In Security Magazine April 2019

Page 1

The magazine wiTh The inside sTory on securiTy ISSUE 39 APRIL 2019

ExTEND YoUR REach hoW EaSILY caN WIRELESS LockS ExTEND ThE REach of YoUR accESS coNTRoL? 06 INDUSTRY NEWS

20 20 ExpaNDINg ThE chaIN

28 SavINg facE

36 hEaRT of ThE maTTER

Latest developments from the security industry

Biometrics is the key to unifying technology

facial recognition as a security tool

automation, cloud, cyber & Unification at the heart of Tyco strategy


Aperio® Wireless Locking Technology:

UPGRADE ANY S � STEM Free download: Aperio® compatibility in 4 simple checks

campaigns.assaabloyopeningsolutions.eu/aperio-upgrade


ISSUE 26 SEPTEMBER 2016

Commentary

W

THE MAGAZINE WITH THE INSIDE STORY ON SECURITY ISSUE 39 APRIL 2019

IN SECURITY THE MAGAZINE WITH THE INSIDE STORY ON SECURITY

EXTEND YOUR REACH HOW EASILY CAN WIRELESS LOCKS EXTEND THE REACH OF YOUR ACCESS CONTROL? WWW.IN-SECURITY.EU

06 INDUSTRY NEWS Latest developments from the security industry

20 20 EXPANDING THE CHAIN Biometrics is the key to unifying technology

28 SAVING FACE Facial recognition as a security tool

36 HEART OF THE MATTER

Automation, Cloud, Cyber & Unification at the heart of Tyco strategy

Editor Chris Hewett editorial@mebmedia.co.uk Accounts Jay Kempisty accounts@mebmedia.co.uk Publisher Wayne Banks +44 (0)1622 201207 wayne.banks@mebmedia.co.uk Designer Mark Fisher production@mebmedia.co.uk Published by MEB Media Limited 13 Princes Street Maidstone Kent ME14 1UR United Kingdom

elcome to the April issue of In Security and with the summer finally beginning to show signs of life, our thoughts move to IFSEC 2019. This issue’s Product & Industry News section (starting on page 8) showcases the latest news and views from the industry. Our cover story this month examines the need for electronic access control systems. Buildings with extensive electronic systems leave mechanically locked doors unmonitored and unguarded. Thankfully, the latest generation of wireless locks can replace them easily and integrate them seamlessly within almost any access system (see page 2). Next, an expert opinion piece written by David Orme, Senior Vice President at IDEX Biometrics, looks at how biometrics is the key to unifying technology and forming a chain of trust (see page 20). Later, ensuring the safety and security of students and staff is an important and often

complicated issue. Here, John Hardman, Product Marketing Manager at Dormakaba, discusses the latest innovations in access control technology and the benefits for educational facilities (see page 24). A look at how facial recognition technology has by now become a common sight at many airports, as it has widely been deployed to replace traditional passport controls in an effort to deal with these large passenger flows (see page 28). In order to provide residents of Sutton Point a mixed-use development with the highest level of security, access control technology from PAC has been installed in key areas of the complex (see page 32). Finally, in an interview with Eli Gorovici, Product General Manager for Access & Video, Tyco, we see that Automation, Cloud, Cyber & Unification is at the heart of Tyco’s product strategy (see page 36). Chris Hewett, Editor n

Tel: +44 (0)1622 201207, Fax: +44 (0)1622 210207 info@mebmedia.co.uk www.mebmedia.co.uk Articles and art may not be reproduced or reprinted without the express written permission of the publisher. Exclusion of Liability Although every effort will be made to ensure the accuracy of all materials published, the publisher takes no responsibility for errors or omissions.

02

06

20

Copyright © MEB Media Ltd – 2019, all rights reserved.

28

32

Contents 02 Front Cover Story – Extend your reach How easily can wireless locks extend the reach of your access control?

28 Saving face Facial recognition as a security tool by Robert Watts

06 Product & Industry News All the latest developments from the security industry

32 Tower of strength Residents of Sutton Point benefit from access control technology from PAC

20 Expanding the chain Biometrics is the key to unifying technology 24 The future of access control Innovations in access control technology and the benefits for educational facilities

36

36 Heart of the matter Automation, Cloud, Cyber & Unification at the heart of Tyco’s product strategy

IN Security I April 2019 I 1


Cover Story

Extend your reach How easily can wireless locks extend the reach of your access control?

As building security becomes smarter, the need for electronic access control systems spreads further. Wired access points and security doors have long been the backbone. Yet at the same time, even buildings with extensive electronic systems leave mechanically locked doors unmonitored and unguarded — and certainly not “smart”. Mechanical locks cannot be connected. Thankfully, the latest generation of wireless locks can replace them easily and integrate them seamlessly within almost any access system. A recent industry survey — cited in the “Wireless Access Control Report 2018”, from ASSA ABLOY and IFSEC Global — finds integration is an increasing concern. Over 90% of industry professionals polled for the report

2 I April 2019 I IN Security

suggest integrating security systems with each other (and with other smart building systems) has increased in importance in the last few years. Integration is a recurring theme in conversations among professionals. For 53% of survey respondents, easy integration with CCTV, alarms, time and attendance, lighting and HVAC would make them interested in upgrading to a particular product — more than any other factor. Forty-three percent said easier integration with existing access control systems would make them more likely to upgrade. But why the focus on integration? What are the advantages? Why integrate? Fewer security interfaces are easier to support and so require less training. Integration can also

enhance the experience of building occupants. One credential opens the car park, then the building, and accesses their laptop and buys lunch in the café. Integration across the business also means security systems — and security teams — contribute to business efficiency, not just the protection of people, premises and other assets. Integrate HR systems with your access control system, for instance, and smart access cards can be automatically revoked when people leave the organisation, reducing overheads and even headcount. A majority of those polled for the “Wireless Access Control Report 2018” believe it very important (58%) that access control supports open standards in order to be flexible and future-proofed. A huge majority (91%) consider


it at least somewhat important. Future-proofing is high on any list of procurement criteria. Will your system accommodate a changing business and the evolution of functions within it? Can you extend access control with components that contribute to, rather than detract from, the flexibility of all your building systems? The solution to extend access control Expanding the coverage of traditional locks can be expensive and intrusive. But one fast, easy and cost-effective alternative enables you to forget about keys and the hassles of key management: wireless devices like Aperio®, battery-powered locks with integrated RFID-readers. The aforementioned report cites growth forecasts for the wireless access

control market of around 8% annually through 2025. The ease and cost-efficient integration wireless offers is surely driving this growth. Because Aperio® has an open architecture, it is flexible and modular, so those who already have wired access control and want to add more doors to their existing system find wireless is the solution. Aperio® wireless locks integrate with security systems from over 100 different OEMs worldwide, for new installations or to upgrade an existing system. Integration is seamless, extending the reach of an existing system with future-proofed devices. Security administrators operate the new Aperio®-equipped doors from the same interface as the installed system. Site users carry a single smart access card for all doors, and other functions like canteen payments or library loans

are just as easy to integrate What if your security system uses mechanical keys, without electronic access control? Wireless locks like Aperio® can also be the right solution. Battery-powered Aperio® RFID-equipped cylinders, escutcheons, handles and locks can be fitted as a new access control system, or extend an existing installation by linking new doors to the same system wirelessly. There’s no need for staff to swap their keycards, nor for anyone to carry more than one credential. Aperio® locks work within almost every major access control ecosystem on the planet, from over 100 different manufacturers. They are energy-efficient, with batteries lasting an average of 40,000 cycles (typically 2 years) before they need replacing. ➔

IN Security I April 2019 I 3


“It’s easy to start the upgrade process,” says Matthias Weiß, Aperio® Product Manager at ASSA ABLOY EMEA. “Your security or facilities manager only needs to contact their regular access control provider to find out if they offer Aperio®. We can upgrade nearly any system.” Aperio® integrates access control — quickly and painlessly Installing wireless locks is also more cost-effective than hard-wiring more doors, because there’s no cabling or invasive building work around the door. Changing door hardware is unnecessary. For example, it’s fast and easy to switch a mechanical handle for an Aperio® wireless handle with integrated RFID reader, to bring more doors into an access system. (Installation takes mere minutes: see https://youtu.be/lr6Sw95qqm8)

4 I April 2019 I IN Security

Aperio® devices with built-in RFID readers fit almost any opening or security level. Aperio® locks protect both exterior and interior doors, from fire and escape route doors to meeting rooms, labs and offices; wooden, glass or aluminium doors are no obstacle. The portfolio includes cylinders, escutcheons and complete locks for security doors, plus a revolutionary new wireless handle with integrated RFID reader, which recently won Intersec’s Access Control Product of the Year. Aperio® locks are compatible with all common door profiles: Euro, French, Finnish, Scandinavian and Swiss. Integration with your existing system can be Online or Offline, or both. For further information please visit www. campaigns. assaabloyopeningsolutions.eu/upgrade-aperio n


ENGAGING CO-CREATION TO PREPARE FOR FUTURE SECURITY THREATS 2 - 4 July 2019 Sands Expo & Convention Centre • Singapore

Key Highlights at INTERPOL World 2019 More than Co-creation Labs

More than

30

4

8,000

Exhibitors 200 International

4

National Pavilions

Attendees

Working Groups

(by invite only)

Meet the Keynote Speakers: Register by 31 May to enjoy Early Bird Rates! Richard van Hooijdonk

Dr Ayesha Khanna

Co-Founder and CEO, ADDO AI Singapore

International keynote speaker, crime and technology trendwatcher and futurist The Netherlands

Dr Mary Aiken

Cyberpsychologist and academic advisor Europol’s European Cyber Crime Centre (EC3) United Kingdom

Learn and Contribute to These Topics and More at the Co-creation Labs: 2 July 2019 • Regulating Big Data • Partnerships • Data Fusion

EVENT OWNER

IW2019_InSecurity_210x297mm_v1.indd 1

3 July 2019 • Future Capabilities and Cultures • Border Security • Community Participation

SUPPORTED BY

visitor@interpol-world.com #INTERPOLWorld

4 July 2019 • Smart Cities • Cyber Disruptors & Drivers of Change • Privacy

INDUSTRY INSIGHTS BY

HELD IN

MANAGED BY

10/5/19 1:30 pm


product and industry news

New audio monitor completes award-winning Net2 Entry range

Paxton has launched the Net2 Entry Audio monitor, bringing a simple, cost-effective option to the versatile Net2 Entry range. The audio monitor fully supports all existing Net2 Entry functionality where video is not required and completes the award-winning range. Its key features are: • A sleek, contemporary design to fit discreetly into its surroundings • Flexible installation – can be wall-mounted or used with an adjustable desk stand • Available with or without a handset • Action buttons configurable for a range of needs • Optional connection to a sounder or beacon to offer enhanced, accessible call notification

6 I April 2019 I IN Security

Gareth O’Hara, Chief Sales Officer, said: “We are delighted to see the audio monitor complete our Net2 Entry range. It means Paxton installers can now use our door entry system whatever the requirements - from high-end premium panels and monitors, to more cost-effective solutions where budgets can be restrictive. “Net2 Entry is known for its versatility and simplicity, so the audio monitor is a natural addition and the perfect product to complete our industryleading range.” Net2 Entry is a door entry system that works standalone or alongside Paxton’s Net2 access control, combining door entry with key features of Net2. It consists of three components that autodetect on set up; external panel, interior monitor and door control unit. To find out more about the new monitor please visit: Paxton.info/3976 n


Videalert awarded enforcement contract for bath’s clean air zone

Bath and North East Somerset Council (B&NES Council) is extending its Videalert CCTV enforcement platform with the installation of additional cameras for its approved class C clean air zone (CAZ) that gives exemptions to private cars but charges higher polluting buses, coaches, HGVs, LGVs/vans, private hire vehicles and taxis. Videalert was awarded the contract to ensure full and seamless integration with the council’s existing hosted digital video platform which is already being used to enforce a wide range of restrictions including bus lanes, bus gates and permit parking. B&NES Council was one of 28 councils directed by the government to prepare an action plan to urgently reduce high levels of nitrogen dioxide (caused by vehicle emissions) to within EU and national limits by 2021 at the latest. The authority had originally proposed a Class D CAZ, charging all higher emission vehicles, including cars, to drive in the city centre. However, following further ongoing technical work and a public consultation in December - which garnered an unprecedented 8,421 responses - a class C option with additional traffic management, was agreed. According to Chris Major, group manager for Transport and Parking at B&NES Council: “The new charging class C CAZ will achieve compliance by 2021 apart from a single exceedance caused by localised traffic issues. We believe this will be resolved by installing traffic signals at two junctions.” Videalert will be installing HD ANPR cameras to

enforce the new CAZ scheme at key road junctions across the designated boundary. The hosted Videalert platform will automate the management and enforcement of this new zone, providing realtime identification including vehicle make, model, colour and euro standard rating for pre-filtering and updating the whitelist of compliant vehicles held at the edge to minimise transmission costs. Information on non-compliant vehicles will then interface with the UK government’s new national clean air zone database for vehicle validation and payment. The system will also provide detailed analytics and impact analysis highlighting the reduction in non-compliant vehicles entering the zone over time. Tim Daniels, Sales and Marketing Director at Videalert, added: “The award of this high profile contract confirms Videalert’s ability to handle the evolving requirements of clean air and low emission zones. It also demonstrates how a single video data platform can support multiple applications, enabling councils to address the challenges of improving traffic congestion and air quality simultaneously.” The CAZ should commence operation at the end of 2020. The daily charge will be £9 for non-compliant taxis, private hire vehicles and light goods vehicles (the minimum standard being euro 6 for diesel and Euro 4 for petrol), and £100 for buses, coaches and HGVs (the minimum standard being euro 6). For further information, please visit www.videalert.com n

IN Security I June April 2015 2019 I 7


product and industry news

Dallmeier presents semi-automated monitoring solution for the airport security area

The problem is familiar to airport operators: Unauthorised individuals enter the security area every day, for example when passengers go back to the airside from the land side after passing through customs or wander between “clean” and “unclean” zones inside the security area. The task of detecting and intercepting these “strays” quickly and resolving the situation places enormous strain on personnel resources, and not infrequently is unsuccessful. The consequence: The threat of partial or even complete terminal closures with the associated enormous costs is real. The video security equipment manufacturer Dallmeier now presents a system based on 3D realtime location tracking, innovative video technology and mobile response team control which enables reliable and significantly faster incident investigation while

reducing overall costs by as much as 50%. Solution pays for itself very quickly Besides considerably faster investigation of threat situations, the Dallmeier solution also offers financial advantages over conventional approaches: Whereas previously a dedicated 24/7 presence was needed for every security checkpoint or passageway throughout the airport, with the Dallmeier solution security for the corresponding areas can be automated. Since the control centre and response teams have a much better overview of the situation and cooperation is optimised, the teams only have to intervene when an alert is issued. This enables savings of up to 50% of total operating costs and the solution pays for itself very quickly. www.dallmeier.com n

TrackTik software offers breakthrough automation for security workforce management TrackTik Software’s mobile and web-friendly guard tour system uses automation to take the effectiveness and efficiency of an organization’s security management operations to the next level. This first-of-its-kind system provides security managers with a custom-tailored, holistic view of their operations and security personnel on tour with the support and safety of having “a coach in their back pocket.” From scheduling and interacting with security staff to incident reporting, TrackTik’s software offers a complete suite of tools, including real-time checkpoint logging, incident reporting, GPS tracking, messaging, alerts and audio-video capabilities. With a variety of checkpoint options, together with GPS tracking, TrackTik’s automated guard tour system

8 I April 2019 I IN Security

creates a real-time picture of an organization’s guard tour operations that improves transparency and accountability. The guard tour system establishes permitted and restricted zones, and can assign special protocols for specific locations. Offering immediate communication, modifications and transmission of data, TrackTik’s automated guard tour system also provides a live picture of the security environment in which security personnel are operating. The watch mode audio and video feed and recording feature informs of dangerous situations, which also helps support the health and safety of security personnel dealing with potentially high-risk situations, resulting in maximized security impact to help deliver a safer environment. For further information visit www.tracktik.com n


Club ClubCar Cartakes takesto tothe thestreets streets

Club ClubCar Carisisnow nowstreet streetlegal legalininevery every country countryininthe theEU. EU. Club ClubCar’s Car’selectric electricutility utilityvehicles vehicles offer offerananattractive attractivealternative alternativetoto traditional traditionalpetrol-powered petrol-poweredvehicles. vehicles. For Fora astart startthere’s there’snonopetrol petrolcosts costs – –and andzero zeroemissions. emissions. Club ClubCar’s Car’svehicles vehicleshave havethe thepower power totoperform performnumerous numerouscampus campustasks, tasks, from frommail maildelivery deliverytotosecurity security and andmaintenance. maintenance. Want Wanttotoknow knowmore? more? Contact Contactyour yourClub ClubCar Car representative representativetoday. today.

STREET STREETLEGAL LEGAL www.clubcar.com www.clubcar.com info_esa@clubcar.com info_esa@clubcar.com (+44) (+44)777 777180 1805463 5463


product and industry news

Honeywell updates pro-watchÂŽ connected security platform to help users increase productivity and reduce costs

Honeywell announced the launch of Pro-WatchÂŽ 4.5, the latest iteration of its flagship connected security platform for enterprise and critical infrastructure markets, is available beginning January 2019. Incorporating new features as well as program updates, Pro-Watch 4.5 meets the latest industry compliance requirements, reduces total cost of ownership and increases operator productivity with improved flexibility and scalability from single site to global deployment. New key features include: Web-Based Alarm and Event Handling: improves operator efficiency, enhances user experience and reduces installation costs through an easily deployable thin client; Access and Vendor Management Portals: provides functionality unavailable from other Physical Access Control Systems and allows operators to accomplish more with fewer dollars by reducing workloads by 20 percent or more; and

10 I April 2019 I IN Security

New Enterprise Tools: simplifies setup and maintenance of Pro-Watch Enterprise deployments to further reduce operating costs. Pro-Watch 4.5 also includes program updates to its current Vendor and Access Management Portals, installation process and overall performance. Pro-Watch 4.5 serves as the center of a connected ecosystem that integrates both Honeywell and third-party solutions to provide a comprehensive connected security platform that meets the unique security needs of each user. Its unmatched compliance offers regulated industries the tools needed to adhere to the most stringent requirements for any industry. It is well suited for enterprise and critical infrastructure environments across a variety of industries including education, pharmaceutical, utilities and financial. To find out more about the new monitor please visit: www.honeywellintegrated.com/products/ integrated-security/sms/ n


Hanwha Techwin introduces Wisenet T Network Thermal Positioning Cameras

Hanwha Techwin has added two Thermal Positioning cameras to its Wisenet T range. The Wisenet TNU-4041T and TNU-4051T Thermal Positioning cameras, which are able to capture images at up to 640 x 480 resolution, are designed to detect objects and people in difficult environmental conditions such as through smoke, snow, heavy rain and fog, which traditional video surveillance cameras may not be able to do. They also offer an effective solution for projects where there are concerns about light pollution. With a pan speed of 120° per second and a ground-tosky view of -90°to 40°, the TNU-4041T and TNU-4051T provide a versatile solution monitoring wide open areas. Both models, which have a robust aluminium die cast exterior, incorporate a true day/night (ICR) camera and can be programmed to endlessly pan 360°. They also offer operators the flexibility to select from up to 255 pre-set positions, which can be scheduled. The TNU-4041T is equipped with a 19mm lens and has a maximum range of 1,714m for vehicle detection, whilst the TNU-4051T, has a 35mm lens and a maximum range of 3,157m. Both cameras are able to monitor areas, such construction sites and oil, gas and chemical facilities, which have a temperature range of between -50˚C ~ +130˚C. A wide range of features ensures that the TNU-4041T and TNU-4051T are able to deliver optimised images in every situation.

Other key features include: • B uilt-in Gyro sensors which offer accurate stabilisation that come into effect when a camera is disturbed by wind or vibrations, resulting in more stable images. • A Hallway View feature provides a highly effective way to monitor narrow vertical areas such as corridors, tunnels and aisles, with the added bonus of minimising bandwidth and video storage requirements. • Analytics: The Wisenet TNU-4041T and TNU-4051T are equipped with audio analysis functionality which recognise critical sounds such as gunshots, explosions, screams and broken glass. Additional features include temperature change, shock, object/people direction, loitering and camera tampering detection. • WiseStream II, a complementary compression technology which dynamically controls encoding, balancing quality and compression, according to movement in the image. Bandwidth efficiency is improved by up to 99% compared to current H.264 technology when WiseStream II is combined with H.265 compression. • Support for H.264 and MJPEG compression and with an SD/SDHC/SDXC memory slot to ensure video is automatically recorded in the event of network disruption. For further information please visit: www.hanwha-security.eu n

IN Security I April 2019 I 11


product and industry news

CEM Systems AC2000 airport security solution Bahrain International Airport secured with CEM Systems AC2000 Airport security solution from Johnson Controls. Johnson Controls today announce that the aviation specific CEM Systems AC2000 Airport access control solution has been selected to secure the new Bahrain International Airport. The powerful CEM Systems AC2000 Airport software and industry leading CEM Systems hardware is being installed at Bahrain International Airport to ensure the highest level of integrated security and assist in controlling passenger flow across the airport. The contract was awarded by Thales and will be delivered by regional partner Tyco Fire and Security Middle East. Bahrain International Airport is the international airport of Bahrain, located in Muharraq, an island about 7 km northeast of the capital Manama. The airport is currently undergoing a $1.1 billion

12 I April 2019 I IN Security

expansion that will boost the airport’s capacity to fourteen million passengers per year. “This contract to secure Bahrain International Airport represents another significant win for CEM Systems AC2000 Airport solution in the growing aviation sector in the Middle East region,” said Philip Verner, regional sales director, Building Technologies & Solutions, Johnson Controls. “The powerful CEM Systems AC2000 Airport has a proven record as one of the most reliable and resilient access control and security management solutions available for aviation security. It not only provides Bahrain International Airport with advanced access control throughout terminal buildings and airside/landside boundaries but it also provides a range of software applications to enhance the airport’s onsite operations and increase business efficiency.” For more information, visit www.cemsys.com n


UNLOCK NEW MARKETS.

UL’s New European Testing Lab for Security and Access Control Devices. Your key to success in global markets combines speed with smooth efficiency. The new security testing laboratory in Frankfurt opens a portal to the market’s of Europe, Asia, the Americas and the Middle East – with comprehensive compliance solutions, cost-saving service bundles, expert European engineers, global regulatory expertise, and the advantage of a single-source provider. Test us.

UL.com/security-lab UL, the UL logo and UL certification marks are trademarks of UL LLC ©2017. All other marks are the property of their respective owners.

EU.BuildingLifeSafety@ul.com


product and industry news

First digital document security conference explores trust issues A new conference will examine fundamental issues of trust as society transitions from paper-based to digital security and ID documents. The first Digital Document Security Conference in Berlin (May 13 – 15, 2019) comes as the illicit production of counterfeit and fake ID documents continues to be big business. Around the world, the use of fraudulent passports, driver’s licences and pass cards aids criminal activity and illegal cross-border movement. Meanwhile, the cost of paying for anticounterfeiting measures and teams tasked with bringing the criminals to justice can run into the millions of dollars. The security of banknotes is also a huge concern for governments and law enforcement agencies. The conference will consider the growth in contactless payments and smartphones used to pay for products and services, while several countries or states are adopting digital driving licences or ID

cards, whereby a person’s identity is confirmed by their phone, not by a piece of paper or plastic. The only global event dedicated to addressing these pivotal questions, the conference will consider the interaction of the physical and digital domains in financial transactions and identity confirmation, as well as providing a stage for both communities - physical and digital - to showcase how their documents or systems are secured, and to exchange ideas for ensuring that future digital documents of value are as secure as present physical documents. The Digital Document Security Conference will be preceded by a half-day course, which will cover the physical and digital document security domains ahead of addressing if physical and digital approaches can work together to create an even more secure environment. More at www.reconnaissance.net/digitaldocument-security/n

ATG Access partners with Crowdguard to deploy innovative security at UK events ATG Access, the world’s leading innovator of road blockers, bollards and vehicle barrier systems, has announced a new partnership with event protection business Crowdguard. As part of the partnership, Crowdguard will be deploying Surface Guard, ATG’s latest pioneering, hostile vehicle mitigation solution, to secure temporary or semipermanent events across the UK. Designed in response to the recent surge in vehicular attacks across Europe, a Surface Guard barrier can withstand the impact of a 7,200kg vehicle travelling at 32kph and has been tested in accordance to the IWA 14 crash test standard. The barrier’s lightweight and modular design means that it can be deployed quickly and efficiently by four men in under an hour, minimising disruption to event operation and the surrounding area. With over 40 years’ experience within the machinery installation and equipment moving industry. With a

14 I April 2019 I IN Security

national distribution network across the UK, Crowdguard’s personnel are dedicated to installing the barriers quickly and efficiently. “With events and crowded spaces continuing to require protection, due to the terror threat remaining ‘severe’ in the UK, working collaboratively with businesses such as Crowdguard will ensure that we can continue to keep the general public safe when they’re attending events with their friends and families. Gavin Hepburn, ATG Access. Deborah Ainscough, founder and operations director at Crowdguard, said: “We are pleased to have reached an agreement to distribute ATG’s market leading Surface Guard product on a national basis. We look forward to working with businesses, events, councils, the police and other relevant stakeholders to provide the highest standards of protection for the public.” For further information, please visit www.crowdguard.co.uk n


Securitas acquires Allcooper Group Securitas has announced the acquisition of Allcoopers Ltd and its subsidiaries. Allcooper Group, founded in 1987, specialises in the installation, maintenance and monitoring of a wide range of security and fire systems. It operates from bases in Gloucestershire, the West Midlands and London with a complement of around 100 employees. Allcooper’s expertise in electronic security and its portfolio of long-term customers will provide excellent support in Securitas’ pursuit of its strategic objectives. As part of the Securitas Group, Allcooper will continue to deliver professional security services to clients in the UK and will operate under the Securitas brand by the end of 2019. Securitas is the leading global security services provider, specialising in protective services built on people, technology and knowledge, and operating in 59 markets worldwide.

In the UK no other security provider layers six Protective Services: On-site Security, Mobile Security, Remote Security, Electronic Security, Fire & Safety Specialist Services and Corporate Risk Management to offer intelligent, value driven, total security solutions to its clients. “The Allcooper Group has been a valued trading partner of Securitas UK for several years and this acquisition further strengthens our portfolio, as we continue to build our Electronic Security services as part of our Vision 2020 strategy.” explains Brian Riis Nielsen, Country President, Securitas UK. Roman Cooper, Service Director, also commented: “This is a fantastic opportunity for Allcooper Group clients and employees. Both organisations are at the forefront of the latest industry trends and technology, and there are huge opportunities for development and growth.” Find out more at www.securitas.uk.com n

IN Security I April 2019 I 15



Ocucon Pixelate launches first-of-its-kind automatic full body video redaction technology

Ocucon’s intelligent video redaction service - Ocucon Pixelate - is set to drastically reduce the cost of CCTV GDPR compliance with the launch of new automatic full body video redaction. Part of a second generation roll out of Ocucon Pixelate’s intuitive web-based software, the introduction of the pioneering full body redaction technology will allow users to simply select the people they do not wish to pixelate before footage is automatically redacted in a matter of seconds. In addition, a new user-friendly manual redaction tool will allow additional features, such as car registration numbers or credit card details to be redacted quickly and easily. Users of Ocucon Pixelate will also notice a new look and feel to the web-based portal as part of the roll out of its intuitive second generation software. The new automatic full body redaction functionality will be unveiled at The Security Event, a major new exhibition for the commercial and residential security market at The NEC Birmingham from 9th – 11th April 2019. Ocucon Pixelate is partnering with Videcon, its main UK distributor, to exhibit at the event and can be found on stand SE50. The second generation Ocucon Pixelate software will also be exhibited at Retail Risk London, the leading risk management and loss prevention event for the retail industry on the 11th April 2019; Security TWENTY 19 in Glasgow on the 30th April 2019; and the Retail Industry Leaders Association (RILA) Retail Asset Protection Conference 2019 in Denver, Colorado from the 5th – 8th May 2019. Harnessing the power of artificial intelligence

and machine learning, Ocucon’s innovative pixelation service delivers intelligent cloud-based video redaction tools for General Data Protection Regulation (GDPR) compliance. Whereas traditional outsourced redaction services are time consuming and costly, Ocucon Pixelate allows users to quickly upload and redact CCTV files via a secure webbased portal for a fraction of the cost, with monthly subscriptions starting from as little as £20 per month. Originally launched in 2018, Pixelate’s innovative software is already used by a number of leading grocery retailers, high-street retail and food chains, local authorities and major transport providers. The introduction of the new functionality is expected to drive further demand. Ocucon Pixelate’s key features include: • GDPR compliance – including auditable log of video redaction and UK processed data • Intelligent automated redaction - select the people you want to pixelate • Quick upload via easy-to-use web-based portal • Suitable for all types of camera footage, including body-worn cameras • Avoidance of high costs associated with traditional outsourcing of video redaction • Significantly reduced redaction time compared to manual video redaction methods • End-to-end advanced encryption of all footage and secure user access control via multi-factor authentication For further information please visit: www.ocucon.com n

IN Security I April 2019 I 17


product and industry news

Custom Consoles Module-R Desks Chosen for IENA Stadium MCR

Custom Consoles (www.customconsoles.co.uk) announces the completion of a twin-desk project for Switzerland’s National Equestrian Institute (IENA). Working in partnership with the Geneva, Zurich and Lugano based broadcast systems integrator Visuals, two desks based on the Module-R series have been produced and installed in a sports broadcast master control room at the IENA stadium in Avenches. Largest of the two desks is a 2.6 metre wide by 950 cm front-to-back five-bay rectangular unit with a centrally inset Sony vision switcher and, to the right, six inset camera control units. Each of the five bays is fitted with a 3U high equipment pod. A 2.6 metre wide monitor rack supports live source, preview and transmission video displays plus near-field monitor loudspeakers. Located just over a metre behind the main desk is a 1.6 metre wide second desk with a Panasonic camera controller allowing up to 100 IP-connected remote cameras to be operated from a single joystick. The camera controller bay incorporates a 3U equipment pod. To its right is an audio production position with a custom inset well to mount the Yamaha DM1000 audio mixer and a monitor bridge. A mix-and-matchable control room furniture range, Custom Consoles’ Module-R enables aesthetically attractive long-life desks to be configured in a variety of shapes and dimensions

18 I April 2019 I IN Security

from a selection of high-quality pods, base sections, 19 inch rack housings, worktops, end-panel modules and legs. Coordinated desk pods are available as single-bay sections with up 10 rack unit chassis capacity.Module-R has been tested by FIRA to ensure compliance with current ISO standards. It is supplied with full cable management and internal 19 inch racking, accessible via removable front and rear cover panels. All rear surfaces and pods are completely interchangeable. A full length cable brush enables easy reconfiguration. Custom Consoles Ltd is an ISO 9001 certified manufacturer of project-specific and modular broadcast, process-control and security furniture. Its product range includes motorised, manuallyadjustable and fixed-height units plus fan-cooled sound-insulated equipment housings. The company operates from a 1,200 square metre UK-based production facility equipped with 3D computeraided-design facilities, computer-controlled cutting machinery and a thermoform press. These resources provide the dual benefits of precise quality control and prompt delivery times, typically 21 days from receipt of order. Custom Consoles’ clients include governmental and corporate organisations in Europe, the Middle East, Asia and Australasia. For further information please visit www.customconsoles.co.uk n


BUSINESS DATA SURVEILLANCE CAMERA

TRAFFIC CAMERA

REMOTE INTERACTION REMOTE NETWORK

Smarter visualization Networked visualization leading to smarter decision making A reliable networked visualization solution is indispensable to monitor, analyze, and share an ever increasing number of video and data sources all over the world. That is why Barco designed its networked visualization solution, the simplest and most flexible way to securely distribute any information to any location. The result: faster and smarter decision-making.

Learn more about networked visualization at www.barco.com/netviz


BIOMETRICS

Expanding the chain

The key to unifying technology and forming a chain of trust David Orme, Senior Vice President at IDEX Biometrics

20 I April 2019 I IN Security


Biometric fingerprint authentication is still in its infancy and often seen as a ‘gimmick’/nice to have. However, businesses and consumers should not be operating under this misapprehension as fingerprint biometrics can play a much wider role in unifying the technology we have grown to depend on. For example, many of us now rely on our fingerprints to access our smartphones and authenticate our mobile payments, but fingerprint biometrics has far greater potential to positively influence other techenabled areas of our lives. More and more devices can now instinctively ‘talk’ to one another, whether it’s via Bluetooth, NFC or Wi-Fi and as such, personal data is exchanged to positively influence and unify the user experience. For example, smartphones often connect to, and are used to monitor and manage other smart devices, such as smart home hubs, smartwatches, fitness trackers, even scales. While there are many benefits of leading a digitally led lifestyle, the more our lives are connected and the technology we use is linked, the more we open ourselves up to cyber threats. If a cybercriminal can gain access to one weak device within a unified network of devices, they can

access all the associated devices, along with the sensitive data each device holds. By adding fingerprint biometric authentication as a layer of security we can ensure the right person is accessing the right device, building or system. The chain of trust that fingerprint biometrics offers can be implemented to provide businesses and consumers with a far greater level of confidence in keeping their unified networks secure. Fingerprint biometrics for the consumer home and the office If we take a closer look at the consumer landscape, fingerprint biometrics can be used to authenticate access to homes through internet-enabled locks and utilities can be managed via home hubs, but consumers can now also use the internet to manage white goods to wash clothes, keep the fridge stocked and to remotely monitor dinner as it cooks in the oven. However, the advantages of fingerprint biometric authentication applied to consumer environments can also be used to strong effect in corporate environments. Every business needs to be confident that their premises, belongings, data,

stock and employees are safe, secure and protected. Fingerprint biometrics provide businesses with a flexible and affordable option to determine exactly who can gain entry to specific areas within a building, or to devices themselves. Removing the need for pin codes, passwords, fobs, swipe cards or keys – all of which can be lost, stolen, lent and forgotten and come at a cost. The future is smart! By applying fingerprint biometrics to smart biometric cards, authentication will put who we are back at the centre of authentication, rather than what we can remember, or write down in many cases. Providing an ideal balance between usability and security, as we carry our fingerprints with us. The added benefit of on-card biometric fingerprint technology means a fingerprint biometric profile can be securely stored on the card itself and not in several databases owned by the card issuers or device manufacturers – limiting potential exposure and risk. This isn’t the only benefit of having one biometric smart card across a network of unified devices. Fingerprint enrolment itself can prove extremely time intensive, ➔

IN Security I April 2019 I 21


Source: ABI Research

particularly across multiple devices, so a user-friendly process is imperative to adoption. By having just one card to authenticate all devices, users will only have to carry out the enrolment process once, rather than multiple times. Whether we are aware of it or not, technology is becoming increasingly unified and if one device is targeted by a hacker, they have the potential to access

22 I April 2019 I IN Security

a whole wealth of personal and corporate data held on a myriad of devices and networks. The reality is not just ‘if’, but ‘when’ these breaches will happen, and we must be ready for them by implementing heightened security practises including fingerprint biometric authentication. Biometric access control can seem futuristic, but in fact, offers many advantages over

standard security solutions and is surprisingly affordable to roll out. Fingerprint biometrics present a unique opportunity to create a secure unified technology chain of trust that can safeguard against human error, laziness and cyber threats while making the authentication process easier than ever before. For further information please visit wwwwww.idexbiometrics.com.


Access controlled… Future secured. www.automatic-systems.com

meet us at intertraffic 2016

Go Go Mobile Mobile Go Mobile with with Confidence Confidence with Confidence

April 5-8, 2016 • Stand 108, Hall 02

50 years of performance and reliability serving the highway, parking and traffic management markets

HID HIDMobile MobileAccess® Access® HID Mobile Access® Convenient, Convenient, smart smart and andsecure secure Convenient, smart and secure

sales.asgroup@automatic-systems.com


Event Security

The future of access control

24 I April 2019 I IN Security


Ensuring the safety and security of students and staff is an important and often complicated issue. Here, John Hardman, Product Marketing Manager at dormakaba, discusses the latest innovations in access control technology and the benefits for educational facilities. With college and university campuses increasing in size to accommodate the growing populations of the institutions, keeping students, staff and visitors safe and buildings secure is becoming increasingly complex. This is particularly true for open campuses where access by the public is largely unrestricted. Theft and personal safety are among the primary concerns, not only for the teaching buildings but also for student accommodation where the value of students’ possessions mean that a robust

solution is required. Restricting access to certain areas of the building also has a role in ensuring safety. For example, laboratories and practical areas may contain equipment and materials that would be dangerous to unauthorised persons. To meet these requirements without unnecessarily hindering movement around the campus and buildings requires a system that can be tailored to the organisation. Access technology has evolved significantly in recent years with one of the most important innovations being cloud based systems. These utilise an online platform to manage user access across a site and require only minimal work to be integrated into the organisation’s existing IT architecture. For large educational facilities, the integration of a new software solution can be costly,

time consuming and inconvenient whereas internet access is all that is required to get a cloud system up and running. From there they offer a simple, centralised and easy to use interface for managing all user profiles and privileges. The flexibility of cloud-based access control systems makes them ideal for college and university settings. It allows tailored access to be established for different people or groups for specific areas of the building to create a zoned security system. This level of customisation helps overcome the challenge of allowing access to a single area of the accommodation as well as more general access to the university buildings with one access medium – such as a smartcard, key card or fob. Access can also be further controlled at certain times of the day for specific groups. For ➔

IN Security I April 2019 I 25


example, access by students can be restricted at night through tailored permissions or by automatically requiring pin number entry alongside the key or badge for certain rooms during these hours. Furthermore, with a full audit trail function, these systems can record the movements of users to allow complete traceability and peace of mind for managers. The ability to quickly and easily make changes to users’ access profiles has a number of benefits for educational facilities. The nature of the environment means that the users of the facilities change each year with some students leaving having completed their studies and new ones joining. This regular turnover of users requires a system where all privileges can be added, withdrawn or amended easily. This functionality also helps maintain campus security in the event of lost access media as the missing item can be rendered unusable to prevent unauthorised access. This feature can aid the university and college in running efficiently on a daily basis and allows appropriate level of access to be granted easily to visitors and contractors. Outside of term time the facilities can be utilised by the public – possibly allowing additional revenue streams to be established. With cloud based solutions

26 I April 2019 I IN Security

new features and updates to the platform can be made and rolled out immediately rather than needing to wait for the locally installed software to be updated. The next step in the evolution of access control is the integration of smartphones alongside existing media such as cards, fobs and smart keys, and this is already being utilised in the range of different applications. dormakaba have already utilised this technology in the hospitality sector - with smartphone room access available for guests. Using a smartphone as the access medium has a number of benefits, especially for educational organisations. The ubiquity of mobile phones provides a greater level of convenience for users and phones are much less likely to be lost or lent to other people, therefore improving the overall level of security. These devices also commonly include additional security measures such as a PIN number or passcode and a growing number of models feature biometric verification, such as fingerprint or facial recognition. This adds a further layer of security whilst maintaining the ease of use for staff and students. Furthermore, as it is now often habit to pick up your phone when you leave a room it will reduce the chance of students being locked out of a building or their accommodation.

In addition to the significant technological advancements, the diversity of solutions has proved to be an important factor in achieving a robust access control system that meets the needs of the organisation. With a wide range of options on the market it is possible to combine products into a fully scalable, bespoke system. For example, at the University of York, dormakaba installed a mix of 890 online controllers on 897 doors and 1,455 offline locks and doors in a phased deployment that covered the whole of the east campus and nine of the buildings on the west campus. The online doors were also integrated into the university’s ERP and HR systems, allowing for a reliable and accurate time recording solution for staff, students and contractors. The access control requirements of educational facilities are complex. When specifying a solution, it is important to consider the flexibility and adaptability of the system. Innovations in cloud based solutions and the closer integration of mobile technology has the potential to improve security and deliver a higher level of convenience for users and system administrators. To find out more about dormakaba’s full range of access control systems visit: www.dormakaba.co.uk n


THE KEY TO CONFIDENCE OVER THE PAST 20 YEARS CyberLockÂŽ has assembled the largest array of key-centric access control solutions for a wide variety of applications. Our patented, sealed triangular keyway is your assurance that CyberLock will deliver versatile, intelligent, and dependable security solutions. The Triangular Keyway. Only from CyberLock.

Electronic lock cylinders, smart keys Control access with one software platform Superior key control: re-key electronically

sales@cyberlock.com | 541-738-5500 | www.cyberlock.com +1.541.738.5500


ENTRANCE CONTROL

Saving face

Facial Recognition as a Security Tool by Robert Watts, Vice President of Facial Recognition, Digital Barriers

The International Air Transport Association (IATA) is predicting the amount of air travellers nearly doubling in the next 20 years, from an estimated 4 billion this year to 7.8 billion in 2036. Growing passenger flows are intensifying the demands put on airports to provide both seamless operations and safety, both of which are challenging to achieve with such a massive clientele. Facial recognition technology has by now become a common sight at many airports, as it has widely been

28 I June 2019 I IN SECURITY

deployed to replace traditional passport controls in an effort to deal with these large passenger flows. This is however one of the simplest applications of this highly advanced technology, which has the potential to do so much more to enhance both security and operations at airports. Heightened threat levels, caused by global terrorist attacks, have forced airports to rethink their existing security measures. With advanced facial recognition technology, there is no longer a

reason to only implement facial recognition at the formal passport control gates, but it can now also be used by airport security officials to monitor the whole terminal or even the entire area surrounding the airport. The technology is able to scan large areas more quickly and efficiently than the human eye, and it works by scanning people’s faces and alerting officials if they match any existing criminal watch lists, whilst ignoring everyone else. Following a positive identification by the technology, a human security


official will then assess the threat and always make the final decision on action – nobody has ever been arrested purely based on an alert from a facial recognition system. The technology, which is already being piloted by security services, the police and casinos, therefore offers significant potential to protect airports and other highprofile targets more efficiently. At ePassport gates, facial recognition is used to identify passengers by comparing their faces to their e-passport photos. In this identification process it is possible to control all of the variables involved: the person at the gate is not only matched against a perfectly positioned high-quality photo on the passport, but is furthermore stood in a well-lit specific spot to make the identification process as easy as possible. Whilst the technology has been a highly useful tool to catch imposters trying to get into countries illegally, for example at Washington Dulles Airport last year, its potential to do more for airport security has long been neglected.

Airports today tend to use facial recognition only for simple passenger throughput, but it has the potential to be used for the entire process from booking a flight to boarding a plane, all of which are today both laborious and time-consuming. Tokyo’s Narita International Airport has announced that it will in 2020 become the first airport to use facial biometrics in check-in, immigration and boarding procedures instead of passports and boarding passes, which is expected to significantly enhance operations and cut waiting times. The idea is to capture a passenger’s facial biometric data at their first point of contact, which will then be linked with passport and travel details by scanning relevant documents, allowing the passenger to then simply go through baggage check-in, security screening, immigration and boarding without having to show any documents a second time. Apart from its operational benefits, the technology can also fill the most general security needs, such as detection and

tracking of known criminals and terrorists in and around the premises, significantly easing the workload put on security personnel. Today, when deployed appropriately, the technology doesn’t need an individual to stand still in a designated spot but is able to identify even those who don’t actively want to be identified – even those who are on the move around the airport wearing hats and other accessories to avoid being picked up by the technology. Facial recognition can also help mitigate the most common issues at airports by keeping track of rogue taxi drivers, detecting and identifying pick-pockets, and limiting the risk of bag theft. To ensure maximum security at airports, security officials need to have the right technology to stop and investigate those they believe could be a security risk. Today however, the security personnel are having to work with very limited information, which has left them vulnerable to accusations of discrimination and bias. Facial recognition would allow officials ➔

IN Security I April 2019 I 29


to make more informed and thus justified decisions regarding who to stop – if the technology for example would match a passenger at the airport to a known terrorist watch list, security officials would have more than enough information at hand to justify that individual to be interrogated. This technology can thus enable more efficient and proportionate security measures at airports, as it can help law enforcement to instantly confirm if the people they are stopping have been involved in criminal activities before, and thus need to be thoroughly searched or taken in for further questioning.

30 I April 2019 I IN Security

Unlike human officers, these systems don’t need prior personal engagement to recognise an individual, but rely instead solely on data and not on personal traits such as gender, age or race. Whilst the decision-making power ultimately stays with the security officers, the technology brings greater transparency and context to the process behind deciding who to stop and question. Facial recognition has great potential to further enhance security and operations at airports, as the technology allows security officers to identify individuals on criminal watch lists faster

and more accurately than the human eye. Facial recognition uses algorithms to match physical characteristics against photos and videos of people’s faces, which have been collected from visas, passports and other sources. At airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in and, in the future, even boarding proceedings. For further information please visit www.digitalbarriers.com n


Access controlled… Future secured. www.automatic-systems.com

meet us at intertraffic 2016

Go Go Mobile Mobile Go Mobile with with Confidence Confidence with Confidence

April 5-8, 2016 • Stand 108, Hall 02

50 years of performance and reliability serving the highway, parking and traffic management markets

HID HIDMobile MobileAccess® Access® HID Mobile Access® Convenient, Convenient, smart smart and andsecure secure Convenient, smart and secure

sales.asgroup@automatic-systems.com


Access control

Tower of strength Residents of Sutton Point benefit from access control technology from PAC

32 I April 2019 I IN Security


Located in south-west London on the site of a former office block, Sutton Point is a cutting edge, mixed use development that features contemporary apartments surrounded by a diverse range of amenities. In order to provide residents with the highest level of security, access control technology from PAC, part of Stanley Products & Solutions Group, has been installed in key areas of the complex. Redefining contemporary urban living and creating a diverse new community in the London suburb of Sutton, Sutton Point offers residents a vibrant new quarter that also has rapid access to and from the centre of the capital. The area on which it is located has been completely transformed and after the full demolition of an existing tower, the space now comprises three main structures – East Tower, Centre Tower and West Tower.

Within them are 332 one and twobedroom apartments, a number of three-bedroom luxury penthouses, 21,000 ft2 of retail space, 18,000 ft2 of office space and a 150-bedroom hotel, as well as a health and fitness centre, roof gardens, a cinema, shops and cafés. Team building Following a tender process, Harrowbased security systems and building technology integrator, Interphone Limited, was appointed to design, specify and install a fully-integrated security system. This included an optical fibre infrastructure, door entry, networked CCTV, an integrated reception system (IRS), and access control. Albert Dwek, sales manager at Interphone, states, ‘We have enjoyed a strong and longstanding relationship with PAC. The partnership has resulted in

the integration of PAC security technology into many buildings, most recently the installation of an access control system at the prestigious Sutton Point development. PAC’s team was always on hand to support Interphone from the bid stage through to completion, providing a high level of design and technical support. This impressive service delivery is underpinned by a quality product range that is extremely reliable and robust. This means our customers benefit from a cost efficient solution with minimal maintenance requirements.’ Support structure The access control technology needed to integrate seamlessly with all other elements of the security system, so it was essential for Interphone to have highly responsive working relationships in place with its key technology partners. ➔

IN Security I April 2019 I 33


‘Installed in a diverse array of commercial and residential buildings, PAC’s products are developed in response to real customer needs, and the ever changing requirements and legislation affecting the access control and door entry sectors,’ explains Paul Scott, Regional Sales Manager for PAC. ‘After listening to the specific requirements outlined by the Interphone team, I had no hesitation in recommending the use of PAC’s SecureNet integrated security software solution, which is reliable, scalable and can be adapted to suit every access control installation.’ Easily configured to operate on a standalone PC or across a corporate network, SecureNet displays detailed real-time event information, including alarms, as they occur across a facility. At Sutton Point, it is configured to enable all management tasks related to the tenants and staff to be administered from a central computer, as and when required, ensuring the highest level of security around the site and added peace of mind.

34 I April 2019 I IN Security

Reporting back PAC technology has been used to secure 73 non-residential doors across the site including hallways, communal areas and cycle stores. Also in-situ are PAC’s high frequency (HF) OPS™ MIFARE® DESFire® EV1 readers, which have been independently tested to meet Advanced Encryption Standard (AES) 128-bit compliance – a standard recognised as being ultra-secure. This further reduces the risk of token cloning through the use of unauthorised duplication machines. The PAC system enables incidents to be dealt with quickly and as Paul Scott says, ‘Real time reporting ensures a high level of security for both the tenants and the staff. Administration is also more streamlined, as all management tasks can be administered from the central computer by the concierge team, as and when required. This provides the convenience of adding or removing tokens or changing time schedules on doors from an on-site location at the heart of where the requirements arise. Changing user access privileges, creating new users or deleting redundant

tokens is straightforward and system administrators can easily control and enforce secure access.’ PAC will continue to work closely with Interphone to ensure the system is fully operational 24/7. Regular maintenance visits to the site, as well as the support of PAC’s technical engineers, will enable any potential issues to be quickly identified for swift resolution of any problems. Success story Interphone’s Sutton Point installation has been recognised by the UK Outstanding Security Performance Awards (OSPAs), and Dwek concludes, ‘Working closely with PAC for our Sutton Point project, we were able to benefit from their impressive knowledge and experience. From inception through to delivery, nothing was too much trouble. The sales team was on hand to attend site meetings and carry out presentations to the client, while the technical support team was always available during the installation, commissioning and handover.’ For further information please visit www.pacgdx.com n


Cologne Cathedral Square

Single sensor

PanomeraÂŽ

DallmeierPanomera_allgemein_186x129_EN.indd 1

Total costs over a time horizon of 5 years

28.08.2018 12:00:42

New AperioÂŽ H100:

* According to industry media in 2018

Wireless access control technology is now inside a stylish door handle Learn more at: campaigns.assaabloyopeningsolutions.eu/ aperio-h100

AA_Aperio_Printadvert_H100_award_halfpage_186x129.indd 1

17.04.19 09:05


Expert opinion

Heart of the matter Automation, Cloud, Cyber & Unification at the heart of Tyco’s product strategy - Interview with Eli Gorovici, Product General Manager for Access & Video, Tyco

CYBER

CLOUD

AUTOMATION

UNIFICATION

36 I April 2019 I IN Security


CLOUD

CYBER

If you want to know anything about the future product strategy for the Tyco video brands, there is probably no one better to ask than Eli Gorovici, Product General Manager, Access & Video, for the security products division of Johnson Controls. In this interview, Eli, who has been a member of the Tyco senior management team for the last 4 years, provides an insight into how the company is looking to establish clear blue water between its premium level video surveillance solutions and the mass market products which have flooded the industry in recent years.

This technology, which has mainly been developed at our UK Engineering Center of Excellence, has been introduced in response to changing market demands and with the intention of delivering greater value by providing real-world practical benefits over and above what might normally be expected from a highquality video surveillance system. This means offering the best available solutions in terms of helping combat criminal activity and which are also capable of helping a business increase productivity through, for example, the use of video analytics.

Q

What is Tyco’s approach to developing a product strategy? We are fortunate in having access to a large network of knowledgeable system integrators who are highly successful within the regional and vertical markets in which they operate and who have a true understanding of what end-users are expecting from their video surveillance solutions. We highly value the input of these customers, which together with the in-depth research carried out by our talented product management team, has assisted us in devising a product strategy which we believe will ensure our ongoing success.

Eli, how are the Tyco video brands, such as American Dynamics, Exacq and Illustra, able to successfully compete in what many regard as an overcrowded market? Our approach has always been to look at how we can offer system integrators opportunities to generate new business and help their end-user clients achieve maximum return on their investment in a video surveillance system. We have done this by packing our cameras, recording devices and software platforms with innovative technology, much of which is proprietary.

A

Q A

Q A

So, without giving away any secrets, can you give an indication as to what kind of new products we can expect to see from Tyco? It might be best if I make use of this interview to provide a view of the bigger picture, rather than list the numerous new products which are in the pipeline. By bigger picture, I mean that our product strategy is focused on four major technology streams and these are Automation, Cloud, Cyber and Unification. Tyco has been among the first to recognise the potential for machine learning solutions which incorporate advanced forms of video analytics and artificial intelligence (AI). Whilst the intuition and experience of security personnel cannot easily be replaced, there is no doubt that the application of machine learning and robotics technologies provide a powerful tool to more effectively respond to any threats. Being able to detect abnormal activity patterns, predict behaviour and augment 3D data from multiple sources, as well as facilitate action macros in response to complex events whilst miminising false alarms; These are just a few examples of where Tyco intends to lead the market âž”

IN Security I April 2019 I 37


and deliver significant value to what end-users would normally expect to achieve from their video surveillance systems. In simple terms, our decision to accelerate our development of Cloud-based solutions will mean our customers can benefit from a significant reduction in the capital, maintenance and operational costs associated with data storage by utilizing our Cloud archiving, Cloud monitoring and service offerings. Customers will have the option between hybrid or pure cloud solutions, with the freedom to migrate when they decide the time is right to do so. They can also take advantage of the greater mobility and interoperability offered by the Cloud. Regardless of the size or complexity of a security system, the need for cybersecurity has never been greater. At Tyco, we are never complacent about the potential for individual opportunistic hackers or organised criminal gangs to access confidential data or video. This is why we have a proactive approach to reducing the risk of cyber attacks against both our Cloud and on-site, edge-based solutions. The Tyco Cyber Protection Product Security Program is one of the industry’s first to offer a holistic

38 I April 2019 I IN Security

approach to cybersecurity for physical security products. Whilst no manufacturer can offer 100% guarantee, the Program is intended to give installers, systems integrators and end-users the confidence that we have minimised the possibility of vulnerabilities in our digital security products and solutions. From the very beginning, all our new products and software are designed and developed with the benefit of advice from certified experts in order to combine best practice during the product design, development, testing and evaluation process, as well as configuration guidelines for compliance in order to combat attacks, damage, disruption, unauthorised access or misuse. When necessary, our experts are able to respond quickly and effectively to any emerging threats or incidents to ensure business continuity, and they endeavor to keep our systems integration partners updated during the process. We have set the bar extremely high with our American Dynamics video management systems and Illustra IP Pro and Flex cameras. We are committed to employing the same cyber safety mindset across other product lines within our portfolio. We are committed to offering complete Unified solutions which

allow our customers to ‘see more, do more and save more’ by the deep integration of our access control and video solutions with products and systems offered by our technology partners. Our Connected Partner Program is driving our efforts to create a network security ecosystem which is futureproof, whilst providing users with the flexibility to choose the possible combination of products, systems and software to match their current requirements. An excellent example of this is our victor Unified video management system which seamlessly synchronises video with data from access control, fire, intrusion and other systems. Futureproof and scalable, it has been designed to offer a high-performance solution which provides operators with superior situational awareness, as well as an easy way to investigate incidents and generate activity reports. victor delivers the right video and other critical information such as event notifications, maps and health monitoring, to the right person at the right time and with the flexibility to display the video and other information on single or multiple screens, as well as video walls. For further information please visit www. tycosecurityproducts.com.n


Hands-off!

Code HandleÂŽ: The convenient way to protect sensitive stuff in public spaces campaigns.assaabloyopeningsolutions.eu/codehandle

aa_CodeHandle_advert_generic_halfpage_186x129.indd 1

17.04.19 09:59

They see 9 to 5.

You see around-the-clock protection from the basement to the boardroom. Bosch empowers you to build a safer and more secure world. With solutions that protect people and assets, 24/7, 365. Find out more at boschsecurity.com

Medium

In Security (GBP) Issue April (01.04.2019)

SAP No.

Size (W x H)

186x129 mm (+ 3 mm)

Language

EN

Color mode

4c

Color profile

ISO coated v2 (ECI)


product Listings

Astute Electronics

DSX manufactures integrated

Barco

Falken At Falken, we are a fully

Astute Electronics promises to deliver customers the best Quality, Service and Reliability. Astute is both an Electronic Components distributor and a global and UK parts supplier. The company’s highly-qualified team is experienced in procurement, engineering, logistics, finance, program management and QA. www.astute.co.uk

BUSINESS DATA SURVEILLANCE CAMERA

Barco designs and develops visualization solutions for the security market. With its own facilities for Sales & Marketing, Customer Support, R&D and Manufacturing in Europe, North America and Asia Pacific, Barco is active in more than 90 countries with 4,000 employees worldwide. Barco posted sales of 1.158 billion euro in 2013. www.barco.com/references

TRAFFIC CAMERA

REMOTE INTERACTION REMOTE NETWORK

Smarter visualization Networked visualization leading to smarter decision making

solutions for the access control and security industries. Based in Dallas, DSX designs all software and hardware in house. The company motto is: ‘Integrated Solutions and real world applications are what we do best.’ DSX products are sold worldwide through a network of factory-trained dealers. Dealers are located in the US, Canada, Mexico, Latin and South America, Europe, Middle East, Australia and the Pacific Rim, and Nigeria amongst others. www.dsxinc.com

licensed, registered, and insured professional service, equipment, manufacturing and retail supply firm. Founded and staffed by former law enforcement officers and retired military personnel, we have grown to become a trusted and secure global provider. www.falken.us

A reliable networked visualization solution is indispensable to monitor, analyze, and share an ever increasing number of video and data sources all over the world. That is why Barco designed its networked visualization solution, the simplest and most flexible way to securely distribute any information to any location. The result: faster and smarter decision-making.

Bosch Security Systems

Learn more about networked visualization at www.barco.com/netviz

14090.BARCO.resize.ad.in security.netviz.indd 1

24/04/14 15:43

Offer an extensive portfolio of innovative, high-quality, ergonomic products and systems for security, safety and communication. Our product range includes video surveillance systems with state-of-the-art IP-solutions, access control systems, intrusion detection systems, fire detection and evacuation systems, security management systems, paging and personal security systems and public address and conference solutions. www.boschsecuritysystems.com

FLIR FLIR Systems, Inc. is the global leader in Infrared cameras, night vision and thermal imaging systems. Our products play pivotal roles in a wide range of industrial, commercial and government activities in more than 60 countries. www.flir.com

pt

Dallmeier One of the world

leading providers of products for network-based video surveillance solutions, already has more than 30 years experience in the development and manufacture of high quality components and complete solutions for the CCTV/IP sector. www.dallmeier-electronic.com

grated

mm

hall 4, stand D80

06.02.2012 11:05:55

40 I February 2019 I IN Security

Hitachi Hitachi’s 3D LiDAR “Time-of-Flight” (TOF) sensor adds an enhanced layer of security / marketing data to existing systems using advanced infrared motion technology. Hide.Hayashi@hitachi-eu.com


to have your company included in this listing contact wayne banks on +44 (0) 1622 201207

Honeywell Security Group

Paxton Access Ltd is a leading manufacturer of electronic access control systems. From its inception Paxton has aimed for engineering excellence. This means designing and manufacturing intelligent and innovative products that are fit for their purpose. We have become a market leader through our constant efforts to exceed the expectations of installers and system users. www.paxton.co.uk

Keytracker Ltd

Samsung Security

delivers the newest innovations, technologies and products. Honeywell is driven to maintain its position as an innovator and leading manufacturer, and invests continuously in R&D. Each of the product ranges regularly delivers new features and technological advancements, while maintaining a familiar user interface and backwards compatibility for ease of installation. Honeywell is a world leading security business. www.security.honeywell.com

Secure Storage & Management for all Keys & Equipment Mechanical & electronic tracking to suit all budgets & applications, low spec to high tech – the world’s largest range of tracking systems for keys & equipment. Keytracker Ltd, Keyper House, Unit 3, Station Road, Rowley Regis, West Midlands, B65 0JY sales@keytracker.co.uk www.keytracker.com

Samsung Techwin is one of the fastest growing professional security brands in Europe. Providing a complete range of security solutions that are suitable for a wide range of applications, the company is dedicated to developing technology and products that its clients demand. www.samsungsecurity.com

The leading global M2M managed services provider

It’s good to be well connected.

Dual vision, Real time. Keysure

ULISSE COMPACT THERMAL The positioning unit offers an integrated solution for total darkness, fog, rain or smoke.

KEYSURE’s patented Key Control container is a pilfer proof, tamper evident key safe. This is the only non-electronic security device that will control and audit the use of a key, password or any other content. Once an item is secured inside the Key Control, it must be physically broken to access the contents. www.keysure.net CCTV PRODUCTS

Your M2M solution is more than just data connectivity. We understand that.

Videotec Dual vision, Real time.

So we not only built the world’s most advanced global M2M platform, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers.in-house Videotec manufactures

ULISSE COMPACT THERMAL a wide CCTV products That’s why Wyless is the trusted M2Mrange partnerof of Fortune 500 companies

The positioning unit offalike. ers an integrated and startups We’re the easiest company to work with. We listen to our solution for total darkness, fog, rain or smoke. customers and take pride in every connection.

recognized for high performances, flexibility and style. Our mission to Wyless offers truly uncompromising M2M solutions, delivering worldwide lead the field in the development wireless connectivity via the most secure and resilient network infrastructure. We provide unrivaled management tools and empower with end-to-end of robust, reliable andyou high managed services, technical expertise and dedicated support. performances mechanical and So connect with the experts and together we’ll take your to the electronic products forapplications surveillance next level. You have found your true M2M partner. applications is the driving force We can’t wait to discuss the possibilities. behind our success. www.videotec.com

www.videotec.com

CCTV PRODUCTS www.videotec.com

wyless Systems

Luminite Luminite have been designing and manufacturing PIR detection systems for 35 years and have extensive expertise in the security market. Their flagship Genesis wireless security range provides rapid, flexible and robust solutions to minimise installation costs and maximise profits. www.luminite.co.uk

+1 617 949 8900

Our award-winning M2M platform, delivered in partnership with the world’s largest mobile network operators, provides secure, reliable wireless connectivity to mobile and fixed devices in nearly every country in the world. Our unique products and services help our customers deploy robust, scalable and secure applications. +44 1895M2M 454 699 info@wyless.com www.wyless.com www.wyless.com

The leading global M2M managed services provider

It’s good to be well connected. Your M2M solution is more than just data connectivity. We understand that. So we not only built the world’s most advanced global M2M platform, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers. That’s why Wyless is the trusted M2M partner of Fortune 500 companies and startups alike. We’re the easiest company to work with. We listen to our customers and take pride in every connection.



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.