You are at : Search > Articles Search Results

Articles Search Results

1495 Articles and 372 related Products found for access control

FLIR thermal cameras help to protect the perimeter of Oubaai Golf Estate

FLIR thermal cameras help to protect the perimeter of Oubaai Golf Estate

Editor / Provider: Sponsored by FLIR Systems | Updated: 3/2/2015 | Article type: Residential & Consumer

South Africa's Garden Route is world famous. It is a popular and scenic stretch of the southern coast of South Africa. It includes towns such as Mossel Bay, George, Knysna, Oudtshoorn, Plettenberg Bay and Nature's Valley.

The area is renowned for its magnificent mountains, indigenous forests, lakes, lagoons and rivers. It is along the Garden Route, in Heroldsbay that the spectacular Oubaai Golf Resort is situated. Recently, The Oubaai Homeowners Association, as part of a five year integrated security plan, has installed 6 FLIR Systems thermal imaging cameras to form part of its active protection plan for its residents, members and guests.

Oubaai Golf Course: designed by Ernie Els
The Oubaai Golf Estate is an exclusive residential development set in the heart of the spectacular Garden Route in South Africa. The development comprises of 450 residential units consisting of 128 Village apartments and 322 single residential properties. Inside Oubaai, the Hyatt Regency Group is constructing a luxurious 100 bedroom hotel which is to open in 2010.

Oubaai Golf Club is a Championship Golf Course designed by the South African golf superstar Ernie Els. Els is one of the most successful golfers in the history of the game, having won more than 60 tournaments since turning professional in 1989, including two US Opens and an Open Championship, and a record seven World Match-play titles. Ernie has occupied a place in the world's top-10 for over 730 consecutive weeks, more than any other currently active golfer. Els himself has placed Oubaai as his favorite course in the world. Oubaai is a beautiful piece of real estate. There are spectacular views of the Outeniqua mountains, the Gwaing river and its' sweeping valleys and the Indian ocean. The estate borders on the Indian Ocean and the Gwaing river just 18km from the picturesque town of George. Herolds Bay, the nearby beach is famous for body boarding, swimming, surfing and sunning.

Security is of extreme importance
“Although the Garden Route is a relatively safe area to live, definitely compared to other parts of South Africa, at Oubaai we do not want to take any risk.”, explains Mr. Louis Olivier, Estate Manager at Oubaai. “We want all residents, their guests, and all people that come here to enjoy a round of golf at our magnificent course, to feel safe and secure. Therefore we have taken all the necessary security measurements and installed state-of-the-art security equipment.”

A complete security network
“Security at Oubaai starts with ones arrival at the main entrance.”, says Andre Steenkamp Regional Manager of Holbert Boikanyo Technologies, initiator and co-designer of the Oubaai Security System. “Not only are CCTV cameras installed at the entrance but biometric readers are in place to ensure accuracy of the access control function. No one enters Oubaai before their fingerprint is taken. If they are not a resident and/or a bona fide registered guest on the system, they may not enter. We will notify the people they are coming to visit and they need to confirm that they are expecting a visitor.”, Andre explains.

Different technologies for perimeter security
“But securing an estate of this magnitude means more than just installing equipment at the entrance gate. Without installing ugly fencing, we want to be sure that the entire perimeter is monitored and that we are aware of everyone that is approaching the estate's boundaries. In order to secure the perimeter, I did a thorough study and compared different technologies. Although cost is important when evaluating different systems, my main goal has always been to provide Oubaai with a good solution. In my opinion, saving money on security is not always the best option.”, Andre continues.

Fences
“Although we are using fences at some parts of the perimeter this is not always the ideal solution. Fences are costly to install since much civil works are required. Furthermore, they are not always the most aesthetic solution at a luxury estate like Oubaai. We also need to keep certain areas of the fence open since animals need to be able to move freely from one area to another. They do not care about whose property the land is and need to be able to roam around freely.”

“Furthermore, if you want to see what is happening around the fence, it needs to be complemented by CCTV cameras. In order to see during the night, CCTV cameras need light. Installing light poles everywhere around the fence is definitely not the correct way to go for an estate like Oubaai. Lighting is considered to be too intrusive by the residents.”

Infrared illumination
“Another technology application we have looked at to secure the perimeter, definitely during the night, is infrared illumination.” Infrared illuminators beam infrared radiation into the area in front of a camera. The infrared beamers are often placed around the lens of the camera. The infrared radiation is reflected by objects and human beings and converted to an image which can be displayed on a screen.

“The initial cost is reasonable but you need to take into account that you need to replace the beamers regularly. Furthermore, if you want some good range performance, you need to install powerful beamers which consume a lot of power.”, Andre continues.

“And infrared illumination has another major disadvantage. Oubaai is situated close to the sea and we are very often faced with very foggy conditions. When you switch on the infrared illuminators they worsen the effect of the fog. You can not see anything anymore.”

Radio Frequency Intruder detection (RAFID)
“Another technology I looked at is RAFID.”, says Andre.

RAFID uses two specially designed cables – one transmitting a radio wave, while the other receives that wave. Changes in the amount of signal passing between the transmitter cable and receiver cable are analyzed by a signal processor. If the amount of signal changes, this means that someone or something is between the two cables and an alarm will go off. Due to the difference in the signal strength, the system can detect whether these changes are due to the presence of a human, a small animal, … “RAFID is a more aesthetical solution than fences but it is a fairly expensive system. Not only are full civil works needed to install the cables, once in operation the system requires a lot of maintenance. And although the system can make a difference between a man and a small animal entering the security perimeter, a lot of false alarms can happen. This means that the RAFID needs to be complemented with a CCTV system so that an operator can determine if an alarm is false or not.”, Andre explains.

Thermal imaging cameras
“I first came into contact with Mr. Tinus Diedericks of Timeless Technologies when I was gaining information about a scanning system that can penetrate fog. Also this technology was not exactly what I was looking for and furthermore it is extremely expensive.”

“Tinus explained me that he is a distributor of FLIR Systems thermal imaging cameras in South Africa and demonstrated the cameras at Oubaai. I was extremely impressed and learned more about the technology. That the cameras are performing well during a clear night was immediately clear to me but I was especially interested in their performance in foggy weather conditions.”

“Together with Andre we made an initial study of how many cameras would be needed to secure the perimeter.”, explains Mr. Diedericks of Timeless Technologies. “Andre's initial plan was to install a large number of fixed mounted, short range cameras along the area. We looked at it together and quickly found out that it would be better to install a limited number of longer range performance thermal imaging camera of which the majority needed the be installed on a pan/tilt. Although we needed to use more expensive thermal imaging cameras to do this, the total investment would be a lot cheaper. Furthermore, since we needed less cameras we did not have to install so many poles to install the cameras on. This again saved money. ”

FLIR Systems thermal imaging cameras secure the perimeter
“Today we have completed the first phase of the installation.”, Andre Steenkamp continues. “Along a big part of the perimeter we have installed multiple FLIR Systems thermal imaging cameras.”

“Three FLIR Systems PTZ-50 MS thermal imaging cameras are installed. The PTZ-50 MS contains a thermal imaging camera and a daylight camera. Both are mounted on a robust pan/tilt so that we can look at every direction we want. They provide excellent range performance since they can detect a man-sized target at a distance of practically 800 meters.”

“At a longer stretch of the perimeter, we decided to install a FLIR Systems PTZ-35x140 MS thermal imaging camera. The PTZ-35x140 MS is equipped with two thermal imaging cameras. It detects man-sized targets at a distance of over 2 kilometers and has the ability to zoom in on suspect activities. It also contains a daylight/lowlight camera which we can use during the daytime. We have installed the PTZ- 35x140 MS in the center of the perimeter. Since it is installed on a pan/tilt, we have the ability to see whatever direction we want. We can see the fence, accross the fairway towards the river, as well as a high risk area along the sea. ”

“For two very short stretches along the perimeter we opted for a fixed mounted PatrolIR thermal imaging camera. It is always overlooking the same area. Although its range performance is a lot less than the one of the other installed cameras, it is exactly what I need to guard two very short lines along the perimeter.”

“Most of the thermal imaging cameras are installed on a pole. Thanks to excellent range performance of the FLIR Systems thermal imaging cameras we did not need to install too many of them. Aesthetics are important here at Oubaai. In order to avoid installing poles as much as possible, two of the thermal imaging cameras have been installed on a house. We communicated with the owner, and he preferred that we installed the cameras on his house instead of on a pole. Not only does he not have a mast blocking his view, it is probably the best protected house in the estate as well.”

Thermal imaging, more than security only
“The main reason for purchasing the FLIR Systems thermal imaging cameras was securing the Oubaai estate. Once they were installed it became clear however that they can have another, sometimes live saving, capabilities.”

“Just underneath Oubaai is the sea. People tend to stand on the rocks while fishing. They sometimes forget that the sea is dangerous. Tides can come up very quickly and big waves can be formed. These waves can easily hit people of the rocks, into the sea."

"When an accident happens and we are aware of it, we can easily turn the PTZ-35x140 MS in the direction of the sea. We will communicate with the National Sea Rescue Institute (NSRI) which sails out with special rescue boats to save the person. We can spot the person floating in the water with the thermal imaging camera, almost 2km away and direct the crew of the boat in the right direction.”

Thermal imaging cameras work in all weather conditions
When asked about the performance of the thermal imaging cameras in foggy weather conditions, Andre is very clear. “The performance of thermal imaging in foggy conditions is extremely good.

Although the thermal image is slightly obstructed by the fog and we are not getting the same high quality image that we see during clear weather conditions, we still get good range performance. A person walking around in the fog will be hotter than the cold surroundings. Since the thermal imaging cameras are producing an image based on the small temperature differences they are detecting, we can clearly see people walking around. We might not see all the detail, but we will certainly see that a person is there. And that is the most important thing.”

“For detecting intruders in total darkness, in practically all weather conditions, there is no better technology than thermal imaging. Different estates have come to Oubaai already to look at the performance of the FLIR Systems thermal imaging cameras and they were amazed when they saw the clear images they produce. Some other estates along the Garden Route are thinking about installing thermal imaging as well.”

Feeling save at Oubaai
“Sometimes when I walk through Oubaai I see houses with the doors wide open. Sometimes expensive material is just standing unprotected in gardens. When we notify the owners that they forget to close their home they are often very surprised. They do not normally do this. To me, it is however the best proof that all the security we have at the gate and alongside the perimeter works. The FLIR Systems thermal imaging cameras definitely contribute a lot to the safety and security we have here at Oubaai.”, Andre concludes.

Holbert was the first technology installer to utilise FLIR Systems thermal imaging cameras on estates of this magnitude, within the Republic of South Africa. The system is user friendly and maximizes the technical aspects without compromising on the staffing quotient, ie. enough guards, but not too many, which is the design approach that Holbert follows in its estate solutions. The relationship between Timeless Technologies and Holbert Boikanyo Technologies is very unique where the distributor and integrator join forces in the research, design, project management and implementation of a tailor made solution for the customer. As the systems and technologies are installed and implemented, Holbert aligns itself with an organization that can monitor the system and utilise the imaging to its maximum outputs, ie. specific control centre operations. This ensures a total turnkey solution and peace of mind to the customer.

Suprema biometric time and attendance deploys in Caribou Coffee, UAE

Suprema biometric time and attendance deploys in Caribou Coffee, UAE

Editor / Provider: Suprema | Updated: 3/2/2015 | Article type: Security 50

Suprema, a global provider of technology in biometrics and security, has announced the deployment of a biometric time and attendance solution across Caribou Coffee chains in the United Arab Emirates. The project involves management of more than 300 employees across 50 locations throughout the region by automating the process of manual data capturing.

Al-Sayer Holding, a major trading company in charge of Caribou Coffee's aggressive global growth strategy in the Middle East and Turkey, was looking for an automated method for data collection. The preexisting method of manual time & attendance data capturing posed a number of problems such as unreliability, backtracking issues, and difficulties in further processing. A solution in which data can be collected automatically with the ability to integrate with the internal resource management software was required.

BioLite Net is a compact IP fingerprint terminal with access control and time & attendance features. The device is highlighted by IP65 rated protection against dust and water which makes it suitable for both indoor & outdoor use. The device features simple user interface for quick easy access to the device and is ideal for applications that require basic user interaction and a variety of installation environments.

The solution will collect reliable data that will be centralized in the corporate office and uses the benefits of an automatic biometric system to efficiently manage a dynamically altering workforce.

2015 Access control: Mobile access picks up steam

2015 Access control: Mobile access picks up steam

Editor / Provider: William Pao, a&s International | Updated: 3/2/2015 | Article type: Hot Topics

Using the mobile phone to authenticate has become increasingly popular, and this trend is set to continue down the road. One major advantage is that using the phone carries a “care” factor. “The average person is more aware of their phone and its location than any other article they carry with them, including their wallet or key ring,” Brad Aikin, Business Leader of Electronic Locks, Allegion said. “Consumers take better care of their mobile device than any other article they carry with them.”

The home remains a sector with high growth potential for mobile access, for no other reason than the technology being able to create an automated environment in addition to providing access. Using the mobile device to turn lights or PCs on and off, for example, can now be done at the home, and this trend is set to continue.

Right now, there are two competing mobile authentication technologies, namely near-field communication (NFC) and Bluetooth low energy (BLE). Each has its unique characteristics and is expected to drive the market.

NFC: More and More Ubiquitous
NFC is now featured on the iPhone 6 as well as a variety of brands including Alcatel, Asus, BlackBerry, Nexus, HTC, Kyocera, and LG. “With an increasing majority of phones on the market today including NFC functionality within them, it is only a matter of time before the usage increases for access control as well,” Aikin said.

However, applications are limited and mostly center around mobile payment, in particular Apple Pay. “Overall, NFC-enabled devices are only one part of the equation. Administering the new services and creating new policies will also need to be addressed,” Blake Kozak, Senior Analyst, IHS said.

BLE: Not to Be Ignored
Another area to be looked at is Bluetooth low energy, also known as Bluetooth Smart, which many say offers advantages over NFC. “For NFC, you've got to be within a few centimeters of the reader, so it works very much like your traditional plastic card,” Jason Ouellette, Product Line Director for Access Control at Tyco Security Products said.

That's different with BLE, which can detect multiple objects with 30, 40, or even up to 50 feet of range, not to mention the availability of Bluetooth-enabled phones. “You are talking about 3 billion devices that are out there today, that are Bluetooth Smart-enabled, without the use of any special chips. So all we're doing is leveraging an enormous network of devices that are already out there,” Ouellette said.

Applications include controls in smart homes, where lighting and air conditioning can all be adjusted with the mobile device. Medical applications are available as well, allowing users to check their various bodily functions on their phones. NFC or BLE, a major issue that needs to be addressed is security, in particular the interception of data. “I think ‘eavesdropping' is the most important issue to be dealt with,” said Norana Johar, COO, FingerTec. “People can ‘listen' to whatever data you are sending.” “When the mobile device is used in a security solution, there needs to be further levels of encryption,” said Rene von Franquemont, EMEA Product Marketing Manager at Honeywell Security. “The way the mobile credential is securely enrolled to the mobile device and how the activation process is set up in both the mobile device and the access control system requires more work.”

GEUTEBRUCK launches Easy Server G-Scope/6000

GEUTEBRUCK launches Easy Server G-Scope/6000

Editor / Provider: GEUTEBRUCK | Updated: 2/27/2015 | Article type: Security 50

G-Scope/6000, the Easy Server in the G-Scope video management family, is a fully functional server, "out of the box". It is as easy to install and to use as a PC. When the reliability of server technology is required, but the level of complexity and flexibility need to remain easily manageable, GEUTEBRUCK's G-Scope/6000 is the perfect fit. Just take it easy.

Its performance meets the high standards of the G-Scope family. The 64-bit G-Core video engine combined with the integrated GPU acceleration guarantees 3 times faster image processing, while the dual database architecture ensures rapid access to memory images and a high level of protection against tampering. Integrated video analysis rounds out the package: Activity Detection for motion-triggered recording or also for motion detection in indoor areas along with scene validation for monitoring the cameras are standard features. Options such as powerful video analysis for outdoor security applications and automatic number plate identification for access control expand the features to meet any wishes.

Reliability and redundancy are an integral part of the Easy Server: Redundant power supply, SSD for the operating system and integrated RAID system provide a level of availability equivalent to that of an IT server. With its high level of expandability, the G-Scope/6000 can fulfill demanding tasks with just a single device: 8 hard disk slots provide storage capacity for up to 42TByte in RAID5; up to 64 IP and 16 analog camera inputs make it possible to secure larger objects. The G-Scope/6000 can of course be integrated into any network, to secure even larger areas or distributed sites, for instance.

2015 Access control: Experts pinpoint growth sectors

2015 Access control: Experts pinpoint growth sectors

Editor / Provider: William Pao, a&s International | Updated: 2/24/2015 | Article type: Hot Topics

IHS estimates the overall growth for the access control industry will be 8.8% in 2015, although that figure is likely to change since this is only the beginning of the year, cautioned Blake Kozak, Senior Analyst at IHS.

Regionally, North America will continue to grow, although not by the same margin as last year. “I do think there will be some shifts in the trend, so this year growth may be a little lower in North America, and higher growth is expected especially in APAC and Latin America,” said Jason Ouellette, Product Line Director for Access Control at Tyco Security Products.

Mike Sussman, Technical Director at TDSi, echoed that comment. “The market is booming internationally, particularly in Africa and Southeast Asia as these markets develop commercially. Even in the U.K., the construction industry's growth is picking up pace after the lull of the late 2000s,” he said. While access control has applications in different sectors, growth is set to be particularly noticeable in certain vertical markets. These include:

Education: Demand in education continues to be strong given school violence and educators' efforts to attract foreign students. “With so many schools, universities, and colleges that have yet to implement holistic access control solutions in their premises, this could be the area of growth for the access control industry this year,” said Norana Johar, COO at FingerTec.

Healthcare: Another area is healthcare, which “continues to see strong growth, especially for electronic locks, to protect patient records, storage closets, drug carts, lockers, among others,” said Kozak.

Residential: Residential security is booming in North America as electronic locks and video are helping to drive the smart home adoption. As for other regions, “although the EMEA and Asia have yet to see this trend, there has been high demand for luxury condos and apartments, especially in parts of Southeast Asia,” Kozak said.

Utilities: Utilities will continue to see strong adoption, especially in many developing countries that are looking to renew their focus on infrastructure development over the next five to 10 years.

SMBs: Demand from small and medium businesses is also growing. “Our belief is in SMBs, which will mainly be driven by two factors,” said Lee Odess, VP of Marketing at Brivo Labs. “First, upfront costs for the system are declining, and second, awareness and demand for the service by this segment are increasing.”

2015 Access control: Biometrics cheaper yet better

2015 Access control: Biometrics cheaper yet better

Editor / Provider: William Pao, a&s International | Updated: 2/24/2015 | Article type: Hot Topics

The access control industry fared pretty well in 2014, fueled in part by the adoption of IP-based solutions. This year, the growth trend will continue in the market, which is also expected to see more advanced technologies. A move towards integration and open standards will further drive the growth of access control, long seen as a vital part of security but now being used more and more for management.

Last year, the overall access control market grew 7.6%, according to IHS. The figure is slightly less than the 10% estimated by Memoori Business Intelligence. Many factors contributed to the growth, with a migration towards IP-based solutions cited as a major market driver, especially amid an increase in the construction of new buildings, most of which deployed IP-based solutions.

“IHS estimated that in 2014, nearly 60% of the global access control panel market was IP-based. Although legacy equipment is still a large portion of the access control market, as new construction ramps back up, nearly all new installations will be installing IP-based access control,” said Blake Kozak, Senior Analyst at IHS.

This year, growth in access is set to continue, due to undying demand from users seeking to secure lives and assets. “Security is still one of the top priority concerns in all areas of personal and business coming into 2015. Physical access control is no exception,” said Norana Johar, COO at FingerTec. “I think that the growth will continue at a higher rate as many premises are looking for better ways and better technology to control access to their properties and business premises.”

Access control has evolved from traditional card readers to more advanced technologies. While card readers will still be prevalent, technologies like biometrics, mobile credentials, and wireless locks are expected to see increased adoption and usage.

Biometrics: cheaper yet better
The overall trend in biometrics is that they will become less expensive, due to several factors including an increase in supply. “Prices of biometrics hardware are getting cheaper throughout the world due to an influx of newbies in the market, especially from China, and the familiarity of consumer to the technology,” Johar said. “I think the cost will go down slightly because of the market demand and competition, but manufacturers need to introduce unique feature to the existing technology in order to maintain the price.”

Indeed, progress has been made in biometrics, both in contact and contactless solutions. The following sections discuss some of the trends in the technology.

Fingerprint to Still Dominate
Contact solutions exist primarily in fingerprint, which is expected to stay the mainstream technology due to its various benefits. “Fingerprint still tends to be the most commonly used biometric, especially since it is affordable and has a small form factor … so I would expect fingerprint to maintain its market leader position compared to other technologies,” said Brad Aikin, Business Leader of Electronic Locks at Allegion, adding that the public is getting more comfortable with biometrics thanks to its incorporation into commonly used products, for example the iPhone 6. An improvement in accuracy has also helped drive acceptance, not only by critical infrastructure operators — seen traditionally as those with a tendency to use biometrics — but by regular businesses as well.

“Now the technology is becoming more mature. Whereas it wasn't uncommon at all for someone's fingerprint not to be read, that is becoming less and less the case,” said Bill Kotwicki, Northeast Regional Sales Manager at AMAG. “People are more accepting of it, and again with the lower cost, it's just a technology that will continue to grow.”

Explosive Growth for Facial Recognition
Contactless biometric solutions are primarily in the form of iris scan and facial recognition. According to Mike Sussman, Technical Director at TDSi, iris had its chance a few years ago, yet with one of the major providers removing its product, iris no longer seems to be a growing technology.

The biometric that gained huge traction is facial recognition, which, “of all the biometrics, will experience the fastest growth in the near future,” said Paul Bodell, CEO of ECKey Smartphone Access Systems.

Facial recognition's contactless, non-invasive nature makes it a great solution for places where sanitary requirements are stringent. “It is especially ideal for locations such as hospitals where contamination can be an issue,” Sussman said. “The face is also a more reliable biometric marker compared to hands, which can be effected by skin damage or a rough environment, for example a construction site or industrial plant.”

Advancements in the technology, such as 3D processing, have contributed to facial's accuracy and may further drive adoption, although price remains an issue. 3D, for example, requires more processing power and will push up the cost of manufacturing. Price, therefore, is likely to keep 3D facial recognition as a niche product.

“Facial recognition is expected to grow more than twice the rate of fingerprint over the next five years but is nearly a tenth the size in terms of revenues,” said Kozak. “While 3D will certainly help advance the technology, the price will continue to be high and will be used in fewer high-security locations compared with other technologies.”

Multimodal Biometrics: Trend or Overkill?
To enhance authentication, multimodal biometrics, or the combination of two or more solutions, is an alternative. “The failure rate makes it such that for a population of 25,000, you could be looking at anywhere in the vicinity of 25 to 200 people that will not be able to get a valid fingerprint or iris enrollment for various reasons,” said Jason Ouellette, Product Line Director for Access Control at Tyco Security Products. “Customers are already at the point where they have no choice but to have multimodal or multi-biometrics to provide 100% coverage of all staff.”

However, popular perception is still such that multimodal biometrics are unnecessary for typical businesses because of the cost and complexity involved. “That level of security is not necessary other than critical infrastructure, government sites, laboratory sites, and things of that nature. It's still seen as an overkill, not worth the investment,” said Kotwicki.

Some see the use of multifactor authentication, or the use of a biometric along with a token or a password, as a more viable choice. “I believe that more terminals will be sold as dual authentication, and it will be biometric plus card or biometric plus pin,” said Allegion's Aikin.

Bank Rakyat Indonesia Implements IP Access Control System

Bank Rakyat Indonesia Implements IP Access Control System

Editor / Provider: Genetec | Updated: 2/23/2015 | Article type: Commercial Markets

Bank of Rakyat Indonesia implemented the Synergis IP access control system to restrict access to vulnerable areas and extends BRIZZI one-card application to include employee access.

Business Challenge
Incorporated in 1895, Bank Rakyat Indonesia (BRI) is one of the largest government-owned banks in Indonesia. Today, BRI has over 10,000 outlets serving 30 million retail clients and a growing corporate clientele. BRI's headquarters is located in Jakarta and serves as the center of their national operations in a state-ofthe- art 35-story building.

As one of Indonesia's largest banks, the organization places a very high importance on security; not only to ensure its proprietary business information stays safe, but also to protect employees and visiting clients. With the aim of enhancing the security of their headquarters, BRI was looking to expand its physical access control system.While server rooms were restricted with a stand-alone access control system, the technology was extremely basic and could not accommodate their plans to implement access control enterprise-wide. BRI also wanted a more advanced and feature-rich IP-based access control system to protect main entrances and exits and other sensitive areas.

An open-architecture system was also important to accommodate device selection and other systems integration in the future. With the help of local integrator Golden Solution Indonesia, BRI chose Genetec Security Center, the unified security platform with Synergis IP access control. According to Mr. Yusuf, Head of Security at BRI, “Security Center met all of our needs in terms of system functionalities within our budget. It also gave us the flexibility to leverage advanced card technology for a unique one-card application with our BRIZZI payment card.”

One-Card BRIZZI Application Showcases Innovation and Simplicity
Today, Security Center manages 114 doors throughout BRI headquarters, securing access to server room areas, offices, and VIP guest locations. HID Global VertX controllers and readers were chosen to secure all doors. The Synergis IP access control system is also managing 12 tripod barrier gates at the main entrance of the headquarters.

Since all employees and some customers already carry the BRIZZI payment card from BRI, the bank wanted to leverage the flexibility of the system and the hardware to use this card for access credentials as well. Today, the 32-bit smartcard not only serves as a pre-paid debit card but is also used by employees to access various areas of the office building.

“The BRIZZI card is designed to serve multiple functions including a prepaid debit card for purchases and for road tolls from merchants who are affiliated with the bank,” said Mr. Yusuf. “By choosing Synergis and HID, we were able to add the access control application within our headquarters. This makes it easier for our employees who now only have to carry one card and this also helps us build on this bank-affiliated innovation.”

Granular Access Privileges and Visitor Management Secure Vulnerable Areas
In order to ensure employees only have access to the areas and floors that are necessary to their functions, BRI was able to create access control groups and pre-assign specific access control privileges to each group for easy cardholder enrollment. Special after-hour privileges are provided to senior-level employees who may require access beyond regular office hours.

The ability to pull detailed access control reports from Synergis has been instrumental to the security team at BRIZZI. During any active investigations, access control event reports provide a clearer timeline of when events might have occurred. Creating monthly reports on visitor access, event logs, and system health status have become routine for the BRI security team.

For clients and business affiliates who visit the headquarters regularly, the built-in visitor management feature in Synergis has facilitated the check-in and check-out process. “The enrollment process for our visitors is quick and easy, and having the ability to assign access control rights ensures our most vulnerable areas will always be secure.”

Growing Into the Future Without Restrictions
Beyond ensuring BRI headquarters are safe from any potential vulnerabilities, the security department is exploring the use of Synergis for a time and attendance application that will involve multiple departments.

Integration with video surveillance and fire detection systems are also on the horizon for BRI. Since Security Center is a unified platform, BRI is looking forward to managing all security and business systems from one easy-to-use solution. Syncing events and alarms with video will further simplify investigations for the security team. BRI is also looking to upgrade access control at other locations and centrally manage these sites from the main headquarters by implementing the Genetec Federation feature.

“ Synergis IP access control is a very effective product and has met all of our needs in helping us secure our headquarters. We look forward to expanding on the system by adding more advanced functionality, systems integration, and other sites. The Genetec solution has given us the freedom to grow, without restrictions, so we know our investment is protected,” Mr. Yusuf concluded.

Philippines: On the fast track to success

Philippines: On the fast track to success

Editor / Provider: Lisa Hsu, a&s Asia | Updated: 2/20/2015 | Article type: Hot Topics

The Philippines have defeated all odds and will make a remarkable recovery in 2015 despite the impact of natural disasters over the past few years. Economic growth is back on track, with public-private programs that will help boost the growth of the private sector, and big events happening this year will fuel the growth for security.

This year will be a positive year for the Philippines, with a forecast GDP growth of 6.8 percent, fueled by inflow of foreign direct investment and remittances. Impacted by a string of natural disasters in the past two years, including Typhoon Haiyan in 2013, the strongest typhoon to ever hit land, the Philippines still managed to achieve a 5.3 GDP growth last year. According to BDO UniBank, the biggest likely change for 2015 will be accelerated implementation of infrastructure projects under the government's public-private partnership (PPP) scheme. Moreover, as the world's largest center for business process outsourcing (BPO), opportunities will present itself with more demand for security and protection for data and employees who work at unruly hours.

Uncertainty for 2016 Elections
Presidential elections will be held in 2016, which may lead to postponement of some projects. Some investors may delay key decisions till a new government is formed and wait to gauge what the future policy environment will be before launching major projects. At the same time, nearing the upcoming election, talk of more projects and activities from the government to gain more votes will hopefully turn into real projects, as growth initiatives must continue. According to Rosalie Real, Project Manager of CBR2 Marketing, “Some agencies will hurry up and purchase before elections, while others who are either indecisive or have no final requirement yet will have to wait after the election is over to continue their projects.”

According to Matthias Boehm, Country Manager of Bosch Security Systems, the elections are considered to be “hot months” in security and safety; most projects are still being rolled out, while some are put on hold.

Security Growth Benefits From Economy
The Philippines has recently been named one of the fastest growing economies in Southeast Asia, and the security industry has benefitted from this trend. “The security industry matures almost every day. As we integrate electronics to this field, the security industry then takes a bigger leap, which opens up many possibilities for surveillance, access control, finger prints, face detection, voice recognition, and building management systems (BMS), etc. If we look at it on a general basis, growth for the industry doubles every year,” said Zel A. Ortiz, Sales and MD of Alcon Philippines Technologies and Solutions.

2015 is a busy year for the country, with events that will be sure to fuel the growth of security. The Asia-Pacific Economic Corporation (APEC) Summit will be held in Manila this year, which the country will appoint a large amount of the budget to security, as it is a main concern. “We are preparing for important visits in 2015, particularly for the APEC summit, for which reason our airports are already in the process of renovation. Entertainment facilities such as casinos and resorts are also in progress in several parts of the country, but predominantly in Manila,” said Boehm.

Also this month, Pope Francis will visit the Philippines to give blessing to the country that suffered from Typhoon Haiyan, which will urge the country to be more aware of security, and take extra precautions by upgrading their current systems at crowd drawing events during the Pope's visit. The Pope's decision to ride in an open vehicle instead of a bulletproof, enclosed "popemobile" poses as a security challenge, and the country has issued additional security forces to ensure protection, including additional soldiers and maritime security surveillance.

“No CCTV, No Permit” Fuels Growth
The policy “no CCTV, no business permit” implemented in 2014, is an essential driver for the security industry, especially surveillance growth and security awareness. With law enforced to mandate surveillance systems as part of business owners' security measures, the public will soon realize the importance of monitoring their premises that can not only deter criminal activity, but also catch culprits.

The policy is implemented in most of the major cities in the Philippines, requiring new and existing businesses to install surveillance systems on their premises in order to obtain business permits. Establishments such as banks, shopping malls, service stations, super markets, money changers, 24-hour convenience stores, schools, fast food restaurants, car dealerships, and other crime-vulnerable establishments such as jewelry and pawnshops, hotels, game and amusement establishments, and health clubs are under the ordinance to install surveillance cameras in order to continue their businesses. “The new legislations implemented by local government units all over the Philippines have definitely placed importance on security, particularly in the use of surveillance systems as a preventive measure against crime. It is now a matter of strictly implementing this policy that will define the standard for surveillance with help of video surveillance manufacturers. This way, more options will be made available to SMBs and will then spur growth in the sector,” Boehm explained.

“No CCTV, no business permit” has set the standard for surveillance systems as the policy has specified a range of requirements for surveillance placement of cameras inside and outside of the establishment, hardware requirements that are needed to record incidents and clearly identify culprits, as well as suitable storage memory that can store the footage for forensic evidence. “The policy will push surveillance growth because it can greatly reduce petty crimes in SMB sectors like supermarkets, convenient stores, etc., and at the same time it helps to contribute security in the public,” said Ortiz. Moreover, in order to push the growth of surveillance in the Philippines, education is essential to allow consumers to know what is appropriate for their requirements. “We manufacturers have to keep educating SMB customers what will be their benefit when they deploy security surveillance systems, or they will simply install no-use cameras just to meet regulation, which is not beneficial at all,” Masami Eguchi, GM of APAC at Panasonic System Communications stressed.

As growth for surveillance is fueled by the policy, business owners have started to realize the importance of video surveillance for their establishment. “Since the government issued a video surveillance requirement, most business owners at first resolve to buy cheap surveillance products just for compliance. Later on as they experience the importance and what good quality products could bring, they are adapting to change. IP cameras and HD-over-coaxial products are fast becoming popular. Consumers learn by asking about resolutions, clarity, and infrared for night viewing. The Philippine government offices, schools, private businesses will surely evolve to upgrading their system these coming years,” said Real.

Private Sector Takes the Lead
Recently, growth in the private sector has been booming with the help of PPP projects. As a result of the government's agenda in the development and implementation in infrastructure, project demand is high. “Mid-high projects have been stronger driven from the commercial sector, e.g., hospitality and gaming that needs security in their operations, which are verticals driving the security industry in the Philippines. It will continue in 2015 with commercial projects from the private sector driving forward,” said Sunny Kong, Director of Sales in APAC at Milestone Systems.

According to Eguchi, though the current market size in the Philippines is still small, it has extremely high growth. “Panasonic would like to contribute to the commercial sector, such as retail stores, and banking,” he added.

Projects to Improve Tourism 2015 is “Visit the Philippines” year, a campaign designated to bring in more tourism to the country, with a target to reach 10 million tourist arrivals. To promote this, there is a need to improve facilities for airports, hotels, residential, commercial, and entertainment establishments that will help bring in more tourists within the year, which will also further boost the security market. According to Tamir Ginat, Senior VP for APAC at IndigoVision, some of the big projects going on that will boost tourism in the Philippines are casinos, smart city projects, the Philippines international airport, and the Philippines light rail transit (LRT).

According to Ivan Tjahjadi, Country Manager of ASEAN at Axis Communications, “To date, the highest growth for us is manufacturing, transport and commercial projects. These industries now require more security and intelligence in their system. Integration also is a big factor since most of them have old systems running.”

Residential Boom
In recent years, various verticals have been growing, especially the residential sector which continues on its cycle of boom as a result of rising demand, capital growth, and rental yield. Developers are committed to addressing the problem on housing shortage. Lately, the trend now is to build mix-use township projects in order to house various types of establishments.

“In all these constructions, security will definitely have a big part to play in ensuring the safety of the general public,” said Boehm.

All Eyes on Philippines
All eyes are on the Philippines as it continues to grow at an optimistic pace, with the help of the BPO industry and government spending for PPP. Additionally, the “no CCTV, no business permit” policy will be a crucial factor that can help the security industry in the Philippines to grow awareness and promote growth. The Philippines will see a prosperous year as it goes on the fast track to success.

Riding on security solutions to safety

Riding on security solutions to safety

Editor / Provider: William Pao, a&s International | Updated: 2/20/2015 | Article type: Commercial Markets

While security products can help with theme park management, operators still rely on them for the original purpose that they were designed for: keeping premises safe and secure. Products and solutions, such as video surveillance, access control, and RFID can help operators achieve their security objectives.

For amusement parks, they deal with several types of security concerns. The first is the protection of premises from various harms. “As like any pubic commercial business, threats that have the potential to prevent or hinder the achievement of objectives that the business needs to perform, for example processes to keep the business financially safe and compliant from potential threat sources, can range from vandalism, terrorism, criminal activity, and asset loss and safety,” said Pedro De Jesus, Channel Manager for Security at Gallagher.

Another concern is ensuring the safety of visitors, some of whom may enter or exit rides from the wrong side or wander off to restricted areas. Locating missing children or members of a group is another primary focus. To address those concerns, security products and solutions are deployed, offering vital and much needed assistance to operators as they strive to build an overall safe environment.

Preventing child abduction and theft
Video surveillance plays a vital role in keeping amusement parks safe, especially when it comes to detecting and deterring crime. “A premier form of electronic surveillance, video provides real-time monitoring of situations, both at the location and remotely,” said Craig Dahlman, Director of IP Camera Products at Pelco by Schneider Electric. “Video security is a proven solution that can offer a complete answer for protecting customers, co-workers, and employees while additionally offering a watchful eye over property.”

Cameras are installed at various points in the park as well as at entrances to prevent various crimes, such as child abduction, although the mere presence of cameras should serve as a deterrent. “Visible installation of cameras and the knowledge that there is a video surveillance system is mostly sufficient to repel potential kidnappers,” said Roland Feil, Director Sales at Dallmeier Electronics, adding that high-definition cameras offering crystal clear images can also help investigate theft and shoplifting, which can be quite rampant at theme parks. Another important value of video surveillance is it can help operators request the necessary compensation should something happens. “It provides indisputable documentation of an event. While serving as a visual deterrent to crime, it gives park managers and security and safety professionals the tools they need to validate liability claims,” Dahlman said.

Locating lost visitors
Tracking lost children or members of a group over a large space like theme parks can be a daunting challenge. RFID, which entails communications between a tag and a reader, can be utilized for this purpose. “It keeps children safe by determining where the child last used the RFID credential. The child's credential can also be programmed not to work without being tagged in tandem with the parent's credential,” said Scott Lindley, President of Farpointe Data.

RFID not only can track lost visitors but also park employees as well. “They can be used to track lone workers, perhaps maintenance workers working in remote parts of the park outside of opening hours, to ensure that staff are accounted for and located, so emergencies can be spotted more quickly,” said John Davies, MD at TDSi.

Better yet, RFID can be integrated with other technologies, such as video analytics, to offer visual verification of the missing person. “Passive RFID tags can allow wearers to be tracked at specific portals throughout the park. While passing through those areas, images can be logged to validate the wearer's location,” said Larry Bowe, President of PureTech Systems. “On a more advanced level, the use of active RFID tags or small GPS transmitter could allow map-based tracking throughout the park and provide the ability to instantly swing a PTZ or zoom a high-resolution fixed camera directly to the child or person in question.”

When looking for lost visitors, every second counts. Video surveillance technologies nowadays have video forensic capabilities that enable quick retrieval of critical video data. “With metadata, which adds sense and structure to video surveillance, it is possible to immediately retrieve the correct evidence of hours of recorded materials in a couple of seconds,” said Pieter van den Looveren, Manager of Marketing Communication for Video Systems at Bosch Security Systems. “Today's video forensic tools can include details on age, clothing color, gender, and even geographic vicinity, allowing a user to literally enter a video search looking for a ‘small male child, wearing a red shirt last seen in the area of a particular ride during a specified time frame,'” Bowe said. “Video clips meeting these requirements can be quickly provided to security for a timely analysis.”

Detecting suspicious objects
While the technology is nothing new, detecting unattended or suspicious items by way of video analytics continues to be a popular application for theme parks, which might be targets for terrorist attacks. “With the help of modern video content analysis, it is possible to issue an alarm if any objects remain within a certain area for a predefined period of time,” Feil said. “The systems can also prevent the blocking of escape routes, fire rescue paths, or approach roads for ambulances by parked objects, which could have very serious consequences in case of an emergency.”

Intrusion detection Perimeter protection is a major concern, especially during the night when theme parks are closed. Delinquents, thieves, or burglars trying to climb over the fence and get into the park need to be kept out. Video analytics and cameras are deployed for this purpose, keeping parks safe and sound after business hours.

“Intelligent video can determine, for example, if an object approaches an area, from which direction it is coming, or how long it stays in a certain area,” Feil said. “This means that intruders can be detected early on and an alarm can be triggered. Comprehensive validity checks reduce false alarms, which may be triggered by leaves swishing in the wind or animals, to a minimum without missing ‘real' alarm messages.”

Video recording during night time, when everything is dark, presents a daunting challenge. Luckily, advances in lowlight and thermal technologies have solved this problem. “Today's thermal imagers have become very affordable, and as video analytic technology continues to improve, protection ranges increase greatly,” Bowe said. “The ability for video analytics to utilize a single camera for distances from hundreds of meters to kilometers makes implementing measures for night time surveillance more effective and more affordable.”

Access Control in critical areas
Like any other businesses, theme parks can step up access control through multifactor authentication, or a combination of tokens, passwords, or, for entry into more critical areas, biometrics. “Biometrics is typically used throughout high security or restricted places, for example head-end sever rooms, cash holding rooms, and security operations,” De Jesus said. “Access to these areas can be controlled to ensure only those staff that are appropriately qualified or trained can gain access.”

Access control management software can offer rapid authorization or removal of access when required. “Examples include contractors needing access to service the rides or attractions, or temporary staff no longer needed to work in restricted areas,” said Davies.

Ensuring safety of equipment
Finally, security products can help ensure that rides and other types of equipment are in good shape. “Video analytics is desirable for monitoring abnormalities, for example smoke, breakage of a gear, movement of a critical component, or overheating through the use of thermal cameras. They can even be used to ensure certain safety procedures are being followed,” Bowe said.

Safe and fun
People come to amusement parks to relax and have a fun day with their family and friends. They can't have fun if constantly being bugged by worries that something might happen. With various security products and solutions in place, operators can strive to make their parks as safe as possible and offer the ultimate visitor experience.

Surveying trends in the security integration market

Surveying trends in the security integration market

Editor / Provider: Scott Lindley, President, Farpointe Data, a&s International | Updated: 2/19/2015 | Article type: Hot Topics

In today's world, sophisticated security end users demand for higher levels of expertise and interoperability, forcing systems integrators to emphasize on seamless integration to provide users with optimal performance and automation.

It is evident that the majority of security installations are becoming more and more complex. No longer content to monitor and manage separate access control, fire alarm, video surveillance, intrusion, and HVAC control systems, corporate security and technology managers want to consolidate and integrate various disconnected security and facility management systems. At a dramatically increasing pace, the IT department is leading the initiative, particularly given the trend toward convergence of physical and logical security systems. End user customers are demanding that their integrator or dealer understand their business and their infrastructure. Security dealers and integrators must quickly decide whether or not they want to be part of this new security paradigm or slowly wither away, providing traditional stand-alone solutions. With every new advance in the installation marketplace, dealers and integrators must again and again decide whether to keep pace. Successful implementations require greater technical knowledge of systems than ever before along with products that work together more easily, while simultaneously providing better ease of use to end users.

Dealers and integrators who want to be positioned for continued success in this evolving marketplace need to choose not only the right products for any given installation, but align with manufacturing partners who will provide them with the best prospects for long-term success, manufacturers that heavily invest in both new scaleable technologies for their products and support programs for their channels.

A New Quid Pro Quo
It used to be that the dealer or integrator that sold the most widgets earned “most favored” status from its manufacturers. Having that status resulted in recognition, special perks, and discounted pricing for those who delivered. However, in a direct reflection of the new realities of today's security market, this simply isn't the case anymore. It is not that manufacturers no longer appreciate top sellers or want to avoid rewarding them. It is because forward-thinking manufacturers know that their dealers and integrators have to stay on top of the latest technology trends in order to stay competitive. These manufacturers want their dealers and integrators to succeed in a manner that will keep both the integrator and the manufacturer successful in the years to come.

Being Seamless is Essential
Reliance on proprietary technologies and platforms inhibits innovation, integration, and the assimilation of emerging technologies. Issues arising from proprietary technologies plague too many systems which is self-defeating for the security industry, and creates major problems for security dealers and integrators, hindering end users from having flexible, scalable security platforms that cost-effectively protect their people and assets.

We increasingly hear that a major trend that will permeate physical access control now and for the foreseeable future is the growing connection between physical security and IT security. Because of this, there is growing demand by organizations for migration of computer-based systems to a common software platform or to standards-based platforms that can be easily and seamlessly integrated. Leveraging technology breakthroughs and a need for increased security, companies will also more rapidly adapt smart cards, two-factor readers, biometrics, long-range wireless, and intelligent video into their overall systems.

Physical access control systems on an enterprise level are now described as much in IT terms as they are in access control terms. New command and control integration platforms are giving integrators a wider range of solutions to help end-users meet this challenge head-on while, at the same time, requiring the integrator to have higher levels of IT expertise.

Integration Equals Success
Today, the various components frequently used in the typical security system are not only disconnected, but from different manufacturers, complicating or making integration impossible. All too often, they employ incompatible hardware or proprietary, unsynchronized databases or completely inconsistent user interfaces that compete for space and attention. Such systems may be inefficient and need many people to manage them, and security personnel who have been forced to use them have been frustrated for some time but these systems will not pass muster with IT personnel.

However, there is a good reason for this — such systems increase employee and training costs, foster unnecessary equipment expense, have gaps causing security and safety breeches, and can produce downtime in mission-critical operations. Since IT budgets and management are responsible for many of these operations, they are beginning to dictate what will be used, particularly for physical access control systems.

Seamless integration means the physical access control department, as well as other groups in the enterprise, have the freedom to select different technology vendors, relying on the command and control platform to handle the integration. This extends to system hardware. Today, with one card reader, users can read the most popular 125 KHz proximity cards, including those from Farpointe, HID, and AWID. 13.56 MHz smart card readers can process contactless credentials based upon NXP Semiconductor's Mifare technology as well as based upon France's Inside Technologies. Such readers provide continuity throughout the organization, without having to eliminate legacy cards while additionally building a pathway to higher security applications in the future. Dealers and installers who want to be able to offer this type of powerful security platform to their customers must be willing to stay one step ahead of the technology.

Partnering for Success
Dealers and integrators must recognize and respond to these emerging trends if they want to remain competitive. That means partnering with companies that are also aware of where the market is going and are staying one step ahead of customer needs. Integrators need more than just equipment in today's market. At a minimum, they require training, technical support, sales and marketing expertise and, of course, innovative, forward-thinking products. Today's partnerships are based on helping both partners build their businesses and profits, not just selling more products.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 >Next >Last Page