You are at : Search > Articles Search Results

Articles Search Results

326 Articles and 12 related Products found for Biometrics

Colorado Regis University Utilizes Brivo Access Technology for Classroom and Equipment Security

Colorado Regis University Utilizes Brivo Access Technology for Classroom and Equipment Security

Editor / Provider: Brivo systems | Updated: 8/15/2011 | Article type: Education

Brivo Systems, leader in Software as a Service applications for security management, announced that Regis University, Denver, Colorado, has deployed Brivo's ACS WebService for managing security at its new CyberSecurity Education Center at the University's Denver Technology Center campus. The University selected Security Install Solutions (SIS). located in Denver, Colorado, as the integrator for this project.

When the University began building its new CyberSecurity Education Center in the fall of 2010, staff knew the facilities would be much more than just a classroom and that there would be a lot of expensive equipment onsite. Also as time went on, more and more visitors would be utilizing the facilities, in addition to the adult students. “Clearly, we had to have enhanced control over the doors at the center and who was coming into and out of the classrooms and meeting rooms,” explained Dan Likarish, Director of the Center on Information Assurance Studies at Regis University.

The University's Facilities Manager recommended that Dan and his colleagues speak with Security Install Solutions. Rueben Orr with SIS provided them with a demonstration of the Brivo access control technology. “It was at this time,” Likarish recalled, “that I realized not only could we use the Brivo system to improve our building security but it represented a teaching opportunity, too.”

Regis' campus at the Denver Technology Center is a public access facility, located adjacent to a major highway and accessible by light rail. Easy access also means that anyone can be walking around the campus. In addition, the Center has made a substantial investment in the equipment they provide in their classrooms and labs. The Center caters to an adult student body so classes are held at night, which compounds security challenges. “With Brivo, we have what I call constant vigilance monitoring and that reduces our worry factor,” said Likarish. “Add to this that our students get the practical experience of working with this system in a higher security environment and that's a positive experience all around.” All students earning their master's degree in information assurance do a walk-through of the University's security systems and that's when they are introduced to Brivo ACS WebService. “Utilizing the Brivo system, we demonstrate the one, two, and three factor combinations of identification—card, biometrics or fingerprint reader, and PIN.”

Likarish continued, “Physical security is part of our curriculum, so we used our Brivo system to turn it into a lab exercise. We explore not only the physical devices, but also what happens in the event of a power failure, what is the door device to webserver connection, why use PoE, what is the support and maintenance model, and many other aspects.”

Another purpose for the Center is to provide education for first responders at the tribal, local, state, and federal levels (the FBI, FEMA, and Interior are future, prospective customers). So, the University has many different groups coming through and recently was preparing to receive 70 new visitors in just a few days. “The Brivo system gives us the flexibility to control our rooms for our many different needs, and those needs are only going to expand as we receive more and more visitors, hold trainings and cyber competitions, and so on. Brivo's ease of use in managing these situations really sold us on the system,” said Likarish.

Likarish and his staff manage all the students' access to the facilities, as well as other staff and their many visitors. They utilize the system's alert features to stay on top of events like loss of power, forced door entry, unidentified or unscheduled card usage, and others. “The system is reliable, scalable, redundant, and it's easy to use.”

Has the Brivo system met Regis University's overall needs? “It has met and exceeded our expectations,” reported Likarish. Once the system was in and we established a baseline, we've found it even better than we thought it would be.”

Newcastle Construction Site Leverages ievo Biometric Readers for Payroll and Access Control

Newcastle Construction Site Leverages ievo Biometric Readers for Payroll and Access Control

Editor / Provider: Ievo | Updated: 8/9/2011 | Article type: Commercial Markets

Based on a site in the heart of Newcastle Upon Tyne directly opposite ST James Park Football Stadium and the Newcastle University Business Center is a modern district being constructed by George Downing Construction. The construction site is part of a number of projects within the city center including the new bioscience buildings.

Downing operates across three successful divisions mixed-use development, property management and construction. This unique approach arms them with thee breath of experience and skill to maximize vale, quality and use of space where other would fall short. As a mixed-use developer they are operational across four northern cities-Liverpool, Newcastle, Leeds and Manchester. George Downing Construction is the group's in-house construction arm. The company handles the main contracting role of all construction requirements and employs 45 highly skilled individuals. This expertise minimizes risk and ensures projects are delivered on time and in budget. This holistic approach is the key to the sustainability. By refusing to be one dimensional they maintain a thriving investment portfolio and are continuing to grow as a major force in the property industry.

In August 2010 GDC decided to specify a new biometric turnstile access control system to replace an existing product which proved not fit for purpose. They were using two fingerprint readers, however because the technology utilized dated optical readers they would not stand up to the harsh environment of a construction workers fingerprints. The readers would also create queue problems because workers had to enter a six-digit code prior to scanning their fingerprint. Because the site had more than 300 employees, this was causing major problems especially for those forgetting their PIN codes.

It is estimated that the biometric system will have up to 800 people registered. The system will be on the site for a total of 86 weeks and then moved to a new GDC site. This site secretary, Jacqueline Pearson, controls all of the security system from one PC on site. She believed the main advantage of ievo and Net2 is how easy it is to use.

The setup of the biometric system on site is a double turnstile positioned in a cabin at the front of the site. An ievo reader is placed on both sides of turnstile. Construction staff then approach the turnstile, scan their finger on the reader and proceed through the turnstile if access has been granted .This event is recorded in real time on the Net2 software and can be used later for administration.

Pearson said, ”We wanted a biometric system because we new traditional card system are corruptible and heart at GDC we take health and safety very seriously. So knowing who is on site all of the time can be very advantageous not only for health and safety purposes but also from a time and attendance perspective. I can now run simple 100-percent accurate reports telling which employees or contractors don't get over paid and any disputes are quickly resolved because the biometric evidence is irrefutable. We also wanted to get rid of using a PIN code and just want workers to be able to scan and enter on site, this would drastically cut down on queues when workers come on and off site. With ievo there is no need to enter a PIN code, workers can simply scan their finger and this greatly reduces the time it takes to get through the turnstile."

"We also use the anti pass back facility on the software which means the system will not let personnel scan off site unless they have scanned on and vice versa," Pearson said. "This is critical for health and safety because we know exactly who is on site. When we run a fire drill we can compare the software report to actual people on site. We have ran a number of these reports and they have been 100 percent accurate."

Security Consultant of Phoenix Eye, Michael Bellis said, ”Having seen ievo readers in harsh environments I knew this was the right product for GDC. They had already used biometrics and believed in the concept but were disappointed at previous technology results. When we demonstrated the capabilities of ievo readers and the reporting information they could get from the use of the complete system the quickly gave us the go ahead to install. Cost was also a significant factor for the customer because they wanted a system that could be relied upon for accurate information without costing the earth. Despite the ievo technology being far superior to that which they had in place the cost was also significantly less."

Security Management Taking Off

Security Management Taking Off

Editor / Provider: UTC Fire & Security, CEM Systems ,System Development Integration and Bosch Security Systems | Updated: 7/6/2011 | Article type: Infrastructure

Airport projects — both new and expansions/upgrades — are taking place all over the globe. These projects aim at putting integration-friendly systems in place for total security and safety management at major air travel hubs.

Zurich Airport Monitored by UTC Fire & Security
Unique (airport operator) operates Switzerland's renowned traffic hub, the Zurich Airport, and is responsible for the airport's daily management. The airport houses around 180 different companies. Unique employs approximately 1,400 people, and together with more than 260 airport partners, the combined total roughly equals 21,000 employees.

The Zurich Airport needed to upgrade its aging video surveillance system, for which obtaining replacement parts was often very difficult. Furthermore, the system could not be expanded, but scalability was demanded along with the expansion of the airport.

UTC Fire & Security offered a combined solution that integrates the existing 330 analog cameras by using 46 digital encoders. The encoders digitalize the camera data so that it can be transferred to the monitoring stations. Each monitoring station is equipped with 40 TB of local storage space, storing more than 400 million images, and events can be saved to the central storage (800 GB) when and if necessary. To avoid the costs associated with establishing a new network, the existing IP network was used to transfer all data.

An additional advantage of the system is that it easily allows for future expansions. With UTC Fire & Security's system installed, Unique is able to monitor all events on its premises and, thus offers a safe environment to those passing through the Zurich Airport.

CEM Systems Refines Access to HKIA
Hong King International Airport (HKIA) has about 900 aircraft movements, serves more than 160 worldwide destinations daily, and had more than 50 million passengers in 2010 pass through the airport, making it one of the busiest international passenger airports.

In 2010, HKIA awarded CEM Systems (a Tyco International Company) a US$2-million security management system upgrade contract. The HKIA upgrade was significant as more than 1,000 serial readers were seamlessly upgraded from Wiegand technology to PicoPass smart-card technology using existing IP connectivity at the airport for simplified installation.

The contract also included a further expansion of fingerprint card readers to all air bridges. The progressive move to biometric card readers was achieved to increase the overall efficiency of the airport.

The fingerprint readers increase HKIA's security by providing three levels of identity checks, including ID authentication, PIN check and fingerprint verification. Each reader has a large internal database which holds card and encrypted biometric templates at the door. This ensures zero system downtime at air bridges. The reader also features an LCD to show personnel meaningful user messages and has many airport-specific door modes such as “Passenger Mode” and “Lobby Mode” for extended doors-open times at air bridges. With the readers in place, only authorized and trained personnel can use the air bridges.

HKIA also uses portable readers for mobile security. The reader allows security personnel to make roaming checks throughout the airport and can also be used at temporary entrances where there is no mains power. This ensures the highest level of security at all times

SDI Upgrades a Midwest Airport's Access Control
System Development Integration (SDI) was contracted by a US international airport in the Midwest to upgrade all hardware and infrastructure to support the biometrics component of its access control system (ACS). The ACS controls the passage of staff (not passengers) into secure and sterile areas of the airport. In order for the ACS to be fully secure, the system must address three checks for an individual's identity: something s/ he has (ID badge), something s/he knows (PIN) and something s/he is (fingerprints).

To minimize service disruption, three subprojects took place. The first challenge was to issue new smart-card ID badges containing unique biometric data to more than 45,000 active holders in a period of less than three months. During this process, every active badge holder was required to submit a new badge application, have his/her badge photo updated, and enroll in the system with two fingerprints that were subsequently stored on an encrypted smart card as a biometric template.

The second subproject targeted the installation and deployment of biometric card readers at each of the employee checkpoints in the airport in order to enhance employee screening. Biometric verification would now be required to allow employee access through each checkpoint. A new fiberoptic network and new control panels were installed throughout the airport as the badge enrolment process took place.

The third subproject focused on the biometric validation of badge holders entering the airfield at a busy drive-in post. The post witnesses airfield access to between 6,000 and 7,000 vehicles per day. This high-traffic entrance screens not only airline employees, but contractors and other service personnel. With the implementation of wireless handheld biometric card readers, all access is now granted through validation of biometric information. A customized gate software application provides the security officer with instant visual verification that all people entering with vehicles are valid badge holders.

Bosch Secures Berlin International
Bosch Security Systems was selected to install security and safety systems at the new Berlin Brandenburg International (BBI) airport. The scope of the order includes the planning and installation for the fire alarm system, electroacoustic emergencywarning system, emergency exit door controllers, intrusion detection system, video surveillance, access control and building functions.

BBI represents the most important infrastructure project in Germany's capital region and is Europe's largest airport construction site to date. It is built to better connect Berlin and the entire region with major destinations in Europe and throughout the world. Further, it will be an important contributor to the regional economy; BBI is expected to create up to 40,000 new jobs.

Optimal protection against fire hazards with around 19,000 automatic and manual fire alarms and a whole host of fire control systems will be installed. They will be connected to a total of nine networked UGM universal security systems. The networked public address (PA) and evacuation system with around 11,500 speakers is planned for passenger information and evacuation in the event of a hazardous situation. The PA and evacuation system will also be used for voice announcements for passenger information and for the gate-paging stations.

In addition, an intrusion detection system will be integrated with the fire, PA and evacuation systems. The information for surveillance is recorded using around 1,200 emergency call couplers. The video surveillance system consists of 300 network dome cameras, 260 HD video cameras as well as 900 video cameras of different types. It will be managed by the Bosch video management system. Bosch will also install more than 600 kilometers of copper cable for the fire alarm and intrusion detection systems as well as the electroacoustics.

The new BBI airport will most likely go into operation in June 2012. With 280,000 square meters of terminal and pier space, a baggage sorting hall of 20,000 square meters, as well as a 9,500-meter conveyor line, it will be one of the largest airports in the world.

Moving About in Airports with Biometric Scanning: The World at Your Fingertips

Moving About in Airports with Biometric Scanning: The World at Your Fingertips

Editor / Provider: Camille Shieh | Updated: 7/6/2011 | Article type: Infrastructure

Advanced technologies such as biometrics-credentialing kiosks are not just seen in movies;they are gradually appearing in high-risk settings such as at airport customs. Not only do biometrics help screen travelers, they are also exceptional management tools in safeguarding restricted areas and keeping tabs on attendance and payroll records.

Biometrics have not been popular in airport settings until recent years, as a result of the technical barriers that hindered their performance in real-life situations. Often, a biometric reader that performed perfectly in a laboratory test is less impressive in real life, as various environmental and hygienic factors obstruct accurate scans.

In the case of fingerprint scanning, most optical sensors are configured to look for the presence or absence of total internal reflectance (TIR), which is the phenomenon whereby the interface between glass and air acts as a mirror at certain angles, said Phil Scarfo, Senior VP of Worldwide Sales and Marketing, Lumidigm. “The contact between the skin and the platen defeats the TIR, allowing those points of contact between the finger and the sensor to be imaged. Thus, those points of contact must be complete and visible to enable the conventional sensor to collect a fingerprint image. Optical and electronic sensors simply cannot do this time after time. All too often, 3 to 20 percent of the time, the reader is unable to detect the fingerprint.”

In recent years, multispectral imaging technology has solved the fingerprint-capturing problems that conventional imaging systems encounter in less-than-ideal conditions. “This solution is based on using multiple spectra of light and advanced polarization techniques to extract unique fingerprint characteristics from both the surface and subsurface of the skin,” Scarfo said.

As airlines and airports work to balance traveler convenience with the need for security, they will increasingly integrate advanced biometricsbased identity authentication technologies into the growing range of self-service processes within air travel, such as passenger and baggage check-in kiosks, said Scott Basham, Location, Perimeter and Surveillance Security Asia-Pacific Program Lead, Unisys. “This is because self-service processes have extended deeper into the air travel cycle — from online flight reservations to today's passenger and luggage check-in kiosks at domestic airports just prior to boarding a flight.”

Staff and Crew Management
In “Recommended Security Guidelines for Airport Planning, Design and Construction” revised by the US Transportation Security Administration in May, while the use of biometrics is not a federal requirement for US airports, the higher degree of security is recommended for strategically significant facilities or high-risk portals.

Commonly used access control features that tie in with time anddual-authentication process, which includes a smart card with a photo ID and biometrics, said Scott Mahnken, VP of Marketing, Bio-Key International. “Depending on the life cycle of the access control system installed, incorporating time and attendance into access control is a logical step in the upgrading/ replacement process,” said Mark Moscinski, VP of Safety and Security, System Development Integration.

Restricting access for aviation staff can be easily configured by applying biometrics credentialing to sensitive entry points. For unsupervised access to high risk areas, biometrics clearly offer a more secure solution, Basham said. “But care must be taken to ensure that the biometrics cannot be circumvented — either through biometric spoofing or tailgating, where multiple people enter at the same time without verifying their separate identities.”

“At Yeager Airport in West Virginia, hand geometry readers have been used since 2001, restricting access to the control tower located in the airport terminal and also to the HVAC system and other sensitive equipment,” said , VP of International Sales, Ingersoll Rand Security Technologies. “The control tower doors are opened about every five minutes around the clock. The hand readers are all networked to the airport's central security system.”

Staff's time-and-attendance records can be simplified as well. “Biometrics are often at the front end for time-andattendance systems in all types of industries, including transportation venues,” Diedam said. “Contrary to using badges, sign-ins or other ways of tracking employees, a biometric reader assures that no employee can punch in for another, eliminating time fraud and reducing payroll costs. This is why so many organizations now employ biometrics; for instance, at the Miami International Airport, the hand punch terminals take time and attendance even for janitorial services.”

Eliminating “buddy punching” is only part of the reason that many want to upgrade, Scarfo observed. “Biometric time-and-attendance systems also prove to be more cost-effective in the long run. Within three to five years, biometric solutions become break-even with plastic cards because of the associated costs with cartridge and printer replacements, as well as the support and management of the system.”

“We've received many requests for facial-recognition technology for airport employees,” said Aluisio Figueiredo, COO of Intelligent Security Systems. “The main factor is that it is not as intrusive as iris and fingerprint scanning. However, the drawback is that equipment setup must be in accordance with the environment; cameras must be placed in specific areas under specified lighting to ensure accurate readings. This technology cannot be set up just anywhere.” The technology can be installed in both large- and smallscale airports, as it is affordable and can be implemented according to various planning needs and available budgets.

Dangers Screened Out
For external screening of travelers coming into or leaving the country, biometric scanning does provide double prevention against possible security breaches. In some airports, a database of collected personal biometrics data is integrated and connected to government databases for quick referencing and tracking of suspicious persons. “The database can be connected to a similar installment, such as the FBI's identification system, or it can be maintained independently in the cloud,” Mahnken said.

Since 2002 in Europe, internal and external security systems in many European airports have already been interfaced with government databases to ensure air travel safety, said Arjan Bouter, International Sales Manager, Nedap Security Management.

Sky is the Limit: Airport Security Soaring into Smart Management

Sky is the Limit: Airport Security Soaring into Smart Management

Editor / Provider: Camille Shieh | Updated: 7/4/2011 | Article type: Infrastructure

Heightened aviation security since the 9/11 attacks and subsequent terrorist threats has brought along increased awareness, for danger can be detected or deterred before brought into the air.

As new airports continue to be constructed and existing ones upgraded, newer technologies like HD video surveillance, video content analysis and management software are gradually adopted to enhance the security and safety of complex airport and aviation operations. Security management of the entire premises is, thus, increasingly highlighted. One of the top challenges faced by system integrators today is assimilating new technologies and products into existing systems, as old and new systems often have trouble communicating with one another. However, should an airport project adopt technologies based on an open platform, integration would be much smoother, with extra cost minimized and existing investment extended.

It is common to find restaurants, retail shops, cafes — and even hotels, spa centers and casinos — in today's airports. “As airports provide a global transportation network among cities, they are important hubs and have considerable regional economic significance, giving the cities they serve great commercial advantages over those that do not have them,” said Uwe Karl, Head of Airport Solutions, Siemens Building Technologies. “Airports will undoubtedly continue to grow in number, and existing airports will continue to grow in size in order to satisfy the increasing demand for mobility. The systems employed to protect them, therefore, need to accommodate such growth, with a smooth migration path to allow systems to expand easily.”

Newer, Bigger, Better
The mature markets in North America and Western Europe see a continuation of security upgrades. “The sales outlook is promising as threat has not lessened,” said Mark Wilson, VP of Marketing, Infinova. “The biggest need requested by airports in North America is HD video surveillance.”

The US market is continuing at a good pace, fueled by the events of 9/11 and carried through up until the Obama administration, said Mark Moscinski, VP of Safety and Security, System Development Integration. “Federal stimulus funding has also kicked in for many airport security projects with design phases giving way to implementation projects; in fact, we seem to be only at a halfway point through the federal funds for the realization of our current projects.” In the last few years, large airports in Europe have had more difficulty with growth than smaller airports, and this trend will continue in the next five years, said Arjan Bouter, International Sales Manager at Nedap. “In Europe, large airports are looking for more flexible solutions to curb the impact of disruptions by extreme weather conditions and other disasters.”

Newer airports in the Middle East and Asia will also challenge the European ones, Bouter continued. “Obviously, this will have an effect on security management systems; new safety and security platforms will contribute to a lower TCO that improves the competitveness of European airports.”

New and upgrade projects in emerging markets, such as China, India, Southeast Asia, Eastern Europe, Russia and Latin America, see healthy growth in number. “We recently completed a project for 22 airports in India, in addition to other major projects in Easter Europe and the Middle East,” Wilson said. “For these projects, we used a combination of analog and HD cameras, and in many cases, they are taking advantage of the existing fiber optics.”

These regions are characterized by strong expansion. For instance, China has planned over the next five years 55 new airports to cover the expansion of traffic, Bouter added. “These regions will implement new security platforms, often based on open standards.”

Many airports in these regions are also undergoing a “face-lift,” and usually for these projects, HD and megapixel technologies are sought after in conjunction with advanced software like video content analysis (VCA), said Aluisio Figueiredo, COO of Intelligent Security Systems. Overall, the physical security market for airports is expected to double by 2016, said Julian Harris, Research Analyst for Aerospace and Defense in North America, Frost & Sullivan. “Perimeter security is growing significantly due to technology innovation and the push to protect patron safety. We see fiber-optic fencing experience more growth than traditional fencing, as the former continues to be invested in.”

In video surveillance, Harris sees more IP surveillance installed at larger international airports, while smaller airports opt for analog technology with less integration of disparate security systems. “In terms of access control, fingerprint readers tend to be adopted by larger airports, while smaller airports stick to standard access control protocol, suggesting that larger airports are exploring more options.”

Biometrics will continue to play an increasingly crucial role, agreed Scott Mahnken, VP of Marketing, Bio-Key International. “Convenience and security are paramount in airports, and biometrics are virtually impossible to corrupt yet involve no cards, passwords or tangible assets. Documents may be forgotten, but we will always have our fingerprints or other biometric attributes.”


Government In volvement
As most airports are state-owned, municipal, state and federal governments are crucial players in determining what security measures need to be set up in airports. “There is a maze of security and regulatory issues facing every airport,” said John Diedam, VP of International Sales, Ingersoll Rand Security Technologies. “It starts with a thorough understanding of Title 49 CFR Part 1542 of the US Homeland Security's Transportation Department, ranging from who must be in charge, how to become compliant and airport tenant security programs, to security of various locations within the airport, law enforcement and access control. The first objective is to reduce the complexity of this and all other pertaining regulations, along with the security ramifications.”

Next, one needs to determine and resolve airport security and fire safety vulnerabilities, Diedam continued. “Security could be almost perfect if everything was locked down and nobody could come or go, but that's not feasible. What needs to be done is to assure that security is at a high level but innocents can escape when needed. There's a compromise, and they are typically found within the regulations aforementioned and local codes and regulations.”

In the U.S., every commercial airport is owned and operated by a local government entity — city, county, state or port authority — each with its own political structure, funding capabilities, environmental/noise requirements and security/law enforcement support, said Art Kosatka, CEO of TranSecure (a member of the Association of Independent Aviation Security Professionals). “There are federal regulations, as well as state and local building and electrical codes and fire and life safety codes, which must be met.”

“We often see that local or state governments are strongly involved in the economic development of the region/country where the airport is situated,” Bouter said. “Under such circumstance, local solution providers are often favored to take on new or upgrade projects.”

Airports are used as hubs to create new business in many places, observed Gerard Otterspeer, Product Marketing Manager for CCTV, Bosch Security Systems. “At times, international consultants such as ADPI, COWI-Larsen, Bechtel and Parsons set the security standards in airport projects while they help clients plan and design aviation construction projects.”

New ≠ Best
While there are strict and high security requirements, not all airport projects use the latest technologies the security industry has to offer. “Airport clients are very savvy customers, knowing what they need and insisting that their integrators and manufacturers provide systems that meet their expectations for both performance and budget,” Wilson said. “With even new construction projects, it is not unusual to see analog video implanted in areas where it sufficiently does the job. In fact, there are many hybrid and coexisting systems at airports.”

“Airports focus on leveraging as much of their existing technology as possible; they do not have a rip-andreplace mentality,” said James Chong, CTO of VidSys. “Additionally, they tend to wait to use new technology until it has been proven in the marketplace.”

“Generally, we like to think in terms of first providing an initial concept of operations (ConOps) for the customer — what are you doing, why do you need it, where is it required, what is the threat you are addressing and what are the priorities,” Kosatka said. “This should drive the technology decisions, one of which might be that new technology in consideration isn't right for the airport's actual needs at all.”

Securing airports is a complex undertaking, remarked Larry Lien, VP of Product Management at Proximex (an ADT Security Services company). “Airports are continuously looking for ways to improve ConOps to best protect passengers and employees, as well as avoid poor publicity and lost revenue from security incidents. Some airports leverage the latest technologies to fit specific project requirements. They evaluate many factors to make the decisions, including the benefits, risk factors, costs and ROI for new technologies. Newer technologies, such as HD cameras, offer significant advantages because airports may leverage fewer cameras but still cover a large area. However, airports must still consider the ability of newer technologies to communicate with existing systems and fit within the ConOps.”

In airport projects, proven brands, solutions and products are preferred, while current technologies are followed in a general fashion, Otterspeer observed. “HD and even full HD products have gained popularity in this kind of projects for applications like forensic search and wide-angle viewing; however, during the course of a project, the technologies used can change.” Technologies used are much influenced by the consultants in many cases.


HD and VCA
Using HD video streaming can help extend the life of the existing analog cabling of an airport surveillance system while providing better forensic evidence and the zero latency needed for live monitoring using PTZ camera controls, Wilson Vertical Market said.

In airport security, the devil is indeed in the details. “HD delivers a wide-screen format that captures more useable image content, reducing the amount of empty sky or foreground in a scene if a wide-viewing angle is needed, such as at baggage claim areas,” Otterspeer said.

Motion sensor technology has certainly improved and can now detect farther and more precisely than previous versions, said Rolland Trayte, President of FutureSentry. “Solar-powered wireless sensors offer simple installation and add the detection range to 1,000 feet. Advanced applications can also add analytics to further ensure robust detection and reliability of alarming inputs, and enable the system to ‘learn' the difference between uniquely shaped objects.”

Adoption of VCA for airport monitoring remains low, despite a visible growth in the last couple of years. “VCA is used in about less than 10 percent of airport projects currently, with potential to grow moderately to 15 to 20 percent in the next few years,” Harris said.

“Security standards are not in place yet to get this widely adopted in the market.” Actual applications, Otterspeer added, include line crossings for external perimeters and wrong-way or loitering detection for strategic locations such as air traffic control towers, customs gates and aircraft ramps. “VCA is used from site to site, depending on what the project requirements are,” Moscinski said. “Currently, simple analytics are used most often, as the technology still has several barriers to overcome, such as unsatisfactory hit ratios and high FARs. Simple VCA like motion and object detection can help identify when someone has crossed checkpoints from the nonsecurity to the security side, alarm relevant personnel and provide evidence to assist with tracking and identifying the intruder. We see the most active VCA evaluation now taking place for use in perimeter security.”

Another key technology identified is ALPR, which is very common these days at Tier-1 (major) airports and is becoming increasingly common at Tier-2 and even some Tier-3 airports, said Jim Kennedy, President of Inex/Zamir. “The primary use is for parking revenue management to prevent ticketswapping fraud and subsequent revenue losses. Increasingly, we are requested to provide a ‘list-matching' capability to our system so that local authorities can be immediately notified if a vehicle that is on a watch list enters a specific parking facility.” The disappointment with VCA often stems from undelivered functions it promised in the beginning, Figueiredo said. “Many vendors are pushing less-than-ready VCA products out to customers to make quick cash even if the technology is still not mature enough for real-life usage, ultimately creating more problems for customers. The accuracy of VCA reading is, on average, 85 percent or better when utilized in a controlled environment with strategic camera position and correct lighting.”

HD, megapixel cameras and video analytics may provide improved inf o rma t i on and s i tua t i ona l awareness, but they introduce enormous operational costs in terms of bandwidth and storage requirements, and other issues such as forensic capability and privacy.


Drawing Together
In expansion projects, such as a midsize, domestic airport scaling to large, international airport or a large-scale airport expanding current facilities, new security systems and technologies, such as HD video, IP-based video and VCA, are often introduced. “These new technologies cannot be installed independently of other existing security systems and require shared information,” Lien said. “Security operators must use different consoles and different systems to manage incidents. The costs associated with operating independent and nonintegrated systems, such as training, additional skills required for reporting and longer incident response time, are significant.”

Yet connecting disparate systems under one central command is no easy task. “We face a lot of problems with legacy systems,” Figueiredo said. “Sometimes, there is no documentation, no SDK, or the company responsible for the system simply went out of business. System integrators (SIs) like us basically have to make sure that the systems work together through the use of an open-platform approach.”

“Typically, each installer/integrator is focused on making sure its own system is installed and runs correctly,” Lien added. “Expectations of how to integrate and what an integrated system can realistically accomplish could often be miscommunicated. Entities that require communication between systems should find an experienced SI that can help them set clearly defined goals for their environments.”

For security purposes, central management software like physical security information management (PSIM) is a good way to maintain unified control over different systems in operation. “A true PSIM solution enables one complete and intelligent security system by aggregating information from various subsystems and automating processes as appropriate to effectively manage situations,” Chong said.

PSIM software is a good option whenever doing a significant expansion or a new project, added Joshua Koopferstock, Director of Marketing, Feeling Software. “Multiple systems, mapping and SOPs should be combined within a single software package, and this common operating picture in airports is becoming increasingly important as security systems become bigger and more complex as the facility expands in size.” To facilitate smooth integration of hardware and software, as well as the old and the new, adopting an open approach that grants partners with access to their SDKs and APIs is vital, Koopferstock said.

“Oftentimes, SIs and PSIM vendors combine their knowledge of and expertise in physical security technologies, process management, and security policy and compliance to provide organizations with a complete situational awareness and management solution,” Chong said.

In addition, SIs and airports should work together to consider their ConOps and how the systems should function after integration, Lien remarked. “Understanding process flows, automating tasks, correlating information and giving usable information to operators will help airports optimize their operations and realize cost savings.”

Many are now focused on quickly identifying situations and disseminating the information to the guards, police and other necessary agencies in real time, Chong said. “Airports are also starting to use a single security asset, such as a camera, for multiple uses. For example, security may use a camera to see if someone is walking around the runway, while air side operations may use the same camera to verify if the gate is available for an arriving flight.”

The growing complexity of daily airport operations demands equally diversified security systems. Smoothly integrated systems, such as access control and people tracking, will help with the fluidity of security management on aviation premises. Biometrics, the new kid on the block for airport access control and ID authentication, will be explored next.

Prominent American University Secures New Facility with L-1 4G Fingerprint Readers

Prominent American University Secures New Facility with L-1 4G Fingerprint Readers

Editor / Provider: L-1 Identity Solutions | Updated: 6/23/2011 | Article type: Education

While the use of biometrics in higher education is still relatively a new concept in North America, it has seen success in the few facilities it has been implemented in. The latest educational institution to implement a biometric access control solution is considered to be one of the top research universities in the world. By day, over 40,000 students roam the campus grounds and by night over 10,000 university housing residents go back to their residence halls and plazas.

With such a large student population, security becomes a big issue. “Their brand new facility needed to incorporate a number of features, that would reflect not only the progressive nature of the institution but also address the critical security issues of an on-campus police station”, said Shiraz Kapadia, COO, Bioscrypt (The Enterprise Access Division of L-1 Identity Solutions). Access to new rooms such as a holding cell and the transportation and protection of evidence transferred from the main station into the secure property room, required restricted access to certain personnel.

Critical tasks such as the ones mentioned above, called for a physical access control solution which would be robust enough to handle the different layers of security clearance within the building, but still simple enough to handle the management of the system. Enter Bioscrypt (The Enterprise Access Division of L-1 Identity Solutions) and their market-tested and customer proven 4G solutions.

Secutech 2011 Holds the Key to Future Security

Secutech 2011 Holds the Key to Future Security

Editor / Provider: Submitted by Messe Frankfurt New Era | Updated: 6/15/2011 | Article type: Hot Topics

Secutech 2011 reached new heights for its 14th annual exhibition. This Asia's most international exhibition and conference for total security solutions took place from April 20 to 22. Over three days, tens of thousands of security professionals came for the latest in products, solutions and conference topics.

Asia's security demand has boomed in recent years, due to growing security awareness and strong economies. The 14th edition of Secutech, the international exhibition and conference for electronic security, showcased the latest products. Offerings included the largest IP equipment pavilion in Asia, access control/biometrics, HD surveillance, intrusion alarms and home automation. Numerous global brands displayed a wide variety of products, enabling buyers to find the right solutions for their needs under one roof.

A strong turnout of 23,782 international and local visitors packed the floors, making their way to exhibits as well as attending educational seminars. Attendance increased by 5 percent from 2010, with visitors flying in from more than 95 countries to Taipei. The show was a one-stop shop for distributors, resellers, importers and integrators to connect with solution providers.

Business-matching sessions connected buyers from specific countries with reputable suppliers. Buyer groups included decisionmakers from Japan, Singapore, Turkey, Italy, Thailand, Vietnam and India.
Total Security Lineup
Secutech 2011 hosted 550 suppliers spread out over 35,873 square meters. Exhibitors showcased a total security lineup, hailing from more than 20 countries. From key components to finished products and vertical-specific solutions, Secutech was the best sourcing platform for professional security buyers. Global manufacturers and component suppliers turned out for Secutech, making it a truly representative exhibition.

Video surveillance was represented by more than 150 manufacturers, including Brickcom, CNB Technology, DynaColor, GVD, Hikvision Digital Technology, iCatch, Infinova, ITX, Koukaam, Nuuo, Pinetron, Qnap, Sony, Vivotek, and many more. Products displayed featured software, recording storage, megapixel cameras, video analytics and VMS.

Two new product zones made their debut this year: Software and Storage.In conjunction with the show's themes of HD/Megapixel, Software and Storage, the software zone featured globally renowned providers such as Milestone Systems, ObjectVideo and Pelco (a Schneider Electric company). The Video Storage and Recording zone covered 200 square meters in the IP surveillance pavilion, rounding out the range of video solutions in the HD era.

The access control and biometrics pavilion of 116 booths covered everything from card readers, IP access control solutions, e-home systems, face recognition, fingerprint scanners, palm vein technology to intercoms and electronic magnetic locks. Security auditing solutions such as RFID products and technologies were also displayed. Leading brands on-site included Assa Abloy, ChiYu, Entrypass, HID Global, Kaba, MicroEngine and Rosslare.

The third CompoSec — the only international expo for components in security technologies and applications — was held concurrently with Secutech. CompoSec completes the security supply chain, covering a spectrum of key components ranging from chipsets and modules to subsystems and embedded software.

Exhibitors include Intel, Intersil/Techwell, Hitachi, LG, OmniVision, Grain Media, Stretch, Texas Instruments, Xilinx, Gennum, Clairpixel, Pixelplus, Kiwi Semiconductors and Macro Image. A new zone for CompoSec 2011 was the Memory Storage zone, gathering hard-disk drive (HDD) and flash disk providers under one roof. Renowned brands such as Western Digital, Transcend, Innodisk, Apacer and Hitachi displayed storage solutions expressly for surveillance purposes.
Show Attractions
Intelligent Buildings and Smart Homes
Intelligent buildings and smart homes are increasing, as building automation becomes a reality. Secutech 2011 enabled greater dialogue at the Home Automation pavilion, which welcomed representatives of intelligent building associations and organization from China and Korea.

Camera Excellence Award
The Camera Excellence Award was a world-first camera shootout at the showground, allowing objective judges and discriminating buyers to determine the best megapixel and HD cameras from live performance.

A total of 25 cameras were tested on-site, including 19 megapixel cameras and six HDcctv models. HDcctv camera entrants included CNB, Hi Sharp, EverFocus Electronics, Micro Digital, Mintron and Shany. Megapixel cameras on display featured Axis Communications, Arecont Vision, Brickcom, Brainchild, Dahua Technology, D-Link, EverFocus, Etrovision Technology, Hikvision, Huanghe, Panasonic System Networks, Shany, Sony Corporation, TeleEye and Vivotek.

Hundreds of visitors stopped to observe how the cameras delivered and cast their votes for the top performers. After a two-day voting period and professional judge panel discussion, the winners were announced. HDcctv camera awards were presented to Micro Digital, Mintron and Shany. For megapixel cameras, six models from Axis Communications, Brainchild, Brickcom, Panasonic Systems, Sony Corporation and Vivotek were recognized.

Country Pavilions
Country pavilions allowed security professionals to identify mutual growth opportunities and develop a competitive edge. This year's pavilions included the U.S., Korea and China.
Quality Education
Secutech 2011 not only featured comprehensive sourcing options, but also showcased top-notch security education. A total of 20 seminars, comprising 115 interactive sessions, makes Secutech the premier security destination in Asia. Conferences held concurrently at the show were the Global Digital Surveillance Forum (GDSF) and CompoSec.

Three Keys: HD /Megapixel, Software and Storage
GDSF is a conference dedicated to digital video solutions. In its 10th year, the conference was divided into three tracks: HD/Megapixel Surveillance, Software and Integration, and Storage Management.

1. HD/Megapixel Surveillance Forum
The keynote of the HD/Megapixel Surveillance Forum was delivered by Hiroshi Sekiguchi, IP Security Product MD, Panasonic Systems. He delved into the IP video surveillance market trends, discussing how to truly integrate megapixel technology.

Followed by Panasonic were Axis Communications, Hikvision, Vivotek and EverFocus. Fan Look, VP of Axis North Asia, explored market development in network video in storage, new sensors and adaptability. Both Hikvision and EverFocus showcased real-life applications of traffic monitoring with network surveillance.

Vivotek presented the latest breakthroughs in storage and recording. This was followed by D-Link's presentation on video analytics and VMS solutions. The last two sessions were delivered by Plustek and Osram, detailing how to best make use of video surveillance.

2. Software and Integration Forum
The Software and Integration forum kicked off with a presentation by Firetide. Firetide discussed video mesh technology and how to deploy it for critical applications. It was followed by a keynote speech from Pelco (a Schneider Electric company). “Integrated security meansbetter protection for people, assets — and the bottom line,” said Pramoud Rao, Security Ambassador for Asia
Pacific, Schneider Electric.

ObjectVideo discussed the value of analytics, along with addressing issues with interoperability and flexibility. Open platform VMS providers Genetec and Milestone Systems discussed third-party integration, a critical issue as more convergence takes place.

3. Storage Management Forum
The Storage Management forum's opening speech was delivered by Seagate. Danny Lim, Marketing Manager for Asia Pacific, Seagate, explored how the adoption of HD and megapixel cameras changes storage requirements. As a newcomer to GDSF, Promise also addressed storage management.

Three sessions focused on IP product launches from Brickcom, ArcSight and NVT. Taking place over three days, GDSF was made up of 18 sessions, covering the full spectrum of IP video.
Product Design for HD Surveillance
CompoSec 2011 covered four themes geared toward engineers and R&D professionals: HD Surveillance, Improved Transmission and Interfaces, Next-Gen Identification and Management, and Green Security. This year's opening speeches were delivered by Intel and Huper Laboratories, discussing HD performance.

Texas Instruments delivered the keynote speed at CompoSec. Sunny Lee, Director of Business Development for Texas Instruments, explained how embedded technology supports more green video products.

Sony's presentation introduced new technologies for generating higher resolution, lowering S/N ratio and improving color reproduction.

Aptina, Aspeed and Pixelplus explored breakthroughs in CMOS image sensors. Aptina's image sensors boost

Secutech 2012
Dates: April 18 to 20, 2012
(15th edition)
Venue: Taipei Nangang Exhibition Center, Taiwan
resolution, enabling cameras to perform more accurate video analysis. Aspeed presented how best to perform server management, desktop virtualization and surveillance processing.

HD was the emphasis for Hisilicon and Grain Media. Grain Media not only focuses on network cameras, but plans to expand to hybrid DVRs and NVRs.

Solution design was an emphasis for product development. Stretch spoke on the importance of integration, video analytics and image processing.

Xilinx highlighted effective processor performance, even with lower power consumption. From the HDcctv perspective, Gennum explained how transmission can be extended for HD images.

Storage plays a crucial role in video surveillance, providing effective and reusable evidence. HDD and solid-state disks (SSD) work to provide effective recording. “A good SSD is worth every penny,” said Alex Kuo, President of Memoright. Both speed and performance determine the quality and scalability of storage. Innodisk stressed how different applications require individual SSD solutions. Western Digital, which announced its intent to purchase HDD competitor Hitachi Global Storage Technologies, further elaborated on the challenges of HD storage.

The last session of CompoSec was closed by NXP. RFID usage, ranging from automotive, identification, wireless infrastructure, lighting, industrial, mobile, consumer and computing applications, was discussed. The presentation looked at how the technology could be used in the future.

Secutech 2011 proved to be Asia's top annual security show. Combining technologies, conferences and networking opportunities, the exhibition is consistently the most professional platform for security in the region.

Take a Pulse on International Market Dynamics

Take a Pulse on International Market Dynamics

Editor / Provider: The Editorial Team | Updated: 6/3/2011 | Article type: Hot Topics

Almost halfway into 2011, a&s surveys and gathers regional market updates for your reference, with specific focus on the analog-to-IP transition and HD development in the real world.

Global markets have enjoyed a rather fruitful year from 2010 to 2011, and growth opportunities and potential for 2012 look very promising. Although some regions see slower growth than others, the effects of the 2008/2009 recession have worn off for many.

In North America, growth has been steadily returning, although no sharp increase in revenue or sales volume is witnessed. "Government spending in the U.S. is still tight due to the weak economy, although the market continues to grow at a steady pace," said Peter Simmons, Marketing Director for Seon Design. "In particular, biometrics sees a growth in demand for US schools."

On the Western European front, the Italian security market continues to expand after the recession, although a

Robert Hufton, Applications Engineering of Video Networks, Teleste
concern over civilian privacy is creating mixed feelings toward implementing security systems. "Privacy is highly regarded by the Italian general public," said Roberto Terranova, Sales Director of Securitaly. "For this reason, we're not seeing as much activity in the market as anticipated."

In the U.K., residual effects of the recession linger. "Many projects are on hold, and IP uptake is slow," said Robert Hufton, Applications Engineering of Video Networks, Teleste. "Some verticals such as railways are going to do well, especially in France, the U.K. and Algeria."

In Oceania, the current instability and power struggle in the Australian government, along with the reconstruction in the south, mean that the US$36-billion, fiber-to-the-home initiative might get scrapped, said Wayne Palmer, MD of Australian Security Supplies. Despite these, solution providers are optimistic about and eager to expand the market even further. "The market is bound with opportunities, giving us a steady two- to four-time growth each year," said Michael Mackowiak of Aucom Surveillance Systems. The country's tight regulations on installers for certificate and license renewals contribute to a highly competitive environment that upholds the "survival of the fittest" principle.
Emerging Markets
The Middle East is now busy with new projects of all scales after recovering from the recession in 2010. “This
Natan Cuglovici, Technical Director of Vault
year, there are projects for airports and seaports, as well as industrial projects in oil and gas,” said Grahame Edwards, Technical Director in Dubai, Schneider Electric.

The market is equally promising in Turkey. "Turkey is a large country with much potential," said Rustu Arseven, GM of Tesan IletiSim. "This year, we are predicting at least 50-percent growth in our security business."

In Iran, industry players tread cautiously amidst improved market conditions in 2011. "The situation in 2011 is much, much better than 2010 due to less social and political issues," said Mohammad Zarei, Sales Director of Hedayat Security Systems. "However, the situation for 2012 remains murky in our opinion."

Opportunities also abound in Central Asia. "Kazakhstan is a very young country, meaning that there are abundant project opportunities, including major government and large-scale infrastructure projects," said Nikita Panfilov,
CCTV Product Manager, Intant.

Eastern Europeans also agree that the local markets have been recovering from the recession, and 2011 and 2012 will see visible expansions and growing numbers of projects. "In Poland, we follow the general trends in the world, but our market was not affected much," said Monika Mirczewska-Stanosz, Import Manager of Suma. "The growth since recovery has not been as huge as everyone expected, but it didn't drop. Growth in 2011 will be even more than last year."

"The Bulgarian security market has been hit quite hard," observed Georgi Kolev, Sales Manager of Avicam. "The market prefers entry-level products; although 2011 has seen a big growth in sales volume, the margin is actually smaller as cost-effective products were sourced and sold at a higher volume than before."

"In 2011, the growth in Bulgaria is not significant," added Rumen Palmov, Sales Manager of Sectron. "Project-based businesses are still down; large-scale projects were cancelled or postponed, and construction also came to a halt."

On the other hand, the market in Bulgaria is benefiting from its rising crime rate, and people want to employ security systems as they are more affordable nowadays, Kolev said. "The market situation will get better as we go into 2012, and achieve further heights," Palmov said.

In South Africa, the market witnessed a slowdown after the World Cup, said Simpson Jong, MD of KYLink Electronics. "Recently, banks have been strict on approving mortgage applications, which causes further delays
Arnon Kulawongvanich, GM of Sales and Marketing, Chubb (a UTC Fire & Security company)
to ongoing or new projects." The market is dominated by large companies from Europe and the U.S., but Samsung and Sony enjoy sizable market shares as well.

Across the world in Latin America, Brazil, Argentina, Venezuela and Trinidad and Tobago are ready to deliver more products and handle more projects in 2011 and 2012. "The Brazilian market is growing fast and is expected to grow even faster due to upcoming world events," said Natan Cuglovici, Technical Director of Vault.

"Currently, all vertical projects in Argentina are surging, and name brands are used in project-based segments by system integrators (SIs)," observed Roberto Alvarez, President of Selnet.

"There is great demand for security and video surveillance products, as Venezuela suffers from high crime rates," said Antonio Formica, CEO of Segintdig de Venezuela. Fueled by the high demand, interest in new security technologies is much higher than expected.

"The Trinidad and Tobago security market is booming, along with the rest of the Caribbean region," said Jason Fraser, MD of BVRT. The growth has encouraged regional distributors and SIs to visit Asia in person, instead of going through Latin American distributors, in order to source suitable products for the residential market.
The Asian markets have been expanding quickly in recent years as well, due to growing awareness. "We're growing at a healthy rate every year in India," said Zaheer Ali, Director of Oriole Electronics. "The security market is
Monika Mirczewska-Stanosz, Import Manager of Suma
growing at 20 to 30 percent on average. What is lagging behind is a more systematic approach, as many lack real capability and experience."

"The growth in India is huge, but nobody knows how to properly coordinate equipment or systems in an operational aspect," added Sam Yang, Director of Special Operation Services, Security & Personnel Services. "Technology is just a tool; we need to know what the tool does and how to properly manage it."

Equally promising markets can be found in the Philippines, Indonesia, Malaysia, Thailand and Vietnam. "There are a lot of opportunities in the Philippines, as the install base is still quite small," said Antonio Uy, Marketing Manager of DigitalCCTV. "As a result of prices coming down, the general public has become interested, from residential units to small retail shops."

Price is still the top concern in the Philippines, added Marc Yu, Manager of VM Security Technologies. "However, prevalent petty crimes and government projects are key drivers behind this growing market."

In Indonesia, the market is estimated to have a 15- to 20-percent growth rate in 2011 and 2012. This growth is partially fueled by a growing concern over possible terrorist activities, explained Andrianto Setiadi, President of Wisma Sirca. "Our company has seen a roughly 20-percent increase in sales activity in 2011," said Dadang Maulana, Director of GSB Security. "The projects we have worked on lie in the banking, government and corporate sectors."

The Malaysian security market will grow as well, but maybe moderately, said Mohamed Mohideen, International Sales and Marketing, Cmos Dotcom. In recent years, the market has started to focus more on quality products for longer life cycles, leading to smarter investment in TCO and less future maintenance.

Both the Thai and Vietnamese markets are seeing rapid growth. "The surveillance market in Thailand has expanded by 30 to 50 percent since last year," observed Arnon Kulawongvanich, GM of Sales and Marketing, Chubb (a UTC Fire & Security company). "Hot verticals include airports, private companies and residential
Nikita Panfilov, CCTV Product Manager, Intant
homes. The surge is a result of growing needs and requirements, as well as the government's driving various projects."

"In Vietnam, the enterprise sector is doing well, such as service, manufacturing and transportation industries," said Leo Wu, Vice Director of Trung Loi Trading. "However, the tightening of government budgets has led to heavy delays in government tenders."

For the more matured markets in Hong Kong and Singapore, only limited growth is seen. "Hong Kong was affected by the recession, and our sales activity did not return to the level it had in 2008 until this year," said David Leong, VP of International Sales at STL Security.

The Singaporean market is highly competitive, as the total market size remains small, said Ang Sze Meng, PM of Golden Sprint Security System Enterprise. "This means that revenue growth and market growth are both limited as well."
Analog to IP
Frost & Sullivan recently modified its prediction that IP sales will top analog ones from 2013 to 2016, and several veterans offered similar estimates in respective regions. In general, analog product sales still dominate with at least 70-percent market share in all major markets. Despite this high percentage, the volume of IP products shipped is rising rapidly in all major markets, with the exception of Oceania.

More precisely, 90 percent of distribution products in the U.S. are still analog, and 80 percent of integration
Mohamed Mohideen, International Sales & Marketing, Cmos Dotcom
projects opt for IP, said Suhaib Allababidi, VP of 2M CCTV. The market share for analog products in Australia and New Zealand remains high at 90 percent, where slow IP adoption is forecast to continue for a few more years. "Analog is still dominant, though IP will eventually become the norm because the market needs to leverage technology from other industries to achieve economy of scale," said Bud Broomhead, President of Intransa.

In Italy, most products used are still analog and not much IP, and it will likely take a couple more years before IP becomes more popular, said Alessandro Berio, MD of Eurogroup. With a market share estimated at 20 percent or less, IP products are currently used for large infrastructure projects only. "IP uptake is slow because installers are traditionally from an electrician background with little IT knowledge," said Alessandro Oliva, IT Engineer, Feniva.

For the emerging markets in the Middle East, Eastern Europe, Latin America and Africa, analog products also account for 70 to 90 percent of market share. "In many cases, if the project is managed by the CIO, IP products would be used; conversely, if it is managed by the security manager, analog products would be used," Alvarez explained.

Many contribute restricted IP expansion to frail and expensive national Internet infrastructure. "Granted, traditional
Alessandro Oliva, IT Engineer, Feniva
installers still need a lot more education to drive IP growth, but IT-savvy distributors have got that covered," said Emre Yildirim, GM of Bilgi Technology. With new state-sponsored and large-scale projects in motion, IP products shall have no problem achieving greater traction in the few years.

In the Asian markets, sales of analog products have reportedly fallen by 60 to 90 percent, while the volume of IP products carried has increased dramatically for some. "Our revenue portion on IP has increased from 20 percent last year to 35 percent this year," said Sunny Mathew, Executive Manager of Autocop. For others, the growth in IP is hampered by a price-sensitive mindset. "Analog products such as DVRs are easy to find in Thailand, even in supermarkets, as they are cheap and easy to install in comparison," said Sakchai Somsuk, MD of TSolutions.

To encourage IP adoption, some local distributors and SIs hold seminars and invite end users to attend exhibitions to better educate the market on IP-based technologies, especially for those end users wanting higher quality and resolution products. For some, designing a pure-IP security system where different segments are interconnected by a network creates less integration problems, said Serguei Zagriatski, System Manager of Transportation Business, ST Electronics. "We use IP products for all new projects now."
What HD?
HDcctv or HD-SDI technology was brought onto the table by various exhibitors at Secutech 2011, offering more
Sunny Mathew, Executive Manager of Autocop
hybrid or tribrid possibilities. Several interviewed have already begun talks with vendors to promote products based on this new technology in the respective regions. Others, however, maintain a conservative stance as to the development, promotion and acceptance of said technology.

For some, HD-SDI products offer the convenience of utilizing existing analog infrastructure and avoiding the switch to a completely IP-based system. In addition, the HD-SDI concept is easier to grasp for traditional installers, who are used to analog systems. "Networking is sometimes too much for traditional players; therefore, HDcctv holds great potential compared to IP," said Andy Chao, President of Panorama Security.

Some are considering expanding their product lineups. "HDcctv is quite interesting and shall help us offer another choice to customers who are thinking of upgrading existing systems," Uy said.

Work in Progress
As HDcctv is relatively new to the security world and needs further time to mature, concerns were voiced. "I have noticed the various HDcctv offerings at the Secutech show ground, but the pricing and maturity/reliability would mean that next year or even 2013 would be a safer bet," Arseven said.

"The price of HDcctv is a sensitive issue. If it is set between analog and IP, there may be some chance for it to grow in the market; otherwise, it would be very hard for it to become widely adopted," Cuglovici said. Current price
Bud Broomhead, President of Intransa
tags of HDcctv products could be six times higher than analog products; therefore, many are still observing how the market will react. Some suggested that encoders minimize the appeal and chance for HDcctv products.

In terms of technology maturity, those who have sampled are concerned about their storage, transmission and DVR functionality. "HD-SDI DVRs need to expand on their capability, as they offer only four channels now; plus so far, only a few makers can offer them," Allababidi said. Also, real-life transmission distance is still limited to about 100 meters, which hampers the upgrading of current systems, Palmov said.

"HDcctv products are not as scalable as IP products, and interoperability issues remain to be addressed, as industry standards for HDcctv are still in drafts," Jong said. Additionally, HDcctv offerings are unsatisfying at the moment, as some of them still project CIF-like results, Yildirim said.

Current mixed views do not seal the fate for HDcctv products in any way — it is, after all, still a fresh idea to many in the industry. Some optimistic professionals believe that as the HDcctv technology matures and products offer better functionality and choice, these devices could have a chance to be adopted by certain high-end, analog-based, niche markets.

Scaling New ‘Highs' in Security? Not So Fast…

Scaling New ‘Highs' in Security? Not So Fast…

Editor / Provider: By the Editorial Team | Updated: 6/3/2011 | Article type: Hot Topics

HD video is emerging as an alternative to analog and standard IP solutions. However, several technical issues remain for transmission, processing and storage, with relatively few HD solutions ready for mass production. A&S finds out about the bottlenecks and issues for the SD migration to HD, along with access control and intrusion integration.

HD video surveillance is the latest offering in a largely unchanged video product lineup from this year's trade

Sunny Lee, Business Development Director, Catalog Processors/EEE Products, Texas Instruments
shows worldwide. While manufacturers previously tried to cram as many megapixels as they could into their cameras, HD is now touted as the standard for real-time viewing at manageable bandwidth rates. As a consumer standard, most users see and grasp the difference between standard definition (SD) and HDTV-quality broadcasts.

But seeing the bigger picture is not without challenges. Not only are more pixels and TVLs being captured, they also require more bandwidth, processing and storage. These limit the number of channels that can be supported at higher resolutions. Uncompressed high-resolution video cannot be processed digitally either — an issue for open-platform VMS designed for IP inputs. HD cameras are hot — literally — due to the added computing power burning up components, which could reduce product life span.

These challenges have not stopped manufacturers from launching high-resolution products. From cameras, transmission peripherals to displays, dozens of Asian manufacturers have
Fan Look, VP of North Asia, Axis Communications
product demos ready. While mass production shipping dates are up in the air, HD product development divides into two camps: compliance with the HDcctv Alliance and HD-SDI solutions. "Our HD-SDI cameras and DVRs are already HDcctv-certified and sampling worldwide, with highlighted interest from the U.S., U.K. and France; DVRs include the four-channel, real-time model and the hybrid model (two-channel HD and 14-channel analog)," said Randy Hong, Sales Manager at Micro Digital. "The overheating problem has been overcome with a special coolant."

EverFocus Electronics has a complete HDcctv camera lineup, compared to a single camera and DVR offering last year. Other vendors expect to commercialize HDcctv products by the end of 2011, such as Korean vendors Apro and Nextchip. Deeplet Technology, a maker of H.264 DVRs, is considering HDcctv, said Yvonne Lo, Manager.


To overcome storage issues, HD cameras should be connected to digital receivers so the signal is compatible with traditional DVRs, said Wayne Lee, Sales Representative, Yoko Technology.

However, uncompressed video takes up a great deal of storage. DynaColor's storage lineup includes an HD-SDI
Ebony Huang, President and CEO, Brickcom
hybrid DVR, which also accepts analog inputs. The hybrid DVR supports 720p and 1,080p real-time recording, managing up to four 720p camera inputs.

Rifatron plans to launch an HD-SDI DVR in the third quarter of 2011, but current component solutions can only manage four-channel inputs. It expects HD-SDI to replace existing analog products, rather than Intersil/Techwell's security link over coax (SLOC).

SLOC transmits both analog and IP signals through coaxial cabling. Sony's latest "hybrid" camera models feature the SLOC technology, which requires added development cost on the receiving end.

Not everyone is convinced that HDcctv is the waveof the future. Seenergy believes HDcctv is just a transitory solution to IP and will not develop related products. Others like Hunt Electronic, GeoVision and Hikvision Digital Technology are still sitting on the fence.

The market for HDcctv exists, but it is a niche market. "HDcctv will impact the growth of IP, but it's a minimal effect," said Snow Hong, President of iCanTek. As components for megapixel cameras are relatively mature and readily available, this makes HDcctv less desirable, as the technology is still developing.

Supporting Cast
Components are a key differentiator, as development breakthroughs affect product performance. "Several challenges face video surveillance product engineers, including improving video quality and supporting standards, while keeping cost and power consumption down," said Robert Beachler, VP of Marketing, Operations and Systems Design, Stretch.

Along with HD cameras and DVRs, displays must also support for HD. IC Nexus was among a select few display manufacturers, such as Acula and Exland, with a twist — an HD touch panel based on ARM.

Even DVR reference designs feature touch screen support, while managing up to three 1,080p video streams at

David Burks, Global Product Marketing Director, Seagate
60 fps, said Sunny Lee, Business Development Director, Catalog Processors/EEE Products, Texas Instruments. Its camera reference design supports dual-streaming of IP HD and analog D1 video, eliminating the need for a video server. Although HDcctv has its advantages, he feels the transceivers are too expensive.

Image Sensors
CCD and CMOS sensors continue to enhance pixel counts, with CMOS working to overcome low-light shortcomings. Mintron designs both CCD and CMOS sensors used in its camera modules, which include an HD model, said David Chang, Sales Department.

CMOS in particular has seen strong uptake for multimegapixel applications. "In the transition from SD to HD, a key development is the global rolling shutter which removes the need for an iris, making CMOS solutions even more cost-effective," said S.K. Lee, President and CEO of Pixelplus.

Network cameras are advancing in compression and analytics as well. "As demand for higher-resolution video escalates, better compression formats such as H.265 and MPEG-7 will be developed to optimize video usability and postevent searches," said Cliff Cheng, Senior Business Development and Marketing Manager, Aptina Imaging. "In analytics, we see lighting, shadow and occlusion challenges gradually being resolved and sensor-level processing and video tagging becoming readily available, given the maturity of the 28-nanometer (silicon) process."


More to Transmit
Growing demand for IP-enabled products can also be seen in peripherals. Enclosure providers such as Videotec and Unitechno have made PoE available in their IP68-rated products, powering up network cameras, IR LEDs, fans and heaters in challenging environments. PoE-enabled wireless access points and nodes are available from EtherWAN, but their practicality in real life — where wired LANs are already in place — remains unknown.

But bandwidth requirements are dropping, with efficient compression schemes reducing the size of images and
Ed Strong, Director of Marketing at Western Digital
new technology providing more bandwidth, said Fan Look, VP of North Asia, Axis Communications. "In the beginning, we had M-JPEG and 10-Mbps pipes; now, we have H.264 and 1-Gbps pipes."

Transmission Distance
For HD streaming over coaxial or HD-SDI cables, transmission distance is another limitation, requiring a repeater at least every 100 to 150 meters. While this is not an issue for indoor applications, HD uptake is limited by distance.

The distance bottleneck could be overcome by converting coaxial signals to fiber, said Johnny Dou, Overseas Sales Representative, TVT Digital Technology. HDcctv quad splitters and accessories are able to reach 120 meters for 1,080p resolution, while 720p images can be transmitted 200 meters, said Su Tai, Sales and Marketing for GoMax Electronics. To be a member of the HDcctv Alliance, the minimum is 150 meters.

For full-HD hybrid storage, SLOC also increases transmission distance up to 500 meters, said Iris Yoon, GM of Business Development, Pinetron.

Network cameras run natively on IP, so wireless transmission is possible over Wi-Fi, WiMAX and 3-G, said Ebony Huang, President and CEO, Brickcom.

However, the non-IP nature of HD-SDI requires converting the signal, as well as increased bandwidth. "For high throughput, 2 Mbps used to be enough, but now HD and megapixel pushes bandwidth requirements up to 5 or 6 Mbps," said Jeremy Koh, Regional Sales Manager for APAC, Firetide.


Extra Loading
Other challenges for HD video surveillance include implementing real-time, complex functions, said Yvonne Lin, Industrial Marketing Manager, Xilinx. While its FPGA supports HD-SDI cameras, the silicon combines video analytics, WDR and image processing. This type of load requires sufficient computing power, which will take time to support more than four cameras.

Increased resolution offers more detail. Vivotek released a 3-megapixel fisheye camera that can be digitally controlled through a touch-screen tablet interface, but takes a toll on real-time computing power.

HD and megapixel surveillance requires a great deal of recording space. Storage makers are keenly aware of
Bach Chen, Director of Platform Technology, Huper Laboratories
high-resolution demand, as hard-disk drive (HDD) leaders Seagate and Western Digital have squared off with dedicated video surveillance drives. With Seagate announcing a partnership with Samsung and Western Digital intending to acquire Hitachi Global Storage Technologies, the five leading HDD providers are now three, with Toshiba Corporation as the third player. Western Digital is No. 1 by unit shipments, while Seagate is No. 1 by revenue, due to its larger share of the enterprise segment.

A dramatic reduction in the cost of storage has enabled the adoption of HD. "In 1995, 1 GB of storage cost US$900," said David Burks, Global Product Marketing Director, Seagate. "Today, 1 GB costs about $0.08."

Having a competitive advantage, such as being the first to market with a 2-TB drive, gave Western Digital an edge for nearly two years. "We see huge potential in surveillance," said Ed Strong, Director of Marketing at Western Digital. "HDcctv is another key standard we will watch to see if it takes hold in the market. It means next-generation capacity points are more critical."

Merit Lilin will launch a 16-channel NVR offering 1,080p recording and display, which can add up to four 2-TB HDDs.

Solid-state drives are seeing more uptake on the edge. "In the real world, video storage and file systems for reading and writing are never sequential," said Alex Kuo, President of Memoright. Flash is suited for volatile, mobile conditions and has higher throughput, but costs more than HDDs.

Selecting the right type of storage requires understanding security needs. "Three factors affect performance: drive types, connecting interfaces and configurations," said Eddie Huang, Deputy Manager of Product Planning, Sales and Marketing, Promise Technology.

Other storage considerations are scalability, remote replication and tiered storage over the data life cycle, said Albert Weng, Director of Global Business Development, D-Link.


Mobile Storage
Mobile DVRs or NVRs must be rugged, with constant vibration ruling out most HDDs. "PC-based systems are too delicate for this setting, and embedded systems have less of a chance to break down," said Jeff Hsu, Regional Sales, Plustek.

Some onboard storage solutions combine flash memorywith PoE for power, as well as backup battery power, said Gary Chiang, GM of Panacom. However, HD surveillance will require added storage and power.

Channel Density
As recording increases, the number of inputs affects the video surveillance system. "There is an estimated 4
Tony Yang, International Marketing Director, Hikvision Digital Technology
million hours of recording per week in the U.S. alone," said Todd Matsler, Director of Segment Marketing, Embedded and Communications Group, Intel. "In the transition to HD in the next couple of years, several system design challenges will arise, the chief of which being channel density."

Current multichannel 1,080p processing beyond four channels can be tricky. "At the moment, the Intel Sandy Bridge platform allows for eight-channel, real-time hardware encoding and decoding at 1,080p, but with optimization, there is potential to go up to 40 channels," said Bach Chen, Director of Platform Technology, Huper Laboratories. "Pricing issues should be resolved within a year as the platform and HD-SDI serializers and deserializers become more readily available."

Other HD-SDI manufacturers have deployed Intel's Sandy Bridge platform for better encoding and decoding. "Our capture card supports five interfaces: RGB, SDI, HDMI, DVI and components," said Wendy Lin, Sales Director of Yuan High-Tech. While its software compression card can handle four channels of 1,080p resolution at 30 fps, more inputs will incur image lag.

Video analytics benefit from higher-resolution detail, delivering better identification in traffic applications such as ALPR or retail behavior analysis. "In system management, we expect to see more automatic and remote detection, diagnostics and healing, which provides ROI for all parties involved," Matsler said.

AVTech's network camera includes onboard analytics and complete Mac support for remote monitoring on an iPhone or iPad.

Metadata from analytics can speed up searches through recorded images. "In traffic monitoring, HD surveillance
Hiroshi Sekiguchi, IP Security Product MD, Panasonic Systems
is required to read the plate number, driver's face and vehicle type or color," said Tony Yang, International Marketing Director for Hikvision Digital Technology.

Increased resolution and more powerful chips will yield more accurate intelligence, such as real-time facial detection and recognition, said Hiroshi Sekiguchi, IP Security Product MD, Panasonic System Networks.

Enhanced identification is ideal, but video content analysis (VCA) is notorious for false alarms. Adding another dimension with 3-D analytics can address problem areas such as depth, color, reflections and shadows, Chen said. Performed with two sensors, 3-D analytics leverage HD and faster processing, aiding accuracy.

Where VCA is placed in a video surveillance system depends on where it can provide the most value to users. "Easy integration with PSIM and VMS is the key ingredient, as it allows the solution provider to focus on solving the problems at hand, rather than making the components work with each other," said Edward Troha, MD of Global Marketing, ObjectVideo.


Management Software
Higher resolution yields more data and requires more powerful VMS. Remote monitoring functions are being developed, enabling users to monitor their assets through smart phones or computers, said Jeremy Mauppin, European Sales for Acumen International.

Megapixel or HD cameras are typically deployed for wide-area surveillance applications, which can be large and complex. "A city surveillance system should be built on a testable and open platform, and is scalable," said Charles Cousins, MD of APAC, Genetec. Managing many cameras to work together as one is the ideal of effective VMS.

As IP emerged as the next step from analog, HD-SDI is now providing a third option. If combining IP and analog resulted in hybrid solutions, adding HD to the mix yields a new "tribrid" category. While no such products are commercially available to date, a number of makers are considering triple-play solutions.

PC-based models will likely come to market first, although stand-alone models are expected to roll out next year.

Charles Cousins, MD of Asia Pacific, Genetec
"The ‘power struggle' between analog, IP and HD-SDI/HDcctv will not be as clear-cut as that between VCRs and DVRs," Chen said. "The need for seamless transitions and effective surveillance means that there is definitely demand for tribrid products with onboard analytics."

For now, existing solutions combine two of the three options. "Instead of busily carving out IP and HD-SDI market shares, we should first think about vertical-specific requirements and the enhancements we could do over existing infrastructure or various boxes," said Fengguo Yang, Director of Security and Surveillance Solutions, Digital Media Management, Hisilicon Technologies. "We are launching hybrid-camera reference designs: HD-SDI and IP, or HD-SDI and traditional analog."

Increased dialogue between component suppliers and end users could mean HD discussions evolve beyond mere pixel counts to power consumption and capital/ operational expenditure considerations, added Yang.


Access Control
Higher-resolution video surveillance does not work in isolation; it is bolstered by integration with access control
Fengguo Yang, Director of Security and Surveillance Solutions, Digital Media Management, Hisilicon Technologies
and intrusion systems. "We see greater integration with video surveillance, so our IP controller sells great with VMS developers like Genetec," said Kenneth Cheung, Director of Sales, Identity Assurance Management (IAM) East Asia and Secure Issuance North Asia, HID Global (an Assa Abloy company).

As the company moves beyond card reader hardware into IAM, the acquisition of ActivIdentity completes HID's
identity portfolio. It is also repositioning in the market with cloud development. "We work with management software companies to put video surveillance, alarms and access control together," Cheung said. "Successful integrations are rare."

Biometric recognition has benefited from advances in image sensors and capacitative technology. Fingerprint provider Virdi performs liveness detection by deploying touch screen sensors from smart phones. Its fingerprint reader will not read fake fingers and also uses IR for detection.

Finger vein recognition goes more than skin deep, with deployments in finance, military and government applications, said Mandy Liu, Business Development Manager, Sonne Infotech.

Intrusion Detection
Integration was a trend in intrusion detection, along with ease of use. Wireless DIY intrusion controllers are
Kenneth Cheung, Director of Sales, IAM East Asia, Secure Issuance North Asia, HID Global
designed for five-minute installation; users simply insert a SIM card, plug in the unit and are done, said Ken Li, GM of Chuango Electronic. Arming the system only requires a press of a remote control button, right before people leave their homes.

IR illumination is becoming more efficient, powerful and reliable, said Michael Gu, Senior Marketing Manager, APAC Head of IR/HPL, Osram. This enables better detection for night vision, ALPR and traffic-monitoring applications.

Physical security has benefited from IT breakthroughs, and higher-resolution video attests to that. However, it still has a long way to go before each link of the chain comes together for a complete solution for various project sizes. As integration promises better resource management, video surveillance, access control and intrusion converge for more comprehensive security solutions.

Health Care Institutions Unify Safe Access to Information and Places

Health Care Institutions Unify Safe Access to Information and Places

Editor / Provider: a&s International | Updated: 6/1/2011 | Article type: Commercial Markets

Unseen dangers such as identity theft and infant abduction are often shadowed by the busy and buzzing atmosphere found in health care facilities. As security concerns in health care facilities increase, more and more institutions are combining their physical access control and logical access control systems for better management of their patients, staff, visitors and assets. In converging different access control systems, smart cards and biometric credentials are becoming the necessary tools to clearly track foot traffic and enforce authorized access to information and places, as they offer high-level data security and identification accuracy. Health care complexes often span across several buildings and campuses, adding onto the security management complication which can now be facilitated by effective physical access control and logical access control systems.

Securing public spaces is a tricky business. Health care facilities are no exception, where patients, visitors and staff openly interact on a daily basis. Three areas need to be reviewed to provide a solid safety assessment, said Kenneth Mara, President of World Wide Security. "First, the safety of patients and staff should be considered by limiting the amount of people who can or should have access to certain areas. Second, access to medical records and medicines need to be controlled. Third, health care facilities should be designed in a way to keep

Kenneth Mara, President of World Wide Security
patients from wandering the premises," he said. "The last consideration is especially important for psychiatric centers and patients with Alzheimer's or other dementia illnesses."

In health care settings, a card system combining physical and logical security has become the main access control method, for everyday administration and operation. "In health care, there are staff members that may shift roles depending on the time of day, or the location access is requested," said Derek Botti, IT Architect for Tivoli Industry Solutions — Health Care, Electronics, Manufacturing and Smart City Industry Lead, IBM. "Many do not have different physical access controls for the different roles, but do have different logical access controls for the different roles."

"The challenge often arises when the staff member in this capacity chooses the access control for one role when actually performing a secondary or tertiary role,” Botti added. “Add in a constant state of flux as it relates to volunteer staff, temporary staff and educational staff; and the security and IT departments typically face issues that are not seen in other industries or facilities."

Physical-Logical Integration
Building a reliable and fluid physical-logical access control system that contributes to operational, financial and clinical effectiveness is a necessity for many health care facilities. "As health care institutions expand their technology infrastructure and deploy multiple systems, they inherently produce an environment with separate access control systems, with multiple credentials issued and managed through duplicate processes with limited interoperability," explained Dave Cullen, Director of Business Development for Health Care, Lumidigm. "The result is an expensive process of credential management and an institution that is exposed and at risk for security breaches, resulting in expensive penalties and fines. More importantly, frustrations with system access will ultimately have a negative impact on the user and, in turn, on the quality of patient care."

The process of accessing areas and information is expected to become simplified by integrating the physical and logical access control systems into one. “IT and security departments are hoping to leverage n-factor authentication solutions to clinical systems and workstations that are able to use the same badges used for physical access to the buildings and nursing units themselves," Botti said. "In that regard, the IT and security departments are facing a desired integration of birthright provisioning, such that access to physical spaces and logical systems are granted through the same process."


Industry regulations and demands are pushing for convergence of physical and IT access control as well. "The Health Information Technology for Economic and Clinical Health Act and the Health Insurance Portability and Accountability Act of 1996 (HIPAA) legislation requirements are pushing health care organizations to facilitate increased security levels for patient and other critical information," said Lisa Pryse, President of the Health Care Division, Old Dominion Security. "Though bandwidth is scrutinized to provide for multiple secure uses, more security systems are centralized into one area as well as coordinated with the IT department."

When the physical and logical access control systems are installed by different integrators, the foremost problem faced is compatibility between the two systems, as the installers might not be trained on both systems, said Eric Assouline, Export Sales Manager, CDVI Group.

Another problem is that the systems would run separately and likely would not read each other's credentials, nor would a smart card carry a biometric template that helps lower network traffic and provide greater privacy for the employee, Cullen said. "Interoperability of the systems delivers a flow of critical information from disparate systems to the right person at the right time. Communication systems enable visibility of information up- and downstream, avoiding costly bottlenecks."

Most often the problem is the lack of open standards in health care IT solutions, Botti said. "If the vendor of choice uses a closed system with proprietary or little API support, the integration between logical and physical access systems becomes a cumbersome and often expensive customized effort. There would also be issues with correlating data between the disparate systems, because there is no real free exchange of data between these solutions. The integration done is for a very narrow band of use cases and tends to miss backend analysis and correlation, which results in additional lengthy and expensive integration efforts."

Ensuring smooth integration between physical access control, logical access control and other security systems is not the sole responsibility of the systems integrator. Security managers and CIOs acting on behalf of the institutions should also thoroughly understand both the existing systems and potential new systems to get a clear idea of how convergence works.

Typically during integration, solution providers have tried to investigate what existing security solutions are in place and where to leverage existing infrastructure components, such as badges or identity stores, Botti said. "If

Dave Cullen, Director of Business Development for Health Care, Lumidigm
possible, instill an interface as part of the implementation of a logical system that provides a single source provisioning solution between the physical access and logical access identity stores."

A converged physical and logical access control system often falls under the CIO's jurisdiction, with the security manager reporting to the CIO. In health care facilities, however, it is often divided between two distinct management chains, pitting physical security against logical security, Botti said. To avoid this standoff, both the CIO and security manager should understand both physical and logical systems to optimize performance, Assouline said.

"CIOs develop the long-term strategic direction of the hospital, and IT is at the core of reducing health care costs and establishing efficient processes," Cullen said. "Protecting these investments is also the responsibility of the CIO and included in this plan should be a strategy for streamlined physical and logical access controls. Streamlining backend identity and access management systems is only the first step to an efficient security infrastructure. It helps when the CIO understands both worlds, but it is equally important that the security manager likewise understands both types of systems."

"More CIOs now partner with security managers in order to manage a complete physical and logical access control system," said Brian Stemp, PM of Access Control in EMEA, ADT Security. "The responsibilities of each position could be influenced by the budget provided for each department, yet the two sides need to establish close ties in order to deliver efficient and solid work."

The drivers for the convergence of physical and logical access control systems in health care institutions are reduced cost, increased security and reliability in the installed system. New platforms used for physical access control open up possibilities to integrate with logical access control faster and easier, while costs have decreased due to a wider selection of solutions, Assouline said.

Converged systems are driven by the desire to reduce operating costs and redundant components when examining the solutions from an enterprise-level view, Botti said. "In some cases, it is to reduce the overall complexity of the entire ecosystem — reducing the number of badges such that physical and logical access can be controlled with the same token."


"In other cases, it is driven by a desire to reduce the operating costs — reducing the total solution footprint by integrating solutions and eliminating redundant components that are performing the same task in an isolated fashion," Botti added. "In some other cases, it is a function of providing better regulatory compliance auditing — having a single source of the truth, which simplifies attestation, birth righting and sun setting of identity."

"Health care facilities are recognizing that they have a responsibility to protect patients, staff and property," Cullen said. "A good integrated security schema can have great impact on the cost of insurance for a hospital. Protecting the physical well-being of staff and patients has always been important, but as more patient information becomes electronic and interoperable, it is critical that this information is only available to those with appropriate permissions. Patient information falling into the wrong hands carries expensive penalties and fines, and can negatively impact the marketability of that facility."

Utilizing Smart Cards
Smart cards are useful for many functions: access control, payroll and attendance systems, among other tasks. Contactless cards in particular help limit and control infections in health care settings. Sensitive areas like the intensive care unit or pharmacy require dual-factor authentication, combining biometric verification with the assigned smart card.

Biometric deployments in health care facilities have traditionally been problematic, as conventional systems fail to operate reliably in harsh environments and situations, Cullen said. "Frequent hand washing, heavy use of
Eric Assouline, Export Sales Manager, CDVI Group
chemicals and cleaners, the wearing of latex gloves and a wide range of demographic issues make biometric enrollment and authentication quite difficult and challenging."

Newer biometric techniques enable fingerprint scanning even when hands are gloved. "Multispectral fingerprint scanning, which has the unique ability to scan beneath the surface layer of skin, handles the environmental factors that can affect fingerprints," Cullen said.

As well, with a decrease in pricing and an increase in ease of use and maintenance, biometrics is becoming more and more adopted in access control systems at health care institutions, said Mike Grimes, President of Integrated Biometrics. "Some of the most dramatic changes are the increased security that comes with no longer having a PIN code, which can be shared, and cards, which can be lost, shared or stolen."

"Contactless smart cards minimize overhead when dealing with biometric template management and distribution," said Dan DeBlasio, Director of Business Development, Identity and Access Management, HID Global (an Assa Abloy company). "Rather than storing biometrics on a server and distributing them over a wired network, a contactless smart card-based system allows biometric templates to be carried by the card holder, offering a stronger level of authentication and security commonly referred to as ‘match on card.'"

The convergence of physical and logical access control systems is largely restricted to staff and patients. However, effective monitoring of visitor access, especially during after-hours, ensures overall secure access in health care facilities. A common way to guard restricted areas is to program access points, permitting only authorized personnel with identification cards to gain entry or exit. “Some health care institutions may also want to integrate intercoms into access-controlled doors so that visitors can communicate with staff during after-hours,” said Philip Verner, Sales and Marketing Manager, CEM Systems (a Tyco International company).


Adding video to two-way audio can instruct unwanted visitors they have entered an area they should not be in, Mara said. "Video and audio communications allow for interaction with a perpetrator in a possible crime in action and elevate it to a more serious response level for first responders. This can be important during after-hours, when guard services need a complement, or in place of guard services in remote areas as well."

Industry experts agree that relying on temporary access cards plus an existing access control system might be cost-prohibitive and insufficient in managing after-hours visitor access. On-site security personnel would still be needed, although manpower can be reduced and redistributed to high-risk areas. "The enforcement of visitor badging requires the direct involvement of the security personnel," said Mark Thummel, Account Manager of Security & Fire in Building Efficiency, Johnson Controls. "They may not be needed at the location where the badging process takes place, but their presence is critical at key entry points, such as the main elevators or main lobby entrances to other facility areas."

Visitor crime and theft occur in health care facilities due to the openness of the premises, although petty theft is more prevalent compared to serious crimes. The most costly crimes are committed by employees, such as stealing equipment, supplies and pharmaceutical substances, Cullen said.

"Theft is a serious issue within these facilities, because many of the assets are portable, expensive and difficult to track," Botti said. “Implementing real-time location services integrated with physical building controls has become a rising trend, as more health care facilities, especially around the emergency department, try to curb the loss of this equipment. Unfortunately, these initiatives are typically done outside the scope of either physical access control or logical access control and are instead often managed by supply chain management initiatives, which create yet another tower for these solutions."

Advancing with Technology
Technology brings both efficiency and risk to the table. For instance, tablet computers are useful tools for instant data retrieval and can be carried by medical personnel on rounds. However, data security and patient privacy are open to new threats.

Usability versus manageability is always a tough challenge for the enterprise, Botti commented. "In health care, the choice has been managed both ways in our experience. There were cases where no devices were allowed on the facility networks that were not directly managed by the IT department, including smart phones. In other
Philip Verner, Sales and Marketing Manager, CEM Systems (a Tyco International company)
cases, the policy allows any device to attach to the network, with the employee community required to sign documentation stating they accept all responsibility for the management of the device and understand any breach or exposure created by the device becomes the responsibility of the individual."

"New technologies like this will surely add onto the threat level and data leakage risk," Stemp said. "To counter these issues, the security and IT departments must work together to formulate extra encryption for harder access to important information by unauthorized persons."

To fill in the gap between the two extremes, physical security is able to assist in securely locating the assets at all times. "Assets could be tagged so that an alarm would sound when the assets leave the premises," Assouline said. "Flexibility of asset management integrated with access control, combined with a good knowledge of the system integrator with a well-educated end user, will enable better processes in securing the assets and personal resources of the hospital."

Biometrics can help too. Access to data networks that have sensitive information can be tightly controlled, as can physical access to the computer rooms or the rooms that hold paper files by implementing biometric scans, Cullen said.

Dual-factor authentication can be added to access portable computer devices which contain patient or business information, Pryse said. "The data housed on the equipment should also be encrypted to prevent unauthorized access in the event of a lost or stolen tablet computer or PDA. The end users should weigh the cost of securing the access and providing adequate firewall protection against the speed or efficiency of patient data entry or retrieval in a live environment."

First Page< Prev< | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 >Next >Last Page