Mobile Access Trends

What is PKOC? How will it make access control solutions more interoperable?
What is PKOC? How will it make access control solutions more interoperable?

PKOC stands for Public Key Open Credential. It is a new standard that will meet a 30-year industry challenge and strip away much of the complexity and cost involved in protecting and administering credentials for access control. It could also accelerate the transition from cards to mobile access control. PKOC is a standards-based mobile credential that is essentially free, vendor-agnostic, and interoperable across multiple devices and systems. It is a highly secure access credential that can live on a mobile phone, in a plastic access card, or in any device capable of generating a public-private key pair. Access control systems PKOC is the newest standard of the Physical Security Interoperability Alliance (PSIA), a tax-exempt organisation created to define, recommend, and promote standards for IP-enabled security devices and systems. PSIA introduced the Physical Logical Access Interoperability (PLAI) specification in 2013 to normalise identity data across disparate physical access control systems. The PKOC specification was introduced in 2021. We’re convinced this is the future A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms “We see the benefit of implementing the PKOC technology and doing it well,” says Sam Siegel, Senior Field Applications Engineer for ELATEC, a manufacturer of credential-agnostic readers/writers. “We wanted to get involved and join the discussion.” ELATEC has been participating in PSIA for more than a year. “This is a better way to do things,” says Siegel. “The PSIA, myself included, are convinced this is the future. The challenge is to get enough people to understand that it is a seismic shift away from what has been in place for so long.” A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms. The explanation spans the concept of public key infrastructure (PKI) and the difference between symmetrical and asymmetrical digital keys. Protecting symmetrical keys A symmetrical key system, which has been used historically in the access control market, involves the use of a single proprietary digital key to both encrypt and decrypt information. This means that digital public keys must be incorporated into each access control reader in the form of a module or a license, which the reader uses to read any compatible cards. Protecting symmetrical keys has been an expensive technology challenge the access control world The need to share these digital keys (in effect, the ability to read every compatible card) securely among access control manufacturers, integrators and end users involves extra administration and costs to ensure the security of the system. Protecting symmetrical keys has been an expensive technology challenge the access control world has borne for decades. The use of proprietary keys also promotes dependence on a single manufacturer or vendor to expand the ecosystem. The use of asymmetrical keys takes away these challenges. Advantages of using asymmetrical key pairs PKOC embraces the principle of PKI (public key infrastructure), a two-key asymmetrical system used to ensure confidentiality and encryption. In effect, there are two digital "keys," one public and one private, that are used to encrypt and decrypt information, in this case, a credential for an access control system. The secure credential standard is generated independently of a third-party credential issuer. It is generated within the device. In the access control scenario, the smartphone generates a key pair in the secure element of the phone, including a private key, which is stored on the smartphone, and a public key, which serves as the user’s ID number in the access control system. Sharing the public key is not a security risk because it is worthless without the private key that is locked away on the smartphone. PKOC-enabled smartphone The smartphone must contain the private key in order to interface with the access control system When a PKOC-enabled smartphone approaches a PKOC-enabled reader, the reader sends a one-time random number (a ‘nonce’) to the smartphone, which then encrypts it using the private key, and sends it along with the public key back to the reader. The reader uses the public key to decrypt the random number, which confirms the authorised access associated with the smartphone. The signals are sent via Bluetooth Low Energy (BLE).  Importantly, the private key never leaves the smartphone and is never shared with any other elements of the access control system. Therefore, there are no administrative or technical costs associated with protecting it. The smartphone must contain the private key in order to interface with the access control system using the public key. Mobile credentialing system For ELATEC, embracing PKOC provides a new way to highlight the company’s value proposition and promote it to a new group of companies; i.e., those who adopt the PKOC approach to mobile credentialing. The ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic “PKOC serves as a great way to show off our value and what we do best,” says Siegel. ELATEC provides credential readers/writers that operate in a variety of card and reader environments, incorporating an integrated BLE module to support mobile ID and authentication solutions, including PKOC. Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic and so compatible with any RFID card or mobile credentialing system, all in a small form factor (around 1 1/2 inches square). How readers and smartphones interact The PKOC standard addresses the variables of how the reader and the smartphone share information. Currently, the PKOC standard addresses communication via BLE, but the principle is the same for systems using near-field communication (NFC), ultra-wideband (UWB), or any future protocols. PKOC also defines how device manufacturers can enable devices (readers, locks, control panels, biometric devices, etc.) to securely consume the credential for authentication and access. PKOC can be used with smart cards as well as with smartphones. In the case of a smart card, the public and private keys are contained on the smart card, which communicates via NFC with the reader. The encryption/decryption scenario is exactly the same. PKOC enables users to ‘bring your own credential’ (BYOC). Public key number ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC" BLE offers a broader read range than NFC; the read range can be managed using software and/or by signalling intent or two-factor authentication. Because private keys remain secure inside a smartphone, they do not have to be incorporated into a digital wallet for security purposes, although they could be incorporated for matters of convenience.  To simplify administration, the public key number can be used as a badge number. If badge numbers have already been assigned, a column could be added to the database to associate badge numbers with public key numbers. “ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC,” said Paul Massey, CEO of ELATEC, Inc. “End-users should not be limited in their solution mix to one or two vendors due to their proprietary technology. PKOC now provides the ideal combination of security, convenience, interoperability, and cost for industry participants, by industry participants.” ‘Experience PSIA’ will promote PKOC at ISC West ISC West participants include PSIM manufacturer Advancis Software and Services The flexibility of PKOC will be on display at ISC West 2023, where ‘Experience PSIA’ will register attendees and provide them with a PKOC credential that can be used with a variety of readers throughout the show. Also showcasing the PLAI standard, PSIA’s presence at ISC West will include ELATEC along with several other vendors/manufacturers. A special PSIA event will be held from 5:30 to 7:30 p.m. on March 29 at the Venetian Ball Room B&C in Las Vegas. ISC West participants include PSIM manufacturer Advancis Software and Services, which acquired Cruatech software in 2012; and Idemia, specialising in identity-related security services including facial recognition and other biometrics. Integrated security systems Also involved are Johnson Controls (JCI), an integrated security systems provider that offers a range of security products and services; and Siemens, which offers its own range of security solutions and systems. Other participants include Last Lock, which has a unique spin on internet-enabled locks; while SAFR from Real Networks offers accurate, fast, unbiased face recognition and additional computer vision features, and Sentry Enterprises provides the SentryCard biometric platform for a privacy-centric, proof-of-identity solution. Finally, rfIDEAS manufactures credential readers.

What are the latest technology trends in biometrics?
What are the latest technology trends in biometrics?

Biometrics is both a mature technology in the physical security world and an innovation perpetually on the cutting edge. Biometric technologies received a boost during the COVID pandemic when “touchless” became a buzzword with particular relevancy to the world of biometrics. Higher security needs, such as “two-factor authentication,” are also driving demand for biometric products. We asked this week’s Expert Panel Roundtable: What are the latest technology trends in biometrics?

What big announcements can we expect at ISC West 2023?
What big announcements can we expect at ISC West 2023?

The upcoming ISC West trade show in Las Vegas will offer innumerable networking and learning opportunities for attendees. Manufacturers will take the opportunity to promote their businesses and showcase products and services to a targeted audience. Best of all, the event will be "in person," an advantage we should never again take for granted. We asked this week's Expert Panel Roundtable: What big announcements do you expect at ISC West 2023?

What changes had the biggest impact on security in 2022?
What changes had the biggest impact on security in 2022?

With 2023 well underway, it’s a good time to look back on what we learned in the tumultuous previous year. In the security marketplace, there was no shortage of technology developments and a few challenges that kept 2022 interesting, to say the least. But what can we learn from the past? We asked this week’s Expert Panel Roundtable: What changes had the biggest impact on the security marketplace in 2022?

Latest Access control news

Crossword Cybersecurity Plc launches ransomware readiness assessment service
Crossword Cybersecurity Plc launches ransomware readiness assessment service

Crossword Cybersecurity Plc, the cybersecurity solutions company focused on cyber strategy and risk announces the launch of its new Ransomware Readiness Assessment service. The service helps organisations reduce their exposure to ransomware attacks, provides detailed assessments on areas requiring protection, and recommends how they should respond to attacks.   Ransomware Ransomware is malware designed to deny a user or organisation access to files on their computer. By encrypting these files and demanding a ransom payment for the decryption key, cyber attackers place organisations in a position where paying the ransom can be seen as the easiest and cheapest way to regain access to their files.  Currently, ransomware attacks are endemic across all industry sectors, the speed of response and lowering the risk of an attack are everything. Impact of a ransomware attack Successful ransomware attacks almost always result in a significant portion of data being stolen 78% of organisations experienced an attack in 2021, of which 68% resulted in successful infections. The cost of these attacks can extend far beyond recovering systems and the ransom if paid. Successful ransomware attacks almost always result in a significant portion of an organisation’s data being stolen, with associated costs including reputational damage, the loss of customers, a long-term loss of productivity during systems recovery, rising insurance premiums, and an estimated 80% chance of a repeat attack. Ultimately, ransomware attacks can close a business down. Cutting the risk of attack The Ransomware Readiness Assessment service leverages Crossword’s worldwide experience in providing cyber threat intelligence and incident response services to organisations large and small. Conducted by the Nightingale security monitoring team, using an industry-specific approach and cyber incident response forensics, an organisation’s current exposure, control systems, and ability to respond to a ransomware incident are analysed in detail. Detailed analysis  Following the assessment, a detailed report is provided to the client with an overall ‘preparedness score’ Following the assessment, a detailed report is provided to the client with an overall ‘preparedness score’ together with pragmatic advice on how to improve preparedness in each area.  Implementation support is also available from Crossword’s Consulting Division, which has extensive experience in helping companies recover from and reduce the risk of attacks. Areas of assessment  The three assessments in the service cover the following areas regarding an organisation’s operational readiness: Exposure – Identify, qualify, and understand the specific weaknesses in an organisation that ransomware attacks exploit, including domain impersonation, cloud configurations, and remote access vulnerabilities.  Controls – Evaluate an organisation’s current security measures against typical ransomware attack mechanisms, such as phishing, which exploit, bypass, and evade weak security controls.  Response – Explore an organisation’s response capabilities with a real-world ransomware attack scenario, to determine the effectiveness of its containment and recovery strategy.  Providing cybersecurity aid Stuart Jubb, Group Managing Director for Crossword Cybersecurity, said, “The true cost of a ransomware attack is far-reaching, and it is simply not enough to rely on your technical infrastructure as a means of defence. The ability and speed of response to a ransomware attack are critical. It must be methodical, proactive, and unemotional." "Crossword’s Ransomware Readiness Assessment service helps organisations test the processes they have in place, achieve a cybersecurity stance that mitigates risks and gives them the tools to act when faced with an attack.”

Bosch introduces software, hardware, and services at ISC West for smart systems that are easy to install and manage
Bosch introduces software, hardware, and services at ISC West for smart systems that are easy to install and manage

At ISC West, March 29 – 31, 2023, in booth 11053, Bosch will showcase new software, hardware, and services that increase security and safety, simplify configuration and maintenance, and enhance ease of use. Products on display Booth visitors will experience the benefits of a new suite of application-specific edge-based artificial intelligence (AI), services for remote management of video recording devices, and the integration of IP horn loudspeakers with video systems. A central station software receiver for IP and cellular alarm communications, and a new mobile access solution will also be introduced at the show. AI-tailored for specific applications IVA Pro delivers valuable insights to improve efficiency, security, and safety Bringing application-specific AI software to Bosch cameras, Intelligent Video Analytics Pro (IVA Pro) delivers valuable insights to improve efficiency, security, and safety.  It enhances building security and operations (IVA Pro Buildings), perimeter security (IVA Pro Perimeter), traffic monitoring (IVA Pro Traffic), and object tracking (IVA Pro Intelligent Tracking). The solutions reliably detect, classify, and track objects to provide operators with deeper scene understanding.  IVA Pro Buildings, IVA Pro Traffic IVA Pro Buildings, based on deep learning AI technology, is ideal for advanced surveillance in and around buildings. It accurately detects persons and vehicles even in crowded areas.  IVA Pro Traffic, also based on deep learning, supports strategies to enhance mobility, safety, and the efficient use of roadways. It reliably subclassifies vehicles as cars, bicycles, buses, motorcycles, and trucks, and detects pedestrians to enable vulnerable road user safety solutions.  Easy deployment For most security practices, IVA Pro Buildings and IVA Pro Traffic eliminate onsite calibration For example, the detection of pedestrians in a crosswalk can trigger third-party systems to broadcast personal safety messages to connected vehicles to increase driver awareness of persons on the road.  For most security practices, like object detection and classification, IVA Pro Buildings and IVA Pro Traffic eliminate onsite calibration for easy deployment and configuration.  IVA Pro Intelligent Tracking IVA Pro Intelligent Tracking enables moving cameras to follow persons or vehicles in busy or crowded scenes, zooming in automatically and keeping subjects in view while in the field of view of the camera. It uses deep learning AI technology to understand more complex vehicle and pedestrian traffic scenarios and situations, such as when vehicles and pedestrians stop moving due to traffic lights, congestion, or an incident. IVA Pro Perimeter IVA Pro Perimeter provides long-distance detection alongside perimeters of buildings, data centers, and energy facilities, even in extreme weather. It can detect intruders who roll, crawl or camouflage themselves while minimising false triggers. New video security cameras pair IVA Pro with high-image quality Flexidome 5100i fixed dome cameras Flexidome 5100i fixed dome cameras come pre-installed with IVA Pro Buildings The Flexidome 5100i fixed dome cameras are the first to bring IVA Pro to market. They come pre-installed with IVA Pro Buildings and offer IVA Pro Perimeter and IVA Pro Traffic as purchasable licences.  With IR versions and 2- or 5-megapixel resolution along with an 8-megapixel/4K ultra high-definition model available soon, integrators have maximum flexibility to meet specific customer needs.  Dinion 7100i IR bullet cameras  The Dinion 7100i IR bullet cameras are for high-security perimeter applications that demand long-range detection and classification. The cameras come pre-installed with IVA Pro Buildings and IVA Pro Perimeter and offer IVA Pro Traffic as a purchasable license.  Due to next-level starlight X, HDR X, and intelligent IR the Dinion 7100i IR delivers clear and detailed images over long distances in all lighting conditions and weather. Autodome 7100i moving cameras The Autodome 7100i moving cameras come pre-installed with IVA Pro Buildings and IVA Pro Perimeter, making them the ideal choice to track and classify objects in traffic and cities. They offer exceptional low-light imaging performance and consistently provide stable images despite excessive force and vibration to ensure the highest reliability.  Situational awareness IVA Pro Intelligent Tracking and IVA Pro Traffic are offered as a purchasable license When paired with IVA Pro Intelligent Tracking, the camera improves situational awareness by detecting and classifying persons or vehicles when the camera is panning, tilting, or zooming and follows continuously, even if the object stops moving. IVA Pro Intelligent Tracking and IVA Pro Traffic are offered as purchasable license.  Integrated communications for immediate audio intervention  New IP-based horn loudspeakers provide integrated audio for video surveillance and public address applications to further strengthen the protection of people and property. It supports both two-way VoIP (Voice-over-IP) communications via SIP (Session Initiation Protocol) and pre-recorded/automated messages. Services for remote system management To increase efficiency and reduce onsite visits for technicians, Bosch will introduce the DIVAR IP 4000 and 6000 all-in-one recording units with optional Remote System Management services. The services provide information for inventory management, remote update capabilities, and system health alerts.  Mobile access enhances ease of use for access control systems Offering a smart addition to the Access Management System, a Mobile Access solution enables using a smartphone instead of a physical card to request access to facilities and areas.  Operators can assign all mobile access rights centrally and transmit credentials via e-mail or QR code for easy operation.  Simplifying monitoring centre operations Booth visitors can also see the Conettix B6800-SR Central Station Software Receiver, a flexible and modular solution for IP and cellular alarm communication. It supports up to 10,500 accounts and provides secure, encrypted alarm communication. The modern and simple browser-based interface allows multiple users to easily configure, operate, and maintain accounts. 

Comment from Thales: Could Microsoft Copilot pose a data security risk?
Comment from Thales: Could Microsoft Copilot pose a data security risk?

Following the announcement of Microsoft Copilot recently, Thales wanted to share this comment from Chris Harris, EMEA Technical Director. Chris discusses the potential security pitfalls of this technology and highlights what businesses will need to consider before it’s adopted within an organisation. Productivity gamechanger Chris Harris said, “Navigating workplace productivity tools can be very, well…unproductive. No doubt then that many workers and businesses will be excited by this latest development from Microsoft." "Less time typing meeting notes, the first cut of a PowerPoint presentation completed in seconds, emails automatically drafted… Microsoft is right in dubbing Copilot a ‘productivity game changer’." ChatGPT style technology Copilot puts ChatGPT-style technology directly into the daily lives of workers" He continues, “However, while businesses may already be calculating how much time they’ll save in admin, they’d do well not to get too excited." "This development puts ChatGPT style technology directly into the daily lives of workers, into the tools we all use universally to connect with colleagues and clients and we cannot overlook the potential risks to data privacy." Copilot Copilot will draft presentations, spreadsheets, and emails based on data that already exists within that company’s server. So, in theory, if an employee wanted to send a campaign report to a customer, they can instruct Copilot to do so, and the technology will pull the relevant data it sees on the system.  Pitfalls  Would Copilot be smart enough to restrict the data that it pulls? Sounds simple enough, but this is filled with potential security pitfalls. What if that employee in question shouldn’t have access to such information? Would Copilot be smart enough to restrict the data that it pulls? Robust access management protocols Chris Harris adds, “There’s also the risk of the technology pulling data that it shouldn’t. For example, if it misunderstands the instruction and pulls data from another client’s project." "The technology is not infallible, and throws human error into the mix and companies could very easily wind up with a data privacy nightmare. Companies implementing Copilot must be vigilant to ensure sensitive data stays protected, and that robust access management protocols are respected from the get-go.”

ASSA ABLOY's door closer that opens like it isn’t even there
ASSA ABLOY's door closer that opens like it isn’t even there

When a door is equipped with a high-quality door closer, building users feel safer. They know that fire doors shut tight and sensitive openings are protected against unauthorised entry. But sometimes, door-closer technology can also create barriers to genuine access-for-all. The problem is greater still for users who for many reasons have restricted strength or mobility. Door closer resistance Why? Because door closer resistance may be too great. Or the time before closing begins may be too short. Every user is different, with individual access needs or challenges. So, in solving one problem, some door closers accidentally create another. A Free-Motion Door Closer from ASSA ABLOY Opening Solutions solves it. Free-Motion combines the safety and protection of door-closing technology with the comfort of a door that opens naturally and is resistance-free and may be left open at any angle. And ASSA ABLOY’s Free-Motion technology gets to work from the very first degree of the door opening. Safety and convenience The door opens weightlessly right up to its widest angle since Free-Motion activation “There is no longer any need to trade security with comfort,” says Arto Kolehmainen, Product Manager for Door Closers at ASSA ABLOY Opening Solutions EMEIA. “A door fitted with an ASSA ABLOY Free-Motion Door Closer enjoys the best of both worlds.” When a user or building manager activates Free-Motion technology, automatic door closing is disabled. Doors may be left open, allowing staff and visitors to circulate freely: The door opens weightlessly right up to its widest angle since Free-Motion activation. Even heavy EN size 6 fire and smoke doors open easily. Everyone moves unhindered. Free-Motion technology At any time, in the event of a fire or other emergency, for example, Free-Motion operation may be stopped and doors once again close quickly after use. This can be done manually or, when integrated with a fire system, happens automatically when a threat is detected. As another layer of safety, every door fitted with Free-Motion technology shuts automatically when power is cut. Flexible deployment and simple, tailored installation “ASSA ABLOY Free-Motion technology gives building managers flexible control over almost any door in a building, without creating barriers to comfortable, convenient building use,” explains Arto Kolehmainen. A Free-Motion Door Closer can fit directly to the door leaf or to the frame. The range includes closers for double doors and the option of an integrated smoke detector. Robust and durable Free-Motion technology adds time- or event-based flexibility to every opening Like every ASSA ABLOY Door Closer, Free-Motion technology is robust and durable by design. It meets all critical safety and fire standards. Closing speeds, stronger latch speeds, and closing force are all adjustable to meet the demands of the specific door or location. And an ASSA ABLOY Free-Motion Door Closer is built for more than just fire or smoke doors: Free-Motion technology adds time- or event-based flexibility to every opening.  Modern and barrier-free building “For example, closers may be active during office hours to allow easy circulation of people, then deactivated overnight, so a door closes automatically after each user passes through it,” Arto Kolehmainen adds. “Free-Motion Door Closers help to create a modern, flexible, barrier-free building.”

Access control applications

Texecom responds to homeless charity's request
Texecom responds to homeless charity's request

Texecom has donated all of the equipment needed to help look after the safety of people affected by homelessness. Homelessness charity - Emmaus Bolton provides up to 22 people with a home, support, training and the focus of supported work each day in different shops and services within its grounds located off Fletcher Street in the town. Donation by Texecom Texecom donated all the equipment to update the intruder system within the charity’s community home As well as private bedrooms and bathrooms, the residential part of the building contains community kitchens, a dining area, lounge and games room, gym, computer suite and meeting rooms. Texecom donated all the equipment to update the intruder system within the charity’s community home and repair personal call-out buttons for each of the bedrooms, as well as new keypads, panels, external detection and bell boxes. Automatic alarms installed on the equipment Automatic alarms were installed on the equipment over three days with two engineers. The new system means residents have access to support at the touch of a button, alerting a central control system and members of staff at Emmaus Bolton. Author's quote Emmaus Bolton Director - Tony said, “We’re constantly looking for improvements and innovations to help people feel safe and secure. People thrive on solid foundations, so we’re grateful to Texecom and Automatic Alarms for helping our charity support people on their journeys rebuilding from homelessness.” Texecom’s Customer Alignment Manager John Gildert was delighted to be part of the project, which is close to his heart being based in his hometown. Tony adds, “After an introduction to Tony at Emmaus Bolton and understanding the requirements of the system I knew the Texecom Premier Elite system would be more than suitable; not only to provide the crucial first response system for staff and residents but would also provide security for the site out of hours.”  Key requirement for Emmaus Bolton Emmaus Bolton was to ensure multiple staff can be notified of any alerts whether they are on or off site A key requirement for Emmaus Bolton was to ensure multiple staff can be notified of any alerts whether they are on or off site and respond to these accordingly.  This was made possible through the installation and setup of Texecom Connect 4G and end-user mobile app providing round-the-clock protection for the site and its residents. Texecom Cloud services After completing the works on site, it was demonstrated how the site can be self-maintained to save costs, but also remotely monitored by the installation company using Texecom Cloud services without the necessity to visit the site.  Managing Director at Automatic Alarms, Gareth Williams, said, “It has been a pleasure to work with Emmaus Bolton and Texecom on this project. People supported by Emmaus will really benefit from this easy-call-out personal alarm system, which we were delighted to install."

Dahua Technology provides video-based security system to enhance security for an injection molding production facility in Mexico
Dahua Technology provides video-based security system to enhance security for an injection molding production facility in Mexico

A site-wide and extensive video-based security system from Dahua Technology has been installed at an injection molding production facility in Mexico. The 40,000 m2 Haitian International site in Jalisco needed perimeter protection, access control and site video monitoring to provide security and the efficient management of the site. Challenges - The remote location and sheer size of the site and its perimeter provided managers at Haitian International with security and infrastructure challenges. Installation challenges included the remote location of the site with its lack of infrastructure, the size and complexity of the installation – including the provision of a wireless network – and the sheer range of Dahua products and systems, including a range of internal and external cameras, perimeter protection sensors, access control hardware and software, and time and attendance systems. Fence-mounted detectors This includes: pole-mounted IR dome, speed dome and other network cameras for intrusion detection Solution - A whole host of security, surveillance monitoring and access control systems were installed by installation company Aldo. This includes: pole-mounted IR dome, speed dome and other network cameras for intrusion detection; wall-mounted IR speed domes, and eyeball cameras for external video surveillance; and quad beam fence-mounted detectors (and network cameras) for long distance perimeter protection. One notable solution implemented in the production site is the access control comprised of several integrated Dahua products. Two ANPR cameras (DHI-ITC215-PW6M-IRLZF) were installed at the parking entrance to manage incoming/outgoing authorised vehicles. Dahua also provided a personnel access control system that includes turnstiles at the main entrance gate that can be activated by security cards. Swing barriers (ASGB510J-L, ASGB520J-D, ASGB510J-R) were also installed at the administrative building entrance to facilitate the access of employees, guests and other visitors in the building.  Video entry system There’s also an attendance terminal (ASA2212A) with fingerprint identification module at the lobby for quick and easy clock in/out, which is managed by an interface that is completely made by Dahua. The installation also included: a video entry system for the administrative building The installation also included: a video entry system for the administrative building; individual door entry access points at certain doors; a video wall consisting of four 55-inch screens; and a PTZ keyboard with joystick. Internally there are 106 cameras – a mix of IR dome, eyeball, panoramic,, mini PTZs and other network cameras – to monitor the production line, public area and administrative building. Vehicle management solutions Results - Managers at Haitian International now have the assurance of a highly secure site, thanks to a comprehensive and integrated security system from Dahua Technology. In addition, they are now running an efficient and safe operation using state-of-the-art technology in a seamless fashion. This delivers high levels of security and efficient access control and vehicle management solutions to help with the smooth running of the facility. “Dahua supported us throughout the whole project, from the preliminary design phase to the implementation and post-sales services once the project was completed,” said Jair Martínez, Information Technology Coordinator at Haitian International. “They will continue to support us with the maintenance of each system,” he added.

Comelit-PAC’s latest integrated video door entry systems deployed at Cardiff's Landmark Place
Comelit-PAC’s latest integrated video door entry systems deployed at Cardiff's Landmark Place

Comelit-PAC’s latest integrated video door entry systems have been installed at premium development, Landmark Place, a 16-storey building that comprises predominantly residential dwellings, with retail at the ground and first floors. Located in the heart of Cardiff city centre, Landmark Place was the city’s first skyscraper development, which features 280 high-end apartments, mixed-use luxury facilities and a 24-hour concierge service. Comelit-PAC Comelit-PAC was specified via main fire and security specialists - IDS Fire and Security, to integrate necessary door entry systems across the development, incorporating main site access and car park entrance systems, together with video calling capability for all apartments and fully shared network facilities. Comelit-PAC was specified via main fire and security specialists IDS Fire and Security Says a Director, who represents the Section 20 Committee for Landmark Place: “There was a definite need to upgrade our legacy door entry system, but what was critical was the requirement to use our existing cabling infrastructure and to keep the old system working at the same time as the new installation was taking place. This was to ensure the security and safety of our residents at all times." “We worked with IDS right from the initial design stages to identify a solution. Comelit-PAC was recommended not only to accommodate the installation process but also to ensure a high-quality finish, with door entry panels and monitors that could blend with the aesthetics of the development. The system is also flexible enough to accommodate the integration requirements to ensure a seamless security experience for our residents and guests.” Simplebus 2 wire system Comelit-PAC specified its Simplebus 2 wire system, allowing the installer to utilise the existing cabling so the site could have the old and system working at the same time to maintain the security for the site. The solution was completed with Comelit-PAC’s ultra-digital entrance panels. Each apartment now features a Comelit-PAC mini hands-free monitor with a custom adapter plate, allowing homeowners to benefit from instant intercom control and video door entry capability. Author's quote Owen Williams, Operations Manager at IDS Security Systems added: “Installing Comelit-PAC at Landmark, was a straightforward decision. It’s really simple to retrofit and one of only a few that could accommodate the need to use the existing cabling infrastructure." Combination of SimpleBus and mini handsfree monitors could be installed without a power supply Owen Williams adds, "The combination of SimpleBus and mini handsfree monitors, could be installed without requiring extra power supplies. Homeowners can benefit from a stylish proposition of video door entry and integrated security, to stay protected.” Tony Berry, Comelit-PAC Business Development Manager, South West concluded: “Landmark Place set a new benchmark for skyscraper living in the heart of Cardiff, with its exceptional offering and level of amenities." He adds, "To maintain its high aspirations, every aspect of any works programme has to be considered to present the latest in a stylish design. This had to be carefully balanced with minimal disruption to homeowners, especially when it came to security. In partnership with IDS, we were able to demonstrate the benefits of SimpleBus and our mini handsfree monitors, with its ease of installation to minimise disruption."  Tony Berry continues, "It’s a great example of a simple upgrade process enabling homeowners to make the most of the latest in integrated video door entry technology.”

Monitoreal announces integration with Ajax alarm system
Monitoreal announces integration with Ajax alarm system

Monitoreal, a global provider of intelligent home and commercial security surveillance systems, has announced its integration with the popular intruder alarm system - Ajax. This powerful pairing allows users to create an accurate video detection perimeter around their property, that proactively deters intruders and monitors security events in real-time. Monitoreal’s AI-based object detection Monitoreal’s AI-based object detection can conveniently be armed and disarmed in tandem with the Ajax alarm, via the alarm’s panel and mobile app, offering superior visibility of what’s happening around your home or business. Users can trigger Ajax intruder alarm zones based on Monitoreal’s detection of people, animals and vehicles Users can trigger Ajax intruder alarm zones based on Monitoreal’s detection of people, animals, vehicles, inanimate objects or a combination of these, in specified areas captured by connected security cameras, at particular times of the day or night. This helps avoid the false alarms that often result from irrelevant movements such as rustling trees, moving shadows, pets and other irrelevant objects. Conversely, alarms originating from motion or magnetic sensors connected to the Ajax panel can trigger cameras to deliver Monitoreal snapshots to users, verifying the validity of those alarms. Monitoreal’s customisable rules Monitoreal’s customisable rules allow users to control whether an Ajax alarm is triggered automatically, semi-automatically, or manually based on particular detections. They also let home and business owners define the specific areas of their perimeter that are of greatest interest, and exclude insignificant zones such as neighbouring properties, bushy areas and busy roads. Monitoreal detects much more than just humans. Identifications include 20+ items, such as vehicles, animals, and a variety of inanimate objects, giving viewers the ability to proactively take action to deter intruders with the Ajax alarm, open or close perimeter gates, and control smart light and sound accessories based on real-time alerts.