The RGB LED is capable of visually displaying three distinct colours for designated states The RGB LED is capable of visually displaying three distinct colours for designated states: red, green, and yellow. The faceplate is made of stainless steel with a piezo. In addition, Camden’s CX-DESPK15 15-watt speaker station, which is also designed for industrial and commercial applications ensures alarm messages are herd where ambient noise is high with a corresponding colour-coded visual Aura™ display. Local AHJ requirements The remote reset switch feature is especially attractive for installers and/or property managers because it allows for the convenience of resetting a group of locks at a common exit, there’s no need to reset each lock individually. Door signage with mandatory delay egress messages is available in English, French, Spanish and Braille. Also available to support the CX-Series of magnetic locks are a wide variety of Camden’s armature housings, brackets, mounting kits, and spacer bars. These accessories support virtually any installation requirement, including installation and mounting on glass doors. CX-DE1200 magnetic locks CX-DE1200 magnetic locks are available in a range of models, with factory default operation, to meet NFPA, BOCA, and local AHJ requirements. The optional system accessories and mounting devices deliver even more versatility in a variety of applications.
Aiphone, the international manufacturer of intercom, access control, and emergency communication products, introduces a PoE two-door controller, a recent addition to its recently launched AC Series access control portfolio. Simple to install above interior doorways, the AC-2DM-B controls and unlocks the door it is mounted near, including another door within 500 feet. It can store up to 100,000 user credentials locally and up to 50,000 events. Door control capabilities To enhance security, an integrated infrared motion sensor can be used to allow immediate egress. An on-board LCD status screen clearly shows users if access is granted (green) or denied (red). To enhance security, an integrated infrared motion sensor can be used to allow immediate egress The two-door controller includes two Wiegand inputs, two outputs available with integrated power, and two solid state dry contact relay outputs. Another four additional inputs are also available. This enables the two-door controller to support various door control capabilities, such as exit buttons and door openers. Access control solutions “The great thing about our new PoE two-door controller is that it can operate on its own or as part of a larger AC Series access control system,” said Brad Kamcheff, Marketing Manager, Aiphone Corp., adding “This system can also grow as a customer’s needs evolve, giving them ultimate flexibility with their access control system. Installation is incredibly easy too, as the AC-2DM units can use the same PoE run as the intercom and strike power.” The AC-2DM-B is both NDAA and TAA compliant, along with UL 294 and ULC 5319-05 compliant. It is available in black; the AC-2DM-W is available in white. Visit the Aiphone website for more information on the AC-2DM-B two-door controller or the AC Series and Aiphone’s complete line of intercom, emergency communication, tower, and access control solutions.
The British Security Industry Association (BSIA), founder members Securitas UK, has been working with homeless charities and funding initiatives that will mean the delivery of hot meals and accommodation for those who find themselves in need of services as well as providing key provisions to assist in a better quality of life. Working with Calderwood House in Cumbria, which was set up to help people experiencing homelessness get back on their feet, its charitable donations have funded a bedroom for a year as well as offering residents access to a variety of courses, including Fire Marshall, First Aid and Mental Health First Aid and helping them develop their CV writing and interview skills. Sustainability Social Value Champion In addition to this, it has donated furniture and computer equipment within the ‘Hub,’ a communal room within the House, loaned a minibus for a year for day trips, which will also assist with its 12-week recovery recreational programme, and purchased a stock of warm hats, gloves, jackets, and some high-vis outer layers for them to wear when out and about. Their work has also been recognised as a shortlisted Sustainability Social Value Champion at the BECBCA Awards. Securitas UK has supported and funded over 30,000 meals so far and raised enough money to fund Securitas UK has also been working with the Kokni Muslim Association, which runs a homeless charity in Birmingham, where the company raised £15,000 from the proceeds of its charity single, Ascending, written and performed by its officers and staff. Securitas UK has supported and funded over 30,000 meals so far and raised enough money to fund an average of 150 hot meals every Friday and Saturday night until early 2024. Author's quote Shaun Kennedy, Chief Operating Officer for Central Europe, Securitas, who also recently helped to hand out 100 hot meals and to chat with the regular attendees of the Birmingham shelter, said: “I have witnessed first-hand how crucial our support is, how appreciated it is and how desperately needed it is; this is a company-wide effort that is so important to this community." "It was a pleasure recently to sit and talk to the people we are trying to help, such as 85-year-old Frank, who relies on the shelter and our support; he spoke to me about the household bills he can’t afford and how he feels the local councils and society, in general, has let him and others down."
Yubico, the globally renowned provider of hardware authentication security keys, announced that it is now publicly traded under the ticker symbol YUBICO on the Nasdaq First North Growth Market in Stockholm. Yubico announced its intent to go public on 19th April 2023, through a merger with Swedish holding company, ACQ Bure. The merger increases Yubico’s resources and ensures more organisations and consumers can be protected against a fast-growing array of cyber threats including AI-powered phishing schemes and ransomware attacks. These attacks not only result in billions of dollars in yearly losses for businesses, but threaten the safe operation of critical infrastructure and services, from government agencies to financial institutions, factories, healthcare and human rights organisations. Cybersecurity standards Today marks an exciting milestone for Yubico and our global customers and partners “Today marks an exciting milestone for Yubico and our global customers and partners,” said Mattias Danielsson, CEO, Yubico, adding “We have been a pioneer of modern, hardware-based authentication, pioneering and setting cybersecurity standards over the past 16 years." He continues, "As a publicly traded company, we look forward to building upon this in the next stage of growth, creating even more value for our customers and shareholders, and inviting others to join our journey.” Yubico Enterprise Services Yubico’s unique solutions enable organisations to address the source of 90% of cyberattacks: phishing and stolen login credentials. Its flagship YubiKey series provides phishing-resistant multi-factor authentication (MFA), based on modern authentication protocols, including FIDO2 passwordless (passkeys) and smart card PIV support. The physical security keys work seamlessly with an organisation's legacy and/or modern infrastructure. Yubico Enterprise Services deliver lower cost and value to entry, flexibility, faster rollout and seamless distribution of security keys, designed to meet an organisation wherever they are on their authentication journey. “We are proud and humbled to have built and established a global gold standard for strong authentication, and being publicly traded ensures our technology will be able to better protect millions of individuals around the world,” said Stina Ehrensvärd, Co-Founder and Chief Evangelist, Yubico, adding “This path allows Yubico to continue innovating and investing in our technology in order to meet the growing demand for strong and frictionless authentication.”
Access control applications
Quanergy Solutions, Inc., a provider of 3D LiDAR (Light Detection and Ranging) security solutions, successfully implemented its ground-breaking 3D LiDAR security solution at a prominent army barracks in the Middle East, resulting in a significant reduction in false alarms and the accurate detection of true intrusion attempts on base. Challenges with perimeter system The country’s military had long faced challenges with the barrack’s existing perimeter intrusion detection system, which relied on camera-based analytics and thermal cameras. This outdated system produced a high number of false alarms, leading to alarm fatigue that masked genuine intrusion threats. Solution: 3D LiDAR sensor and Q-Track The result was a hyper-accurate, flexible solution that allowed the army to deploy sensors Quanergy stepped in, deploying its unified 3D LiDAR sensor and advanced perception software solution, Q-Track, to pinpoint the exact location of a potential intrusion while tracking the direction and speed at which an intruder is moving. This near-perfect data was then ingested by the army’s Video Management System (VMS) to generate real-time, accurate alerts. The result was a hyper-accurate, flexible solution that allowed the army to deploy sensors over a diverse terrain with assorted elevations and suboptimal lighting. Successful intrusion detection The deployed Q-Track solution underwent rigorous testing wherein hundreds of intrusion attempts were simulated by military personnel, including fence-jumping and tunnel-digging, in both daylight and complete darkness. Quanergy’s highly accurate LiDAR system was proven to detect all true intrusion attempts made by military personnel, exponentially reducing false alarms and their associated risks. 3D LiDAR security solutions Quanergy’s 3D LiDAR security solutions are currently deployed at hundreds of critical infrastructure sites around the world, addressing a wide spectrum of mission-critical applications including perimeter intrusion detection, server rack and cabinet security, mobile security towers, mantrap/vestibule access controls, rooftop security, and more.
Robots do monotonous workflows and less pleasant, repetitive tasks with brilliance. Combined with image processing, they become “seeing” and reliable supporters of humans. They are used in quality assurance to check components, help with the assembly and positioning of components, detect errors and deviations in production processes and thus increase the efficiency of entire production lines. An automobile manufacturer is taking advantage of this to improve the cycle time of its press lines. Together with the latter, VMT Vision Machine Technic Bildverarbeitungssysteme GmbH from Mannheim developed the robot-based 3D measuring system FrameSense for the fully automatic loading and unloading of containers. Pressed parts are thus safely and precisely inserted into or removed from containers. Four Ensenso 3D cameras from IDS Imaging Development Systems GmbH provide the basic data and thus the platform for process automation. Application The actual workflow that FrameSense is designed to automate is part of many manufacturing operations. A component comes out of a machine-here a press- and runs on a conveyor belt to a container. There it is stacked. As soon as the container is full, it is transported to the next production step, e.g., assembly into a vehicle. All these tasks are now to be taken over by a robot with a vision system-a technological challenge Up to now, employees have been responsible for loading the containers. This actually simple subtask is more complex than one might think at first glance. In addition to the actual insertion process, the first step is to determine the appropriate free space for the part. At the same time, any interfering factors, such as interlocks, must be removed and a general check of the “load box” for any defects must be carried out. All these tasks are now to be taken over by a robot with a vision system-a technological challenge. This is because the containers also come from different manufacturers, are of different types, and thus vary in some cases in their dimensions. Positioning of the components For their fully automatic loading and unloading, the position of several relevant features of the containers must be determined for a so-called multi-vector correction of the robot. The basis is a type, shape and position check of the respective container. This is the only way to ensure process-reliable and collision-free path guidance of the loading robot. All this has to be integrated into the existing production process. Time delays must be eliminated and the positioning of the components must be accurate to the millimetre. 3D point cloud These point clouds of all four sensors are combined for the subsequent evaluation To counter this, VMT uses four 3D cameras per system. The four sensors each record a part of the entire image field. This can consist of two containers, each measuring approximately 1.5 × 2 × 1.5 metres (D × W × H). Two of the cameras focus on one container. This results in data from two perspectives each for a higher information quality of the 3D point cloud. These point clouds of all four sensors are combined for the subsequent evaluation. In the process, registrations of relevant features of the container take place in Regions of Interest (ROIs) of the total point cloud. Interference contours Registration is the exact positioning of a feature using a model in all six degrees of freedom. In other ROIs, interference contours are searched for which could lead to collisions during loading. Finally, the overall picture is compared with a stored reference model. In this way, the containers can be simultaneously checked for their condition and position in a fully automated manner. Even deformed or slanted containers can be processed. All this information is also recorded for use in a quality management system where the condition of all containers can be traced. The calibration as well as the consolidation of the measurement data and their subsequent evaluation are carried out in a separate IPC (industrial computer) with screen visualisation, operating elements and connection to the respective robot control. Image processing solution The entire image processing takes place in the image processing software MSS developed by VMT The main result of the image processing solution is the multi-vector correction. In this way, the robot is adjusted to be able to insert the component at the next possible, suitable deposit position. Secondary results are error messages due to interfering edges or objects in the container that would prevent filling. Damaged containers that are in a generally poor condition can be detected and sorted out with the help of the data. The entire image processing takes place in the image processing software Multi-Sensor Systems (MSS) developed by VMT. FrameSense is designed to be easy to use and can also be converted to other components directly on site. Robust 3D camera system On the camera side, VMT relies on Ensenso 3D cameras-initially on the X36 model. The current expansion stage of FrameSense is equipped with the Ensenso C variant. The reasons for the change are mainly the better projector performance-thanks to a new projection process-as well as a higher recording speed. In addition, the Ensenso C enables a larger measuring volume. This is an important criterion for FrameSense, because the robot can only reach the containers to be filled up to a certain distance. The specifications of the Ensenso C thus correspond exactly to VMT's requirements, as project manager and technology manager Andreas Redekop explains: "High projector performance and resolution together with fast data processing were our main technical criteria when selecting the camera. The installation in a fixed housing was also an advantage.” Ensenso models Housing of a robust 3D camera system meets the requirements of protection class IP65/67 The Ensenso C addresses current challenges in the automation and robotics industry. Compared to other Ensenso models, it provides both 3D and RGB colour information. Customers thus benefit from even more meaningful image data. The housing of the robust 3D camera system meets the requirements of protection class IP65/67. It offers a resolution of 5 MP and is available with baselines from current to approx. 455 mm. This means that even large objects can be reliably detected. The camera is quick and easy to use and addresses primarily large-volume applications, e.g., in medical technology, logistics or factory automation. Outlook By automatically loading and unloading containers and the integrated 3D container inspection, manual workstations can be automated with the help of FrameSense. Against the background of the shortage of skilled workers, the system can thus make an important contribution to process automation in the automotive industry, among others. It meets the prevailing challenges of the industry. Ensenso C provides the crucial basis for data generation and exceeds the requirements of many applications. Lukas Neumann from Product Management sees their added value especially here: “The high projector power and large sensor resolutions are particularly advantageous in the field of intralogistics. Here, high-precision components have to be gripped from a great distance with a large measuring volume.” For other stacking or bin-picking applications in classic logistics, he could imagine a similar camera with high projector power but lower resolution and fast recording. So nothing stands in the way of further developments and automation solutions in conjunction with "seeing" robots.
The Honourable Society of Lincoln’s Inn is one of the four Inns of Court and operates as an active and thriving society of lawyers, sprawling across 11 acres in central London and dating as far back as 1422. The title of “Lincoln’s Inn” refers both to the Society and the location, which houses the Society’s facilities, numerous barristers’ chambers, and several solicitors’ offices. Inns of Court The Inns of Court originally provided accommodation for law students who learned their craft by attending court. Currently, the Inns exist to aid students in pursuing the legal profession and serve as landlords, and custodians of historic buildings, banqueting and events venues, and tourist attractions. To fulfill these many functions, Lincoln’s Inn required security that would meet their high standards while protecting buildings that had been in continuous operation for centuries. Need for a key tracking system The Inn not only provides services to law students but also operates as an attraction and a hosting venue As the Inn not only provides services to law students, but also operates as an attraction and a hosting venue, many different levels of security need to be in place for a variety of users, full-time employees, temporary contractors, event staff, students, and others. For this reason, Lincoln’s Inn needed to have a comprehensive system to track and monitor the many keys for the extensive venue. Challenges due to manual management For some time, keys at Lincoln’s Inn were managed manually through an analogue system, with staff retrieving keys from an open cabinet and recording key usage with pen and paper. However, because at times manual recordkeeping can be less than diligent, this allowed for confusion as to who had what keys and when and made it possible for keys to be stashed away or used by unauthorised persons. KeyWatcher Touch key control KeyWatcher Touch provides us with a fully secure means of key storage and management" With the variety and quantity of people moving throughout Lincoln’s Inn on any given day, a more secure solution was needed. To update and improve key control, Chief Porter Nicholas Bracey turned to the KeyWatcher Touch key control system by Morse Watchmans. “KeyWatcher Touch provides us with a fully secure means of key storage and management. We considered several products on the market and found the Morse Watchmans solution to be the most flexible and easy-to-use system,” said Mr. Bracey. Installation of two key units “The high quality and ease of scalability were two of the top features we required, and the KeyWatcher Touch was a perfect fit for our key control needs.” Lincoln’s Inn installed two KeyWatcher Touch units configured for a total of 192 keys or keyrings in January 2016, and the system has been in daily use since the installation. It utilises the Inn’s IT network and is fully integrated with the PCs in the security office and the office of Chief Porter to provide maximum flexibility and ease of use. KeyWatcher software Tracking keys as they were removed and returned was a top concern, so the ability of the KeyWatcher to record who has removed what key and when was exceptionally important. “The keys are always secure, rather than being openly accessible to staff. There is no longer paperwork to be managed for logging, it is all taken care of with the KeyWatcher software,” continued Mr. Bracey. Easy and accurate management KeyWatcher Touch has provided Lincoln’s Inn with the functionality and security it requires to easily manage its 192 keys “Audits and reports are fast and accurate, and it has led to our staff becoming more responsible overall.” KeyWatcher Touch has provided Lincoln’s Inn with the functionality and security it requires to easily manage its 192 keys, while also providing an easily accessible audit trail. In addition, the system has proven hardy and resilient in daily use over two years. Exceptional service “We have had continuity with Morse Watchmans since day one,” finished Mr. Bracey. “Demonstrations of function, installation, and training were all handled almost entirely by the same representative, in addition to subsequent orders." "The continuously exceptional service has ensured that we were getting exactly the product that would best serve Lincoln’s Inn and provide us with the security we need.”
Magenta Security Services is proud to announce its continued partnership with the Royal Hospital for Neuro-disability, underscoring its unwavering dedication to providing quality security solutions while making a positive impact on the community. 2023 marks another year of collaboration, highlighting Magenta's commitment to the hospital's mission and showcasing its corporate social responsibility (CSR) efforts. Donating profits Throughout the past year, Magenta Security has not only provided steadfast manned guards for the hospital but has gone above and beyond by pledging to donate all profits from the contract to the Royal Hospital for Neuro-disability. This generous contribution is a testament to Magenta's commitment to making a meaningful difference in the lives of those they serve. Hospital's staff, patients, and visitors safety Magenta's staff has consistently demonstrated their reliability, going the extra mile to ensure the safety" “The partnership between Magenta Security and the Royal Hospital for Neuro-disability has been characterised by a unique blend of professionalism and personal connection and we are truly grateful for their donation,” comments Georgina King, Head of Facilities at the Royal Hospital for Neuro-disability. Georgina King adds, “The hospital's decision to continually work with Magenta is a testament to the security provider's exceptional dedication. Magenta's staff has consistently demonstrated their reliability, going the extra mile to ensure the safety and well-being of the hospital's staff, patients, and visitors.” Approachability and integration According to Georgina, what sets Magenta's team apart is their approachability and integration into the hospital's environment. She said, “Despite being external suppliers, they embody the ethos of the hospital, acting as valued members of the team." "Their personable nature and commitment to understanding the unique needs of the Royal Hospital for Neuro-disability have made them indispensable partners in maintaining a secure and comfortable environment,” concludes Georgina. Safe and supportive space Reflecting on the longevity of their collaboration, Magenta Security's Managing Director, Abbey Petkar, said, "As we celebrate another year of partnership with the Royal Hospital for Neuro-disability, we are reminded of our shared commitment to creating a safe and supportive space for all." He adds, "Our team's dedication remains as fresh as ever, and our ongoing support is a testament to the mutual respect and understanding that defines this collaboration." Neuro-disability partnership Our commitment to providing reliable, personable, and effective security solutions stands as a beacon of excellence" Abbey Petkar continues, "The partnership between Magenta Security Services and the Royal Hospital for Neuro-disability began through a competitive tender process 14 years ago." He further said, "Despite the passage of time, the enthusiasm and energy that we bring to our work have not waned. We believe that our commitment to providing reliable, personable, and effective security solutions stands as a beacon of excellence in the industry.” Creating a positive impact Magenta Security's ongoing support for the Royal Hospital for Neuro-disability underscores its corporate philosophy of not only securing spaces but also enriching communities. Through this partnership, they continue to demonstrate their commitment to making a positive impact beyond their core services.