In Security April 2018

Page 1

The magazine wiTh The inside sTory on securiTy ISSUE 24 APRIL 2018

KEY–baSED aCCESS KEYS oR aCCESS CoNTRoL? WHY NoT boTH?

06 INDUSTRY NEWS

20 aN INNovaTIvE fUTURE

28 IfSEC INTERNaTIoNaL 2018

32 vISIToR MaNaGEMENT

Latest developments from the security industry

Philip Ingram chats to Gareth o’Hara, Paxton

IfSEC International 2018 takes place at ExCeL, London

author: Rafael Schrijvers, Johnson Controls



ISSUE 26 SEPtEmbER 2016

Commentary The magazine wiTh The inside sTory on securiTy ISSUE 24 APRIL 2018

In SEcURIty THE MaGazINE WITH THE INSIDE SToRY oN SECURITY

KEY–baSED aCCESS KEYS oR aCCESS CoNTRoL? WHY NoT boTH?

www.In-SEcURIty.EU

06 INDUSTRY NEWS

Latest developments from the security industry

20 aN INNovaTIvE fUTURE 28 IfSEC INTERNaTIoNaL 2018 32 vISIToR MaNaGEMENT IfSEC International 2018 Philip Ingram chats to author: Rafael Schrijvers, takes place at ExCeL, London Gareth o’Hara, Paxton Johnson Controls

Editor Chris Hewett editorial@mebmedia.co.uk Accounts Jay Kempisty accounts@mebmedia.co.uk Publisher Wayne Banks +44 (0)1622 201207 wayne.banks@mebmedia.co.uk Designer Mark Fisher production@mebmedia.co.uk Published by MEB Media Limited 13 Princes Street Maidstone Kent ME14 1UR United Kingdom

W

elcome to the April issue of In Security and with the summer finally beginning to show signs of life, our thoughts move to IFSEC 2018. This issue’s Product & Industry News section (starting on page 8) showcases the latest news and views from the industry. Our cover story this month examines how access control is still evolving and how locking systems can combine high-end mechanical and electronic protection. A range of key-operated mechanical cylinders and padlocks maximise physical security and attack resistance to change (see page 2). Next, we see a British manufacturer build a reputation in the market for being one of the best and then to take that message and their products globally. Who am I talking about? Paxton Access, the Brighton-based access control and video door entry systems manufacturer (see page 20).

Later, how intelligent camera solutions help to increase traveller safety and transportation infrastructure efficiency (see page 24). IFSEC International 2018 will play host to a dedicated learning and demonstration area, where visitors will benefit from a realtime immersive experience of integrated physical and cyber security (see page 28). Rafael Schrijvers, Access Control Product Marketing Manager EMEA, Building Technologies & Solutions, Johnson Controls takes a closer look at visitor management (see page 32). Finally, David Wilkinson, Director of Technical Services, British Security Industry Association examines how the Electronic Call Handling Operation (ECHO) project

looks to take up the challenge of integrated call handling (see page 36). Chris Hewett, Editor n

Tel: +44 (0)1622 201207, Fax: +44 (0)1622 210207 info@mebmedia.co.uk www.mebmedia.co.uk Articles and art may not be reproduced or reprinted without the express written permission of the publisher. Exclusion of Liability Although every effort will be made to ensure the accuracy of all materials published, the publisher takes no responsibility for errors or omissions.

02

06

20

Copyright © MEB Media Ltd – 2018, all rights reserved.

28 Contents 02 Front Cover Story – Key-based access. Keys or access control? Why not both?

24 Intelligence broadcast How intelligent camera solutions help to increase traveller safety and transportation infrastructure efficiency.

06 Product & Industry News All the latest developments from the security industry.

28 IFSEC International 2018 IFSEC International 2018 takes place 19th- 21st June at ExCeL London.

20 Access-ing an innovative future Philip Ingram chats to Gareth O’Hara, Paxton’s Chief Sales Office.

32 Visitor Management Author: Rafael Schrijvers, Johnson Controls.

32 36

36 ECHO project looks to take up the challenge of integrated call handling.

IN Security I April 2018 I 1


COVER STORY

Key-based access Keys or access control? Why not both?

2 I April 2018 I IN Security


Lock and key security has come a long way since Ancient Egypt. Over the centuries, Romans, the lever tumbler and Linus Yale’s pin tumbler all took the technology forward. Each was a significant milestone. But in truth, your average pharaoh would still recognise his clever gadget. The latest advances in key-based electronic access control, on the other hand, would send Rameses into a tailspin. A mechatronic locking system like CLIQ® combines highend mechanical and electronic protection. A range of key-operated mechanical cylinders and padlocks maximise physical security and attack resistance. CLIQ® technology then layers encrypted, user-friendly electronic security on top — adding control and convenience without the need for wires: all CLIQ® devices are wire-free. Power to operate the electronics comes from the battery inside every CLIQ® key. And because it’s key based, CLIQ® offers a simple step up from mechanical security to powerful access control, with no change to existing hardware like doors. Smarter security, secure

cloud-based interfaces, mobile endorsement and a more flexible workplace are within easy reach for any building.

The convenient truth CLIQ® is trusted by organizations in all kinds of industries. Recently, German supermarket chain REWE chose CLIQ® for its newest warehouse in the north of Berlin. “With CLIQ®, we have great flexibility in the event a key is lost or if we want to make any changes. We can revoke the key’s access entitlements by reprogramming the 400 locking cylinders in use,” explains Marc Haverkamp, Project Manager for the REWE Logistics Centre. In Sweden, Stockholm’s Vasamuseet upgraded their old mechanical system to CLIQ®. Staff used to carry heavy keychains with ten or more keys. Now facility managers can amend the access rights of everyone’s CLIQ® key at any time, even remotely. “Previously, the biggest problem was lost keys,” says Michael Andrésen, Operations and Security Officer at the State Maritime Museums, Sweden. “Then the lock

had to be replaced, which was expensive.” With CLIQ®, a lost key’s access rights are simply removed, instantly, and it no longer opens any doors. “With CLIQ®, it’s clear where our keys are.” CLIQ® is popular with public utilities, because CLIQ® cylinders and padlocks can handle extreme weather and secure almost any locking point, making it more adaptable than standard electronic access systems. It is also easy for Eau de Valence, a French water utility, to manage mechanical and electronic locks in the same installation: “The electronic and mechanical cylinders are managed by one and the same key,” adds Christophe Nublat, Head of Study and Works Division at Eau de Valence. To combat the theft of valuable recyclable materials, Communauté d’Agglomération La Rochelle managers installed CLIQ® padlocks and cylinders at 13 dispersed waste reception centres and issued individually programmed keys to authorized staff. The impact was instant: “The number of burglaries has been reduced in a spectacular way,” says ➔

IN Security I April 2018 I 3


Hervé Begaud at the Communauté d’Agglomération. “We used to report damages every week. Now, we have had a single, failed, attempt on a cylinder in the last 6 months.” La Rochelle district administrators are impressed: they plan to extend CLIQ® access control to all critical municipal sites.

There is a CLIQ® that fits Wherever you work, employees leave, keys get lost, and outdated devices with unreliable security are still in use throughout your premises. Yet the remedy to all these problems is not a “one-size-fitsall” solution. There are CLIQ® extensions for all kinds of security needs, supplementing the easy, flexible access rights management, and scheduling for keys, users and doors that comes with every CLIQ® installation. For small to medium-sized businesses, CLIQ® Go supports managers in administering their access system on the move and in the cloud. Lost keys are easy to revoke via the CLIQ® Go app, designed to be easy enough for a non-specialist to operate. Even a pharaoh. In medium to large businesses, security managers can administer their CLIQ® system using the

4 I April 2018 I IN Security

CLIQ® Web Manager via a standard web browser. The additional option to operate on a Software as a Service basis can help reduce IT infrastructure costs. Data security is ensured, plus 24/7 monitoring and support are available on request. For managing a large business with remote sites or a mobile workforce (or both), CLIQ® Remote with CLIQ® Connect is the tailormade solution. In Sweden, the Skellefteå Fire Service uses CLIQ® Remote. In the event of a fire, firefighters update their CLIQ® key at the station or on the move, using a key updater kept in each fire engine. There’s no longer any need for stations to hold and manage multiple sets of keys, or for off-site firefighters to first go to the station for the right key. A rapid response means more chance to prevent a fire from spreading. “With the CLIQ® Remote key updater in each fire engine, we can authorize a key for a limited time. If we lose the key during an emergency, for example, it becomes useless after 60 minutes,” says Skellefteå fire engineer Johan Marklund. “Previously, we had a key safe at every fire station,” he adds. “At the main station alone there were about 100 keys. We had to take inventory regularly and sometimes found

certain keys no longer worked. In a serious situation, we wouldn’t have been able to enter premises without breaking down the door. I recommend emergency services in other locations choose the same solution.” The optional CLIQ® Connect app smooths mobile workflows. A key-holder no longer needs to update access rights in person, carry additional updating devices, or even return to base. All they need is a smartphone and the app. The app pairs a programmable CLIQ® Connect key, via Bluetooth and an encrypted cloud connection, with the CLIQ® Web Manager. To change a key-holder’s access rights, a system admin accesses the CLIQ® Web Manager software — from anywhere — and updates their profile. The key-holder establishes a secure Bluetooth connection between their programmable CLIQ® Connect key and the CLIQ® Connect app to instantly update permissions. ASSA ABLOY sells and supports CLIQ® technology under several brands, including IKON, ABLOY, Mul-T-Lock, ASSA, Vachette and KESO. To discover the right CLIQ® solution for your business, take the quiz at http://campaigns. assaabloyopeningsolutions.eu /cliq-quiz n


PART OF

Leading trade fair for security September 25 – 28, 2018, Essen/Germany

SCT

SECURITY & COUNTER

TERROR EXPO

CNI PROTECTION | BORDER SECURITY

6-7 March 2018 Olympia, London

OFFENDER MANAGEMENT | SERVICES

MAJOR EVENT SECURITY | CYBER SECURITY POLICING AND COUNTER TERRORISM

Video//Perimeter Protection//Access/Mechatronics / BOOK YOUR STAND FOR 2018 Mechanics/Systems//Cyber Security/Economic Security// Meet face toServices//Fire/Intrusion/Systems// face with over Engage with over 901 VIPs and 9,500 security professionals arrange pre-booked meetings Launch your products and services on an international platform

! decision makers with Skey U T I S VIConnect across 114 different countries

WWW.SCTX.CO.UK/INSECURITY Part of UK Security Week WORLD COUNTER TERROR CONGRESS

Organised by

@SCTX18

Ambition THE EPRR EXPO

FORENSICS EUROPE EXPO

sctx.co.uk/linkedin

www.security-essen.de


product and industry news

With the Cyber Security Conference, Security Essen provides a strong signal for digital security

Digital security technology brings more comfort but, amongst many manufacturers and users, also raises the question of unwanted attacks by data thieves. The door system with video-based access checking, the fire alarm controllable using an app or also the house technology connected to the control room - how can the data arising here be protected in the best possible way? The world’s leading fair for civil security with its own Cyber Security Conference will provide information about these things. Here, attention will focus on transferring knowledge and exchanging experience on all four days of Security Essen. From now on, experts have the opportunity to submit their applications for lectures relating to all aspects of the subject areas called “Chances & Risks of Cyber Security”, “Connected Building - Security in the Building of the Future” as well as “Admission, Access and Attack - Possibilities for Identification”. The conference will flank the even stronger orientation of Security Essen towards digital security. For the first time, this area will have its own fair hall, prominently placed directly at the new East Entrance. The Cyber Security Conference will take place there, too. “Thus, trade visitors and exhibitors will have the possibility of obtaining information close to the fair and in the middle of the happenings. After all, the conference should yield the best possible benefits for them. It is important to us that the lectures are formulated in a user-related way and the listeners receive valuable stimuli,”

6 I April 2018 I IN Security

explained Julia Jacob, Head of Project for Security Essen. Messe Essen is organising the conference in cooperation with BHE Federal Association for Security Technology and with the specialist support of the Federal Office for Information Security (BSI). Attention-Grabbing Conference in the Middle of the Happenings at the Fair In a way close to practice, the planned lectures will deal with situations relating to all aspects of digital security. In the subject area called “Chances & Risks of Cyber Security”, it is intended to provide information about smart cities, KRITIS, IT security on computers, manufacturer-neutral solutions in the cloud as well as cloud services. The lecture series entitled “Connected Building - Security in the Building of the Future” will focus on the subjects of smart metering, the Internet of Things, the safeguarding of interfaces, dynamic escape route control as well as biometry. The third main focal point of the Cyber Security Conference will relate to the digital possibilities for identification such as the wireless technologies of Bluetooth / NFC, biometry or cryptography. From now on, experts, lateral thinkers, developers or scientists are being invited to apply to be speakers for the Cyber Security Conference at Security Essen 2018 at www.security-essen.de/impulsgeber/ programm/cyber-security-konferenz/, any interested parties can submit brief abstracts.” n


Getting to the heart of the matter! Stanley Security adopts digital asset mapping for improved service & maintenance

STANLEY Security, one of the UK’s leading security providers, has adopted an innovative asset mapping technology to provide customers with more efficient system maintenance & servicing than ever before. ‘Connected Assets’ is an advanced digital asset mapping technology that enables STANLEY Security to quickly and easily map out an entire security system and all its individual elements. It allows for detailed additional information to be included, including images of equipment in situ. Using Connected Assets, a visiting STANLEY engineer can now familiarise themselves with a customer’s security system before attending site and, whilst there, can quickly locate where specific items are that require servicing. For customers, Connected Assets means an engineer can be on and off site quicker than ever before, making for a more efficient service with minimal disruption. For STANLEY Security it not only makes for happier customers, but also means STANLEY can make more efficient use of its resources. For example, with a complex site, rather than wait for an engineer who is familiar with that site and its system(s), any available engineer can now be sent fully loaded with the information they need to conduct that service visit. For Stephen Hodgkinson-Soto, STANLEY Security Service Director GB, Connected Assets marks a leap forward: “Most security companies use an asset register spreadsheet to detail an installed security system, but

this is basic and limited in terms of what information you can include. In a digital world, this approach is out of date. Moving to Connected Assets enables us to add considerably more valuable information and our field engineers are using it to good effect. It’s working well for our customers, big and small, from a single newsagent to a large international airport.” STANLEY Security’s maintenance & servicing options include service plans with differing levels of support to suit customers’ needs. It has a network of expert technicians UK wide who can repair or maintain security equipment to ensure that it’s fully functional. Whilst STANLEY Security is currently using Connected Assets to map static assets for its own service and maintenance contracts, Derek McLean, Head of Technology Solutions at STANLEY Security, sees an even wider use for it: “Using Connected Assets for mapping customer’s security systems is the first step. We are looking at ways to further develop and use this innovative technology. For example, we are already combining it with asset utilisation. Using technology such as Low Energy Bluetooth, GPS and RTLS Location Tracking, Temperature Monitoring and GSM we are able to provide real time information on assets, however large or small, both inside and outside a building.” For more information on STANLEY Security, please go to www.stanleysecurity.co.uk n

IN Security I June April 2015 2018 I 7


product and industry news

UL opens fire safety laboratory in Europe

Frankfurt, 02/28/2018 – On February 27, 2018, the international testing and certification company, UL, opened a brand new fire safety laboratory in Europe, in the city of Rosenheim. The almost 3,000 sqm laboratory specializes in reaction to fire, fire resistance and smoke protection tests. The facility operates in conjunction with the ift Rosenheim Technology Center, an independent test institute dedicated to testing doors, windows and facades. At the ceremonial opening conducted by deputy Bavarian Prime Minister and Bavarian State Minister for Economic Affairs, Media, Energy and Technology, Ilse Aigner, Rosenheim’s mayor, Gabriele Bauer, and the Consul for Trade, Eric Hunt, representing the US Embassy, were also in attendance. The politicians, the embassy representative and other invited guests were subsequently given a brief tour of the fire testing laboratory. “The new laboratory offers companies the unique opportunity to certify the suitability of their products under both European and North American standards, in a single test procedure,” said Chris Hasbrook, VP and GM for Building and Life Safety Technologies at UL. “In this way, Germany will become the new European centre for the testing and certification of building products for global markets,” added Ingo Rübenach, VP Central, East and South Europe at UL. Opening as part of a UL symposium on fire protection The opening took place as part of a two-day symposium, “UL International Fire Safety & Building Science Symposium”. In it, UL experts and guest speakers spanning the fire safety industry in Europe and the US provided information on the latest

8 I April 2018 I IN Security

developments in building and fire protection. During the symposium, talks and podium discussions were held by experts such as manufacturers, architects, planners, insurers, consultants and public officials. UL is the global leader when it comes to fire protection. The conference, which is the first of its kind to be organized in Germany, is part of UL’s expansion in Europe. For nearly two decades, UL has been supporting manufacturers worldwide to help them access global markets more easily. Today, operating out of Europe, the company provides guidance to a large number of customers with global market presence. The success achieved so far in Europe prompted UL to increase its capacities in the area of fire testing and certification. New fire safety laboratory offers numerous test procedures The new facility in Rosenheim offers a large number of test procedures which are used to test and certify the compliance of building products with fire protection regulations. The tests are carried out according to European, North American and other International test standards. Fire protection testing services at the new facility include, among other things, the testing of products and materials for flammability, fire propagation smoke protection and fire resistance. Through collaboration and spatial proximity between UL and ift, manufacturers and system providers are given the option of having their products tested and certified at a single facility, quickly and easily, for Europe and the worldwide market. More information on UL’s new fire safety laboratory can be found at www.UL.com/FireTestingEurope n


Net2 Entry Touch Smart, Simple Door Entry with a Premium Touch Durable 7" colour touch screen

Personalise with multiple theme options

For more information:

paxton.info/3004

Fully compatible with Net2 access control


product and industry news

Eneo’s Candid bullet camera range uses Sony STARVIS CMOS sensors for exceptional video quality, at night

Eneo’s high-performance Candid bullet camera range, with integrated junction box, uses a 2MP and 3MP, 1/2,8” Sony STARVIS CMOS sensor to provide exceptional video quality in low light conditions. There are three Candid bullet cameras in the range with built-in junction boxes. A 2MP, IP bullet (ICB62M2712M0A) and a 3MP, IP bullet (ICB-73M2712MWA) with the newly-launched, WiFi set-up interface. A 2MP, analogue, multi-signal bullet (MCB-72M2712M0A) completes the range, offering selectable, HD-TVI, AHD, CVI, HD-SDI, EX-SDI and Composite video stream options. The eneo, Candid bullet cameras have a rugged, aluminum construction, designed for tough, outdoor applications. They are weather proof-rated to IP67 and come with high-power, integrated, IR illumination and a motorized, 2.7mm to 12mm, varifocal lens. They will operate at a temperature of -20°C, but have a built-in, low-energy heater which will extend the IP camera’s temperature range to -50°C and the analogue cameras temperature range to -30°C.

10 I April 2018 I IN Security

The eneo, Candid bullet camera’s integrated junction box is built in to its wall-mounting bracket. This simplifies, neatens and speeds up installation, allowing cabling from behind, directly into box. Not only does this seal the camera against dust and moisture, but it also means no cabling is visible, reducing the risk of tamper and vandalism All cameras include onboard, Micro-SD card storage; triple streams for recording and viewing; a smartphoneready, cross web browser for remote set up; and low voltage and PoE supply. The IP cameras’ onboard, analysis features include motion detection; tamper protection; trip wire; people counting; direction and field detection; defog; and vertical view. The multi-signal model includes defog, privacy masking and motion detection. Eneo’s new Candid bullet cameras are available now through eneo’s established, UK distribution channels. For more information on eneo Security products please visit: www.eneo-security.com n


Hanwha Techwin launches Wisenet Group ANPR cameras for small site management Hanwha Techwin has strengthened its range of Intelligent Traffic Management solutions with the introduction of Wisenet Group ANPR cameras. Taking advantage of a powerful chipset, Wisenet Group ANPR cameras are an ideal edge-based solution for small sites with multiple entrances/exits or roadways. Camera-to-camera IP communication technology enables up to 4 Wisenet Group ANPR cameras, (1 master camera and 3 slaves) to work together. The cameras recognise vehicle number plates and simultaneously transmit data to a single web based display. Sharing many of the features and attributes of the Wisenet ANPR single use solution introduced at the end of 2017, Wisenet Group ANPR provides the opportunity to automatically control the movement of white listed cars through barriers via camera relay outputs, as well as provide valuable car park management information, such as ‘time spent’ and occupancy rates. The Wisenet Intelligent Traffic Management Suite The comprehensive range of ANPR based Wisenet

Intelligent Traffic Management solutions have been developed by Hanwha Techwin in partnership with analytics experts, FF Group. In addition to Wisenet Group and single site ANPR cameras, the range also includes a number plate server solution for large site management and Cloud based options for multiple sites and cameras. “Collectively, these ANPR solutions provide car park access control for business applications, as well as large scale city wide based systems which help local authorities keep people safe, enforce parking regulations and detect other traffic infringements,” said Bob (H.Y.) Hwang Ph.D., Managing Director of Hanwha Techwin Europe. “The key benefit of the deep integration of FF Group’s analytics with our Wisenet cameras is that users can deploy a highly effective ANPR solution without having to evaluate the myriad of specialist analytics solutions on the market.” www.hanwha-security.eu n

IN Security I April 2018 I 11


product and industry news

Nedap ensures fast ground transport access at Auckland Airport

While 15 million passengers travel through Auckland Airport every year already, this number is anticipated to grow rapidly in the upcoming years. The Ground Transportations Plan was redesigned to ensure that service levels required meet the demands of the many passengers. To offer extremely reliable, fast and secure access to all ground transport vehicles, Nedap’s TRANSIT and MOOV were installed. 15 million passengers a year Auckland Airport is the major connection between the world and “the land of the long white cloud”. Over 70% of visitors enter or leave New Zealand via Auckland Airport, which handles over 19 million passengers a year. More than 20 international airlines serve Auckland Airport, Australasia’s third busiest international airport, after Sydney.As New Zealand’s major transport hub, Auckland Airport is continually developing the capacity and services to ensure it will sustainably cope with an anticipated 40 million passengers a year by 2044, reflecting New Zealand’s growing popularity as one of the world’s leading tourism destinations. Ground Transportations Plan In response to this expected growth, the Ground Transportations Plan was redesigned to ensure that service levels required meet passenger demands. All ground transport vehicles (such as taxis, tour buses, emergency services and other commercial vehicles) are automatically registered by the TRANSIT as they pass through the restricted areas, only accessible for authorised vehicles using Nedap’s Compact Tags. Each transport vehicle is identified up to 10 meters by Nedap’s TRANSIT readers. As soon as the vehicle approaches this high-end vehicle identification reader, the vehicle is automatically identified, ensuring a fast and secure traffic flow without any congestion. A wide variety of vehicles of different heights are accurately identified in each lane, which is key for any transaction based charging solution.

12 I April 2018 I IN Security

Independent control system The TRANSIT readers are connected to Nedap’s MOOV VMC system. The MOOV VMC offers an independent control system that registers and records each transaction. The MOOV VMC application controls the entire vehicle access to the restricted Ground Transport areas. Proven airport solution Nedap’s TRANSIT has proven itself world-wide in airport applications, where security and fast identification are the key to ensuring traffic flow on the airport. Extremely reliable identification is the basis for transaction based payment processing. The TRANSIT readers and MOOV vehicle management controllers record over 30.000 transactions per month. Account-based payment solution Each transaction with exact date and time is transferred to Advam’s GroundTransport system for payment processing of each transaction. GroundTransport is the leading traffic management solution that allows operators to manage traffic flow for taxis, limousines and buses. It facilitates the entry, exit and tolling of ground transport vehicles, whilst easing congestion and improving the overall passenger experience. Secured vehicle access Next to the Ground Transport application, Nedap’s TRANSIT readers are also installed at the airport to facilitate automatic long range secured vehicle access to restricted areas of the airport. The TRANSIT readers are integrated into the existing access control system provided by CEM. Authorised vehicles use a Window Button to get access to the restricted zone. The system has been supplied by supplied by ISCS New Zealand, Nedap’s distribution partner in New Zealand. For further information please visit: www.nedapidentification.com n


UNLOCK NEW MARKETS.

UL’s New European Testing Lab for Security and Access Control Devices. Your key to success in global markets combines speed with smooth efficiency. The new security testing laboratory in Frankfurt opens a portal to the market’s of Europe, Asia, the Americas and the Middle East – with comprehensive compliance solutions, cost-saving service bundles, expert European engineers, global regulatory expertise, and the advantage of a single-source provider. Test us.

UL.com/security-lab UL, the UL logo and UL certification marks are trademarks of UL LLC ©2017. All other marks are the property of their respective owners.

EU.BuildingLifeSafety@ul.com


product and industry news

New distribution deal agreed between Norbain and Satel UK

Satel UK – the national distributor for high-quality security systems manufacturer Satel – is delighted to announce a new partnership with Norbain, one of the UK’s largest distributors of IP, CCTV, access control and intruder detection solutions. The agreement will see Norbain stock and distribute Satel’s range of graded PIR detectors, intruder alarm boards and sirens in the United Kingdom. Satel’s PIR sensor range has been configured to be both tamper-resistant and reliable, while devices are able to compensate for a wide ambient temperature range and adjust their performance to the requirements of the user and the protected premises (for example, adjustments can be made to ensure pet immunity). Additionally, certain Satel PIR sensors can be used to implement building automation functions when the house alarm system is unarmed. “We’re exceptionally pleased with this partnership, and we believe that Norbain are the perfect company to represent Satel in this market,” believes Bert McGaughey, Supply Chain Manager at Satel UK. “Our products offer incredible quality and serious reliability coupled with flexible features that make them perfect for residential, commercial and retail premises, and we are excited to see more and more UK installers using Satel systems in their projects in the coming months and years.”

14 I April 2018 I IN Security

“We believe that Satel’s range is an incredibly good fit within our product line-up, and bolsters the options available for installers when it comes to graded alarm systems,” adds Steve Marshall, Divisional Director for New Business Initiatives at Norbain. “We’re delighted to be working with Satel and look forward to a fruitful and rewarding relationship.” The new additions to Norbain’s portfolio will be showcased for the first time at the Norbain North Roadshow, which takes place on 17th May at the Macron Stadium in Bolton. As well as demonstrating the company’s CCTV, access control and intruder detection portfolio, there will be talks on both cybersecurity and GDPR – both crucial topics for the security industry. www.satel-security.com n

“We’re exceptionally pleased with this partnership, and we believe that Norbain are the perfect company to represent Satel in this market.”


CBRE extends contract with Axis Security at major Rathbone Square development

CBRE has renewed its contract with Axis Security, one of the UK’s leading providers of security services, to continue providing security services at the new Rathbone Square development in Central London. CBRE has been working with Axis Security at Rathbone Square since the beginning of 2017 when the development was still in its construction phase. Rathbone Square, just north of Oxford Street, is a 2.5 acre estate, which includes the new UK home for social media giant Facebook, as well as 142 private residential apartments, a carefully curated retail site featuring shops and restaurants and a landscaped public square. Facebook officially moved in to the 240,000 sq. ft. building in December 2017, with capacity for 2000 employees working across six floors of Grade A office space. A high-profile client, the security officers have to deal with a number of issues, including the physical management of external media. The Axis Security team at Rathbone Square comprises of a core team of 13 security staff. All employees were hand-selected and recruited by Axis Security. Eleanor Petch, CBRE Operations Manager at Rathbone Square, says Axis Security has performed above expectations: “Rathbone Square has been a continuallychanging project over the last year. The Axis Security team was mobilised during the construction phase and were extremely useful in helping to manage multiple contractors.

“The team has demonstrated excellent knowledge and experience and have adapted impressively to all the challenges and demands faced. We had no hesitations in renewing the contract.” David Mundell, Managing Director at Axis Security says the team at Rathbone Square deserves credit: “To have this contract extended is recognition of the impressive work our team have been doing. It has been a difficult challenge, but the team, brought together from a number of different sites, has bonded into a cohesive unit that has proved it is able to handle the demands of this high profile development.” For further information please visit www.axis-security.co.uk n

“The team has demonstrated excellent knowledge and experience and have adapted impressively to all the challenges and demands faced. We had no hesitations in renewing the contract.”

IN Security I April 2018 I 15



Redvision adds 2MP and 4MP pre-built, camera options, to its newly-launched VEGA™, rugged housings Redvision, the UK’s leading manufacturer of highperformance, rugged CCTV products, has added two pre-built, fixed-camera options to its newlylaunched, VEGA™, rugged housing range. Security installers can now buy complete, rugged, fixedcamera solutions from Redvision, with the same tough, hazardous or corrosive, outdoor, surveillance characteristics as their market-leading, X-SERIES™ and VOLANT™, rugged, PTZ cameras. The initial VEGA™ 2050 camera options include the VEGA™ 2052, with a built-in, 2MP camera module and the VEGA™ 2054, with a built-in, 4MP camera module. Both VEGA™ 2050 cameras are fully ruggedized, offering protection from dirt, moisture and dust ingress. They are also cable-managed, with easyconnect terminals, making them vandal-resistant and simple to install, with a pendent or pedestal mount for ceilings, walls and soffits. Stephen Lightfoot, technical director at Redvision, explains, “The VEGA™ 2052 and 2054, fixed, rugged cameras are based on the high-quality, 2MP or 4MP, Sony™ Exmor™, Low Light Sensor. They both offer 2.7 ~ 12mm motorised zoom lens, Smart IR - up to 60m, audio in/out, true Wide Dynamic Range (WDR) and Region of interest (ROI) settings. Further features include video analytics; SD card edge storage up to 128GB; alarm triggers for motion or network loss;

H.264 and H.265 compression options; and ONVIF compliance to Profile S 2.6.” The VEGA™ 2050 range is finished with a marinegrade plating, followed by a tough powder-coating. It comes in light grey (RAL 7035) as standard, but can be customised for any RAL colour, extra marine finish and customer branding. The housing is both IP67 weather-proof rated and IK10 shock and vandalresistance rated, making it amongst the toughest, fixed cameras in the security industry. Visit www.redvisioncctv.com for more information n

The initial VEGA™ 2050 camera options include the VEGA™ 2052, with a built-in, 2MP camera module and the VEGA™ 2054, with a built-in, 4MP camera module.

IN Security I April 2018 I 17


product and industry news

Clarity for GDPR compliance in 20 minutes: With the free VdS-Quick-Check On May 25th, every company and every authority in the EU must have implemented the extensive “General Data Protection Regu-lation (GDPR)”. VdS now supports those institutions with a free WebQuick-Check for the fast determination of their GDPR com-pliance level – including, where necessary, practical implemen-tation assistance. Despite its far-reaching requirements, the EU´s General Data Protec-tion Regulation (GDPR) must be fully implemented until May 25th by every company processing personal data and every public authority in the EU member states (and, at current negotiation status, also the UK). Therefore VdS, Europe´s largest institute for corporate security and safety, has now supplemented its range of data protection services for the practical

management of these EU requirements with a free Internet-Quick-Check. On the basis of 26 questions, specifically small and medium-sized businesses as well as smaller authorities can quickly determine their individual level of GDPR compliance. The convenient VdS-traffic-light-system immediately shows any need for action. Included in the evaluation is also precise assistance for any subsequent improvements that may be necessary. Markus Edel, head of VdS Cyber-Security, explains: “In the new Web-Quick-Check, we have compressed our core support functions for the necessary GDPR implementation – allowing a fast self-analysis of the compliance level in all relevant fields of action.” The new tool is provided free of charge on www.vds-quick-check.de/en n

ISM reports successful event for relaunch into Scotland Intergrated Security Management (ISM), a leader in the design, development and manufacture of door entry and intercoms, has hailed the success of Security 2018 Scotland, in particular the positive reaction to its innovative Compact Series. ISM also showcased its recently-launched IP Connect range of IP door entry products and popular Genesys Integrated Security Management System (ISMS) at the event in Glasgow. Geoff Pye, Managing Director (Joint) at ISM, says the event was a useful springboard to focus again on the Scottish market: “Security 2018 Scotland has given us a great platform to engage with potential customers and showcase our portfolio of high-quality and reliable systems.

18 I April 2018 I IN Security

“The Compact door entry system was particularly well received, and it was also very encouraging to have some initial conversations about our new IP Connect range.” Compact is a robust, vandal resistant telephone entry system for low-rise residential buildings owned or managed by authorities that need a cost-effective system, that is easy to use, install and maintain. Security 2018 Scotland was hosted at the Hilton hotel in Glasgow and featured a lineup of top industry speakers including Gordon MacKenzie, Head of Security Services at University of Strathclyde, and Dr David BaMaung, Director at Camor Training. www.ism-uk.com n


Club ClubCar Cartakes takesto tothe thestreets streets

Club ClubCar Carisisnow nowstreet streetlegal legalininevery every country countryininthe theEU. EU. Club ClubCar’s Car’selectric electricutility utilityvehicles vehicles offer offerananattractive attractivealternative alternativetoto traditional traditionalpetrol-powered petrol-poweredvehicles. vehicles. For Fora astart startthere’s there’snonopetrol petrolcosts costs – –and andzero zeroemissions. emissions. Club ClubCar’s Car’svehicles vehicleshave havethe thepower power totoperform performnumerous numerouscampus campustasks, tasks, from frommail maildelivery deliverytotosecurity security and andmaintenance. maintenance. Want Wanttotoknow knowmore? more? Contact Contactyour yourClub ClubCar Car representative representativetoday. today.

STREET STREETLEGAL LEGAL www.clubcar.com www.clubcar.com info_esa@clubcar.com info_esa@clubcar.com (+44) (+44)777 777180 1805463 5463


ACCESS CONTROL

Access-ing an innovative future Philip Ingram chats to Gareth O’Hara, Paxton’s Chief Sales Officer

20 I April 2018 I IN Security


Success rarely makes the headlines and it should, especially when we see a British manufacturer build a reputation in the market for being one of the best and then to take that message and their products globally. Who am I talking about? Paxton Access, the Brighton based access control and video door entry systems manufacturer who is doing so well they have just expanded and opened a new Technology Centre. Philip Ingram MBE went along to see the centre for himself and chat to Gareth O’Hara, Paxton’s Chief Sales Officer. Gareth is focused on keeping Paxton Access at least one step ahead of the competition and to do that, understanding how the market is changing is critical. “The biggest challenge for the market comes from changing user expectations. It’s now possible for a consumer to purchase a security system from their local hardware store and operate this using a handheld device and this is resetting expectations as to what can be achieved with technology,” he says. But how much is the market really worth? Gareth thinks that by 2020 the global access control market will probably be worth around approx. $9-10 billion. “I think that there is

a massive opportunity for Paxton to really take advantage of this. But even more so, the intelligent buildings market is growing exponentially as well. More and more systems are talking to one another, the internet of things is a term which people know about and perhaps customers are asking their installers: ‘how can I use that?’ What is clear is there is a lot of opportunity outside the pure access control market and this is where we are seeing Paxton’s products moving in the future.” Part of the rationale behind the building and opening of the Technology Centre is to keep up with the pace of change of technology, “to stay at the forefront you must innovate to stay relevant. Our challenge is to continue to stay ahead of the curve in relation to user expectations while still aligning ourselves with Paxton’s philosophy of keeping our solutions simple, easy to use and install,” he adds. However, in wider discussions the challenges that are coming are getting technically more and more complex. Looking forward Gareth says, “in the next 5 years we expect to see the identification of people and the movement of people around

a building to change from not only using tokens, but a greater demand in the use of smart credentials especially with the increasing popularity of wearable technology as a means of identification.” “What we have seen over the last few years is the increasing number of integration partners that are approaching Paxton with a solution that they wish to incorporate into our access control system, Net2. That could be video management software, or it could be physical security management systems where everything is on one portal. What they want to do is take access control and make sure it’s integrated with their CCTV or make sure that it’s integrated with HR function for example. I think that customers are much more aware about what they want the system to do, but don’t want to have multiple systems to do that, the recognition of these changing requirements is in thinking behind the ongoing investment into the evolution of Net2. The fact that so many integration partners are approaching us to say we want to work with you, shows that the industry is moving more towards an integrated system approach and ➔

IN Security I April 2018 I 21


Gareth O’Hara, Paxton’s Chief Sales Officer

one sort of cohesive system, rather than multiple systems that don’t talk to one another.” “However, innovation is at the forefront of Paxton’s growth and investment plan and innovative thought and product development will mean that over the next couple of years we will release more products than we have done in the previous 10 years. We are continually investing in improvements to functionality and hardware within our Net2, Net2 Entry and Net2 Paxlock systems whilst continuing the develop Paxton10 our building intelligence solution that combines access control, video surveillance and building automation. With any developing technologies especially with IP enabled capabilities and as Gareth said wearable technology, the cyber threat should be something that comes to the forefront of all professional’s minds. Never to shy away from the awkward question I asked Gareth what measures Paxton takes to negate the cyber risk. “We take the security of our systems very seriously and are constantly developing our software to ensure both Net2 and Paxton10 are up to date and secure. We ensure security updates are part of our regular software releases. Cyber threats often come from an attack on an IT network that Paxton’s products sit on and we always

22 I April 2018 I IN Security

ensure our products have the latest levels of encryption to ensure their endpoint security,” reminded Gareth. Alongside the cyber challenges are challenges in getting sufficient trained staff to keep companies at the forefront of the innovation race. Paxton clearly have a winning recipe which has enabled them to expand and open their new innovation hub, so how do they do it? Their first step is in-house training of installers, Paxton trained over 7,500 installers globally last year and have ambitious targets again this year to ensure installers have the necessary skills to confidently install their products. Their free training is either provided in the new Technology Centre for those who can get there, or in other locations if more appropriate. Customer satisfaction through competent installation, a five year product guarantee and dedicated support service are key to Paxton’s success. Their second strand is to encourage the engineering and product design talent of the future by working with local universities. “We want to make sure that we have the staff working for us that are able to push the boundaries of innovation, product diversification and development. We are fortunate to be close to the University of Sussex and the University of Brighton, both of which have great engineering departments. To

improve our engagement with these universities we have launched the Paxton scholarship. This is initially in association with the University of Brighton and we invited students studying engineering, product design and computer sciences to see us and to find out a little more about the access control market, the security industry and see what it’s like to work at Paxton. We were very encouraged by the number of students that came here, they certainly were full of great ideas, many of which could well be adopted by the security industry in the future. We had a lot of applications and selected three students to come and work with us on a work placement in the summer and their final year project will be a Paxton project. We can take these enthusiastic young students and help them in their journeys and their future careers. Ultimately, we hope they will be able to have a career at Paxton once they have graduated. We are very aware that in order to be an innovative company, we need to constantly be at the forefront of what’s happening in the industry, but also what’s happening in the wider technology industry, and want to encourage young people to consider a career in the security industry and for us to advance and move forward.” For further information please visit www.paxton.co.uk n


Access controlled… Future secured. www.automatic-systems.com

meet us at intertraffic 2016

Go Go Mobile Mobile Go Mobile with with Confidence Confidence with Confidence

April 5-8, 2016 • Stand 108, Hall 02

50 years of performance and reliability serving the highway, parking and traffic management markets

HID HIDMobile MobileAccess® Access® HID Mobile Access® Convenient, Convenient, smart smart and andsecure secure Convenient, smart and secure

sales.asgroup@automatic-systems.com


SURVEILLANCE

Intelligence broadcast How intelligent camera solutions help to increase traveller safety and transportation infrastructure efficiency As more and more people move into cities worldwide and people have an ever-increasing drive to travel, the strain on the transportation infrastructure is on the rise, and pressure is on to keep travelers safe at all times. City authorities and transport operators look for means to better understand the usage patterns of all transportation modes to sustain these increasing utilization levels and guarantee passenger safety. For quite some time

24 I April 2018 I IN Security

camera technology has been deployed to allow traffic and security operators to closely monitor critical parts of this infrastructure. With the growth of the infrastructure and the need for more knowledge of its use, the monitoring technology developed for use by human operators has evolved into intelligent sensing technology that no longer just provides video feeds but uses intelligent analytics and sophisticated support systems. These systems filter out irrelevant

sensor data and present only meaningful events complete with all relevant context data to operators for decision making. Bosch has developed cameras and support systems for a lot of applications in transportation for a long time and heavily invests in further advancing the state of video analytics technology, so it not just is useful for human operator surveillance but can really deliver KPIs that are relevant to transport operators, planners and city authorities.


Except for the lowest range, Bosch cameras include analytics processing capabilities at the edge, so in the camera. This has the advantage that only the analytics output metadata needs to be transmitted from cameras to central system and no video feeds need to be transmitted for analysis in expensive server farms. So, the network transport capacity is vastly reduced, in many cases a 3g or 4g wireless connection can easily handle this network load, which save installation costs and increases deployment flexibility. With every camera that’s added to the system from Bosch, the required processing power for its video stream is available in the camera and does not require additional server capacity. In traffic applications, and outdoor analytics in general, lighting conditions vary continuously, and inclement weather provides big challenges for video analytics. Bosch high-end series cameras of the 7000i-9000i series run specially tuned and hardware accelerated algorithms that

prevent false alarms. This helps ensure that systems with 100s or even 1000s of cameras don’t swamp operators with a deluge of false alerts during bad weather. Bosch also heavily invests in integrating and fusing video-based analytics data with other sensor data to produce more meaningful information. The Bosch MIC IP fusion 9000i cameras combine optical and thermal imaging modules in a single PTZ camera. Both camera modules produce analytics overlays which are registered and fused with the video stream of either module. For instance, the analytics data of the thermal cam can be rendered on top of the video of the optical camera when the operator watches the color camera’s image. In a similar fashion the metadata of the color camera shows up on the image of the thermal camera, with icons indicating alarm conditions outside the view of the thermal camera that are detected by the optical camera analytics looking at a wider field of view. All this is done even while the PTZ camera is moving!

In another sensor fusion application, the analytics of an audio array camera determines the geolocation coordinates of audio sources of interest (think of gunshot detection or aggressive shouting at airports or in city centers or other load noise sources during the night in a city center) and steers MIC IP or AUTODOME IP PTZ cameras to these geolocation to capture video footage of these audio sources. For parking lot management both magnetics based wireless sensor technology and in-camera machine learning algorithms are combined with license plate capturing cameras and provide drivers with parking availability data on their phone, car-park attendants with violation data on their mobile devices, and car-park operators with dashboards showing real-time and historical usage data of parking lots. In traffic intersection management Bosch video analytics data is sent to intersection controller units for improving pedestrian and cyclist safety and optimizing traffic light cycles based on real-time ➔

IN Security I April 2018 I 25


Together we can rethink what video security can do detection of pedestrians and cyclists. Radar technology, which Bosch has developed for use in autonomous driving systems, can also be applied in intelligent traffic support systems to improve safety and traffic flow and reduce pollution on intersections by measuring speeds of vehicles approaching intersections and providing advance detection of heavy vehicles and signaling that pedestrians are on the road to vehicles approaching. In inner cities, curbside space is a very valuable asset and city authorities are interested in curb side usage patterns for parking, bus stop miss-use and pedestrian safety. Bosch camera analytics is used to provide insights about curbside usage, double parking, traffic volume and speed and pedestrian walking patterns near bus stops. This helps city agencies to improve street layout, determine

26 I April 2018 I IN Security

parking offenders that clog the city’s’ streets and, through pre and post analysis, investigate the effectiveness of measures implemented to improve matters. On airports Bosch PTZ cameras have been integrated with various radar systems to provide perimeter protection on the airside. The radar systems detect objects moving near the airport perimeter, determine the position and direction and control the camera positioning system to capture video and track these objects In a slightly different airport scenario cameras, sometimes combined with radar, are used to monitor airplanes and their landing gear during departure and approach and to detect potentially dangerous landing conditions due to wet landing strips. In the security area of airports or on the airside, video streams

from multiple cameras are stitched together into large comprehensive visual overview improving the situational awareness of security and ATC operators In order to keep tabs on traveler waiting times during check-in, luggage drop-off and security checks, the analytics of Bosch cameras is used to count passengers as they work their way through the queues. Information panels inform the passengers about the expected processing times, and airport capacity planning uses the collected data to optimize personnel planning and quick reactions to capacity problems. Together we can rethink what video security can do. For further information please visit www.boschsecurity.com/ xc/en/news/news/i-series/. n


Access controlled… Future secured. www.automatic-systems.com

meet us at intertraffic 2016

Go Go Mobile Mobile Go Mobile with with Confidence Confidence with Confidence

April 5-8, 2016 • Stand 108, Hall 02

50 years of performance and reliability serving the highway, parking and traffic management markets

HID HIDMobile MobileAccess® Access® HID Mobile Access® Convenient, Convenient, smart smart and andsecure secure Convenient, smart and secure

sales.asgroup@automatic-systems.com


Exhibition Preview

IFSEC International 2018 IFSEC International 2018 will play host to a dedicated learning and demonstration area where visitors will benefit from a real-time immersive experience of integrated physical and cyber security.

Networked systems and applied technologies are presenting security management professionals with rising levels of information outputs and data, which are rapidly becoming core aspects of their business strategies. The business intelligence available from this deepening level of integration is now a core competency, providing commercial, industrial and government users with unparalleled levels of insight. However, these systems also represent major security vulnerabilities; the nature of their networked capabilities means there is a strengthening need for higher levels of understanding and vigilance in combating threats to information security. It’s a simple equation: greater complexity of technologies

28 I April 2018 I IN Security

will lead to greater threats. This is where IFSEC, Vidsys and their partners can provide the solutions. In this new world of converged security networks and information software, IFSEC is pleased to announce the introduction of the Converged Security Centre at this year’s show, taking place at London’s ExCeL from 19th-21st June. IFSEC has worked closely with key thought leaders in this space, including James Willison, Founder, Unified Security Ltd, and Sarb Sembhi CISO, Virtually Informed Ltd. Together they have long advocated the use of converged technological solutions managed by cross-functional security teams to identify and mitigate security risks to organisations. In the development

of the centre, IFSEC and Unified Security recognised the capabilities of Vidsys’ CSIM solution and their partners. The Converged Security Centre will be powered by the experts at Vidsys, the pioneering architects of Converged Security and Information Management (CSIM), to offer visitors a real-time immersive experience of an integrated cyber physical SOC, demonstrating ways to enable multi-disciplinary security teams to respond to the whole range of security risks across an enterprise. The Converged Security Centre will be a combined learning and demonstration area hosted by Vidsys, Unified Security Ltd and their partners’ representatives, delivering a series of panel discussions with leading Information and Physical


security professionals on the exceptional capabilities of a fully integrated CSIM platform. Visitors will learn how, with a fully converged security system, users can correlate multiple events into one situation, track major assets, execute efficient building management operations, monitor social networks, and most importantly enable high level information security resilience for true situation management. The presentations will show the simulated outputs of CSIM across a range of applications including transport, utilities and infrastructure and discuss how these benefit all areas of security management. IFSEC visitors will be able to see how CSIM operates in real-time and ask the experts from Vidsys, Unified Security

Ltd and their partners how this will empower their future security strategies. The Converged Security Centre will also display capabilities from a selected range of Vidsys partners. These include IFSEC premier partner Axis Communications, whose expertise in IP networked surveillance is acknowledged worldwide; Unisys, which provides expertise and guidance on cyber and information security; and Micro Focus International, who will be demonstrating how IDOL, an AI powered analytics platform for video, image, text and audio data, can automate real-time 3600 intelligence for security operators. The Converged Security Centre is a cornerstone feature in IFSEC’s

role as a platform to show security professionals the available technologies and capabilities in real-time, delivered by world leading experts whose solutions they can trust. It is also a key part of the IFSEC ‘Show Me How’ programme, providing direct access to learning and insights visitors would otherwise not have the opportunity to see. James I. Chong, CEO, Vidsys says: “We’re excited to be part of the Converged Security Centre at IFSEC this year and to be working with our global partners to showcase what a truly converged security solution can provide to organizations worldwide. We believe there is an immediate need for a converged security solution that unifies monitoring of both physical and cyber security

IN Security I April 2018 I 29


Exhibition Preview

IFSEC International 2018

under one, unified platform. By leveraging disparate sources of data, organizations can effectively manage a situation in real-time without having to go to multiple subsystems, including analytics and cybersecurity, to get the job done.” Gerry Dunphy, Brand Director, IFSEC says: ‘’IFSEC is delighted to welcome Vidsys to this year’s show as the major driver behind the Converged Security Centre. Our recent research revealed there is an absolute need for our customers to gain greater understanding of the capabilities of CSIM as well as a deeper awareness of the growing threats of cyber penetration into their networks so this project is an ideal solution. We’re thankful also to our good friends James Willison and

30 I April 2018 I IN Security

Sarb Sembhi from Unified Security who have helped us co-ordinate this exciting new project at IFSEC 2018’.’ James Willison MA MSyI, Founder Unified Security Ltd and Sarb Sembhi CISM, CISO, Virtually Informed Ltd, add: “Sarb and I have long advocated the use of converged technological solutions managed by cross functional security teams to identify and mitigate security risks to the organisation. We were delighted to assist Gerry and his team in this new project and bring together Vidsys and other partners to establish the Converged Security Centre in June. We look forward to leading some of the sessions in the centre to promote this immersive real-time multi-disciplinary approach to cyber physical attacks on all

security systems. It is a significant step forward to bringing physical and information security professionals closer together and so more efficiently protect our people and organisations.” IFSEC International 2018 takes place 19th- 21st June at ExCeL London, running alongside FIREX, Safety & Health Expo, Facilities Show and Field Service Management Expo. Secure your place at IFSEC today for access to dedicated learning areas like the Converged Security Centre powered by Vidsys, as well as exhibitors, product demonstrations and inspirational speakers across all shows. n



building management

Visitor Management Author: Rafael Schrijvers, Access Control Product Marketing Manager EMEA, Building Technologies & Solutions, Johnson Controls There has been a steady evolution in the world of visitor management— from logbooks managed by a greeter at the reception desk to stand-alone electronic systems that can issue paper or card-based credentials to ones that are integrated into access control and security management systems. Each step along the way, security has improved and knowing who is visiting a building and what they were doing within the facility has became clearer and easier

32 I April 2018 I IN Security

to identify. But these integrated systems are not without their issues: among them being that with disparate systems being brought together there can be problems regarding maintenance, the ease of and limitations to integration and one of the biggest concerns to-date, cybersecurity vulnerability. A visitor management system is only as good as its database. Having up-to-date information on visitors as well as those they are coming to visit can be compromised when

relying on multiple platforms for information. A company may have one database that it uses for its access control and internal security system, but its bolt-on visitor management system usually has a separate database that requires separate maintenance and support. To keep the data current now requires double the effort. And failing to keep it up-to-date means creating opportunities for miscues— such as listing a person as still active in one database, while he’s


been terminated from the company and thus eliminated within the other one—which can lead to buildingwide security issues. Although more seamless integration through the use of standardized interfaces is becoming the norm, using a third-party system still requires some level of effort for security personnel, whether it’s setting up log ins to grant access to the client or staying aware of software updates and corrections to that part of the system. Integrators are also taxed by the two-system model, having to become experts on multiple systems for both installation and maintenance purposes. This can be especially challenging for those integrators for whom visitor management isn’t a day-to-day installation. And, of course, with cybersecurity top-of-mind these days, having multiple systems to manage can increase the opportunity for weak spots through which cyber terrorists can enter and take advantage of vulnerabilities within a system, often because different providers may

have different levels of testing and vetting related to cybersecurity. Fortunately, the answer that the industry is providing comes in the form of embedded visitor management programs that are part of the larger security platform. Designed and supported by the providers of the access control system, these systems help to plug the holes an integrated system can create. Gone is the need for multiple databases or learning and maintaining more than one system. Having one database is the key to an efficient visitor management system, not only making it easier to identify the status of personnel, but also for creating reports, updating information and the like. How does such a system work? Using the security and event management platform as its core, with a web portal set up for visitor management, an employee can log on and create a visit, add one or more visitors, include specific instructions, and attach a document (such as a map with directions) to the invite. Once saved, an invitation

is sent to the potential visitors, including an Outlook calendar invite, and a QR code. As each visitor shows up for the visit, he or she presents the QR code to the check-in kiosk, which streamlines the check-in process and triggers an email to their host, who now comes to the lobby to meet them. From there, the visitors can be provided with temporary printed badges, or, they can be provided with active badges at the reception desk that will work in conjunction with the access control system but only for specified areas that are needed for the visit. Even before the visitor arrives, however, the host is able to set up a series of parameters for the visit using customizable access control workflows, ranging from start and end time of the visit to assigning the clearances to appropriate areas within the building. Having everything within one system eliminates the need for entering the information multiple times, checking more than one database, or relying on information to be shared among disparate ➔ systems.

IN Security I April 2018 I 33


Gone is the need for multiple databases or learning and maintaining more than one system Depending on how a system is configured, the QR code could also serve as the credential for some access system readers or within parking garages. And the visitor’s active badge along with the host’s own credential could be used with the access control system so a visitor’s movement could be tracked within the building and, for specified areas, escorted access operation can be enforced, such that after a visitor’s card is presented, the door will not unlock until the host presents their badge. And, in many

34 I April 2018 I IN Security

cases, visitors will not be able to gain access to areas that are offlimits. In addition to streamlining visitor management and using information that is current, such systems save on personnel costs. Using a kiosk to sign in and having all the data preloaded means fewer people are needed at the reception or security desk to handle visitors, allowing them to focus on their primary job. The information about the visit is also captured in the access control system, providing an audit

trail, which is important for certain compliance situations. Especially for small to mid-size companies looking to explore the next level of visitor management, an embedded option that takes full advantage of a business’ existing security and access control platform and addresses the key issues of maintenance, integration and cybersecurity may be the answer. For further information please visit www.jci.com n


BUSINESS DATA SURVEILLANCE CAMERA

TRAFFIC CAMERA

REMOTE INTERACTION REMOTE NETWORK

Smarter visualization Networked visualization leading to smarter decision making A reliable networked visualization solution is indispensable to monitor, analyze, and share an ever increasing number of video and data sources all over the world. That is why Barco designed its networked visualization solution, the simplest and most flexible way to securely distribute any information to any location. The result: faster and smarter decision-making.

Learn more about networked visualization at www.barco.com/netviz


BRITISH SECURITY INDUSTRY ASSOCIATION

A new revolution in call handling The Electronic Call Handling Operation (ECHO project looks to take up the challenge of integrated call handling. David Wilkinson, Director of Technical Services, British Security Industry Association The British Security Industry Association have been working closely with the Fire Industry Association and the Fire & Security Association to develop a new Electronic Call Handling Operation (ECHO) which aims to combine current call handling systems into one nationally recognised solution. Unwanted alarm signals have been exercising police and fire services’ call handling for many years, and in order to tackle this ongoing problem these services have been taking radically different approaches. Using different forms of technology to fit their requirements, the Police have adopted a national approach providing a Unique Recognition

36 I April 2018 I IN Security

Number (URN) to systems that have been installed to accredited third party validated standards, whereas the Fire Service have adopted a whole range of approaches, from non-attendance to any call from an Alarm Receiving Centre (ARC), to full attendance to all such calls. Though ECHO will initially focus on automating the call handling process from ARCs to the emergency services, it will bring about the ability to automate Police URN management as well as exploit the potential for delivering both automated audio and visual alarm confirmation. Though a similar service to this has been successfully piloted for some time with a limited number of alarm

companies and police forces, the ECHO project has aspirations in enabling the technology to be rolled out to other police and fire control rooms. The problem with the current system’s capability is that it is a manual operation, which leads to the possibility of human error and delays in responding to emergency service incident response, so developing the partnership approach between first responders and the industry will improve efficiency and service delivery. Overall, there is a potential to all partners to benefit from advancements in technology to automate and improve this part of our service.


The ECHO project team’s proposal is to move from manual response handling to a centralised fully automated end-to-end electronic alarm handing ability, aimed at reducing call handling times and the incidences of error, whilst alleviating pressure on the emergency services and the aforementioned ARCs. This migration to an electronic medium has the potential to also add value by providing a realistic opportunity to apply and manage URNs online. Though initially focused on alarm message handling, there is plenty of scope to consider other means of confirmation through video and audio, as well as the passing of risk critical information to the emergency services. Also on ECHO’s radar is the consideration of possible potential future inclusion of other users such as the Ambulance Services and the National Coastguard. Over the next 18 months the ECHO team will develop the project whilst raising awareness of how the service will work, by attending conferences and working closely with service providers. For the rest of 2018/19 the initial intent is to scope out the project detail, formalise the ECHO technical solution and then begin

the role out to connect participating ARCs to emergency service control rooms. In order to validate the services as a viable product a new not-for-profit company, managed by the trade associations, has been launched which aims to provide direction and governance for ECHO. The eventual ECHO service is expected to be subscription-based, most likely calculated annually on the number of unique reference numbers (URNs) managed by ARCs and will be managed online. This will ensure the operation of ECHO can be sustained year on year, consistently delivered by industry partners. Following discussions between the National Police Chiefs Council (NPCC) and the private security industry, the decision to implement electronic transfer has been agreed meaning the NPCC security systems policy citing a date of 2020 for all ARCs to be operating on an electronic platform. The project hopes that by 2020 a full technical requirement specification for the ECHO system, including a viable financial operating model for the company and a project plan for the delivery of the operating company will be fully operational.

The first phase of ECHO will automate the current phone call from the ARC to the emergency services as a digital electronic machine to machine event. Once confirmation that the alarm has been received and understood, a signal will be sent from the responding service (also as a machine to machine event), back to the ARC. This will also provide for the responding key holder information being tagged to the alarm event. The responding service will send an event close/stop message with an outcome to the ARC via machine to machine. The second phase will look to automate the URN management, including application, approval and payment system possibly via a cloud base application process. This will improve the efficiency and accuracy of data to ensure it is consistent between installers, ARCs and the emergency services. Later phases proposed include; system enhancement to send additional event traffic information about the event, i.e. roller shutter door (open rear of property), or fire alarm (zone 3 third floor of building) and a further enhancement to phase âž”

g IN Security I April 2018 I 37


3 enabling further live situation data to be presented from typically video or audible equipment from the premises. As with all major projects there is an element of risk and the ECHO group has identified some possible hurdles, which need to be alleviated if the deadline of 2020 is to be reached: The levy: a key concern would be to get ARCs to agree to a proposed levy. The lack of take-up from ARCs would impact on the ongoing funding, so it is important that ARCs are informed of the process and to demonstrate the benefits to migrating to ECHO and the need to meet the NPCC policy by 2020. Use of the Police National Network (PNN): if the project were unable to utilise the PNN, this would reduce the ability to provide a centralised platform to all the police forces, so it is paramount that the technical specification of ECHO complies with the requirements of the network. Manage expectations of performance: like all major infrastructural changes the ECHO team are aware of how critical it is to ensure that the expected level of performance meets expectations.

38 I April 2018 I IN Security

The ECHO team are using ongoing sensitivity analysis using an independent challenge group as well as factoring in extensive testing before the launch date. Funding: as the programme will be run out progressively there may be a differential between the funding stream and the company’s costs initially, so to counteract this scenario the ECHO team are looking to put in place contingencies for possible additional funding steams as the project progresses. Fire Services and URN: if the Fire Services fail to adopt the URN model or agree to respond to 3rd party certified systems the effectiveness of the overall scheme has the potential to be diluted and although this would only comprise around one-fifth of total connections, the ECHO project would need to make sure the Home Office and NFCC would work closely with the Fire Services to consider the scheme more favourably. A service acceptable to all parties: a fairly low probability with a nominal impact but in order to maintain a 360-degree buy-in to this major project, ECHO are committed to making sure that there is appropriate

representation from all industry partners in order to keep what is arguably the biggest step change in call handling for decades, on course for completion. ECHO represents a real opportunity to generate significant savings in emergency response resources, both through fewer errors and a potential increase in the effectiveness of the emergency response by all participating services. Taking the longer view its potential is immense, with critical infrastructure across all sectors of society, from hospitals to heritage all potentially benefitting from enhanced alarm transmission that offers all services to benefit from reduced false alarms. www.bsia.co.uk n


Multifocal sensor technology

The ultimate solution for stadium safety & security

Video surveillance without limits – unprecedented resolution in minute detail Dallmeier UK Phone +44(0) 117 3039303 dallmeieruk@dallmeier.com

www.dallmeier.com DallmeierPanomeraStadien_186x129_UK.indd 1

23.10.2017 15:04:20

The Pioneer in Key-Centric Access Control Solutions

SECURE ALL ACCESS POINTS

› › › › ›

Retrofits into existing hardware No hardwiring required Cost effective Receive audit trails and denied access alerts Local representation

Electronic Access Control MARKETS WE REACH:

› › › › ›

Utilities Water Power Churches

› › › ›

EMS Critical Facilities Traffic Vending

Schools

AND MORE!

Contact Us cyberlock.com | 541.738.5500 support@cyberlock.com sales@cyberlock.com [GCO 4031]


product Listings

Astute Electronics

DSX manufactures integrated

Barco

Falken At Falken, we are a fully

Astute Electronics promises to deliver customers the best Quality, Service and Reliability. Astute is both an Electronic Components distributor and a global and UK parts supplier. The company’s highly-qualified team is experienced in procurement, engineering, logistics, finance, program management and QA. www.astute.co.uk

BUSINESS DATA SURVEILLANCE CAMERA

Barco designs and develops visualization solutions for the security market. With its own facilities for Sales & Marketing, Customer Support, R&D and Manufacturing in Europe, North America and Asia Pacific, Barco is active in more than 90 countries with 4,000 employees worldwide. Barco posted sales of 1.158 billion euro in 2013. www.barco.com/references

TRAFFIC CAMERA

REMOTE INTERACTION REMOTE NETWORK

Smarter visualization Networked visualization leading to smarter decision making

solutions for the access control and security industries. Based in Dallas, DSX designs all software and hardware in house. The company motto is: ‘Integrated Solutions and real world applications are what we do best.’ DSX products are sold worldwide through a network of factory-trained dealers. Dealers are located in the US, Canada, Mexico, Latin and South America, Europe, Middle East, Australia and the Pacific Rim, and Nigeria amongst others. www.dsxinc.com

licensed, registered, and insured professional service, equipment, manufacturing and retail supply firm. Founded and staffed by former law enforcement officers and retired military personnel, we have grown to become a trusted and secure global provider. www.falken.us

A reliable networked visualization solution is indispensable to monitor, analyze, and share an ever increasing number of video and data sources all over the world. That is why Barco designed its networked visualization solution, the simplest and most flexible way to securely distribute any information to any location. The result: faster and smarter decision-making.

Bosch Security Systems

Learn more about networked visualization at www.barco.com/netviz

14090.BARCO.resize.ad.in security.netviz.indd 1

24/04/14 15:43

Offer an extensive portfolio of innovative, high-quality, ergonomic products and systems for security, safety and communication. Our product range includes video surveillance systems with state-of-the-art IP-solutions, access control systems, intrusion detection systems, fire detection and evacuation systems, security management systems, paging and personal security systems and public address and conference solutions. www.boschsecuritysystems.com

FLIR FLIR Systems, Inc. is the global leader in Infrared cameras, night vision and thermal imaging systems. Our products play pivotal roles in a wide range of industrial, commercial and government activities in more than 60 countries. www.flir.com

pt

Dallmeier One of the world

leading providers of products for network-based video surveillance solutions, already has more than 30 years experience in the development and manufacture of high quality components and complete solutions for the CCTV/IP sector. www.dallmeier-electronic.com

grated

mm

hall 4, stand D80

06.02.2012 11:05:55

40 I April 2018 I IN Security

Safeotronic SAFE-O-TRONIC is a smart and keyless locking solution for doors, cabinets, lockers and furniture. Its advanced access control features provide facilities managers with the flexibility and management control required in today’s demanding workplace environments. SAFE-O-TRONIC can be used in numerous applications – Hotels, Hospitals, Spas, Gyms, Office Furniture, Cabinets, Lockers. The list is endless... www.safeotronic.com


to have your company included in this listing contact wayne banks on +44 (0) 1622 201207

Honeywell Security Group

Paxton Access Ltd is a leading manufacturer of electronic access control systems. From its inception Paxton has aimed for engineering excellence. This means designing and manufacturing intelligent and innovative products that are fit for their purpose. We have become a market leader through our constant efforts to exceed the expectations of installers and system users. www.paxton.co.uk

Keytracker Ltd

Samsung Security

delivers the newest innovations, technologies and products. Honeywell is driven to maintain its position as an innovator and leading manufacturer, and invests continuously in R&D. Each of the product ranges regularly delivers new features and technological advancements, while maintaining a familiar user interface and backwards compatibility for ease of installation. Honeywell is a world leading security business. www.security.honeywell.com

Secure Storage & Management for all Keys & Equipment Mechanical & electronic tracking to suit all budgets & applications, low spec to high tech – the world’s largest range of tracking systems for keys & equipment. Keytracker Ltd, Keyper House, Unit 3, Station Road, Rowley Regis, West Midlands, B65 0JY sales@keytracker.co.uk www.keytracker.com

Samsung Techwin is one of the fastest growing professional security brands in Europe. Providing a complete range of security solutions that are suitable for a wide range of applications, the company is dedicated to developing technology and products that its clients demand. www.samsungsecurity.com

The leading global M2M managed services provider

It’s good to be well connected.

Dual vision, Real time. Keysure

ULISSE COMPACT THERMAL The positioning unit offers an integrated solution for total darkness, fog, rain or smoke.

KEYSURE’s patented Key Control container is a pilfer proof, tamper evident key safe. This is the only non-electronic security device that will control and audit the use of a key, password or any other content. Once an item is secured inside the Key Control, it must be physically broken to access the contents. www.keysure.net CCTV PRODUCTS

Your M2M solution is more than just data connectivity. We understand that.

Videotec Dual vision, Real time.

So we not only built the world’s most advanced global M2M platform, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers.in-house Videotec manufactures

ULISSE COMPACT THERMAL a wide CCTV products That’s why Wyless is the trusted M2Mrange partnerof of Fortune 500 companies

The positioning unit offalike. ers an integrated and startups We’re the easiest company to work with. We listen to our solution for total darkness, fog, rain or smoke. customers and take pride in every connection.

recognized for high performances, flexibility and style. Our mission to Wyless offers truly uncompromising M2M solutions, delivering worldwide lead the field in the development wireless connectivity via the most secure and resilient network infrastructure. We provide unrivaled management tools and empower with end-to-end of robust, reliable andyou high managed services, technical expertise and dedicated support. performances mechanical and So connect with the experts and together we’ll take your to the electronic products forapplications surveillance next level. You have found your true M2M partner. applications is the driving force We can’t wait to discuss the possibilities. behind our success. www.videotec.com

www.videotec.com

CCTV PRODUCTS www.videotec.com

wyless Systems

Luminite Luminite have been designing and manufacturing PIR detection systems for 35 years and have extensive expertise in the security market. Their flagship Genesis wireless security range provides rapid, flexible and robust solutions to minimise installation costs and maximise profits. www.luminite.co.uk

+1 617 949 8900

Our award-winning M2M platform, delivered in partnership with the world’s largest mobile network operators, provides secure, reliable wireless connectivity to mobile and fixed devices in nearly every country in the world. Our unique products and services help our customers deploy robust, scalable and secure applications. +44 1895M2M 454 699 info@wyless.com www.wyless.com www.wyless.com

The leading global M2M managed services provider

It’s good to be well connected. Your M2M solution is more than just data connectivity. We understand that. So we not only built the world’s most advanced global M2M platform, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers. That’s why Wyless is the trusted M2M partner of Fortune 500 companies



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.