In Security Magazine June 2023

Page 1

IN SECURITY | June 2023 | 1 IN SECURITY THE MAGAZINE WITH THE INSIDE STORY ON SECURITY HARVEST THE FUTURE ISSUE 63 JUNE 2023 FUTUREPROOFING ACCESS CONTROL WITH ENERGY HARVESTING TECHNOLOGY AND CLOUD MANAGEMENT 8 INDUSTRY NEWS Latest developments in the industry 26 NEXT GEN ACCESS Why biometrics should ‘Factor’ 38 THE BEST MEDICINE 42 PATH TO UNIFICATION Unifying physical security for a safer campus Paxton secures US cannabis facility
Connected access for smarter working Incedo™ Cloud. Flexible, convenient, simple. Digital with confidence Download the Solution Guide:

Editor Chris Hewett editorial@mebmedia.co.uk

Accounts Jay Kempisty accounts@mebmedia.co.uk

Publisher Wayne Banks +44 (0)1622 201207 wayne.banks@mebmedia.co.uk

Website and Circulation Manager Kevin Villa website@mebmedia.co.uk

Design and Production Charles David production@mebmedia.co.uk

IN SECURITY | June 2023 | 3
In Security Magazine is published 6 times a year by MEB Media Publishing Ltd 13 Princes Street
201207,
Articles and art may not be reproduced or reprinted without the express written permission of the publisher. Exclusion of Liability Although every effort will be made to ensure the accuracy of all materials published, the publisher takes no responsibility for errors or omissions. Copyright © MEB Media Publishing Ltd 2010 - 2023, all rights reserved. 38 34 26 4 Cover story - Harvest the furture Futureproofing access control 8 Product & Industry News Latest developments from the security industry 22 Is biometric secure? Exploring two scenarios by Jonas Nilsson, Fingerprints 26 Next generation access Why biiometrics should ‘factor’ in every CISO’s strategy 30 Reliable storage systems Meeting the expectations of high-resolution video 34 Physical security operations The costs of not being enterprise-ready 38 The best medicine Paxton secures US cannabis facility 42 Path to unification Unifying physical security for a safer campus Contents
Maidstone Kent ME14 1UR United Kingdom Tel: +44 (0)1622
info@mebmedia.co.uk www.mebmedia.co.uk

Harvest the future

Futureproofing access control with energy harvesting technology and cloud management

Buildings consume around 30% of the world’s energy*. Across many management functions, the growth in energy harvesting technologies promises to help reduce this consumption.

In a survey for the most recent ASSA ABLOY Wireless Access Control

Report, 90 percent of industry professionals agreed sustainability considerations would influence their future choice of access technology**. Interviewees pointed to energy harvesting as one potential solution. Powering building security devices without mains electricity should contribute to improved

sustainability performance, as well as greater cost-efficiency and reduced maintenance.

Electronic cylinders self-powered by energy harvesting

ASSA ABLOY PULSE key-based access control is one leading selfpowered access control technology.

4 | June 2023 | IN SECURITY
COVER
STORY

Operation is familiar and hassle-free: a user inserts their programmable key just like a standard mechanical lock. The power generated by inserting and turning — energy which is usually “wasted” — is instead harvested to power the lock’s encrypted electronic security.

PULSE locks are easier and faster to install than comparable electronic access technologies because they require no major adjustments to a door. An installer simply switches its existing mechanical cylinder for a PULSE cylinder.

Users enjoy the convenience. They carry one PULSE key pre-programmed with all their cleared permissions, no matter how many doors they need to open. Tim Timmins, Business development manager EAC at ASSA ABLOY Opening Solutions EMEIA, explains: “While battery life in most wireless locks is very generous, ASSA ABLOY’s new PULSE locking range addresses concerns about both this and energy use. PULSE locks are energy-harvested: their microelectronics are powered by kinetic energy generated from key insertion and turning. They offer secure, programmable key-based electronic access control without

cables or batteries.”

PULSE keys and cylinders are reusable and reprogrammable, simplifying employee or tenant turnover. Premises can equip almost any opening from the PULSE range which includes door cylinders, camlocks, furniture locks and padlocks which can operate outdoors even in harsh climates.

The unique platform-based ecosystem for managing ASSA ABLOY PULSE offers another major benefit: maximum flexibility to adapt and grow a system in the future.

Flexible cloud-based access control boosts business agility

“PULSE locks are part of the Incedo™ access control ecosystem,” adds Tim Timmins. “With this flexible, scalable access management platform, facility managers can deploy PULSE energy harvesting locking alongside other wireless and wired locking. Everything is controlled from a single software interface.”

When they choose Incedo Cloud access management, organizations can secure almost any opening with autonomous electronic locks like ASSA ABLOY PULSE, or in real time with a vast range of online wired or wireless devices. With Incedo

Cloud, security teams can manage a wide range of access points and users remotely, while maintaining complete control over all their buildings — working smarter and more effectively.

Security managers issue building users with credentials of their choice. Building users gain access via smartcards, mobile keys stored on their smartphone or energyharvesting smart keys. PULSE smart keys have an inbuilt RFID chip, so no one needs to carry two credentials.

The entire ecosystem is modular, designed for simple adoption, flexible management and easy expansion at any time and in any direction. An Incedo Cloud system can include both wired and wireless locks, all natively integrated and covering almost any application: for a handful of doors or hundreds, a startup or a staff of thousands across several locations. Add new devices and credentials as your business grows

The flexibility and scalability of Incedo ensures an investment in Incedo is genuinely futureproofed. Managers have the flexibility to roll out multiple access control technologies and manage everything from the Incedo Cloud interface.

In addition to PULSE, the award-

IN SECURITY | June 2023 | 5

winning range of Aperio devices with built-in readers provides batterypowered locking for almost any door or opening, via the Aperio wireless handle, escutcheon, cylinder, security lock or server rack lock. Aperio devices can secure almost any wooden, glass or fire door. Because they are wireless — like PULSE — installation is quick and without disruption to walls or work.

An Incedo system may also incorporate high-security doors hardwired with ASSA ABLOY Signo readers. These upgrade door and identity security without compatibility worries. Signo readers are powered by Seos, with the highest encryption and authentication standards. Each one supports almost any RFID credential and is mobile-ready when installed — Bluetooth, NFC and Apple Wallet.

A shared Seos backbone ensures all credential types may be deployed together, which makes gradual site upgrading easier. Incedo Mobile Keys work on most smart devices, including phones and watches.

The benefits of cloud access management

In any modern organization, business-critical teams want to stay in control from anywhere, at any time. This can be especially important in security, where unexpected issues are usually urgent

— or time-sensitive, at least. Cloud management keeps staff in control from wherever they happen to be.

Cloud management simplifies budgeting and reduces unexpected IT expenditure: its simple subscription model prevents nasty surprise bills for hardware or support costs. The UK’s National Cyber Security Centre suggests another benefit: cloud security services may encourage good practice and improve organizational resilience***.

Security management must be agile and futureproof; cloud access control provides this. The inherent scalability of a cloud solution offers another huge advantage for businesses which may need to expand or pivot the use of space at any time.

It helps futureproof their access management system and processes.

PULSE protects new climateconscious housing development

As a Premium Member of Green Building Council Denmark, the developer of Esbjerg’s new “A Place To” housing complex sought efficient access control to complement their contemporary style and sustainability ethos. Energy harvesting technology provided the answer.

More than 300 apartments connect with shared common “coliving” areas. There’s a cafe, fitness and yoga, a big screen, reading

nooks and workstations, communal kitchens and more. Sustainability is core to their vision. As they grow — in Copenhagen, Horsens and beyond**** — A Place To aims for the operation and maintenance of all buildings to be DGNB-certified.

ASSA ABLOY PULSE key-operated electronic cylinders now secure their apartments: “We went for a future-proof solution which was maintenance-free and where we did not have to change batteries,” explains Peter Høpfner, COO and Founder. “It was a big plus with PULSE that keys and locks are battery and cable free.”

Security administrators manage building access control in the cloud with Incedo. They can change anyone’s access permissions online. Users update their own keys at integrated door-phones or online readers. This ensures resident access permissions are always current — enhancing security and supporting A Place To’s sustainability ethos at the same time.

* www.iea.org/reports/buildings

** https://campaigns.

assaabloyopeningsolutions.eu/wacreport2021 *** www.ncsc.gov.uk/whitepaper/securitybenefits-of-a-good-cloud-service **** www.aplaceto.com/en/corporation

To learn more about Incedo™ Cloud, please click HERE

6 | June 2023 | IN SECURITY

HIGH-END CAMERA TOP PERFORMANCE LENS X

THE NEW FUJINON SX800. THE BEST OF BOTH.

With the new SX800, Fujinon combines both in one for the first time: camera and lens. For long range surveillance at the highest level with 40x optical magnification and constantly sharp images. www.fujifilm.eu/fujinon. Fujinon. To see more is to know more.

SALTO introduces face recognition access control with the acquisition of TouchByte

SALTO Systems, a global market leader in keyless electronic access control solutions, confirms its commitment to secure seamless face recognition access control with its acquisition of UK technology innovator TouchByte. TouchByte are pioneers in frictionless access control using advanced face recognition systems.

A world-leading provider of innovative smart access control solutions, SALTO Systems is committed to the use of biometric technology as the future of access control. In the past two years, it has aimed to accelerate the development of frictionless access control solutions through various strategic investments.

The digital revolution has transformed society. Entire industries have been reimagined, and our professional lives, education, and leisure time have evolved beyond recognition. Digital credentials, digital identities, and facial recognition are becoming the standard across all industries, with automatic face recognition emerging as a key technology to address the market’s needs.

In 2022, SALTO Systems acquired Cognitec, a major and growing player in the Face Recognition arena. This was already a significant move toward enhancing its access control solutions through biometrics and using face recognition technology to facilitate a frictionless smart access experience. By integrating its flagship FaceVACS algorithm, powered by Cognitec, into SALTO’s smart devices, SALTO will bring a whole new range

of capabilities to its portfolio of products to enable additional use cases in applications across several industries.

Now, that moment is closer than ever. Through the recent acquisition of TouchByte, a UK-based technology innovator focused on face recognition, SALTO intends to accelerate the development and time-to-market of the first and most advanced face recognition access control solution by realising Cognitec’s algorithm potential through TouchByte’s solutions portfolio and face management platform.

Bringing TouchByte under the SALTO Group umbrella reinforces SALTO’s commitment to innovation and the development of new technologies. “Our acquisition of Touchbyte is a natural step forward in our mission to bring innovative and cutting-edge technology to the access control market,” said Marc Handels, Chief Technology & Innovation Officer at SALTO Systems. “With our future face recognition solution, we aim to provide our customers with a secure and frictionless way of accessing their buildings and facilities.”

SALTO Systems is excited to see what the future holds for biometric technology and how it can continue to benefit its customers.

For more information please visit https://saltosystems.com/en/

8 | June 2023 | IN SECURITY PRODUCT & INDUSTRY NEWS

Introducing SALTO Neoxx G3: The ultimate electronic padlock solution

SALTO’s new Neoxx G3 electronic padlock is the most advanced and versatile locking system suitable for a wide range of applications.

“We’re thrilled to announce the launch of the SALTO Neoxx G3 electronic padlock which is the most advanced and versatile locking system on the market,” said Marc Handels, SALTO Systems CTIO. “The SALTO Neoxx G3 is perfect for a wide range of access control applications and is particularly well-suited for those outdoor deployments that need the reporting and advanced technology that electronic access delivers as well as a product with a tough exterior that can withstand extreme weather variations.”

Designed with exceptional attention to detail, this electronic padlock offers unbeatable durability and reliability, ensuring that property and valuables are kept safe and secure at all times.

Featuring a special armoured case with a doublelayered structure, the SALTO Neoxx G3 electronic padlock provides unbeatable protection against falls, shocks, and even the harshest environments or usage.

As for innovation, the SALTO Neoxx G3 integrates RFID, Bluetooth LE, and NFC technologies to provide the ultimate keyless experience and most advanced electronic locking system available. In addition, the Neoxx G3 electronic padlock features SALTO SVN data-on-card and BLUEnet wireless network capable core technologies onboard. Thanks to BLUEnet wireless advanced capabilities, the padlock can read, receive, and write information via a smart card or real-time communications over the air (OTA).

The SALTO Neoxx G3 electronic padlock also includes SALTO JustIN Mobile technology, which provides users the convenience of gaining access with an iOS or Android smart device. Users can open doors, gates, and padlocks with a smartphone or Apple Wallet with an iPhone or Apple Watch, thereby eliminating the need for physical keys.

The SALTO Neoxx G3 padlock is made of hardened steel with a removable shackle model option, which

can be completely detached from the padlock body. The cover case with a double-layered structure guarantees the ultimate protection from falls, shocks, and the most extreme environments or usage. The shackle is available in 8mm diameter and length options of 25mm, 30mm, 60mm, and 90mm. The padlock weighs 515g.

Other features include anti-drilling protection, emergency battery change, battery monitoring to optimize maintenance and battery life, optical signaling through light ring, and dual-color green/red lights to indicate access authorization, with optional acoustic signal.

The SALTO Neoxx G3 electronic padlock has been tested up to 130,000 operations on a standard set of batteries (4 x LR1) and is IP66 - IP68 rated for waterresistance, making it suitable for any kind of climatic environments, even those that are very extreme. It is also IK08 impact-resistant, thanks to the rubber-made cover that does not scratch and delivers additional protection.

The SALTO Neoxx G3 electronic padlock is the ultimate locking solution because it delivers a weather-proof solution that extends electronic access to places never before thought possible – outside on the perimeter of property, in remote utility fields, and similar places, said Handels.

“We designed the Neoxx G3 to meet the extreme demands that are found in these exterior areas but to also be compatible with the SALTO Space on-premise access platform and the SALTO KS and Homelok cloud applications,” said Handels. “Together, our solutions deliver a comprehensive access platform for any type of business. You no longer have to worry if your valuables, users, guests, residents, or visitors are safe and secure. No matter the type of facility or property, SALTO has a variety of electronic locking soloutions that improve security and can enhance operations.”

For more information or to make an inquiry, please visit the SALTO website at www.saltosystems.com

IN SECURITY | June 2023 | 9

HID launches New Seos® access security cards made from sustainably sourced bamboo

HID, a worldwide leader in trusted identity solutions, has introduced its Seos® Bamboo™ credentials made from sustainably sourced bamboo instead of PVC. The credential is part of HID’s award-winning Seos security solution and is the first in a range of physical access security Eco Cards™.

The bamboo is certified by the Forestry Stewardship Council® (FSC®), an assurance that the material comes from responsibly managed forests that provide environmental, social and economic benefits.

Recent market reports, including HID’s State of Security and Identity Report, indicate a majority of organizations rank climate and sustainability as corporate priorities. As a result, they are turning to renewable and eco-friendly materials as much as possible, in addition to reducing energy consumption and waste.

Introducing highly secure access cards made from bamboo—a renewable resource that grows quickly and requires less water and pesticides than traditional card materials—demonstrates HID’s continuous

innovation without compromising security and customer experience.

“Our journey to offer alternative options to plastic cards and badges began 10 years ago with the introduction of HID Mobile Access®—a first in the industry,” explains Martin Huddart, Senior VP and Managing Director of Physical Access Control at HID. “Seos Bamboo offers an additional option for sustainability within the physical access ecosystem, as it supports a more eco-friendly value chain in areas where physical access cards are still required.”

Seos Bamboo cards also support organizations seeking green building certifications, including the internationally accepted Leadership in Energy and Environmental Design (LEED), the Building Research Establishment Environmental Assessment Method (BREEAM®), and the Zero Waste to Landfill certification.

For more information on the new Seos Bamboo card, visit https://info.hidglobal.com/2023pacsemea05sustnb ltybambooemlecocardregistrations_LP2022.html

10 | June 2023 | IN SECURITY
Security made simple. Paxton is easy to quote, easy to install & easy to deal with. Access control, door entry & video management solutions you can rely on. paxton-access.com/training Sign up for free training Get the free Paxton Installer app The ultimate installer tool Sign up to our FREE installer training today Our smart security solutions make it easier for you to do business. Manufactured in the UK with a 5-year guarantee & hassle-free returns policy as standard. Free online & in-person training. Unrivalled tech support. If you need us, we’ll be here for you. Use Paxton access control to save energy and keep costs down this year. We want to support your business, helping you to help your customers during a difficult time. Read our new guide at www.paxton.info/5355

Mayflex continued service enhancements

Mayflex, the distributor of Converged IP Solutions, prides itself on the levels of service provided to its customers and is happy to announce several new enhancements that have been introduced or that are coming soon.

Buy Now – this offers simple, but convenient functionality that will enable customers to quickly confirm the PDF quotes with the click of a button. No additional phone call or email is required. Customers can also remove lines, choose a different delivery address and shipping method, select a delivery date up to 2 weeks in advance, before confirming their order at the touch of a button and at any time to suit them.

Delivery Time Window – next day parcel deliveries, sent out by FedEx, will now be delivered within a 4-hour window. Once the order has been routed by the FedEx Team on the day of delivery, customers can get visibility of their window by clicking on the track and trace facility and entering their Mayflex Order Number and post code of where the delivery is being made to.

For pallet deliveries made by Mobile, deliveries are made within a 2-hour window. As above customers will get visibility on the day using the same procedure.

Gas Powered Deliveries – for larger orders that require 8 or more pallets these can now be delivered via a gas-powered truck that runs on renewable biomethane, delivering an 85% reduction in CO2 emissions. All the trucks are also FORS registered to the Silver Standard.

Delivery Photo Evidence – coming soon to the Fedex parcel deliveries will be photographic evidence as part of the POD, to show the exact delivery point of your

parcel.

Enhanced Phone System – with the new 8 x 8 phone system getting through to the right person has never been easier or quicker. Customers now have a choice of an automated call back, where they will be contacted as soon as the next operator is free, rather than having to hold. The website ‘Live Chat’ is now much improved and available from 8.00 a.m. to 6.00 p.m. each working day with direct access to our sales team, as well as Customer Services and Technical Support. Communications by SMS and What’s App is also live via our Customers Services Team which will be particularly useful when out on site chasing or following up details on deliveries.

Commenting on the enhancements Martin Eccleston, Commercial Manager said “We take customer service very seriously and we understand that customers have a choice of where they buy from. We constantly monitor our service levels with many different KPI’s and our ultimate goal is to offer the best-in-class omnichannel experience, So, however a customer chooses to interact with us our aim is to ensure they will always receive exceptional service.”

Martin concluded “As a business we are also heavily focused on reducing our impact on the environment and improving sustainability, so look out in the future for more initiatives being introduced that will help us and our customers to achieve this goal.”

If you don’t already work with Mayflex then it’s easy to set up an account by visiting https://mayflex.com/customer_register

12 | June 2023 | IN SECURITY

New ASSA ABLOY Security Door Closer named Product of the Year 2023 in Germany

Fitting doors with secure escape functionality can be a challenge. Many available solutions cause leaf damage or affect building design aesthetics. Recently named 2023 Product of the Year by a prestigious German business magazine, the new ASSA ABLOY Security Door Closer with integrated escape door locking for doubleleaf door systems adds discreet protection without impacting door structure.

To win in S+B Schloss- und Beschlagmarkt’s security technology and access control category, products must convince a jury of experts by combining innovation, utility, value, design and digitalisation potential. The 2023 award follows similar success last year for the ePED® Panic Touch Bar.

“I am particularly pleased that the expert jury has awarded one of our product innovations 1st place for the second time in a row,” says Stefan Fischbach, Chairman of the Management Board of ASSA ABLOY Sicherheitstechnik GmbH and SVP & Head of Central Europe.

“This shows me that we as a manufacturer are right on target with the development of highly functional and at the same time aesthetically pleasing locking systems and technologies that offer our customers the greatest possible flexibility while also being convenient to use.”

The Product of the Year 2023 award was presented

Innovative solution for fire and escape doors, new or retrofit

The Cam-Motion® Security Door Closer with integrated latch bolt, escape door strike and mechanical door coordinator easily equips doors with an emergency exit lock, without any need to wire the door leaf.

To retrofit an existing door, drill holes for a door closer which meets EN 1154 (supplement 1:2003-11) standard are reused. Without drilling, milling, filing or grinding, the door leaf itself remains physically unchanged, which preserves door integrity, fire certification and aesthetics.

All door closers with ASSA ABLOY’s patented Cam-Motion technology open with less effort and close reliably behind everyone who passes through them. Because an installer can set separate latch and closing speeds, high closing force works alongside easy opening which helps to keep the building barrier-free.

To learn more about ASSA ABLOY Door Closers, visit https://www.assaabloy.com/group/emeia/solutions/ topics/door-closers

IN SECURITY | June 2023 | 13
to ASSA ABLOY CEO Nico Delvaux and Stefan Fischbach during April’s BAU 2023 in Munich – World’s Leading Trade Fair for Architecture, Materials, Systems.

G4S Secure Solutions (UK) has become a founder member of The Social Recruitment Advocacy Group, which has been set up to place greater emphasis on the recruitment of people who are disadvantaged in the labour market.

Social recruitment is an approach to hiring that positively impacts every part of society and the economy by moving unemployed people, who are furthest away from the labour market, into sustainable jobs. These disadvantaged groups include people from within BAME communities, young people ‘Not in Education, Employment, or Training’ (NEET), unpaid carers, ex-offenders, those in low socioeconomic groups and people with long-term health and disability challenges.

Becoming a member of The Social Recruitment Advocacy Group will underpin the ‘people’ pillar of the G4S social value programme and, as part of the affiliation, G4S has been accredited to silver status. This means that G4S can demonstrate an open recruitment policy that encourages individuals from underrepresented groups to apply for roles. In addition, G4S is required to evidence active partnerships with local and national organisations that exist to support the employability of people who face barriers in the labour market.

G4S already has a number of social value initiatives underway, working with its Social Value Partner, PeoplePlus, including:-

• The successful appointment of dozens of unemployed people into G4S roles in the last two months

• Strategic partnerships with pre-employment training providers to feed into recruitment activity and the

development of sector based work academies.

• Working collaboratively on solution design for new security bids, to evidence social value as part of the overall proposition

• Consultancy services to assist with the embedding of social value within the G4S approach to security operational delivery

• Providing mid-life services to the G4S workforce in the Northeast assisting with planning for retirement and financial resilience and taking stock of skills and health.

Bridget Brookfield, HR Director, G4S Secure Solutions

UK said “Social value is the key thread that runs through all of our recruitment activities. It is critical to our talent and acquisition strategy. Social recruitment enables our business to create long term learning and future growth opportunities through local government events supporting local, sustainable, and environmentally ethical suppliers. We are committed to improving social value to benefit local communities by supporting local people into employment and this reflects our values in maintaining a diverse and inclusive workforce.”

Over the coming weeks, G4S will be celebrating some of the individuals that have begun a career in security as a result of the social advocacy recruitment programme.

For information on G4S careers please visit www.g4s.com/en-gb/careers

14 | June 2023 | IN SECURITY
G4S announces greater emphasis on recruitment from disadvantaged groups

DO YOUR BEST WORK

One of the most versatile work utility vehicles on the market, the Carryall 500 has the power to replace pickup trucks at a fraction of the cost. With a rustproof, aircraft-grade aluminum frame, and cargo box, along with best-in-class ergonomics, the Carryall 500 is the perfect solution for your industrial and commercial jobs.

500
www.clubcar.com info@clubcar.com

BigChange job management system supports net zero drive at Atlas World

Atlas World is using the BigChange job management system to improve the delivery of smart energy metering and fire and security solutions across the UK and Ireland. Engineers with tablets running the BigChange mobile app are live linked to the back-office Service Team allowing for automated scheduling, optimised route planning and real-time tracking. The integrated system is also fuelling savings in routine administration and a reduction in the company’s own carbon footprint.

“We know from our experience and expertise that you can only manage what you measure,” commented Stephen McConnell, Director at Atlas World. “Since implementing BigChange we can now practice what we preach – measuring our performance against defined customer and internal KPIs and managing tangible improvements for our business and our clients.

“BigChange has taken us to the next level in terms of professionalism and customer service and we will continue to build on this with better communication.”

Atlas Fire and Security was established in Belfast in the 1980s. Following a series of mergers, acquisitions and management buyouts, the company has evolved into Atlas World offering a range of services including Fire and Security, Fire Suppression, Energy Monitoring and Renewable Solutions and Assistive Technologies.

A team of more than seventy staff split between frontline engineers and back-office support and management, completes around 27,000 planned and reactive maintenance visits a year and delivers nearly a thousand new projects.

Supporting the Government’s Net Zero Strategy, Atlas is currently rolling out a project to design, install and maintain automated metering technology across the

Northern Ireland Civil Service estate.

Atlas selected the BigChange job management system, which incorporates a mobile workforce app, customer relationship management (CRM), job scheduling, live tracking, resource management, job finance and business intelligence, following a rigorous selection process that involved benchmarking and field testing. Managing all aspects of the customer experience, from initial enquiry through job scheduling and reporting, to final invoice, BigChange is already delivering tangible benefits.

Atlas has completely automated the planning of routine maintenance calls and improved its ability to respond to reactive requests, and has reduced the administrative resource required to produce customer reports and invoices by at least 50 per cent.

Optimised scheduling and intelligent route planning, complete with integrated real-time tracking, means Atlas can now measure, and therefore manage, its own carbon emissions at the touch of a button and, using BigChange, the company plans to be 100 per cent paper free in the forthcoming months.

“Using BigChange we have already taken the first steps to improve our own green credentials. We expect to save approximately 300 tonnes of carbon by using the route optimiser, making our driving more efficient and saving on fuel and being environmentally friendly. We are also overhauling our customer experience, with aspirations to provide an almost Amazon style of service, with automated, yet personalised, confirmations, ETAs, completion reports, invoices and follow ups,” McConnell concluded..

To learn more please visit www.bigchange.com

16 | June 2023 | IN SECURITY

Security specialist Safetyflex secures first site in Africa

A Midlands manufacturer

and barriers has ticked off another continent on its impressive export book after securing its first site in Africa.

Safetyflex Barriers, based in Coventry, has seen hundreds of its Truckstopper anti-terror bollards installed at government buildings in Casablanca, Morocco.

The prestigious contract means the firm’s unique and cutting-edge designs have now been installed in six continents across the world in major cities.

The latest in Morocco follows a similar high-profile scheme in India, installing more than 300 Truckstopper bollards.

The Truckstopper anti-terror range utilises special military-grade steel to provide resolute hostile vehicle mitigation. Its unique patented design requires only a shallow foundation and comes in a variety of slim-line shroud options, whilst the anti-terrorist bollard can be fixed or removable.

Marcus Gerrard, Director at Safetyflex, said: “We’re the only company in the world to use this type of material for anti-terrorist bollards and barriers, and the Truckstopper has become one of our most popular ranges.

“We are incredibly proud of our strong export book

which now represents almost half of our orders, so to break into a new market in Africa is testament to the strength and reputation of our products, and shows that we are a global leader in the anti-terrorist barrier market

“This particular type of bollard is popular for public realm as it has a super slim appearance that no other company can offer, and only requires a simple shallow foundation resulting in less disruption to public footpaths and walkways, whilst the slim-line finish means it remains tough on terrorists without losing its aesthetic appeal.”

The family-owned and managed firm is rooted in Coventry but has excelled in the global market since forming out of GME Springs in 2010, becoming a market leader in anti-terrorist hostile vehicle mitigation and protecting high-profile sites from London to Sydney.

It has secured 36 patents worldwide and has won more than 15 awards for its innovation.

The company has recently announced plans to expand with new warehouse and office space in Coventry and has committed a further £1 million into research and development in its 2023/24 budget, which will be focused on furthering its crash-rated street furniture range.

IN SECURITY | June 2023 | 17
of anti-terrorist bollards
The World's Premier Government & End-User SECURITY Event 10,000+ HIGH-LEVEL SECURITY DECISION-MAKERS LIVE DEMONSTRATIONS CPD ACCREDITED LEARNING 350+ INTERNATIONAL EXHIBITING COMPANIES FIND OUT MORE TODAY! INTERNATIONALSECURITYEXPO.COM SCAN TO REGISTER NOW! FREE TO ATTEND Co-located with: International Security Expo gives security professionals from across the world the chance to come together to network, learn and discover the latest security solutions from the world’s leading suppliers. There is no better way to stay ahead of the curve and ensure you and your businesses are adequately prepared to take on current and future security challenges.

New NVR powered by VMS from 3xLOGIC redefines network video recording for SMEs

3xLOGIC, the leading provider of integrated and intelligent security solutions, has announced the availability of its innovative NVR-1U-8CH network video recorder. NVR-1U-8CH is a feature packed but cost effective device that is perfect for small to medium sized enterprises (SMEs) operating in commercial, educational, healthcare and warehouse and distribution environments that need an NVR that is easy to install, configure, monitor and maintain.

NVR-1U-8CH is a Linux OS based embedded power over Ethernet (PoE) 1U professional grade NVR. It has an Intel Celeron processor, which provides superior performance, and with 64MP resolution support users can also experience high definition video. Its large 256GB solid state drive (SSD) provides effortless working and it can deliver PoE+ up to 30W for each of its eight channels, enabling full pan tilt zoom (PTZ) control. A remote management feature also allows a user to be in control from anywhere with internet access – saving time and making operations more efficient.

‘The best-in-class features of the NVR-1U-8CH are powered by the VIGIL 12.5 video management system (VMS),’ explained Mike Poe, Director, Product Management at 3xLOGIC. ‘A powerful security server software solution that all 3xLOGIC VIGIL applications are built upon, VIGIL 12.5 has received numerous enhancements and features from the previous version including improved user control, increased performance and ONVIF-M support for analytics metadata. Furthermore, camera onboarding has been simplified and the VIGIL CLOUD plug-in for video streaming, retention and case management is built in.’

3xLOGIC believes that all organisations should have access to a state-of-the-art security solution that meets

their specific needs and protects their businesses. So in order to make life easier for SMEs, the company has also launched its NVR-1U-8CH Small and Medium Business Kit (SMBK), which combines superior video surveillance with ease and affordability.

The NVR-1U-8CH SMBK features eight IP licenses as standard, with the option of four or eight VISIX 4MP VX-SMBK-B-IW mini-bullet or 4MP VX-SMBK-D-IW mini-dome style cameras, or a combination of each, alongside an NVR-1U-8CH. VISIX cameras have a rich feature set offering convenience, aesthetic appeal and excellent performance. They are designed to be installed in a wide range of areas and climates, while dual streaming allows recording at the highest quality, while facilitating live viewing from any location. In addition, with full support for both variable bit rate and variable frame rate, each stream can be matched to available bandwidth for optimum image quality.

‘Security is just as important to SMEs as it is to larger organizations,’ concluded Poe. ‘Having listened to our customers, we have created an easy to set-up and install NVR that offers the type of flexibility they require. By leveraging a Linux OS based embedded PoE solution powered by the VIGIL 12.5 video management system (VMS), SMEs can now benefit from cost savings, reliability, convenience and powerful functionality. What’s more, the NVR-1U-8CH SMBK includes products that have all the features and capabilities a business owner needs for comprehensive security and peace of mind.’

For further information please visit www.3xlogic.com/products/vigil-1u-nvr-series-linux-os

IN SECURITY | June 2023 | 19

Amthal adds surveillance to expanding Butterfield Business Park

As part of Butterfield Business Park’s expansion plans, Amthal has fitted new columns featuring integrated wireless IP CCTV cameras and surveillance technology to offer essential peace of mind to businesses and visitors on site.

Luton-based Butterfield Business Park, managed by leading UK commercial and residential real estate consultancy, Lambert Smith Hampton, covers a total site area of 24 acres and is home to a range of highquality commercial buildings.

The park is currently home to over 20 businesses and provides office spaces ranging from 500 to 15,000 square feet, with extensive expansion planned to complete the oval design.

Amthal was selected as the security partner of choice, covering all aspects of security installation and maintenance from the perimeter through to internal business protection, including smart CCTV, ANPR technology and access control.

Says Paige Dyke, Facility Manager – Property Management FM at Lambert Smith Hampton: “The complete security programme installed by Amthal at Butterfield Business Park continues to provide a comprehensive and reliable security solution, offering peace of mind to businesses together with their employees and visitors.

“As we continue our site expansion plans, the clear advantage of the system is its scalability, ensuring we can continue to benefit from latest technology. The

addition of two new wireless CCTV columns and benefits of instant voice activation alongside visual surveillance allows our on-site team remote monitoring capability and the capacity to respond instantly to any incidents.”

As the size of the business development park grows, Amthal has installed two new columns featuring advanced CCTV which has been wirelessly bridged to the existing network. The added advantage is the microphones installed allow security teams on site to speak through and raise awareness that any criminal activity is being monitored.

Jacki Adams, Amthal Supervisor – Installation Team added: “At Amthal, we believe that close collaboration and communication with our clients is the key to delivering effective and tailored security solutions. Our partnership with Butterfield Business Park is a great example of this approach, where we worked closely with the management team to understand their security requirements and design a bespoke, scalable security system that met their specific needs, not only now but also for the future. Our ongoing maintenance and installation support ensures that the security system continues to operate at peak performance, providing the best possible protection for the businesses and employees operating within the park.”

For more information, please visit www.amthal.co.uk

20 | June 2023 | IN SECURITY
The Wireless Access Control Report 2023 is available now Discover what’s next for wireless access control. Download your copy

Is biometric technology secure?

Exploring two scenarios by Jonas Nilsson, Head of Product Management at Fingerprints

As people, technologists and organizations, we have a wealth of technology and connectivity at our fingertips. This has clear benefits for how we live and work, offering greater flexibility, productivity and scalability for businesses. Sadly, cyber-criminals also have great opportunities to strike. And when they do, their actions not only impact the targeted person or organization, but their customers and wider stakeholders too.

From gaining access into Microsoft Exchange’s software –leading to the hacked accounts of

at least 250,000 organizations – or Acer’s stolen data being leaked online as part of a $50 million ransomware attack, cyber-crime is a very real problem that affects many, regardless of industry or company size. It not only damages an organization’s revenue, reputation and infrastructure, but the effects of malicious attacks are set to cost the world $10.5 trillion annually by 2025.

The good news is that the fight against cyber-crime is heading in the right direction. Improving cyber security is a priority for many leaders, further evidenced by the vast investment that’s anticipated –

with spending expected to surpass $260 billion by 2026.

This increased focus on robust security has put a spotlight on alternative authentication methods. Especially since 80% of computer hacks and cyber-crimes have been as a result of passwords being compromised. And, while they might be easy to implement, 60% of consumers say they have too many passwords to remember, with some having over 85 covering their professional and personal accounts. In addition, 41% re-use or only slightly vary their passwords. As humans, we are an important

22 | June 2023 | IN SECURITY
BIOMETRIC SECURITY

link in the IT security chain, with some even citing human error as the number one cyber security threat to businesses.

Is biometric technology secure?

While users, technology vendors and organizations can never be completely immune to attacks, everyone can take steps to level-up security with more robust authentication methods that specifically serve their business’s needs and fight against future breaches.

And that’s where biometrics comes into the picture.

Either independently or as an integrated part of multi-factor authentication, biometric technology can be the solution, but it’s not a one-size-fits-all approach because organizations require varying levels of scalable security and authentication. After all, not everyone is trying to protect Fort Knox.

There are many inherent security features of biometrics to help curb cyber-crime. For example, implementing biometrics makes an immediate jump from single-factor authentication using only something you know (PIN / password) to multi-factor based on something you have and something you are.

The management of the data is also key. Consumer device authentication utilizes a ‘privacy by design’ approach that inherently protects end-user biometric data with an on-device authentication

approach. This means biometric data is captured, enrolled, stored, and managed all on the same device, without ever leaving the device owner’s control.

It’s a common misconception that biometric data, such as fingerprints, are stored as images that, if stolen, would permanently compromise the corresponding fingerprint and its use for any device or application. In fact, data from a biometric sensor is captured and stored as a fingerprint template. This mathematical representation makes hacking useless, as the template code cannot be reverse engineered into the original fingerprint image, nor can it be linked to other services or personal data.

Can you spoof biometric technology? Early spoofs would only need a very high-quality photocopy or, amazingly, the use of a gummi bear. Extensive research and development created advanced sensors and algorithms that are extremely difficult to spoof. It’s worth noting that spoofing requires considerable care, skill, money and time, and also for a number of factors to come together perfectly, which is extremely unlikely in the real world:

• A good latent print. To retrieve a latent print that’s high quality enough to work, either a willing volunteer or the commitment to stalk a victim until a viable print can be retrieved is needed.

• Advanced Photoshop skills. Even if a quality latent print is secured,

advanced editing skills are needed to get the level of 3D detail needed.

• A lab environment – or very similar. To convert these prints into an effective mold usually requires a lab environment and significant effort.

• Access to the device. To perform the hack, the attacker would also need access to the device in question for an extended period of time. Most people will report their device lost or stolen, or block their debit card, before anything can be achieved. Also, most devices only give attackers a small number of attempts to gain access before reverting to passphrase and locking.

The fingerprint sensor spoofing seen in media today is either a proof-ofconcept or a cooperative spoof and takes months to work, alongside a highly skilled team and the perfect scenario of circumstances. Most criminals also want to put their time into attacks that can be replicated and scaled across multiple devices, people or companies. Investing the time, money and effort to spoof a fingerprint would only help the fraudster access one person’s devices and services, likely for a limited time. Largely, the risk and investment outweigh the reward.

Biometrics is not ‘one-size-fits-all’

Biometric technology provides many robust cyber security options to suit an organization’s requirements.

IN SECURITY | June 2023 | 23

For example

• Scenario 1: Moving away from passwords, PINs, and token systems for everyday authentication

Biometrics presents the very real possibility for businesses and users to say goodbye to passwords and PINs for good.

In social engineering attacks, attackers generally take the path of least resistance and most often, it is the end-user that is the ‘weakest link’ in the security chain. Consumers are vulnerable to attacks, such as phishing, where they can be tricked into giving away information such as a PIN or password. With consumer biometrics, the user only presents their biometrics to their personal device, meaning they cannot give anything away. Additionally, biometrics is not ‘glanceable’ like a PIN in a shoulder surfing attack. This

also removes the risks generated by mistakes or complacency, such as creating a password that is easily guessed or used across multiple accounts.

As well as immediately increasing security, biometric technology maintains and even, in some cases, increases convenience and UX.

• Scenario 2: The need to protect high-value assets and resist sophisticated attacks Certain systems and implementations can prevent highly sophisticated attacks and subsequently protect the most valuable targets. A great example of this is Fingerprints’ recently launched FPC1523 sensor for physical and logical access devices and applications. The model enables users to store a key in a secure area of the memory and ‘pair’ between the secure element and

the sensor, preventing the exchange of a valid sensor to a rogue one. It can also encrypt the communication between the two, ensuring ‘replay attacks’ don’t occur.

Tailoring cybersecurity through biometric technology to meet specific needs

Security works on the basic premise that nothing is 100% secure. Traditional solutions – like keys and safes – through to digital security (such as biometrics and FIDO2 tokens), are there to make life difficult for criminals who don’t want to deal with how time-consuming, expensive and risky it can be if they were to try and hack into a device or application.

Biometrics provides an easy pathway for people and organizations to move from basic traditional security measures to more sophisticated, multi-factor digital security. That foundation can be built on with different biometric systems and implementations that protect everything from smaller scale operations to those possessing high-value assets. The important factor to remember is that biometric technology offers choice and the ability to integrate security solutions that are tailored to specific needs, budget and existing infrastructure.

Discover how to implement secure biometrics into your organization –visit www.fingerprints.com

24 | June 2023 | IN SECURITY
Jonas Nilsson

More Than Access Control

Maxxess eFusion software opens up limitless possibilities, taking you beyond feature-rich, enterprise-level access control to give you all the benefits of a total security and safety management platform – without the cost or complexity.

Ready-made to integrate more than 60 leading technologies, off-the-shelf, Maxxess eFusion now lets you combine access, video, fire, intruder, visitor management, building systems, widely used databases and site-specific applications.

Flexible security for a changing world Europe Maxxess Systems Europe Ltd United Kingdom +44 (0) 1344 440083 sales@maxxess-systems.com Middle East Maxxess Systems Middle East United Arab Emirates +971 (0) 509467717 North America Maxxess Systems, Inc. United States +1 (714) 772 1000 www.maxxess-efusion.com

Next generation access control

Why biometrics should ‘factor’ in every CISO’s strategy

CISOs must move fast to address the changing demands of physical and cybersecurity, says Antonio Santos at Zwipe. Biometric access control cards work with existing readers to offer a familiar, easy-to-use and cost-effective way to keep bad actors at the door.

When weighing their data security strategies, too many Chief Information and Security Officers (CISOs) still overlook the critical importance of physical access control. According to a Verizon report , 82% of cybersecurity

breaches involve a human element; with many being linked to insider threats and physical breaches. With the number of physical security incidents projected to grow throughout the 2020s, together with the increasingly sophisticated approaches taken by bad actors, it’s time for physical and logical access control to be accepted as two sides of the same coin.

Why? Because the world is not the same place it was just five years ago. Digital transformation, accelerated by the pandemic, has

turned the world of access control on its head. Today’s workers expect maximum flexibility over how and when they come and go, which leaves the doors in and out of secure zones on constant rotation. To compensate, a higher grade of physical access control is required.

Biometric access control card solutions offer an elegant way to incorporate an extra security factor into existing RFID-based infrastructures, and mitigate the increased risk without excessive onboarding, or the costly need to rip

26 | June 2023 | IN SECURITY
BIOMETRIC
SECURITY

and replace existing systems.

Weighing options: what makes biometric access control cards attractive?

The decision to update security infrastructure is always informed by the perceived risk. This is calculated by considering the susceptibility of existing measures against the value of the assets they protect. The bigger the perceived risk, the more secure counter measures need to be. While traditional access control solutions have used measures such as passcodes or even physical enforcement personnel, these all follow the age-old rule: low cost, high convenience and high security. Choose two. You can’t have all three. Biometric access control cards, however, don’t conform to this rule. They offer a bona-fide, cost effective alternative which dramatically raises security without compromising ease of use.

What is biometric authentication? Security solutions face one fundamental question. How do you authenticate that a person is who they say they are? PINs and passwords have long been a staple of access control solutions; however, these can be easily compromised through loss, negligence or theft, and then exploited. Alternatively, ID cards that are then visually checked by security personnel give enhanced

assurances that the correct person is using the credentials offered, but can be undermined by counterfeits and human error. Furthermore, both options create friction for users, making the process of authentication a slow and laborious process.

Enter biometric authentication. These solutions, including Zwipe’s biometric access control cards, offer a way for a user to authenticate themselves using unique physiological or behavioural identifiers including, but not limited to, their fingerprint, iris, face, or voice. These battery-less cards are also fully compatible with existing market-leading card-based access control architectures. On placing the card near a reader, the access control application on the card invokes the biometric cardholder verification function to perform cardholder verification. An access code is only computed if the biometric verification is successful.

Many factors to consider

High security facilities such as power plants, airports and data centres, need to ensure that everyone accessing the facility is, without question, who they claim to be. In these environments, industry best practice calls for a multifactor approach to authentication; verifying a person’s identity based on:

• Something you have

• Something you know

Something you are

While the first two of these tenets have long been pillars of most automated security solutions, be it through personal smartcards or passwords, validating the person in possession of the credentials has commonly required a physical staff presence.

Allowing users to authenticate themselves using physiological or behavioural characteristics, biometric solutions facilitate enhanced multifactor authentication by comparing the probe template (which is derived from the biometric data) against a previously recorded enrolment template. The result is that access can only be granted to those able to present their uniquely registered biometric data. This system of biometric multifactor authentication has recently been trialled at Richmond International Airport (RIC) - a Transportation Security Administration-approved Airport Innovation Forum member in the USA. Here, biometric access control cards have been issued to authorised personnel, and are fully compatible with existing RFID card readers, allowing the facility to implement biometric multifactor authentication without additional investment in upgrading the existing hardware. This has created a cost-efficient,

IN SECURITY | June 2023 | 27

scalable, and robust access control solution that provides a frictionless and secure authentication journey.

Protecting data privacy

As a security factor, the uniqueness of an individual’s biometric data is both its greatest asset and its biggest challenge. Due to the sensitivity of such personal data, an individual’s biometric identifiers are far more valuable than any password or PIN.

The best biometric access control card solutions store each user’s biometric data on the chip of the card itself. These biometric system-on-card (BSoC) solutions mitigate many of the risks associated with the centralised storage and transmission of the biometric data across networks. When the credentials remain solely on the authentication device, the organisation never has access to the biometric data and, therefore, also has no need to manage it. And if the user loses their card, or it is

stolen, the multifactor approach renders it unusable. It can simply be deactivated remotely and another issued.

What’s next for biometric access control?

The next step for biometric access control solutions is mass deployment globally. The enriched multifactor approach provides the much-needed boost to security, and user familiarity gained from smartphone usage means the technology will be easily adopted. Card-based biometric solutions can also be integrated within many existing access control architectures. The physical and logical security industries are already heavily invested in RFID card-based infrastructures and are seeking ways to continue leveraging this investment for years to come, without having to install readers and back-end biometric algorithm. Card-based biometric solutions that securely store and compare

all required data on the card itself enable them to do just that, but utilising the same proximity technology that legacy terminals are built on.

Biometric solutions offer a seamless, cost-effective way to provide enhanced security while also providing an intuitive user experience. Successful deployments provide an excellent proof of concept for biometric access control at high security facilities; something that will soon become commonplace. And not a moment too soon; if CISOs are to address the ever changing demands of physical and cybersecurity, adopting a holistic strategy is their only option. And if they want to enact that strategy cost-effectively, biometric access control cards are the obvious choice.

To find out more about Zwipe’s advanced biometric smart card solution for access control, visit www.zwipe.com/access

28 | June 2023 | IN SECURITY

Bosch IP 3000i cameras. Extend smart video surveillance to general surveilance applications.

Bosch all-new IP 3000i cameras offer high-quality, 24/7 performance and something never seen before in such competitively-priced cameras; built-in Essential Video Analytics as standard. Micro dome, mini dome, bullet and turret options are available with resolutions of up to 5MP for indoor and outdoor use. This intelligent solution is an industry first for general, cost-effective video surveillance.

Find out more at boschsecurity.com

Reliable storage systems

Meeting the expectations of high-resolution video data streams by Irina Chan, Toshiba Electronics Europe

Video surveillance systems are incorporating larger numbers of cameras, with higher resolutions. Consequently, the volumes of data being generated are growing all the time. This ongoing trend means that the storage media being used have to satisfy significantly increased demands. Not only is this true when it comes to storage capacity, but also in terms of providing around the clock reliability in what are often extremely tough working conditions.

The market for video surveillance is booming. In addition to the greater need for security among the population and businesses, there are also new applications emerging in the field of video analytics. For

example, smart algorithms are capable of analysing video streams to count visitor numbers, identify vehicle number plates or detect the presence of smoke. The quantity of cameras deployed in the public domain and at company premises is therefore rising dramatically. According to a study conducted by Mordor Intelligence, the European video surveillance market is predicted to experience a compound annual growth rate (CAGR) of approximately 15.5% between now and 2027.

As already mentioned, along with the number of cameras, device resolutions are also increasing. Even the simplest models already offer full HD these days, with 4K

and even 8K not being uncommon in the professional sector. Given that multiple cameras are typically used and these are in operation 24/7, the amounts of data involved can quickly build up. It is often the case that this data then has to be kept for a prolonged period without losing frames and also be readily available for review at any time. Such requirements pose particular challenges for storage systems and the media they rely on.

Conventional desktop hard disk drives (HDDs) are insufficient here - as they are only designed for operating times of between 8 and 16 hours a day, and for annual workloads of about 55 TB. In a video surveillance system they would

30 | June 2023 | IN SECURITY
SURVEILLANCE

generally exceed these values and wear out quickly, as the probability of faults or failures during the warranty period would increase considerably. Consequently, HDD manufacturers offer specialised models that are optimised for video surveillance and support non-stop operation. These drives are much more robust, enabling them to handle up to 180 TB of data per year.

Surveillance HDDs typically have a mean time to failure (MTTF) of 1 million hours, which equates to an annualised failure rate (AFR) of 0.88%. So, out of a thousand of these drives, about 9 would probably fail per year. By comparison, if placed into continuous operation, desktop HDDs with a MTTF of 600,000 hours have an AFR of 1.46% Therefore, out of a thousand of these drives, 15 would probably fail in any given year. Lower priced models would thus only save money in the short term, as in the longer term they would incur higher maintenance and servicing expenses, that will add to the total cost of ownership (TCO). In addition, surveillance HDDs will have a longer warranty period, usually covering a 3-year period.

Robust and reliable storage media

Given the large volumes of data

involved in video surveillance activities, digital video recorders (DVR), network video recorders (NVR), video servers and video management systems must provide plenty of storage capacity. This is why they are often equipped with a number of HDDs. The problem with this is that, in conventional arrangements, their rotational vibrations reinforce each other. In extreme cases this can even result in damage being done to the drives. That is why special surveillance HDDs have sensors incorporated, so as to identify these vibrations. As soon as a situation occurs where the vibrations present are becoming a concern, the operating parameters can be adjusted by control mechanisms to safeguard against the HDDs suffering any adverse effects on their performance. Desktop HDDs, which are normally only installed on a stand-alone basis, can manage without such sensors and control mechanisms. However, their service life will be substantially reduced if used in the storage systems intended for video surveillance.

Unlike desktop HDDs, surveillance HDDs are put through comprehensive compatibility and function tests in various different types of video recording

equipment. This enables hard drive manufacturers to ensure that their models work smoothly with such equipment and deliver optimum performance - which is not guaranteed in the case of desktop HDDs.

In addition, desktop HDDs are only designed for an operational temperature range of 0 to 60˚C. This can be insufficient for video surveillance, because the recorders are not always installed in airconditioned server rooms or data centres, or even in normal office environments. In some cases, the systems are located in poorly ventilated storage rooms or within safety cabinets in production and storage areas, where they may be exposed to elevated temperatures. Surveillance HDDs are designed for higher temperatures, with 0 to 70˚C operation covered.

Boosting performance

To enable high-resolution video streams to be processed in parallel, surveillance HDDs have optimised firmware and will generally also feature a larger buffer memory than desktop HDDs of comparable capacity. This allows them to attend to up to 64 video streams - with the exact performance ultimately

IN SECURITY | June 2023 | 31

depending on the resolution, the video codec used and the captured video content. Take an example of a camera in an underground car park. This will generate smaller amounts of data than a street camera that is monitoring a constant flow of traffic.

Some surveillance HDDs operate at speeds of 5,400 or 5,700 revolutions per minute (rpm). This is enough for many applications, even if video material sometimes needs to be read out for review in parallel with the recording. The firmware ensures that the write operations are not slowed down and that all streams are reliably recorded. Low rotational speeds make drives very

energy-efficient and helps companies using them to reduce their power consumption. Where higher performance is required, however, there are also surveillance HDDs supporting 7,200 rpm.

If there are frequent high read loads, it can make sense to use enterprise grade HDDs instead of surveillance HDDs. Not only do these provide higher data rates, they can also cope with bigger annual workloads of up to 550 TB. They are also equipped with vibration sensors and control mechanisms for vibration suppression, but are only designed for operating temperatures between 5 and 55˚C. Companies therefore

need to make sure that they only put video storage systems equipped with enterprise grade HDDs in air-conditioned rooms. If this is done, then nothing stands in the way of downstream analysis of large video volumes, potentially using modern AI algorithms.

Conclusion

Through access to high-resolution video data, there are a plethora of exciting new use cases that can be explored. Analysis of such data will have huge worth as we move into a smart city future, allowing traffic congestion to be alleviated and the better assigning of resources to particular areas. In residential buildings and workplaces, captured occupancy data will help lower energy usage, as heating and lighting will only be activated in the places where they are needed. With an unprecedented quantity of acquired data needing to be stored, having fully optimised HDD solutions will be absolutely essential.

About the Author

Based in Dusseldorf, Irina Chan is Specialist Product Marketing Management for the Storage Products Division at Toshiba Electronics Europe.

For further information please visit www.toshiba-storage.com

32 | June 2023 | IN SECURITY
Irina Chan
Visit the Azena Application Store: the largest open platform for IP cameras. Offering groundbreaking software that runs on different models and integrates seamlessly with third party systems. Letting you benefit from AI video analytics – whether optimizing new cameras or retrofitting existing ones. The range of ready-to-install apps extends beyond security and safety; adding value to operational intelligence, automation, or process control in such industries as healthcare, manufacturing, retail, transportation and tra ic. Release the power of AI video solutions. www.azena.com Start with a free trial Our free trial program is an easy way to test our solution with our support – no strings attached. Increase safety on the factory floor? Get a head start with AI video analytics.

Physical security operations

The costs of not being enterprise-ready by

At most large organizations today, physical security is expected to comply with the same standards and practices as their IT counterparts. This means they have to ensure devices are fully operational and compliant.

But while physical security departments understand the need to manage and protect their IP-based

devices, they often face a number of challenges. For example, physical security departments don’t always have the technical, operational and budgetary resources of their IT counterparts.

Nevertheless, physical security departments can—and often do— remain operational with even limited resources. But they are not always able to meet the latest IT standards.

This creates costs for the business in the way of outages, unnecessary management headaches and rising maintenance costs—all stemming from a lack of visibility into device operations.

Potential costs can also include regulatory penalties for noncompliance and damage or liability from any security incident. And these risks increase as a physical security

34 | June 2023 | IN SECURITY
NETWORK SECURITY

department scales its fleet of devices, which is inevitable as an organization grows.

The anwer? Enterprise-readiness, which boils down to achieving full device visibility and end-to-end management which, if efficiently executed, keeps fleets secure and operational. The five most important results of enterprise-readiness are:

1. Device Availability. A baseline necessity for physical security, device availability should be as close to 100% as possible. In some cities, though, availability of public-area security cameras is believed to languish below 80%.

2. Robust Cybersecurity. IP-based devices are connected to IT’s networks,so ensuring these devices are hardened against bad actors – for example by regularly rotating passwords and upgrading firmware – is one of the greatest benefits of enterprise-readiness.

3. Compliance. Physical security

teams and device manufacturers are increasingly bound by regulatory mandates, company-internal and industry requirements, as well as IT standards for device management.

4. Cost-Efficiency. A prime example is reducing avoidable truck rolls, and more generally the reduction of expensive break-fix cycles.

5. Future Planning. Replacing outdated and unsupported devices at the right point in their life cycle is key to cost efficiency, cybersecurity and compliance.

Physical security professionals are aware of the issues, but readiness as described above requires specific capabilities to achieve. The ecosystem of physical security devices is wide-ranging and complex. There are many different vendors and versions of devices with different software and maintenance requirements. Some support remote diagnostics; others do not.

Even when devices have these key features, physical security still needs the technology to manage and protect the devices at scale.

Whatever the nuance, the big picture is that enterpriseunreadiness can come at a cost. Any small misconfiguration or outage could set off a chain reaction or result in a compromised network, which is not something a large organization can afford.

But what exactly is the cost of enterprise-unreadiness to a business?

Breaking Down Risk and Cost to Business

Costs can manifest themselves in several ways. For instance, monetary costs tied to hours worked are easily quantified. Others, like risk and deficits in organizational communications and collaboration, are not as tangible, but nevertheless they do impose costs.

Specifically, for physical security

IN SECURITY | June 2023 | 35

teams, unreadiness costs can present themselves in the way of:

• Increased device downtime. The longer a camera, sensor, or an access control system remains offline, the higher the security risk to an organization. Without the active monitoring and surveillance capabilities provided by these devices, an organization can become more susceptible to unauthorized access, other breakdowns in protection, and lawsuits.

• Increased vulnerability to cyber threats. Lapses in required updates of device certificates (such as SSL and 802.1x), firmware, and password resets increase the likelihood of a security incident. Keeping ahead of these requirements requires real-time visibility of fleet devices and their status.

• Increased staff hours spent on repetitive procedures. Password rotation (resetting) and firmware updates are large-scale critical procedures that are very timeconsuming and difficult to perform correctly. Without automated, remote management, physical security teams carry out these tasks manually, resulting in higher staff costs. The team’s mandate also includes managing

users, defining access and setting permissions.

• Unnecessary maintenance costs. Physical security teams often spend resources and budgets on endless break-fix cycles and other avoidable maintenance tasks. This often results in excess truck rolls, which can easily triple a physical security team’s spend on maintenance. Remote device management capabilities can enable a proactive approach to maintenance that ultimately reduces costs.

• Misalignment with IT. Today’s connected physical security ecosystem is inextricably linked to IT, which makes collaboration between both teams that much more important. Any tension or miscommunication between both organizations can lead to a misalignment of priorities and may impede diagnosis and resolution of technical issues.

• Stuck in “firefighting” mode. Reacting to any device outage or potential risk is part of physical security’s job. But not every incident is created equal and chasing back-to-back fires can result in rising costs and shift teams away from more strategic tasks—such as end-of-life device planning.

• Non-compliance. Penalties for device non-compliance can result from common problems like outdated device software or firmware. But, even if your entire fleet is in order, regulations change and often vary by jurisdiction, country and industry. Regulation of security at major airports is, of course, different than for a standard enterprise. Keeping an entire fleet of devices compliant requires visibility into device compliance status, standardized audits and technical logs.

Enterprise-readiness lowers physical security costs

It’s important to note that achieving enterprise-readiness requires an ongoing, carefully thought-out approach. By becoming enterpriseready, physical security organizations can ensure that their systems are fully prepared for the demands ahead. Their proactivity not only has a positive impact on budgets, availability and maintenance but also enhances compliance, cybersecurity and overall mission-effectiveness for physical security.

For further information please visit https://securithings.com

36 | June 2023 | IN SECURITY
VIDEO SECURITY PRODUCTS www.videotec.com Made in Italy IP66/IP67 IP68 T YPE 4X T YPE 6P ULISSE EVO THERMAL is the new high-performance PTZ thermal camera with radiometry functions, designed to provide a preventative 24/7 video surveillance system in critical infrastructures, transport, traffic, railways and fire detection applications. Ulisse Thermal

The best medicine

Paxton secures US cannabis facility

Net2 access control has been installed at Highlands Grow, a fully licensed industrial-scale cultivator, producing cannabis for medicinal and recreational use.

Based in Lapeer in Michigan, Highlands Grow provide consumable cannabis products to US-based retailers, projects. The volume of produce they cultivate is of extremely high-market value and needs to be secured with a sophisticated and

advanced security system as stated by Michigan state law.

Requirement

Prior to the new Net2 security installation, the Highlands Grow facility was secured by traditional locks and keys. This meant that they were open to potential security risks, and their site would not meet the legal requirements to secure the higher volume of product they plan to produce as they increase the size of

their ever-growing customer base.

Highlands Grow, called Existo Solutions which is a consulting company that specialize in services designed specifically for the budding US. cannabis industry. They recommended Paxton’s Net2 access control due to its customizable highsecurity functionality and integration options.

Chris Hernandez, Operations Lead at Existo Solutions, said: “Achieving compliance while growing cannabis

38 | June 2023 | IN SECURITY
ACCESS CONTROL

in most US states is related to the security and access of the facility. Cultivators who don’t comply can receive up to a $90k fine from the US government, so access control is vitally important to get right.”

For the new security system to meet legal surveillance requirements, cameras need to be integrated alongside a remote alert system. For Highlands grow, that means monitoring 50 cameras, while securing 21 doors, which lead to large-scale grow rooms and secure vaults, storing curing cannabis and finished products.

Having this functionality is crucial so the owners can receive real-time notifications and video clips of potential security risks on individual doors when the facility is at low

capacity.

Chris continues: “What is very important for the customers in our industry, isn’t just knowing who goes in and out of a facility, it’s who goes up to a door when they are not supposed to. It’s about being aware of who tried to open a vault when no one is there.”

Solution

Existo Solutions installed Net2, Paxton’s flagship networked IP access control system, which originally launched into the US market in 2007. Since then, the system has received consistent updates and integrated with many leading cameras, as well as fire and intruder alarms.

The system was integrated

seamlessly with VIVOTEK cameras, meaning that Highlands Grow can now remotely monitor every door on their facility 24/7, using Net2Online software and the Paxton Connect app.

Chris said: “Paxton are our go to when it comes to access control. We like the way Net2 integrates with VIVOTEK cameras, and the system just works every time.

“Net2 has enabled us to provide Highlands Grow with the highest security service package we offer, which is great for them.”

Paxton’s vandal resistant Entry range touch panel has been fitted on the main entrance to the facility, alongside an Entry Premium monitor in the site’s security station. The Net2 software has been configured

IN SECURITY | June 2023 | 39

to provide notification alerts on the owner’s smart devices if people are trying to enter the building outside of business hours.

Net2 readers were fitted across all doors alongside the camera integration to monitor access from internal employees to grow rooms and vaults. These readers have been configured to allow different access levels depending on seniority in the company, and time restrictions added to lock down rooms with no need for frequent access.

Chris concludes: “I think access control is so important as one of the initial means to manage the workspace and how people move around. There are lots of locked doors in the cannabis industry and opening them using Net2 makes

it easy to move around with large plants on carts.”

“Paxton makes our job straightforward. It’s beyond simple, it’s beyond easy, and the technology is so stable, that it’s easy to support.”

Result

The Net2 system has been installed with no problems and the owners are pleased with how easy Net2 access control is to use. They have been maximising the use of its feature-rich software and have been impressed with the proximity cards, which they have doubled up as access tokens and ID cards.

Matt Saagman, Director of Cultivation at Highlands Grow, said: “Using Net2 is very smooth. Once I started using the Paxton Connect

app, it has been a breeze. Almost too easy.

“As we expand out our facility, we plan to keep building on the current system and we are interested in seeing what else it can do as we grow.”

With nearly 40 years of experience, Paxton put their core values of simplicity, quality, and honesty at the heart of everything they do.

Based in Brighton, East Sussex, they manufacture in the UK and export to over 63 countries worldwide: with offices in the US, France, Germany, South Africa, UAE and Benelux.

You can find out more about Net2 on www.paxton-access.com

40 | June 2023 | IN SECURITY

Audio made smart & easy.

Axis network speakers are complete high-quality audio systems in a single unit. And because they’re based on open standards, they’re easy to integrate with other systems. Our ceiling and cabinet speakers are perfect for public address system and background music in stores and other settings, such as schools. And with our horn speaker you have a cost-efficient way to deter crime by complementing your video surveillance solution in outdoor settings.

Learn more about our network audio systems at www.axis.com/products/audio

AXIS C3003-E Network Horn Speaker AXIS C1004-E Network Cabinet Speaker AXIS C2005 Network Ceiling Speaker

Path to unification

Unifying physical security for a safer campus, Jon Hill, Business Development Manager, Genetec

Educational campuses have had a wealth of physical security solutions introduced to the market over the years. Video management, access control, to automatic number plate recognition (ANPR) and more have all made a difference to how students, staff and assets are kept safe. But integrating these solutions together doesn’t mean that they’ll operate seamlessly. Sometimes the results can be limiting. This is where

a unified physical security platform can be more effective.

Integration – the challenges with siloed systems

For campus security departments that are using an integrated system, it can become complicated when operators have to communicate and move between these systems to complete a task.

If an organisation decides to integrate access control with video,

the two systems will appear on the same screen but they are not necessarily communicating both ways. This means that, while an operator can monitor video as people access the facility through doors and gates, many of their other day-to-day tasks, like emitting cards to employees, unlocking doors for visitors, or running reports to see who accessed an area after the fact, still require the operator to switch between systems. These remaining

42 | June 2023 | IN SECURITY
EDUCATION
SECURITY

silos distract operators from the task at hand and introduce more overhead and inefficiencies, such as still having to learn two interfaces, longer time to resolve investigations and general fatigue from working across systems.

Unification – how to bring multiple systems together

Imagine if all of your physical security activities, functions and data came through one solution – then you could harness the flow of data across all of your security activities. It would also make it easier and more efficient to secure your campus while also supporting your organisation’s operational activities. This is unification.

A unified platform is built from the ground up to consolidate all of the data that you collect, so you can easily and efficiently manage security policies, monitor events and run investigations all from one single platform. It provides a seamless and unified view of your entire security operation, giving security operators the ability to monitor, track and proactively address security concerns using actionable and relevant information. Instead

of toggling between multiple tabs, screens, or workstations, operators can manage alarms, maps, schedules and privileges from a single central interface so that security efforts are coordinated and centralised for consistent and swift responses.

For example, if a fence sensor is triggered with a traditional system, the operator will only receive the pre-defined corresponding information, such as a short video feed of the area around the fence. But a unified system goes beyond just co-locating more data: it allows that data to interact in new ways. Video analytics and other sensors confirm the fence sensor isn’t a false alarm; doors are locked in response to the threat; speakers sound a warning that personnel is on their way to intercept the intruder. Unification expands the operator’s reach so they can better address the situation.

One view – a comprehensive security approach

The security coordination of your campus is crucial to managing day-to-day operations, large events and emergencies.

A unified physical security

platform optimises resources by sharing common servers and databases for authentication and permissions, licensing, configuration settings, alarms and events, audit and activity logs, video recording, access logs and schedules. Deploying a unified platform means that users only need to learn, configure, upgrade and backup a single software suite. This makes installing and managing a unified platform easier than an integrated one. Access is also easier as administrators can manage the system through a single application, regardless of the number of servers or systems.

With a comprehensive view of security where both routine activities and unanticipated incidents are managed within a single unified platform, security teams can decrease response times and improve decision-making.

Imagine a campus with hundreds of buildings and thousands of staff and visitors each day. With a unified platform, the security team can have an overview of thousands of doors, intrusion sensors, automatic license plate recognition and even intercoms and public address

IN SECURITY | June 2023 | 43

speakers, for example - and each of these devices would be visible on a single map in the security operations center, allowing operators to quickly dispatch the closest officer when a security event occurs. And before even reaching the scene, officers could review the video and any other details from their mobile devices.

Ensuring campus security has what they need at their fingertips allows them to deliver a faster and safer response to any type of issue that comes up.

Open architecture – scale and adopt new technology without limitations

Open architecture is the foundation of a physical security platform that gives you the ability to choose any software. It’s non-proprietary and flexible, which means that whatever software you select will be compatible. An open platform guarantees that as your organisation grows, you can swap out or add technology to match your needs at that moment without having to start from scratch.

Does your organisation have plans to expand or change? With the increasing amount of new security technology and sensors

available, you need to consider open architecture.

Sure, an integrated physical security solution gives you the ability to add new systems. But in reality, trying to add more data to a user interface that’s designed for a single set of activities can quickly show its limitations. As soon as one system needs to be updated, compatibility issues will probably arise and slow down or even prevent updates. A unified physical security platform with open architecture offers more flexibility and evolves with you since it can grow to any size as new systems are added. It’s able to monitor thousands of devices, from door readers, IP cameras, to intrusion sensors, intelligent lighting and more.

Maintaining several integrated systems can also be costly since paying for multiple vendor agreements, training operators and maintaining multiple, disparate systems can quickly add up. However, operator training is simplified with an open, unified platform since alarm management, event to action, reporting, investigation and incidentrelated workflows all take place in one familiar environment. This

significantly reduces the learning curve for new operators and existing staff can easily stay up to date with system improvements.

Get on the path to unification

An effective and unified campus security system doesn’t require an all-or-nothing approach. Security leaders can start by focusing on the basics, such as unifying video and access control systems. Getting on the path to unified physical security can allow campuses to expand, scale and add solutions as their needs evolve.

Unification enables organisations and campuses to unlock business intelligence and improve organisational efficiency. Instead of numerous data silos, unification puts operators and administrators in front of valuable and actionable business intelligence. The right security system does more than just protect people and assets — it also provides business and situational data to enhance overall operations. Helping campus security teams to work smarter and more efficiently.

For further information please visit www.genetec.com

44 | June 2023 | IN SECURITY

P

P A R E D

THE VOICE OF THE PROFESSIONAL SECURITY INDUSTRY
risk, protecting your customers
call to installers
R E
F O R I P V O I C E ?
Mitigating
A

The ASSA ABLOY Group is the global leader in access solutions. Our offering covers products and services related to openings, such as locks, doors, gates and entrance automation solutions. This also includes expertise in controlling identities with keys, cards, tags, mobile and biometric identity verification systems.

www.assaabloy.com

azena accelerates the next generation of smart security and safety solutions through joint innovation with customers and partners. Our goal is to be the leading open platform and marketplace for smart security and safety solutions. The platform we offer is based on a camera operating system that powers cameras from various manufacturers on the market.

www.azena.com

Club Car boasts nearly 60 years of industry-leading innovation and design, initially focused on golf cars and then expanding to commercial utility vehicles and personal-use transportation.

www.clubcar.com

Hanwha Techwin Europe, formerly Samsung Techwin Europe, offers robust and reliable video surveillance products designed to meet the current and future needs of security professionals. Our cameras, video recorders and other devices are built to exacting standards which reflect the heritage of precision engineering associated with the Samsung brand.

www.hanwha-security.eu

Innovating for a smarter, safer world by combining intelligent technology and human imagination, at Axis Communications we offer solutions based on sight, sound and analytics to improve security and optimize business performance.

www.axis.com

Buildings today don’t only provide a safe, functional place for people to live and work. They can also cater for – and even respond to – their needs, while helping them work more efficiently and sustainably. At Bosch Building Technologies, we are at the forefront of these new developments.

www.boschbuildingtechnologies.com

With a full HD camera and an optically stabilized, 40x zoom lens from FUJINON, two high-performance components are integrated into one system. This innovation is the result of years of experience in digital cameras and a dedication to the highest optical quality.

www.fujifilm.eu/fujinon

HID powers the trusted identities of the world’s people, places and things. We make it possible for people to transact safely, work productively, and travel freely. We are passionate about helping people use a verified, trusted identity to make it more convenient and safer for them to get to where they need to go and achieve what they want to do in everyday life.

www.hidglobal.com

46 | June 2023 | IN SECURITY
DIRECTORY

Maxxess Systems delivers innovative SaaS and security management software solutions that combine otherwise disparate physical security, communications, business intelligence and data integration capabilities onto one unified management platform.

https://maxxess-systems.com

Panasonic i-PRO Sensing Solutions Corporation of America a global leader in professional security solutions for surveillance and public safety, is launching their new name, i-PRO Americas Inc., and taking a unique approach to best navigate the evolving business environment and technology demands of the professional security industry.

https://i-pro.com/eu/en

As a trusted advisor and reliable partner, as a system integrator, service provider and a product vendor, Siemens offers energy-efficient, safe and secure buildings and infrastructure. With our people, our global footprint and our technical expertise, it's our passion helping you to create the perfect place – your perfect place.

www.siemens.com

Transforming teaching and learning with creative solutions to engage and inspire every student. Learning’s becoming more interactive. More immersive. More collaborative. At Sony we’re working with universities, colleges and schools to create richer, more rewarding educational experiences for today’s students and teaching staff.

https://pro.sony.com

At Mayflex we lead the way in the distribution of Converged IP Solutions. Bringing together ‘best-in-class’ Infrastructure, Networking and Electronic solutions. We’re a growing international force, enriched by the skills, expertise and unique personalities of our people. Globally owned but with a family and local feel.

www.mayflex.com

With over 30 years of experience, we design and manufacture marketleading security solutions for a range of buildings. Around 25,000 buildings each year are secured globally with Paxton products. Our global Head Office is based in Brighton, we have colleagues in 12 countries and we export to over 60 countries worldwide.

www.paxton-access.com

From its inception in 2001, SALTO was created with one objective: to devise a world-class access control system that was simple to use and extremely efficient, giving users the ability to control all their access needs and secure all their doors without complex and expensive wiring.

www.saltosystems.com

Videx Security is a leading manufacturer and supplier of access control systems across the UK. We are experts in the door entry market. Videx and our team of estimators, technical support and designers are focused on making and providing high quality products and support to customers.

www.videxuk.com

IN SECURITY | June 2023 | 47

One system for all requirements of an intelligent building

– the state-of-the-art building automation system
siemens.com/desigo Desigo

Turn static files into dynamic content formats.

Create a flipbook

Articles inside

P A R E D

3min
pages 46-47

Path to unification

4min
pages 42-44

The best medicine

3min
pages 38-40

Physical security operations

4min
pages 34-37

Reliable storage systems

5min
pages 30-33

Next generation access control Why biometrics should ‘factor’ in every CISO’s strategy

5min
pages 26-29

Is biometric technology secure?

5min
pages 22-24

Amthal adds surveillance to expanding Butterfield Business Park

1min
pages 20-21

New NVR powered by VMS from 3xLOGIC redefines network video recording for SMEs

2min
page 19

Security specialist Safetyflex secures first site in Africa

1min
pages 17-18

DO YOUR BEST WORK

2min
pages 15-16

New ASSA ABLOY Security Door Closer named Product of the Year 2023 in Germany

3min
pages 13-14

Mayflex continued service enhancements

2min
page 12

HID launches New Seos® access security cards made from sustainably sourced bamboo

1min
pages 10-11

Introducing SALTO Neoxx G3: The ultimate electronic padlock solution

2min
page 9

SALTO introduces face recognition access control with the acquisition of TouchByte

1min
page 8

Harvest the future

4min
pages 4-7

Path to unification

7min
pages 42-47

The best medicine

3min
pages 38-40

Physical security operations

4min
pages 34-37

Reliable storage systems

5min
pages 30-33

Next generation access control Why biometrics should ‘factor’ in every CISO’s strategy

5min
pages 26-29

Is biometric technology secure?

5min
pages 22-24

Amthal adds surveillance to expanding Butterfield Business Park

1min
pages 20-21

New NVR powered by VMS from 3xLOGIC redefines network video recording for SMEs

2min
page 19

Security specialist Safetyflex secures first site in Africa

1min
pages 17-18

DO YOUR BEST WORK

2min
pages 15-16

New ASSA ABLOY Security Door Closer named Product of the Year 2023 in Germany

3min
pages 13-14

Mayflex continued service enhancements

2min
page 12

HID launches New Seos® access security cards made from sustainably sourced bamboo

1min
pages 10-11

Introducing SALTO Neoxx G3: The ultimate electronic padlock solution

2min
page 9

SALTO introduces face recognition access control with the acquisition of TouchByte

1min
page 8

Harvest the future

4min
pages 4-7
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.