In Security Magazine April 2022

Page 1

IN SECURITY THE MAGAZINE WITH THE INSIDE STORY ON SECURITY ISSUE 56 APRIL 2022

PERFECT VISION NEW CORE & PRO SERIES CAMERAS RELEASED FOR PAXTON10

8 INDUSTRY NEWS Latest developments in the industry

22 THE CHAIN OF TRUST

34 AIRPORT SECURITY

42 IT SECURITY

Why biometrics are central to secure access control

Access and security challenges

What do you need to know!

IN SECURITY | April 2022 | 1


Same powerful system, new cameras, more choice.

Paxton10, our combined access control and video management system, is now suitable for more installations than ever before with the introduction of the CORE and PRO series cameras.

Cost-Effective CORE series

High Performance PRO series

4MP resolution 64GB on camera storage

8MP, 4K resolution 256GB on camera storage

Find out more about the Paxton10 cameras at

paxton.info/5279

See the full Paxton10 range at IFSEC 2022, stand IF4210


22

Editor Chris Hewett editorial@mebmedia.co.uk Accounts Jay Kempisty accounts@mebmedia.co.uk

30

Publisher Wayne Banks +44 (0)1622 201207 wayne.banks@mebmedia.co.uk Website and Circulation Manager Kevin Villa website@mebmedia.co.uk Design and Production Charles David production@mebmedia.co.uk In Security Magazine is published 6 times a year by MEB Media Publishing Ltd 13 Princes Street Maidstone Kent ME14 1UR United Kingdom Tel: +44 (0)1622 201207, info@mebmedia.co.uk www.mebmedia.co.uk

Contents

Articles and art may not be reproduced or reprinted without the express written permission of the publisher.

4 Perfect vision New CORE & PRO Series cameras for Paxton10

Exclusion of Liability Although every effort will be made to ensure the accuracy of all materials published, the publisher takes no responsibility for errors or omissions.

8 Product & Industry News Latest developments from the security industry

Copyright © MEB Media Publishing Ltd 2021, all rights reserved.

22 The chain of trust Why biometrics are central to secure access control 26 IFSEC International 2022 Thousands of visitors expected at IFSEC International to discover groundbreaking security

34

30 Persistent surveillance What is the next generation of surveillance for border security? 34 Airport access and security solutions Airports are faced with an evolving set of access and security challenges 38 A smart guide to access How you can benefit from Smart card technology 42 IT Security What you need to know!

IN SECURITY | April 2022 | 3


COVER STORY

Perfect vision New CORE & PRO Series cameras released for Paxton10

T

he international security technology manufacturer Paxton has announced the release of six brand-new cameras to their popular Paxton10 range. Paxton has taken their newest and most powerful combined access control and video management security system to the next stage in its development. They have launched

4 | April 2022 | IN SECURITY

ty - Front cover.indd 1

two brand-new and distinct camera ranges that are available to order now. The new CORE and PRO Series cameras maintain all key features of the previous Paxton10 cameras. This includes edge processing for ultimate scalability, built-in edge storage, and a plug-and-play installation. The two ranges offer different benefits to both Paxton installers and system users

with new hardware options providing more choice, flexibility, and scalability to suit a variety of projects and budgets. What is Paxton10? Paxton10 offers next generation access control and video management on one easy-to-use online platform. By combining both technologies, sites secured by the

04/03/202


“Over the last decade we have seen a clear desire for customers to have a single point of management for their security systems, which includes access control, video surveillance and alarm systems.” future proof system, benefit from the advantages of an integrated solution, without any of the complexity of traditional security systems. End-users have the ability to use license free Bluetooth® smart credentials and the systems Multisite management functionality. This makes remote site management simple from anywhere in the world and is ideal for sites where access tokens are frequently distributed for temporary use. The system is compatible with Paxton’s door entry and wireless door handle range and can support up to 1000 doors and 1000 cameras

from a single server. This makes Paxton10 Paxton’s most powerful and forward-thinking security system to date. There is currently nothing similar on the market, making it unique in its offering to potential installers and end-users. Adam Stroud, Paxton’s CEO, explains: “We have been making access control systems for over 30 years. Over the last decade we have seen a clear desire for customers to have a single point of management for their security systems, which includes access control, video surveillance and alarm systems. “Traditionally this has been

achieved by integrating various products together, but unfortunately integrating systems is complicated. We believe that simple installation and a good user experience are key to value and effectiveness. “This is exactly what inspired us to create Paxton10, a single combined platform that allows the seamless installation and simple management of access control and video surveillance.” More Choice The CORE and PRO Series cameras offer different specifications and pricing. Both provide installers and

IN SECURITY | April 2022 | 5


users more options, and greater versatility to mix and match on a project. They are suitable for installations of any size, making the systems combined access control and video management ability ideal to secure commercial, public, and residential buildings. This is particularly apparent where top-level security, smart device access, and remote monitoring are a priority. Adam said: “Our new CORE and PRO Series cameras were inspired by the varying requirements of our customers. Sometimes a Adam Stroud

cost-effective option is needed, and sometimes a higher spec is more important. “We are now able to offer customers a real choice.” Product Specifications The high-performance PRO Series are top-end video recorders that take building surveillance to the next level. The range includes a 2.8mm mini-bullet, vari-focal bullet, and turret. All three 8MP cameras capture footage in crystal clear 4K HD. Storage will never be an issue thanks to the 256GB in-build memory, and the vari-focal bullet is also equipped with a vandal resistant IK10 rating. The great-value CORE Series are a cost-effective solution for sites where hardware cost is a factor, but with no compromise on quality. The range includes a 2.8mm mini-bullet, mini-dome, and turret. All are 4MP cameras with 0.003 Lux industry leading low light performance and 64GB of in-built edge storage. The mini-dome has a IK10 rated metal exterior for those who need a more robust solution. Installation Paxton have focused on simplicity when it comes to a Paxton10 installation. When installing the

6 | April 2022 | IN SECURITY

cameras, the plug-and-play hardware is extremely easy to connect to a user’s Paxton10 network. The system’s intuitive software has immediate automatic recognition and a drag and drop system. You simply plug in a camera, then name it and tell it where to record, then it just does. This makes the process efficient and will save installers a lot of needless troubleshooting time on site. Adam concludes: “The cameras are designed to work seamlessly with Paxton10 and require almost no configuration. They can be up and running in minutes and come with our standard no hassle 5-year guarantee, free training, and expert customer support.” See all the benefits of the new CORE and PRO series cameras at IFSEC 2022, where Paxton will be showcasing more technology than ever before. Their expert team will be on hand to reconnect in person for hands-on technology demonstrations. They’ll even be giving you the chance to win a smartwatch and one of three Paxton goodie bags worth £85, every day of the show. Register for IFSEC to see Paxton and their new Paxton10 cameras in action.


HIGH-END CAMERA

X

TOP PERFORMANCE LENS

THE NEW FUJINON SX800. THE BEST OF BOTH. With the new SX800, Fujinon combines both in one for the first time: camera and lens. For long range surveillance at the highest level with 40x optical magnification and constantly sharp images. www.fujifilm.eu/fujinon. Fujinon. To see more is to know more.


PRODUCT & INDUSTRY NEWS

A unique choice: Manage energy-harvesting electronic locks, wireless locks and wired readers, all in one access control solution The benefits of cloud access control management are driving a rapid increase in demand. Now ASSA ABLOY PULSE’s programmable digital cylinder and key range, along with ASSA ABLOYs wide range of wireless RFID locks and wired RFID readers, are controlled by Incedo™ Business access control software. A cloud solution helps to make access management easier and more convenient, enabling companies to design workflows which are streamlined, locationindependent and efficient. Based on their specific security needs and access points to control, businesses may now deploy PULSE key-operated energy-harvesting cylinders and padlocks on doors, cabinets or gates, alongside a large range of wireless locks or wired readers. With PULSE devices, customers can bring access control to more than just doors. High flexibility for security managers Organizations are constantly moving and need flexible access management. Because Incedo Business is a scalable ecosystem, customers have the option to start small — with a handful of offline PULSE cylinders, padlocks and cabinet locks, for example — and grow as their needs change, adding real-time control via wireless or wired locks if required. The investment in hardware or software is always protected, because the Incedo platform is built to grow with a business. Wireless, battery-powered Aperio devices for doors or server racks can be managed either offline or online 8 | April 2022 | IN SECURITY

— for real-time control over openings — alongside offline control of PULSE devices within the same system setup. If required, wired doors equipped with Signo readers also integrate within Incedo Business. A single, programmable PULSE key can unlock every digital cylinder or padlock. It also has an integrated RFID chip and so can operate wireless or wired doors on the same site. This is efficient and convenient for both security managers and users. Energy-harvesting locks without batteries or wires “Our PUlSE self-powered electronic locking brings decades of innovation into a range of intelligent key-powered access control cylinders, without drilling, without batteries. It can actively contribute to customers’ sustainability goals,” says Henrik Degn, Business Development Manager, PULSE at ASSA ABLOY Opening Solutions EMEIA. PULSE key-operated cylinders and padlocks are selfpowered by energy harvesting technology. Devices run without any external energy source. To unlock a PULSE cylinder or padlock, the user simply inserts and turns their programmable smart key. The power generated is instantly harvested to energize the lock’s encrypted electronic security. To learn more about PULSE energy-harvesting digital locking, visit https://campaigns. assaabloyopeningsolutions.eu/pulse


Security ID specialist accesses all areas with latest acquisition

A European company that supplies security ID cards and the print equipment used to create them, is significantly expanding its product and service range, after acquiring a German counterpart that specialises in access control systems for large-scale events. cards-x, which has bases in the UK and Germany, has acquired Adon Development, which is based in Ratingen near Düsseldorf and is one of the world’s most prominent suppliers of turnstiles, barriers, gates and electronic door systems. Its access control systems operate alongside an advanced online, browser-based event registration system that is fully customisable in terms of look and feel, enabling it to incorporate event branding and other features relevant to any event. It can also be tailored for individuals attending the event, offering everything from access to special zones through to food and drink credit in hospitality areas. The company’s products are available to lease or rent, serving clients including the Eurovision Song Contest, Ski World Cup Croatia, as well as global motor racing events. Adon Development’s founder, Peter Mooshage, and its six-strong team will all remain with the business, which is being rebranded to cards-x Development. With offices in York and Düsseldorf, cards-x has quickly become one of Europe’s leading suppliers of security products, ID cards, and Matica printers. In the last 12 months cards-x’s team has grown from six people to a team of eight at Malton near York with

a further 20 people in Germany, following this latest acquisition. cards-x chief operating officer, Andy Reeves, stated: “cards-x is now at the forefront of the market in terms of security ID cards and the print equipment used to create them, and this latest acquisition is a key part of our ambition to become much more than a distributor and manufacturer.” Norman Kämmerling, CEO at cards-x, added: “Adon Development is a world leader in access control systems with an innovative product range that is supported by an advanced online system that can provide an array of bespoke services to ensure sports fans, music lovers, exhibition attendees, and anyone else visiting an event, have an outstanding experience. “It’s very exciting to be able to incorporate these products and services into our offering and the acquisition will enable us to continue growing our client base throughout Europe and beyond.” This latest deal follows cards-x acquiring the world’s most eco-friendly manufacturer of ID card holders, Evohold at the end of 2020. Following the acquisition, ‘Made in Britain’ member, Evohold, relocated from Preston to Malton and the company now produces hundreds of thousands of card holders each week, which are exported to countries throughout the world. For further information about cards-x visit www.cards-x.co.uk

IN SECURITY | April 2022 | 9


Tallest building in the European Union relies on HID Mobile Access® to support tenants HID Global’s Unified Access Control Solution Serves Touchless Capabilities to Tenants Using Different Credential Types and Technologies HID Global, a worldwide leader in trusted identity solutions, announces the successful implementation of its HID Mobile Access solution and mobile-enabled readers in Varso Place, the site of the tallest skyscraper in the European Union, which allows more than 7,000 people to move more freely and securely throughout the building. Located in Warsaw, Poland, Varso Place is HB Reavis’ latest development and most ambitious project to date. Designed by world famous British architects, Fosters + Partners, it comprises three buildings in a 144,000 square meter area. The project’s showstopper is the fully glazed 53-storey Varso Tower standing at over 310 metres tall. The mixed-use site features prestigious office and public spaces on ground levels, including shops, restaurants and an observation deck at the top of Varso Tower. Due to the size and scope of the project, HB Reavis a renowned international workspace developer - sought a single access system for the entire building so that every tenant would have a simple, easy-to-use, one-stop solution for security management. It wanted to move away from tenants having to use a traditional keyfob or card-based solution and rather implement a high-tech system that also allows for the management of digital credentials using smartphones as a primary form factor. The solution of choice included HID Mobile Access and mobile-enabled readers from HID Global which 10 | April 2022 | IN SECURITY

are equipped with Bluetooth® Low Energy (BLE) and Near Field Communication (NFC) technologies, as well as a Software Development Kit (SDK) that integrates with HB Reavis’ More App. The app covers all building services from concierge services, events, room booking systems, car or bike sharing and, of course, easy access when people enter and exit and move around. As the SDK can be developed and upgraded over time as requirements change, HB Reavis is able to maximize the long-term benefit of mobile security. The mobile, contactless solution – which supports Android and iOS-based smartphones - has been particularly beneficial during the COVID-19 pandemic as it minimizes surface contact and the human-to-human interaction that is typical when issuing and managing physical cards and keyfobs. “Not only does mobile access provide state-of-theart security control, there is no need to remember to take a pass with you when you leave home or move around the building. When security is based on the phone, it is frictionless because people always have their phones with them,” said Jakub Kacer, Security Manager at HB Reavis. With the support of HID Global, HB Reavis can ensure a seamless access control solution that enhances the user experience for tenants and employees at Varso Place who access the building’s facilities every day. Click here to learn more about HID Mobile Access.


More Than Access Control Beyond feature rich access control, Maxxess eFusion software delivers the benefits of a full security management platform, without cost or complexity. eFusion integrates video, fire, intruder, and building systems, plus site specific applications from more than 60 leading technologies and brands off-the-shelf.

www.maxxess-efusion.com Europe Maxxess Systems Europe Ltd United Kingdom +44 (0) 1344 440083

Middle East Maxxess Systems Middle East United Arab Emirates +971 (0) 509467717

North America Maxxess Systems, Inc. United States +1 (714) 772 1000


The Keyholding Company relaunches emergency and temporary guarding service in response to shortages in the labour market The Keyholding Company, the tech-enabled security services provider, has today announced the relaunch of its emergency and temporary guarding service which gives guarding and facilities managers a “subs bench” of SIA-licenced guards they can call on as cover for holiday, sickness, vacancies and unplanned absence. Designed to support both direct clients and clients serviced through channel partners, this renewed focus comes in response to the current nationwide shortage in trained security officers caused by COVID-19 and other industry challenges that have decimated resources. The Keyholding Company offers security services across the UK using a network of 200 highly accredited local security companies. This model extends their reach to a greater pool of talent than any other nationwide supplier, with access to circa 11,000 officers who are on hand to step in at short notice. Solutions Director, Sean Hargreaves noted “Direct clients and guarding suppliers we have supported with mobile security for years are finding it increasingly difficult to ensure consistent coverage of full-time guarding positions. In the past it was possible to find resource to provide cover last minute, but now it’s a constant source of stress. Plus, when they can find the guards there are concerns about reliability, with many managers being let down at the 11th hour.” The company has successfully introduced their improved service offering to become one of Next’s preferred suppliers for emergency and temporary 12 | April 2022 | IN SECURITY

guarding. According to Dale Weatherson, Regional Loss Prevention Manager for Next, “The Keyholding Company has proven on multiple occasions to be a consistent, reliable source for quality temporary or emergency security guards. Having a trusted partner to provide competent security support when we need it most saves time and effort spent trying to find cover. I highly recommend them to anyone looking for additional support.” The Keyholding Company’s CEO, Charlie Gordon Lennox added, “This relaunched service transforms the way we are delivering emergency and temporary guarding. Adding a scheduling team, building new online management tools and introducing new guarding workflows in our custom-built workflow app ensures we can offer reliable, trained guards quickly.” Managers can also benefit from The Keyholding Company’s focus on technology. As with any service offered on-demand from the company, clients can place a guarding request online through their client platform. Job requests are then published to the network and the job is won by the first approved partner to accept it. This online process ensures rapid job delivery, clear audit trails and job status monitoring. An experienced account management and dedicated scheduling team then ensure clear briefing and consistent delivery. To learn more please visit The Keyholding Company’s website for more information.


Mayflex appoints Simon Steer as Director of Sales for Security

Mayflex, the distributor of Converged IP Solutions, has appointed Simon Steer in the role of Director of Sales for Security. Simon has extensive experience in the industry having previously worked for Indigo Vision for the last 10 years, where his last position was Sales Director covering the UK and Ireland and prior to that he worked for an installer for 8 years in the security industry. Ross McLetchie, Sales Director at Mayflex commented, “We are delighted to welcome Simon to the team, he has good technical knowledge and commercial experience and great leadership qualities which will all be crucial for driving our continued growth of our security focused business.” Ross continued “Simon will be leading our external security team with a focus on the UK and he will be working closely with our security vendors to continue

building our close relationships with brands such as Avigilon, Axis, Hikvision, Milestone, Mobotix, Paxton, Suprema and Wavestore to name but a few.” Simon commented, “I’m very much looking forward to being part of the Mayflex team, it’s a business that has continued to grow and evolve and one that puts the customer at the heart of everything that it does. I’m excited about getting to know my team, the Mayflex associates and most importantly getting to know and support our customers.” Ross concluded “In the first few weeks Simon will undergo a comprehensive induction to bring him up to speed on everything that is Mayflex and particularly around our security business. For further details on the full range of security products distributed by visit the Mayflex website IN SECURITY | April 2022 | 13


Quanika and CIE UK distribution agreement to deliver advanced security integration projects Deal signed at The Security Event to give users complete security and site management solutions encompassing best-in-class brands and technologies Specialist audio, video and security distributor CIE Group will deliver a new generation of powerful, silo-free security and site management solutions – including best-in-class video and access control from Axis Communications - following a partnership deal with Quanika, formalised at The Security Event (Birmingham NEC, April 5, 2022). CIE, which has built a reputation for high level design-and-build access control solutions, will extend its offering via Quanika to include a range of leading brand integrations in security, life safety, building controls and broader corporate systems – all operated from a unified management platform. The distribution agreement covering the UK will focus on sectors including retail, leisure and hospitality, offices and commercial property, healthcare, light industrial and the education sector. With a rapidly growing user-base globally, Quanika technology is enabling a new generation of security and site management solutions that leverage the power of enterprise identity services – including Microsoft’s Active Directory - helping customers to operate their sites more efficiently in increasingly competitive landscapes. “Quanika fully integrates with 2N’s leading IP access control & door intercom range, where CIE has built a market leading reputation, and allows us to seamlessly link other third-party access devices, video monitoring and online payment brands including 2N, Assa Abloy, Akuvox and HDI,” says Steve Collin, CIE Group Sales 14 | April 2022 | IN SECURITY

Director. “Our customers will also benefit from the full range of Axis Communication’s video technology and Quanika’s unrivalled ability to adapt and customise solutions and rapidly develop new features, function and integrations whenever they are needed.” Quanika Enterprise combines advanced access control functionality with the ability to manage video surveillance and wider building management systems to give organisations multi-site management and control from a single user interface. VisitorPoint synched with Active Directory gives organisations complete identity and access management to manage their staff, contractors, and visitors under one single umbrella giving them the flexibly to adapt to the latest security, safety, and operational requirements. “Greater user convenience, more positive visitor experiences, and advances in overall efficiency are now vital for organisations looking to adapt to economic stresses by improving working conditions and staff retention,” says Quanika Sales Director, Phil Campbell. “Customers in almost every sector looking toward a ‘single pane of glass’ to streamline their operations, improve efficiency and care for their people with frictionless access and a smooth experience every time they arrive at a site,” adds Phil. “We are delighted to be working with CIE to deliver on these priorities with complete security and safety solutions and the ability to quickly integrate new systems and devices to meet site-specific challenges.” For more information on Quanika solutions go to quanika.com and for CIE Group go to cie-group.com


500

DO YOUR BEST WORK One of the most versatile work utility vehicles on the market, the Carryall 500 has the power to replace pickup trucks at a fraction of the cost. With a rustproof, aircraft-grade aluminum frame, and cargo box, along with best-in-class ergonomics, the Carryall 500 is the perfect solution for your industrial and commercial jobs.

www.clubcar.com info@clubcar.com


Phone as a convenient access card Modern access control means convenience, for both security managers and building users. Today, when modern door readers detect an access card, they tell the system who is accessing, which door and record the time. System integrator Visma Megaflex just introduced a powerful new convenience in their systems: the option to use mobile phones to enter. Mobile phones provide a sensible, convenient platform for securely storing digital access credentials because everyone keeps their phones with them. Additionally, mobile phone locks, whether fingerprints, keywords or security patterns, can strengthen security further. Mobile phone access doesn’t just simplify building entry. It also greatly streamlines system management and enhances information security. How so? Mobile access IDs are also simpler to manage for temporary users like maintenance personnel. Once a visit ends, removing their ID from the system only takes a couple mouse clicks. With building maintenance work often performed outside office hours, it also becomes easier to pre-define and send such temporary mobile privileges in advance. “Our customers save time and resources, since they don’t have to handle and deliver physical tags on site, explains Visma’s Sales Director, Kari Kuittinen. Visma Megaflex deploys Idesco’s 8 CD 2.0 MI readers in their system. These also read traditional MIFARE DESFire tags and cards, in addition to mobile IDs. Idesco designed its mobile IDs to integrate seamlessly into systems where physical tags are also managed. Administering these mobile IDs inside Megaflex’ system is the job of Idesco ID service. Idesco ID lets Megaflex 16 | April 2022 | IN SECURITY

customers manage their mobile IDs from within the Megaflex system. Best of all, since no user data is transferred or resides in external cloud services, user privacy is protected. “We chose Idesco as supplier, because the priorities of solution quality and understanding the customer is embedded in everything they do. It mirrors the same values we imbue our own work with every day, so cooperation is easy and feels natural with Idesco”, reflects Kari Kuittinen. Visma Megaflex is strongly future-oriented in developing their access control solutions. “As a software house, we provide data-secured solutions intended for ongoing development. Integrating access control with other processes such as HR systems, is already an everyday business. In the future, we will focus even more on providing our customers the data they need to support their different business operations. In this area, we are committed to being an agile operator. Due to the rapid development of access control technologies and tools we foresee continued tight cooperation with both Idesco and our customers”, concludes Kari Kuittinen. With more than 30 years of experience, RFID technology pioneer Idesco Oy makes RFID readers, mobile access solutions, transponders, controllers and touch screen devices for customers worldwide. Every day, our devices collect data and enhance security for a variety of access control, vehicle identification, logistics and inventory control systems. For further information please visit www.idesco.fi


Securing the perimeter of airports by Simon Barnes, Genetec Physical security breaches at airports are detrimental to airports, airlines, and passengers alike. Security incidents can cause everything from delays and inconvenience to financial losses. For example, in the UK, drones entering the airspace of London Gatwick forced the entire airport to shut down, costing the organisation over £1.4 million. On another occasion, flights at London City Airport were disrupted for 6 hours, as nine protesters gained access to the runway and chained themselves together. Many organisations are now asking how they can effectively protect their perimeter and prevent similar events from happening in future. The answer is to deploy a unified security system and then incorporate new technologies as part of a more comprehensive perimeter strategy to enhance or upgrade any existing sensors. Deploy a unified system An open-architecture, unified security platform provides greater ‘correlative’ situational awareness for security and operational personnel. By implementing an open architecture security system, operators can unify their existing video surveillance, access control and license plate recognition to better protect and manage the passenger terminal, tarmac and perimeter. With a unified system, security personnel can make critical decisions quickly, improve response times and minimise the time wasted by monitoring disconnected systems and devices individually. Incorporate new technologies There are constant innovations coming to market to improve intrusion and perimeter protection, including, radar, fence detection sensors, buried cable detection sensors, LiDAR, and even video trip-wire analytics. But knowing that something is about to breach a perimeter doesn’t tell you whether a threat is real or how serious it is. The ability to see who or what is approaching a perimeter helps security personnel make the right decisions on what or if actions need to be taken. Assessing an incident at a fence or other restricted area is made easier when security personnel have eyes on the scene. By classifying threats visually and pulling relevant data from multiple systems, security personnel can identify if it is a real intrusion requiring immediate action. Effective video surveillance, using high resolution cameras and infrared, can help operators better respond to events. With strategic configuration, the first line of perimeter detection at the fence will prompt alerts that trigger cameras to automatically pan-tiltzoom into the target area for visual identification and even constantly track a target. Live and playback video surveillance can be displayed at multiple security

monitoring centres, or even as a mobile alert to security personnel smart phones, for immediate verification and response. Physical Identity and Access Management Systems add another layer to the process by connecting access control to business systems, including human resource directories. This interconnectivity allows organisations to automatically assign or remove access to restricted areas and systems based on corporate policies. As employees leave or change roles within an organisation, their access to sensitive areas can be adjusted to reflect changes in the HR directory, certification status, or other linked systems. The importance of managing data As organisations deploy more and more sensors at the perimeter, they increase the amount of information coming in. This can become overwhelming for security personnel, especially when they must actively monitor all the input from these sensors to identify specific threats. A unified security system that supports greater automation can help. Automated alerts, alongside digitised standard operating procedures that guide personnel step-by-step on how to respond to events, can help ensure that possible threats are identified, investigated, and resolved in a timely and consistent manner across different shift patterns and individuals. In some cases, a potential security threat can be difficult for a person to spot. For example, an operator might not be able to connect the dots between a contractor unexpectedly entering a restricted area and a device activating. But a unified security system could easily correlate those events and quickly flag them, automatically alerting the operator to investigate further. The ability to fuse event data is also important for ensuring perimeter security. Operators must be presented with current events as they occur in order to make informed decisions based on threat levels. A unified security system provides greater situational awareness for operators by giving them the ability to fuse together reports and alerts from all sources on the platform. This is critical as it allows an emerging situation to be seen from all parts of the system as a single event rather than a series of separate incidents. Closing thought When it comes to protecting the perimeter, you need to a layered approach that will allow you to extend security beyond the fence line. By selecting a unified system that can incorporate a wide variety of technologies, you can better secure your facilities today and in the future. Find out how Genetec can help here

IN SECURITY | April 2022 | 17


Take control of your buildings security from anywhere with

Incedo™ Business Cloud The future proof access control platform that offers flexibility and scalability. All your security needs controlled from anywhere. Incedo keeps everyone moving. Together Download a free introductory guide campaigns.assaabloyopeningsolutions.eu/incedo-business-cloud

ers l l ro nt o C Reader modules

Wired readers

Wireless door locks (Aperio)

Wireless locks

USB readers

Digital cylinders

Desktop updaters

Biometrics

Wall updaters

Mobile keys

Video & Audio intercom(s)

Smart keys API eg. Alarms, CCTV etc

Cards & Tokens

ls tia en ed Cr

rs ramme Prog

Cluster controllers

3rd P a rty already available

ers ad Re

Gateways


Mul-T-Lock scores at Headingley Stadium

Mul-T-Lock’s high security MTL500 patented cylinder system has been installed by MB Locks across hospitality and stands at Headingley Stadium, as part of the prestigious club’s investment programme to achieve strict test match and super league dual criteria. Headingley Stadium is a double-faced sports stadium that works seamlessly for both Yorkshire County Cricket Club and the rugby league club Leeds Rhinos. The unique concept of the jointly owned stand is undergoing a significant £50 million investment programme over a twenty-year period, involving architects and designers coordinating with different needs and security aspects. Mul-T-Lock worked closely with EM-B, part of the MB Group, from the initial design process, working in partnership as technical design consultants for door hardware, and checking compliance across the premises, with a focus on hospitality and stand security, to bring the project together. To date, over 250 MTL500 cylinders have been installed on a master key suite, providing high-security protection and flexibility to accommodate the different access control requirements across the stadium complex. Says Rob Oates, Commercial Director at Headingley Stadium: “We have, and continue to invest, a significant amount to ensure Headingley Stadium meets the strict criteria for both test cricket and Super League rugby. We need to ensure every level of detail is commissioned to be as secure as possible both now and in the future, without compromising on aesthetics and finishing styles.” “MB-Locks, together with Mul-T-Lock, demonstrated the advantages of MTL500, and I was especially impressed with the flexibility of the master key system and its ability to incorporate all of our key access requirements. Cont/d… “MTL500 master key suite is now installed in the

stadium’s hospitality areas and stands, with minimum disruption to the dual ground operations.” Mul-T-Lock’s MTL500 is the first cylinder in the UK to be supported by a unique key authorisation magnetic strip card. This card must be presented to a registered MTL500 locksmith before any additional keys can be supplied to ensure tight control of key duplication. Philip Goldberg, Managing Director of MB Locks added: “The Headingley Stadium is a unique challenge, as both the Leeds Rhinos Rugby League Club and Yorkshire County Cricket Club have very different needs and requirements for the project in terms of security, accessibility and aesthetics. We worked on both sides of the stand including boxes, changing rooms, hospitality areas and concourses; a complex brief. “The benefit of working with Mul-T-Lock is our longstanding relationship, meaning that the specification could be quickly translated with the technical and sales team to design a master key suite, using MTL500 as a protective opportunity to meet the requirements. It can provide the ultimate in security, but also it offers a high-quality access control system with a huge number of useable combinations.” Lee Mitchell, Mul-T-Lock regional sales manager concluded: “The specification for Headingley Stadium, especially for the hospitality areas was exceptionally high. And this all had to be considered with top levels of security and access control for corporate and players’ entrances. “Mul-T-Lock worked with EM-B Locks to deliver the tailor-made solution that could accommodate the different access requirements, all without compromising on aesthetics or security. All ultimately operating off the high protection MTL500 master key system to offer the highest level of patent protection throughout the dual stadium premises.” For further information visit www.mul-t-lock.com

IN SECURITY | April 2022 | 19


One simple door upgrade ensures a home office is private and secure Has the growth in working from home (WFH) outpaced our ability to keep a home office environment secure? Hybrid working — combining WFH with on-site attendance — grew steadily in the decade up to 2019*. It is now here to stay: One-quarter of the workforce in Finland, for example, principally worked from home in 2020, according to one study**. However, many repurposed domestic spaces are not equipped with the security or privacy WFH requires. “In many organizations, the convenience and productivity advantages of home and hybrid working are significant,” says Lars Angelin, Business Development Manager, Aperio & Code Handle at ASSA ABLOY Opening Solutions EMEIA. “WFH will remain — at least for some employees, some of the time. In these cases, the security of the home office needs attention.” Why lock your home office? “Home security for hybrid workers does not begin and end at the front door. A domestic workspace requires security of its own. After all, not every houseguest should be reading next quarter’s confidential company data!” adds Angelin. Privacy is another key concern, whether to make important video calls or have a sensitive conversation. Commercial security is always desirable. In many sensitive industries, it is required by law. “Cybersecurity is usually down to the employer,” says Angelin. “However, the physical security of documents, data and conversations is the responsibility of those who choose to continue working from home.” The most elegant, seamless way to put an effective barrier between your residence and a home workstation is with a Code HandleÒ digital door lock.

20 | April 2022 | IN SECURITY

Simple to fit to almost any interior door Code Handle is a locking handle with built-in digital PIN keypad suitable for most lock cases and door types. A secure 4- to 6-digit PIN ensures only authorized people enter the home office. There is no need to use or keep track of a key. At the end of a day, homeworkers don’t even need to remember to lock their office: Code Handle locks itself when the door is closed — and for safety, allows simple, code-free exit from the inside. Installation is simple: A homeworker can simply swap their existing door handle for a Code Handle. Fitting takes just two screws: It is easy even for nonspecialists, and also straightforward for any domestic locksmith. In an ASSA ABLOY competition to find the fastest Code Handle installation, the winning entry took just 26 seconds. To power the lock’s digital security, standard batteries slot into the handle itself. There is no need for software. Batteries typically last 30,000 lock/unlock cycles. Code Handle is already trusted at medical surgeries, retail stockrooms, flexible workspaces and almost anywhere else a private door meets a public space. It is perfectly adapted for upgrading a home study, basement, attic or spare room. “Contemporary and elegant, a Code Handle adds digital PIN security without the hassle of keys or any ugly push-button mechanical device,” says Angelin. “It is the simple, secure, convenient solution for any home office door.” To learn more about the Code Handle® door lock, download a free brochure here


Touchless Access Control Solutions. Protect your people. And their people. We’re seeing our world a little differently now. The decisions you make affect more people than ever before. And HID Global is leading the industry with touchless security solutions that protect your workforce–and their families–holistically. From no-contact secure entries and over-the-air credentialing to occupancy control and social distance monitoring, our comprehensive solutions allow you to reassure your employees and ensure a safe, secure, successful return to work. For a limited time, HID Global is offering new customers

50% OFF

TOUCHLESS ENTRY

MOBILE ACCESS

VISITOR MANAGEMENT

REAL-TIME LOCATION SERVICES

mobile IDs for one full-year subscription.

Learn more at hidglobal.com/touchless


BIOMETRICS

The chain of trust Why biometrics are central to secure access control by Vince Graziani, CEO, IDEX Biometrics

P

asswords simply aren’t secure enough in today’s digital world. With bots now able to try more than 100 billion password combinations per second, the average eight-character password can be cracked in as little as 12 minutes. Passwords have become the soft underbelly of the corporate network. According to Verizon’s 2021 Data Breach Investigations Report, three-in-five (61%) of all company data breaches last year involved

22 | April 2022 | IN SECURITY

stolen password credentials. As work becomes hybrid and digital tools continue to hold an everstronger position in organisations, now is not a time to take chances. Since the launch of the EU’s General Data Protection Regulation (GDPR) in 2018, the Information Commissioners Office (ICO) has had the power to impose a fine on any businesses that falls foul of a data breach of €20m or 4% of annual turnover (whichever is greater). Despite this, cyber-attackers are

increasingly accessing corporate networks using weak, stolen, or otherwise compromised passwords. Traditional physical access to businesses is also much easier than many would care to admit and well within the wheelhouse of a motivated criminal. Key card duplicators that clone traditional RFID access cards have been around for a decade or more. It’s not just in the traditional corporate realm where access to sensitive data is being breached


daily. In the rapidly expanding world of cryptocurrency, fraud is widespread. Just this month saw the largest ever cryptocurrency hack, as a Blockchain bridge called Wormhole confirmed that roughly $320 million worth of Ethereum cryptocurrency was stolen. Users of cryptocurrency store their funds on either hot or cold wallets. A ‘hot wallet’ is a device, such as a laptop or phone, connected to the internet. Convenient, but susceptible to digital currency heists of the kind seen this month. In contrast, a ‘cold wallet’ is external storage, like a hard drive or USB stick. A safer option from cyberhacks, but far less convenient. So users need a better solution – an accessible, security-assured ‘cold’ device . With cyber-criminals attacking from every angle, it’s more important than ever for businesses and consumers alike to build a chain of trust: ensuring only the right people have access to the right devices,

offices, and networks, at the right time. This is particularly important in high-risk industries, such as education, finance, healthcare and the public sector. But how can you make sure that those that need to access your systems and offices can do so securely without impacting their daily lives? One of the answers lies in fingerprint biometric access. The advancement of biometrics in logical and physical access Many of us already use our fingerprint to access our mobile phone. It is proven access technology. At the Trustech event in Paris in December 2021, we saw several examples of how businesses are using fingerprint biometrics in the corporate world too. Dongwoon CEO Kim Dong Cheol was just one business leader who talked about a focus on innovative applications for card-based biometric authentication. More companies are likely to embrace biometric fingerprint cards

as part of their security systems in 2022. After all, biometric smart cards have numerous use cases. They give greater protection for many different security access areas of the modern business, whether that’s building access, logical authorisation on devices, or secure networks. As the sector grows, fingerprint biometrics will surely be considered a standard approach to authentication, whether used in payment cards, digital wallets, or in digital ID applications. The future of access control is right at our fingertips The success of the Great Work From Home Experiment is largely due to increased usage of remote devices and acceleration of digital transformation. With reduced staff, hybrid working environments and the more remotely accessed digital tools comes growing security risks providing cybercriminals broader enterprise network exposure. The recent trend for converged

IN SECURITY | April 2022 | 23


physical and logical access cards presents an ideal value proposition for on-card biometrics. Employee ID cards with integrated fingerprint authentication can now be used to manage non-transferrable employee access restricted to the individual. These new generation smart access cards are enabled with both physical access protocols and mobile credentials that can be provisioned for instant onboarding or managed time-based access control. The combination of physical access protocols, provisionable user credentials and biometric identity management creates the next generation unified enterprise badge that will keep pace with the rapid increase in digital transformation. The chain of trust that fingerprint biometrics offers can be implemented to provide businesses and consumers with a far greater level of confidence in keeping their unified networks 24 | April 2022 | IN SECURITY

secure. The importance of trust While this is an excellent step forward for security, it is important that GDPR and data privacy requirements are always kept front and centre. It is also a case of trust. Both employees and consumers need to be comfortable with how their biometric data is used. To do so, businesses should be fully transparent about their plans and procedures. That way, people know what to expect and understand the benefits of biometric access. These include enhanced convenience with better security, less to carry around and securely protected user biometric data that never leaves the card. Biometric technology holds the key With working from home realities continuing to accelerate digital

transformation and device usage, the rate of data breaches continues to climb. To mitigate against the crippling impact and untold lost goodwill a breach can bring, it is crucial for businesses of all sizes to protect themselves against hackers. Cyberattack sophistication continues to rise and enterprises must act now to protect their offices, devices, and networks from attack. Where passwords and legacy RFID access cards pose gaping security holes for businesses, innovations such as biometric technology hold the key to measurable and reliable access. By enabling the right employees to log in to their devices or access secure networks via their fingerprint, companies can markedly improve their security. For further information please visit www.idexbiometrics.com


Ulisse Thermal ULISSE EVO THERMAL is the new high-performance PTZ thermal camera with radiometry functions, designed to provide a preventative 24/7 video surveillance system in critical infrastructures, transport, traffic, railways and fire detection applications.

IP66/IP67 IP68

TYPE 4X TYPE 6P

VIDEO SECURITY PRODUCTS www.videotec.com

M a d e in I t a ly


EXHIBITION REVIEW

IFSEC International 2022

T

Thousands of visitors expected at IFSEC International to discover groundbreaking security solutions

he UK’s longest-running security event, IFSEC International, returns to ExCeL London from 17-19 May 2022 with thousands of new products including exclusive launches from the likes of SightLogix, Securesoft and Paxton. Hailed as the #1 reunion event for the UK security industry, the 49th edition of IFSEC will reconnect security installers and integrators, end-users, distributors, consultants, manufacturers and key security associations in person for the first

26 | April 2022 | IN SECURITY

time in three years. IFSEC offers tens of thousands of visitors an unrivalled opportunity to meet hundreds of leading security suppliers across access control, video surveillance, perimeter protection, cyber security and more including Advancis, Dahua, Hikvision, CSL and many more, collectively showcasing the most innovative products launched since COVID--19. Visitors to this year’s IFSEC will also have a chance to see: • Live demos: Visitors can explore

how security technologies have developed and adapted over the last three years by joining unique demonstrations at the Converged Security Centre on how physical security and information technology fuse to provide a holistic solution. • Approved products put to the test: The popular LPCB Attack Testing Zone returns to IFSEC for 2022, where attendees can observe live test sessions of trained professionals from the LPCB team putting LPS-1175


approved products to the test, demonstrating the effectiveness of some of the most robust physical security equipment in the industry. • The next generation of apprentices in action: Designed to raise the profile of engineering apprenticeships and the skills on display, the UK’s next generation of security and fire engineers will be showcasing their skills at the Engineers of Tomorrow feature on the showfloor, as they battle it out to make it to the WorldSkills UK finals. • NEW to 2022 – IFSEC & FIREX Training: For the first time ever at IFSEC International, engineers and integrators will have the opportunity to attend 4–6-hour training sessions hosted by a mix of specialist training providers and leading vendors in security and fire. Taking place off the show floor, attendees can secure valuable CPD points and enhance their knowledge, with plenty of time left in the day to catch the rest of the exhibition afterwards, to get the most out of their visit. “The security industry has seen ground-breaking innovation and product development over the last couple of years, so we’re really excited to invite buyers to

explore the latest developments at IFSEC – some of which will be on display for the first time,” said IFSEC International event director Gerry Dunphy. Several exhibitors will be showcasing brand new products at IFSEC International, including: SightLogix – global launch of the SightTracker PTZ The SightTracker PTZ is being announced globally for the first time at IFSEC International; an AI-based, smart intruder tracker that follows detected targets as they move throughout a site, repositioning at speeds that have not been seen before with other PTZs, delivering critically important situational awareness over large perimeters and outdoor sites. SightLogix is also showcasing its international smart thermal camera line: • SightSensor GT is a smart thermal camera for detecting intruders at perimeters and outdoor areas with outstanding detection performance. • SightSensor GTC is a smart thermal camera for detecting intruders at perimeters and outdoor areas with outstanding detection performance, with the added benefit of HD colour visible.

Terracom– exclusive first look of QR-Patrol Terracom is launching an Issue Management functionality for its QR-Patrol and MyLoneWorkers products that will take incident and issue reporting a step further and manage it in its entire life cycle, until resolution and closure. The idea is to help companies be proactive and more efficient in day-to-day operations, which will also save them time and eventually lead to cost saving. A spokesperson said: “We have focused on giving more ways of safeguarding people through our new Safepass functionality, which consists of SOS alerts and communication for dangerous situations. Transparency and enhanced decision making have also been a priority to us; we have invested in new reports using Mobile Forms data coming directly from the field to recognize patterns and reduce incidents, created productivity metrics and efficiency reports and also integrated our systems with MS Power BI to give more flexibility to companies that already use it.” Beamagine – exclusive first look L3CA is Beamagine’s first official product and IFSEC will be its first ever commercial viewing.

IN SECURITY | April 2022 | 27


A spokesperson explained: “L3CAM is an advanced perception unit including 3D imaging, RGB and thermal imaging modes. The system includes a computer which fuses all the data modes so one can shift from one mode to another swiftly. This is relevant as far as it enables the user to apply detection software (e.g. of pedestrians) simultaneously in all the imaging modes, and thus you can remove most false alarms of automated security centrals. This also takes the pain out of software developers who want reliable data while keeping focused in their software development, not having to get involved in hardware adjustments.”

• Live Dashboard • Static/Mobile Reporting with Time Stamp & Multi-Media Capability • Billing & Invoicing • Guard Tour Solution (NFC Tags & QR Codes) • Dynamic Tracking & Geo-Tags • Client Portal • Mobile Patrol • Payroll • Leave of Absence Management • Scheduling Wizard (Static and Mobile Runs) • Assignment Creation Wizard • Dedicated Messaging • Out of Hours On-Call Contact Management • Client Monthly Performance Scorecard

Securesoft – exclusive product launch Securesoft has launched the SIA Control Room since Covid, an operations and performance management command and control platform for private security companies in the UK and this will be on display at FIREX for the very first time. Comprising of a web-based platform and mobile workflow app, SIA Control Room offers the following features: • Terror Threat Alert Updates • Real Time Guard Alerts/ Notifications • Security Licence Renewal Management • Lone Worker Voice Messaging • Digital Assignment Instructions • Security Officer Vetting • Health & Safety Risk Assessments • Operations Calendar Management

Paxton – new product showcase Paxton will launch its newest system Paxton10 at IFSEC international and will be offering live demos, as well showcasing the latest functionality of Net2, Entry, PaxLocks, and its suite of mobile apps. Andy Edwards, Paxton’s Technical Support Manager, said: “We have helped crucial sites to operate in a Covid-secure way by offering new features in our flagship systems Net2 and Paxton10. Those updates, and assisting our installers to implement them, have been vital in keeping people safer, and provide useful functionality after the pandemic ends.”

28 | April 2022 | IN SECURITY

PINTEL – new product showcase PINTEL will launch new technology that detects objects with high-speed in high-resolution frame through bitstream information

generated during CCTV encode. This technology is certified by the Ministry of Trade, Industry and Energy of Korea as a NET (new excellent technology). PINTEL will also display demonstrations of PREVAX 2.0 software and videos of actual software being applied in Korea. PREVAX 2.0 is a software with various functions in transportation and safety. Various videos will make it easier for customers to understand how to use the software. Toshiba – showcasing upgraded products Toshiba will be showcasing its S300 and S300 Pro Surveillance Hard Drives and the MG Series Enterprise Capacity Hard Drives. The team has enhanced the S300 and S300 Pro Surveillance Hard Drive ranges and expanded its capacity offerings as well as providing CMR and SMR options. It has also launched the 18TB version of its MG Series Enterprise Capacity Hard Drive and will soon be announcing the launch of a higher capacity product. An IFSEC visitor pass gives unlimited access to the entire Protection & Management Series, which includes FIREX International, Facilities Show, Safety & Health Expo and Intelligent Building Europe. To register for a free visitor (or press) pass to all five shows taking place 17-19 May at ExCeL London, please click HERE.


Bosch IP 3000i cameras. Extend smart video surveillance to general surveilance applications. Bosch all-new IP 3000i cameras offer high-quality, 24/7 performance and something never seen before in such competitively-priced cameras; built-in Essential Video Analytics as standard. Micro dome, mini dome, bullet and turret options are available with resolutions of up to 5MP for indoor and outdoor use. This intelligent solution is an industry first for general, cost-effective video surveillance. Find out more at boschsecurity.com


SURVEILLANCE

Persistent surveillance What is the next generation of surveillance for border security? By David Eldridge, Sales Director at Chess Dynamics

A

n integral part of any border security operation is robust surveillance. Be that coastal or landbased, tracking objects or people and being able to identify the absence of the normal is crucial to protecting a border or any kind of critical infrastructure. Without effective detection and identification, steps to nullify threats cannot be successful, and any protection is compromised. New advancements are enabling forces to be more agile and obtain a richer understanding of the operational environment. So, what are they, and how might their deployment provide

30 | April 2022 | IN SECURITY

an advantage? Persistent surveillance As a fundamental part of the security picture, surveillance is an increasingly innovative and forward-thinking capability area, and next generation technologies are coming online rapidly. Increasingly, operators have moved to a ‘persistent surveillance’ model. Vital to any surveillance capability is its ability to perform 24 hours a day, seven days a week and deliver persistent surveillance at maximum resolution. A 24-hour operation, regardless of operating conditions, is crucial in a dynamic environment,

such as a border, where many objects need to be identified and classified. Through technological innovations and the development of new sensors, persistent surveillance can provide long range reconnaissance for the detection and identification of potential threats for the military, civil organisations, and high value assets. But how can surveillance truly be persistent? There is a clear trend toward more integrated intelligence systems that provide more useful data for the command centre, however key to this is the management of data generated from sensors. Improving


the operational flexibility of these systems is also becoming a key factor. Systems built with open architecture are becoming more prevalent, while the ability to customise a system and swap out some elements – such as sensors or cameras - will significantly benefit the user. These early adoption trends will likely become fundamental requirements for persistent surveillance in the near future. Therefore, it’s important to consider what system manufacturers are offering and how this can support the establishment of a border surveillance capability. All about the data Underpinning any surveillance capability is the sensing technology that detects, tracks, and identifies threats. Image accuracy, resolution

and stability are the fundamentals of this capability, enabling both detection and classification of objects of interest. These three key pillars ensure that potential threats can be identified, and accurate information is shared throughout the command chain. Increasingly, operators are looking for even more data from their systems. Adding GPS, temperature sensing, barometer and range identification capability to a system provides a more complete understanding of the environment. With the proliferation of data produced by the increased use and integration of sensors, efficiently utilising the data produced becomes key to operational advantage. This is where AI comes into the picture, providing new enhancements that take surveillance

to a new level. The latest AI technology in the surveillance space, such as Vision4Ce’s DART (Detection and Acquisition, with Robust Tracking) can detect an abnormal object and accurately track it. AI technology is constantly learning and developing, and is even able to reacquire targets once lost among clutter as the tracking loop becomes tighter. This greatly reduces the burden on the operator as the system effectively filters the information and only flags objects that are deemed risks or threats or are unknown. The operator will benefit from only being notified when a threat is genuine and action needs to be taken, drastically reducing the time and effort required to operate a system and improving overall security. These AI-based solutions also help improve the

IN SECURITY | April 2022 | 31


security of a border or high value asset, as they can auto-detect a target at a much greater range than through manual and human-centric processes. Other technologies, such as augmented reality (AR) could also play a role in helping to paint an even clearer picture for the operator. AR may not be at the same readiness level as AI when it comes to surveillance, but there is huge potential in this area. While AI has a crucial role to play, surveillance specialists such as Chess Dynamics can make the process even more efficient. Not only do these specialists understand different operational environments, but they are able to configure the system to provide the correct classification of expected targets of interest. Again, this will reduce the time, effort and skill required from the operator and enable them to focus their resources on other key areas, such as the ability to deal with the threats identified by this surveillance to ultimately improve the overall security. In addition, this approach will lower the total cost of operation as fewer hours need to be spent on operating the system 32 | April 2022 | IN SECURITY

and training personnel to use it. This demonstrates how engaging with surveillance specialists can offer significant benefits to operators. Modular and flexible While technological advancements are shaping the next generation of persistent surveillance, features such as open architecture remain crucial. Modern surveillance requires innovative technology such as electro-optic systems, and with an open architecture, they can easily be integrated with technologies from other manufacturers. This enables better customisation so the system can suit the operational environment it is working in more effectively. Not only does this give the operator and integrator more freedom and a better choice of the best technology around, but it also provides the opportunity to tailor the application to suit its surveillance needs. Different applications may cover land or sea and enable benign ‘threats’ to be filtered out from the genuine ones. Having this flexibility is crucial as operational environments become increasingly complex. Moving forward, a system that can offer modular swap outs will become even more important. Systems

that can remain operational while individual sensors are damaged are not offered by all manufacturers, but they provide significant benefit to operators. Typically, if a sensor is compromised, the whole system needs to be sent to the integrator to be replaced. Enabling modular swap outs means persistent surveillance is maintained, even if parts of the system are damaged. Innovative technology is driving the next generation of persistent surveillance. Looking towards the future, with border surveillance becoming an even greater global focus, we expect to see new innovations rapidly entering service. Due to this, open architecture will continue to be essential so these technologies can be easily integrated with modular systems. With this trend likely to continue, the role of surveillance specialists will be to enable forces to reduce the cognitive burden on the operator, increase cost efficiency, and to continue to improve the overall security capability as new sensors become available. For more information please visit www.chess-dynamics.com


CONNECTING THE SECURITY INDUSTRY

3JƤGMEP 7TSRWSV

IFSEC International 2022 is your unmatched opportunity to network and do business with the entire security buying chain, discover solutions and see real products put to the test across access control, video surveillance, cybersecurity and more. Enhance your knowledge and grow your network through our series of online and in-person events.

ENQUIRE ABOUT EXHIBITING WWW.IFSEC.CO.UK

5 INDUSTRY SHOWS. 1 FREE TICKET.

This event is produced to the Informa AllSecure Standard


AIRPORT SECURITY

Airport access and security solutions Airport owners and managers are faced with an evolving set of complex access and security challenges

H

ere Mark Gore, Airport Business Development Manager at dormakaba explores how these challenges impact the passenger journey and how implementing a suite of smart access and security solutions can help airports achieve their objectives. Pas senger numbers in the UK have consistently increased in recent decades. Although the COVID-19 pandemic severely impacted the sector, the long term trend data suggests passenger numbers could reach 435 million people by 2050, up from 284 million in 2017. This is part of a wider global trend, with the International Air Transport Association (IATA)

34 | April 2022 | IN SECURITY

estimating that globally the number of air travellers will reach 8.2 billion by 2037, more than double the 4 billion passengers seen in 2017. Modern airports have implemented a range of additional security to protect the passengers, crew and aircraft from attack. Furthermore, airports play a key role in ensuring that law enforcement agencies can track and control who is entering and leaving the country. With the steady expansion of passenger numbers, airport operators must achieve streamlined movement through the airport from check-in to boarding, while ensuring that security is maintained at all times. In fact, research suggests that

passengers are now less accepting of delays at airports. An IATA survey found that 80% of passengers said they wanted to wait no longer than three minutes to drop off a bag. Similarly, 79% of travellers were happy to queue for a maximum of 10 minutes at immigration, with only 2% saying they would accept a waiting time longer than 20 minutes. It is also important to consider the ease of access and experience of people with disabilities, including those whose disability is not immediately obvious. This includes dementia, autism, learning difficulties, anxiety issues, mental health conditions and hearing loss. In addition, the UK Civil Aviation


Authority (CAA) has a world-leading Accessibility Reporting initiative that seeks to measure and improve airports’ performance with regard to the experience of people with disabilities. It assesses waiting times, satisfaction scores and the airport’s engagement with the disabled community. Implementing the correct access control and security solutions at each stage of the passenger journey can help the airport achieve all these requirements. This includes solutions for boarding pass checks into the security area, passport control, access to lounges and final boarding. The access for staff to the non-public areas of the airport also needs to be considered. Automation of these processes is an effective way of streamlining journeys and making ground staff available for other purposes. Minimising the number of manual checks helps to free up airport and airline employees to assist those that might need additional support. This is particularly important for boarding where some passengers may require assistance, especially wheelchair users or those who have issues with mobility. Furthermore, automatic immigration or passport checks means border staff have more time to carry out spot checks, monitor for suspicious behaviour and deal with any incidents that may occur. In airport lounges, automation frees up staff to focus on providing a higher level of customer service to passengers. Implementing solutions that allow for a contactless passenger journey

through the airport is something that is positively received by passengers. As well as being more hygienic, the IATA survey found that 74% of passengers said speed was the main benefit of using automated immigration gates and that 72% were positive about the experience of automated immigration processing. Solutions for each area While the different areas of the airport will have specific needs, considering the access solutions holistically and how these will integrate together helps to achieve the best possible results and streamlined outcome. Arrival at the airport Although access control systems are not generally required at the entrance, this area has a role in ensuring a streamlined and secure passenger journey as well as creating a welcoming and pleasing environment. At the check in, bag drop or pre-security gates a facial recognition template can be taken which can then be used at the boarding gate to verify that the person boarding the plane has entered the airport via the main entrances or from a connecting flight. Security Following check-in and baggage drop, passengers must move into the secured area of the airport through the security area. This requires a check of each person’s boarding pass and this has the potential to become a bottleneck, especially at busy times. Automated boarding pass control gates can provide the

solution. The specific challenges here include, preventing tailgating – more than one person attempting to get through the gate – while ensuring that people can move through the barriers with luggage safely. Automated gates with sensors capable of distinguishing between luggage and a person solve this issue, so that the gate is kept open for the appropriate amount of time. Passport Control Another area where smooth but controlled movement of passengers is essential, is passport control. All the required checks must be made on people entering and leaving the country, but as efficiently as possible to minimise waiting times and delays. When using automated immigration gates, the most important factor to consider is ensuring that invalid or forged documents are detected using biometric validation. Advances in technology means the passenger simply needs to look into a camera and the system swiftly runs checks to determine whether the person in question is the passport holder. Lounge access Lounges are an important part of the travel experience for First- and Business-class passengers, and an important revenue stream for airlines. Here, automated gates provide simple and seamless access to the lounges for those passengers. Bi-directional gates featuring a document scanner and screen facing in each direction, allows easy and flexible movement in and out of the lounge.

IN SECURITY | April 2022 | 35


Boarding When boarding commences, the flow of passengers onto the aircraft must be managed carefully and a final check of passports and passes is required to ensure that the correct passengers are boarding and prevent any unauthorised access to the aircraft. It is also important to quickly determine who has boarded to allow staff to locate any missing passengers as quickly as possible to avoid departure delays. Arguably, boarding is one of the areas where automation has the greatest untapped potential for airports. Self-boarding gates offer a fast and reliable method for document checks. Sophisticated automated systems are also able to control the speed and flow of boarding to avoid queues within the plane and on the airbridge, allowing a more comfortable and, ultimately, quicker boarding. Staff Access For efficient operation of the airport, staff must be able to move easily between the public and secure areas these areas of the airport without compromising security. Solutions such as electronically controlled security interlocks can provide a simple, secure and space-efficient solution. Access can be granted using key cards or code entry, with 36 | April 2022 | IN SECURITY

biometric verification available for high security area applications. Misuse of the interlock is prevented using contact mats and weight sensors that detect the presence of a second person. Choosing an automated system Beyond the factors already mentioned, there are other considerations when selecting the system. Automated systems must be easy to use for everyone, especially as many of the people using the gates will not speak the same language. For example, our Argus Air solutions, which have been designed specifically for airports, feature a clear colour display screen and animated LED lighting to provide intuitive user guidance. It is also important to select a product that has demonstrably very low false acceptance and false rejection rates to ensure confidence in the security of the process and minimise the need for manual checks. The solution must also deter unauthorised access, including preventing passengers from entering without presenting their boarding pass. This can be achieved via sensors that detect when the passenger has entered and exited the gate area. The gates must also be robust enough to resist attempts to force the

barrier open or move in the opposite direction to the intended flow of people. Finally, it is always recommended that airports select solutions for each area that integrate together and even operate in the same way. This makes it easier for the users and means that data can be shared across the passenger journey to further streamline the process. For example, the Argus Air range includes products designed for security areas, passport control, access to lounges and boarding management, with flexibility built in to allow specific requirements to be met. With major airports welcoming millions of passengers every year, the operators must balance the need to deliver a positive passenger experience with ensuring that security is maintained at all times. Automated access control solutions can speed up security and identity checks, allowing more staff time and resources to be dedicated to improving safety, security and the passenger experience. To find out more about dormakaba’s expert range of solutions engineered for airport environments, including self-boarding and automated immigration gates, visit www.dormakaba.com/gb-en/ solutions/market-sectors/airports


CONNECTING DESIGNERS OF SMART BUILDINGS WITH THOSE WHO OPERATE THEM

Creating smart, efficient and sustainable environments Intelligent Building Europe provides a platform to explore cutting-edge smart building technology and discover the latest industry trends. Bringing together end users, installers, integrators, consultants and building services engineers, these events provide an unmissable opportunity to connect with the entire smart buildings supply chain.

GET YOUR FREE TICKET AT WWW.INTELLIGENTBUILDINGEUROPE.COM

5 SHOWS. 1 FREE TICKET.


SURVEILLANCE

A smart guide to access control cards

N

How you can benefit from Smart card technology without being tied to one manufacturer

eill Williams, Director of Smart R Distribution, explains how end-users looking to upgrade their Access Control system, can do so by enhancing what they already have, rather than ‘rip and replace’. “You have to know the past to understand the present.” Carl Sagan The main objective of this article

38 | April 2022 | IN SECURITY

is to raise awareness as to how end-users can be in control of the future of their system by having ownership of the ‘keys’ built into the Access Control cards. Before explaining why and how this is achievable, I believe it would be useful to take a brief look at how card technology has evolved over the last 40 years or so. In the beginning there was Magstripe Access Control card and reader technology. At the time of its

introduction it had a ‘wow’ factor with many impressed that for the first time, a person’s access credentials could be loaded onto a plastic card and this could be done by an installer, systems integrator or the end-user. The card, however, was poor from a security point of view as card duplicators quickly became available online, enabling anyone to overwrite or copy a card. In the 1980’s there was a big move towards using Wiegand cards


because they offered a far higher level of security with proprietary encoding formats, i.e. the way that data is laid out on a card. An open format using 26 bits of Wiegand data was adopted as the de facto standard, but with access control system manufacturers looking for higher security reserved Wiegand formats of their own which were only sold to the system manufacturer who reserved it. Wiegand technology was almost impossible to build in the first place, let alone copy and were more reliable in terms of reading a card swiped at any speed. However, the complexity of manufacture carried a penalty of lead times of up to 6-8 weeks and there were often gaps in the number range with cards failing at the point manufacture. Wiegand swipe cards were replaced as the technology of choice by Proximity cards because, as well as being more secure than Magstripe, they were also much more convenient to use and could be programmed to order and supplied within 2 weeks. They provided very reliable reading without having to swipe a card through a reader and with no batteries in the cards, they were also very reliable and offered

longevity. With the expiry of some of the patents relating to Proximity card technology, we arrived at a situation where any manufacturer could produce compatible cards and readers. Furthermore, without the protection of patents and with the data being stored ‘in the open’, cards could easily be cloned. The criminal fraternity, for example, could perform a ‘man-in-the- middle’ attack and capture data by standing between a card and a reader, with the data, (i.e. the card’s ID number), being rewritten to another card or simply replayed by using some electronics. Although card cloning can be an issue, it is widely accepted that for building security purposes, the best way to combat the threat is to use a second factor of authentication, e.g. a PIN or some form of biometric identification. Contactless smart cards With processing power becoming much faster as well as cheaper, we saw the development of contactless memory cards which are more commonly known as contactless Smart cards. These require a key to be embedded in the card and reader, which offers a real security

improvement over the traditional ‘Beep and Click’ of proximity. At the same time that the Access Control industry was embracing advances in technology, the ability to carry stored data on a piece of plastic was also being adopted by other market sectors and in particular, transport in terms of fare collection and ticketing. Hence the development of the MIFARE® card, which was designed as an electronic bus ticket and having recognised the potential for its wider use, the International Standards Organisation (ISO) decided to introduce a number of standards covering the technology. The consequence of the introduction of these standards was that much of the proprietary nature of Proximity Access Control technology, (and Wiegand before it), which was based around the card formats, became virtually redundant. This was because anybody could now write virtually anything to a MIFARE® card, (or the now more advanced MIFARE® DESfire® card), as long as they followed the ISO standards. CSN reading Vs Programmed cards The standardisation, however, also gave us the Chip Serial Number or CSN, which meant whenever a card

Your secured card

IN SECURITY | April 2022 | 39


of new cards, as they have not had the option to seek out an alternative supplier.

Neil Williams

came within range of a compatible ISO 14443 reader, it would give out its chip serial number. This arguably makes it less secure than a Proximity technology based card, because if you can read it, you can copy it! Contactless smart card technology was never intended to be used in this way. It was instead designed to have information in a sector of the card protected by secure keys and on the basis that if keys within a reader do not match the keys in a card, you would not be able to see the information, thus making it very difficult to copy. Unsurprisingly, hackers soon realised they could easily copy the chip serial number of a MIFARE® card and so the technology does not offer any improvement in security compared to Proximity. With Proximity technology you get a fixed site code, standardisation on the card format and a sequential card number. This is often printed as a matching number on the outside of the card and so you always know which ones are which and can enrol cards in sequential batches, without having to present each card to a reader. Although therefore using unprogrammed cards with CSN is cheaper, it’s much less convenient and issuing cards is certainly more time consuming if the CSN is not printed on the outside of the card. This is because every card has to be individually presented to an access control reader in order to capture the CSN and then allocate it to a person who is being authorised to use an 40 | April 2022 | IN SECURITY

Access Control solution. It should be noted that there are two different sets of MIFARE chip serial numbers. The first are 32-bit serial numbers which, with limited number of possible configurations, have been repeatedly used by different manufacturers and as a result have become known as nonunique IDs (NUID). The second are a longer 56-bit Unique ID (UID) set of chip serial numbers, which offer billions of possible combinations of serial numbers. Don’t be held to ransom – Own your own keys! Access Control manufacturers and system integrators of Smart cards and readers have developed proprietary card and reader programming which further enhances the level of security and in this respect, they supply their cards with proprietary or custom keys. It is important to note that if you use cards with proprietary keys, you will only be able to order additional cards from the same manufacturer you originally decided to work with, whilst if you buy cards with custom keys, you will have to continue buying them from the original system supplier. Simply put, having invested in a specific manufacturer’s readers and cards means that going forward you can only expand the system by ordering additional readers or cards from the same supplier. As a consequence, recent chip shortages have seen some end-users having to wait up to 11 weeks for delivery

How to free yourself from being tied to one supplier? Installers of Access Control systems will have end-user clients currently using either Magstripe, MIFARE® or DESfire® cards, as well as those just using basic barcoded cards. Whichever cards they may be using, there is a solution available which harness a combination of existing technologies which will read and capture the data on each card presented to an existing end-user’s reader. The solution will then interact with a reader/writer which will write the captured data to a replacement card, but with the end users own keys. The solution will also facilitate the addition of unrestricted keys to existing cards for those end-users who for whatever reason, do not wish to continue working with the original Access Control solution provider, but have a need to upgrade or expand the system. With the unrestricted keys sitting alongside non-proprietary or custom keys, the cards will be recognised by both the existing readers and any new readers sourced from another manufacturer, without the need to totally re-enter the IDs and credentials of everyone on the database. We expect installers, system integrators and their end-user clients, regardless of the size of their existing Access Control, to be interested in this solution. However, it is likely to be of particular interest to businesses who employ large numbers of people, as it will allow them to replace existing readers at their own pace, as well as avoid the cost of having to buy and program new cards and with the added bonus of no plastic waste. As the chips in the cards cannot be recycled, continuing to use the same cards also avoids wastage of natural resources. Want to know more? Speak to your card supplier or for further information please visit www. smartrdistribution.com for free, no obligation advice on moving to owning your own keys.


Increase safety on the factory floor? Get a head start with AI video analytics. Visit the Azena Application Store: the largest open platform for IP cameras. Offering groundbreaking software that runs on different models and integrates seamlessly with third party systems. Letting you benefit from AI video analytics – whether optimizing new cameras or retrofitting existing ones. The range of ready-to-install apps extends beyond security and safety; adding value to operational intelligence, automation, or process control in such industries as healthcare, manufacturing, retail, transportation and traffic. Release the power of AI video solutions.

www.azena.com

Start with a free trial Our free trial program is an easy way to test our solution with our support – no strings attached.


CYBERSECURITY

IT Security What you need to know! By by Jack Rosier of QMS International

W

e’re living in the age of computers, with technology playing a more important role in our lives with each passing year. With the pandemic acting as a catalyst for increasing digitalisation, 2022 is likely to see more technology usage than ever before - so businesses need to make sure they’re prepared. Embracing technology has been great for us as a global community in many ways. For example, it has

42 | April 2022 | IN SECURITY

enabled people and businesses to almost seamlessly shift to remote or hybrid working models, with a plethora of collaborative software to utilise. However, this can be a doubleedged sword. The more technology organisations interact with, the more opportunities for cyber criminals to launch cyber-attacks. At the beginning of 2021, QMS International carried out a cyber security survey among businesses and 75.7% of the respondents

reported that they now felt more open to attack. Another 10% reported that they had no confidence in fending one off. This stresses the importance of understanding what good IT security looks like and how you can protect your business, employees, clients and stakeholders from dangerous and costly cyber-attacks. If organisations and individuals are aware of best practises and show due diligence in cyber security protocol, there is minimal reason to worry.


In this article, the experts at QMS International take you through potential risks to IT security in 2022, upcoming changes that might affect businesses, and best practises to implement to ensure cyber operations are completely secure. Ransomware The Chief Executive of the UK’s National Cyber Security Centre, Lindy Cameron, has warned that ransomware is “the most immediate danger to UK businesses” and all organisations could be at risk of cyber-attacks through the use of ransomware. According to an analysis of reports made to the UK’s Information Commissioner’s Office (ICO) by CybSafe, the number of ransomware incidents in the first half of 2021 doubled compared to the number reported in the first half of 2020. Ransomware is a type of malicious software which cyber criminals deploy on an unsuspecting person’s computer network in order to encrypt their files. If a cyber-criminal is successful in doing this, it enables them to extort

the victim into paying large fees to decrypt their files and make them accessible again. Nowadays, most people tend to have their data backed up somewhere, whether it be on an external hard drive or on the Cloud. Most cyber criminals have clocked onto this and now threaten to release stolen files online. This same threat has also been used on those who have refused to pay the criminal. Often, cyber criminals will target customer service and HR teams as they are easily reachable employees who hold information valuable to the cyber-criminal. It’s absolutely crucial that organisations ensure they’re well equipped to prevent ransomware attacks in the coming year, and make sure all employees have a fundamental understanding of how to spot and avoid potential ransomware attacks. Spear phishing With the pandemic forcing people to adopt new technologies, cyber criminals have been using different methods to carry out their attacks.

One method that seems to have gained popularity has been spear phishing. Spear phishing is a type of digital communication scam that targets a specific individual or organisation. It’s designed to trick unsuspecting victims into clicking a link and willingly giving away their credentials. Unlike conventional phishing, which is a broader approach to the same goal, spear phishing is a lot more personal, and can be a lot more deceiving. In order to prevent spear phishing attacks, organisations should create filters which flag incoming emails as either internal or external, which allows the recipient to see if somebody is trying to trick them. Additionally, organisations should ensure employees are educated to understand what spear phishing is and how it can be prevented. This information can be simply delivered through eLearning on cyber security. Remote or hybrid working Over the past two years, the various lockdowns and a shift in attitudes has led to businesses adopting mass

IN SECURITY | April 2022 | 43


remote working or moving into hybrid working models. Now, in 2022, it’s clear to see that the movement towards remote and hybrid working is here to stay, with 85% of managers believing that having teams with remote workers will become the new norm. However, remote working presents a number of challenges to an organisation’s cyber security. Data supplied by Darktrace to The Guardian revealed that the proportion of attacks targeting home workers rose from 12% of malicious email traffic in March 2020 to more than 60% six weeks later when the nation was in lockdown. Risks like unsafe networks, digital file sharing, and outdated software make up part of a long list of risks that should be addressed by all organisations with remote workers. These risks should not put off organisations from allowing employees to work remotely, but instead should encourage all businesses to ensure their 44 | April 2022 | IN SECURITY

cyber security policies are up to date and cover remote working responsibilities. Training employees, carrying out risk assessments, making sure workers are using secure connections, and introducing robust information management frameworks will all help protect your business during hybrid or remote working. Create a culture of IT security From larger businesses to SMEs and start-ups, creating a culture of security is one of the most effective ways to protect your business against all types of cyber-attack in 2022 - and you can do this through ISO 27001 and ISO 27002. ISO 27001 is the internationally recognised Standard which provides the framework for a comprehensive Information Security Management System (ISMS). It implements 114 legal, physical and technical risk controls that allow an organisation to carry out robust information management.

It’s set to be updated in the coming months to reflect the current challenges to an organisation’s IT security - making 2022 a great time to put in place a futureproof framework to protect your business. Another Standard receiving an update in 2022 is ISO 27002 - the code of practice for an ISMS, which provides details on the requirements and controls in ISO 27001. Again, this update will make sure ISO 27002 reflects and addresses the current challenges businesses face in relation to IT security. Adopting the latest versions of these Standards is a great way to give your business all-round protection in 2022 and beyond - so you can reassure your stakeholders and clients, fulfil your legal obligations, and keep your information secure at all times. For further information please visit www.qmsuk.com


ARE YOU MISSING SOMETHING?

@psimagazine follow PSI on Twitter for news, views & comment

SECURITY WITH THE POWER TO LEARN Putting artificial intelligence where it’s most powerful IN SECURITY business.panasonic.uk/ai

| April 2022 | 45


DIRECTORY

The ASSA ABLOY Group is the global leader in access solutions. Our offering covers products and services related to openings, such as locks, doors, gates and entrance automation solutions. This also includes expertise in controlling identities with keys, cards, tags, mobile and biometric identity verification systems.

Innovating for a smarter, safer world by combining intelligent technology and human imagination, at Axis Communications we offer solutions based on sight, sound and analytics to improve security and optimize business performance. www.axis.com

www.assaabloy.com

azena accelerates the next generation of smart security and safety solutions through joint innovation with customers and partners. Our goal is to be the leading open platform and marketplace for smart security and safety solutions. The platform we offer is based on a camera operating system that powers cameras from various manufacturers on the market.

Buildings today don’t only provide a safe, functional place for people to live and work. They can also cater for – and even respond to – their needs, while helping them work more efficiently and sustainably. At Bosch Building Technologies, we are at the forefront of these new developments. www.boschbuildingtechnologies.com

www.azena.com

Club Car boasts nearly 60 years of industry-leading innovation and design, initially focused on golf cars and then expanding to commercial utility vehicles and personal-use transportation. www.clubcar.com

With a full HD camera and an optically stabilized, 40x zoom lens from FUJINON, two high-performance components are integrated into one system. This innovation is the result of years of experience in digital cameras and a dedication to the highest optical quality. www.fujifilm.eu/fujinon

46 | April 2022 | IN SECURITY

Hanwha Techwin Europe, formerly Samsung Techwin Europe, offers robust and reliable video surveillance products designed to meet the current and future needs of security professionals. Our cameras, video recorders and other devices are built to exacting standards which reflect the heritage of precision engineering associated with the Samsung brand.

HID powers the trusted identities of the world’s people, places and things. We make it possible for people to transact safely, work productively, and travel freely. We are passionate about helping people use a verified, trusted identity to make it more convenient and safer for them to get to where they need to go and achieve what they want to do in everyday life.

www.hanwha-security.eu

www.hidglobal.com


Maxxess Systems delivers innovative SaaS and security management software solutions that combine otherwise disparate physical security, communications, business intelligence and data integration capabilities onto one unified management platform. https://maxxess-systems.com

At Mayflex we lead the way in the distribution of Converged IP Solutions. Bringing together ‘best-in-class’ Infrastructure, Networking and Electronic solutions. We’re a growing international force, enriched by the skills, expertise and unique personalities of our people. Globally owned but with a family and local feel. www.mayflex.com

Panasonic i-PRO Sensing Solutions Corporation of America a global leader in professional security solutions for surveillance and public safety, is launching their new name, i-PRO Americas Inc., and taking a unique approach to best navigate the evolving business environment and technology demands of the professional security industry.

With over 30 years of experience, we design and manufacture marketleading security solutions for a range of buildings. Around 25,000 buildings each year are secured globally with Paxton products. Our global Head Office is based in Brighton, we have colleagues in 12 countries and we export to over 60 countries worldwide. www.paxton-access.com

https://i-pro.com/eu/en

As a trusted advisor and reliable partner, as a system integrator, service provider and a product vendor, Siemens offers energy-efficient, safe and secure buildings and infrastructure. With our people, our global footprint and our technical expertise, it's our passion helping you to create the perfect place – your perfect place.

From its inception in 2001, SALTO was created with one objective: to devise a world-class access control system that was simple to use and extremely efficient, giving users the ability to control all their access needs and secure all their doors without complex and expensive wiring. www.saltosystems.com

www.siemens.com

Transforming teaching and learning with creative solutions to engage and inspire every student. Learning’s becoming more interactive. More immersive. More collaborative. At Sony we’re working with universities, colleges and schools to create richer, more rewarding educational experiences for today’s students and teaching staff.

Videx Security is a leading manufacturer and supplier of access control systems across the UK. We are experts in the door entry market. Videx and our team of estimators, technical support and designers are focused on making and providing high quality products and support to customers. www.videxuk.com

https://pro.sony.com

IN SECURITY | April 2022 | 47


Desigo – the state-of-the-art building automation system One system for all requirements of an intelligent building

siemens.com/desigo


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.