Home Articles posted by a&s Adria (Page 143)

Suprema focuses on security standards and compliance

Suprema, a global leader in access control, biometrics and solutions for time and attendance management, has certified its products and solutions by acquiring international safety certificates to ensure the highest level of security and protection.

Suprema’s four-door access control panel Corestation is its first controller to acquire UL 294 compliance, a certification that evaluates the safety and reliability of the product. Suprema’s compact outdoor RFID reader, Xpass D2 is SIA OSDP verified, meaning that the device conforms to the SIA Open Supervised Device Protocol (OSDP) standard and the related performance profiles. It ensures higher security than a common access control communication protocol by constant monitoring of wires and protecting with high-end AES-128 encryption.

Furthermore, Suprema continuously works hard to update and enhance data protection features to meet security standards. Suprema’s access control and time & attendance platform Biostar2 has acquired ISO 27001 and ISO 27701 certifications, which certify compliance with Europe’s General Data Protection Regulation(GDPR). Overall, these certifications ensure that Suprema access control systems have the highest level of protection against potential security breaches and vulnerabilities.

“Suprema not only provides the world’s leading biometrics security solutions but also takes the lead in the protection and safe use of biometric data, including facial and fingerprint information”, said Suprema Inc. CEO Hanchul Kim. “Suprema will continuously expand our investment in data protection by acquiring certifications to comply with the different regulations on a regional basis. Suprema will provide the most secure biometrics security solutions to the world so that people can enjoy the convenience and safety that biometric technology provides.”

Three ways businesses benefit when they free their access control system from cables

London, March 2022 – An access control system is familiar technology to organizations of every size. Access control may operate as standalone electronic locking. It can also integrate with complementary business systems such as HVAC, time-and-attendance, in-house payments and more. What many businesses may not know is that, by restricting their access system with wires, they are not using its full potential.

In many companies’ access systems, only the most important doors and locks are wired to mains electricity. Software then filters and monitors traffic. It is a tried-and-trusted way to let the right people in — and keep everyone else out.

Yet the expense and disruption of wiring doors can stop electronic access control in its tracks at the front entrance. This leaves building door control in the hands of mechanical locking, which limits the flexibility and control of security, and its potential contribution to business success.

The answer is to unleash access control from its cables: Extending security with wireless devices — managing access around a building interior — benefits a business in at least three ways.

Make sure only authorized personnel open sensitive doors

Not everyone should be able to walk into the CEO’s office or open the server room. In real-world situations, where staff are busy, relying on manual lock-and-key technology often leaves doors unguarded. If a lock is somehow breached, a security manager will have no idea when, nor will they be able to identify the last person to open the door.

Cable-free electronic locking devices are available for all kinds of internal door, of every size and any material. At Luminy University in France, for example, wireless devices ensure only qualified and authorized staff open rooms where hazardous materials are stored*. They are controlled and monitored from the same system as the university’s wired doors.

Businesses can filter and track access to more than just rooms, too. Wireless cabinet locks add security to cupboards, cabinets and drawers — for employee personal items, controlled medicines or almost anything else. A wired system may find it difficult to reach these openings.

Battery-powered locks can add real-time control and monitoring to server racks, so IT staff know right away if unauthorized access has even been attempted. With the cost of a typical data breach estimated at $4.24m (€3.7m), an investment in wireless Aperio server rack locking could repay itself many times over**.

Convenience for employees, peace of mind for facilities teams

Wireless devices can bring access control much deeper into a building. Employees feel safer at work; facilities and security managers can relax, because important openings beyond the front door are secured and monitored, without any time wasted tracking bunches (or hundreds) of physical keys.

The workload to maintain a network of wireless devices is minimal. For example, Aperio wireless locks only need a change of battery every two years on average, nothing more.

Battery operation is energy — and therefore, cost — efficient, too. Compared to traditional wired locking, wireless devices contribute to an energy-efficiency strategy: Installation is less invasive and less energy intensive; it uses fewer materials like cabling.

For visitors and employees, a single credential still opens all their authorized locks. No one carries large, inconvenient key bunches or wastes time hunting for the right key: Time saved can have a real impact on service delivery, as nurses at the Centre Hospitalier Métropole Savoie have discovered***.

Understand building use (and users)

With the exception of designated “high security doors”, wired access control often stops at the front entrance. Once employees and visitors are inside the building, the system loses track of them. This leaves valuable business data un-gathered.

Extending access control with wireless digital devices can help collect this data and put it to work. Technology protocols and standards such as OSDP and LDAP ensure the data is interoperable with complementary systems, now and in the future.

For example, a better understanding of building use enables more efficient energy management. If no one is occupying a suite of offices, why heat or air-condition them? Data from a more comprehensive access system could help automated systems make intelligent, cost-saving decisions in real time.

Granular access control can also help inform decisions about leasing office space — and of what type — or whether to let leases expire. This type of data will only grow in importance as work patterns become fluid. IBM estimates the global mobile workforce will soon number 1.87 billion people****. Understanding how these workers use space will be critical — and could directly influence business success.

To learn more about unleashing your access control system, download a free Digital Solution Guide at: http://campaigns.assaabloyopeningsolutions.eu/aperio-stop-cabling

Euralarm releases guidance on the use of lithium-ion batteries

The Extinguishing Section of Euralarm has published a guidance document on Integrated fire protection solutions for lithium-ion batteries.

This new Euralarm guideline provides information on the issues related to the use of lithium-ion batteries, how fires start in batteries and on how they may be detected, controlled, suppressed and extinguished. It also provides guidance on post fire management. Excluded from the scope are explosion and ventilation issues.

Lithium-ion batteries have become the battery technology of choice in a variety of areas, including amongst others, power generation, communications, industrial, vehicles and many other applications. Active control of the energy being stored and extracted from lithium-ion batteries has been the foundation of their increasing popularity. The relatively low frequency of major incidents is testament to the effort and successful design applied to the critical aspect of using such high-density energy products. However, active control of the battery energy is not sufficient to prevent safety-critical situations and multiple levels of defence are needed to minimize the serious consequences of a failure in a lithium-ion battery.

The increasing number of lithium-ion batteries and an increasing amount of stored energy in different energy storage applications present a new type of fire hazard where fire protection is challenging. Key issues in any fire protection system are the selection of the most appropriate agent for the specific hazard, system layout, the correct discharge of the extinguishing agent, as well as correct installation, the use of approved systems and constant maintenance by appropriately trained staff.

The guidance document ‘Integrated fire protection solutions for lithium-ion batteries’ is intended as guidance for all professionals dealing with fire safety, fire protection, extinguishing and fire suppression in connection with the use, storage or transport of lithium-ion batteries and their fire risks. Aspects of consumers products are not covered in the guidance.

Euralarm states that the document is intended as general guidance and is not a substitute for detailed advice in specific circumstances. It represents the current understanding of the industry and will be updated as more information becomes available.

Motorola acquires Ava Security

Motorola Solutions has acquired London-based Ava Security Ltd, a global provider of cloud-native video security and analytics.

This acquisition means that the Group strengthens its global dominance in the video surveillance industry and especially in the area of video analysis. The video security companies Avigilon, Pelco, Indigovision and Openpath (which deliver mobile access control solutions) are already part of the group.

The terms of the transaction were not revealed in the press release from Motorola Solutions, but according to the American online publication IPVM, it is said among many professionals in the security industry that it is about 400 million dollars.

Impressive growth

Earlier this month Ava’s latest financials revealed another year of triple digit growth for 2021. Overall the figures show that video revenue grew globally by over 300%, ARR grew by 500% and the number of cameras connected to the Ava Aware Cloud continues to double every three months. The company continued to make significant investments across R&D, sales, marketing and leadership throughout the year.

Innovative development

On the innovation front, during the year, Ava introduced two new cloud cameras (the Ava Compact Dome and the Ava Bullet), launched Ava Cloud Storage, delivered a unified dashboard for hybrid deployments and developed native integrations with IP Video’s Halo sensors and Disruptive Technologies’ environmental sensors. Ava also launched software-driven LPR (License Plate Recognition), enabling the technology on both Ava and third party cameras and not requiring separate dedicated LPR hardware.

“2021 was a great year for us, with our growth rate boosted by new enterprise customers – five Fortune 1000 customers in Q4 alone. But we’re not stopping there, as we’re projecting similar growth numbers for 2022,” comments Tormod Ree, CEO & Co-Founder of Ava Security.

Intelligent video surveillance

Ava Security’s scalable, secure and flexible cloud solution provides enterprises with real-time visibility and powerful analytics to optimise their operations and detect anomalies and threats.

“Our acquisition of Ava highlights our continued commitment to advancing cloud-based video security technologies,” states Greg Brown, chairman and CEO, Motorola Solutions.

“With Ava, we’re well-positioned to support our customers’ evolving security needs by expanding our portfolio of intelligent video solutions that help to enhance safety and streamline operations.”

In addition to allowing organisations to easily access, search and manage their entire system from a centralised dashboard, its self-learning algorithms also enhance enterprise security by detecting abnormal behaviour and alerting operators to events in real-time.

Merger created a hybrid

Ava Security was formed through a merger between Jazz Networks, a cyber security insider threat detection and response company, and Vaion, an end-to-end video security provider. Together, they would meet the market’s needs against both physical threats and cyber security threats by making companies and other organisations to monitor, understand and act on threats in real time to protect people, assets and data. Both companies were privately owned by Ubon Partners and employees.

 

The Future Is Computer Vision – Real-Time Situational Awareness, Better Quality and Faster Insights

Over the past few years, organizations across the globe have moved from piloting to operationalizing enterprise-wide computer vision solutions at scale. Breakthrough technologies that were destined to take 5 to 10 years to appear in the market are being implemented today, and this trend of adapting to the latest advanced technologies shows no sign of stopping.

Nigel Steyn, Sales CTO, Computer Vision Edge IoT, Dell Technologies

Years ago, computer vision was just a clever science fiction innovation, but now it’s a reality that is quickly becoming a part of the enterprise landscape.

In essence, computer vision uses AI and machine learning to make sense of digital video, images, audio and even biometric data, and provides insights and conclusions. With data gathered from both cameras and edge based IoT sensors dotted around a building, campus or an entire city, for example, computer vision technology applies algorithmic models to learn about visual data and turn it into information for decision making.

According to Forrester, 80% of organizations expect the number of AI use cases to increase in the next two years.[1] These data-driven organizations are implementing computer vision to improve the customer experience, gain operational efficiencies and ultimately drive new revenue streams. Indeed, IDC says that organizations that are considered data analytics innovators are two times more profitable than their peers.[2]

It all makes sense. Reliable, accessible data helps business and operational leaders make better decisions, strengthens security, gives companies a competitive edge and can transform how organizations deliver products and services.

The missing link: a real-time federated approach

Video intelligence is not new. Most companies, public spaces and even today’s schools are outfitted with video camera systems. What’s standing in the way of translating video into real-time actionable insights, however, is managing the volume, velocity and variety of data, as well as connecting the dots on that data.

While common approaches to data curation and analytics send data to a central platform for processing, doing so can create tremendous amounts of traffic across a network. There’s also latency involved with large data flows traveling back and forth, which is a significant issue if time-sensitive decisions must be made based on the data.

In order to overcome these challenges, some organizations are implementing real-time federated learning models (Figure 1) which allow for the data to be more efficiently processed and stored, for the most part, at the network edge. The idea is to build algorithmic models on a central server, which is often in the cloud, and keep data at the edge where it’s used. Send a model to the edge, train it with the local data, and then send back only the results to the central server for aggregation. In turn, the central model can be improved and sent back to the edge for enhanced local inferencing.

Figure 1. A Federated Learning Model: The flow of information in a federated model keeps data in place from each edge device while enabling secure data sharing of metadata, results and models across users, devices, data centers, and the cloud.

Today’s visual data models are also designed with typical end users – at the edge – in mind. Having data scientists on hand to perform analyses has largely been replaced with standardized models and drag-and-drop workflows for a “create your own” analytics package. An analytics model marketplace has emerged where companies that are investing in computer vision technology but don’t have in-house AI or data science expertise can incorporate models into their operations.

There are significant advantages to the real-time federated approach:

  • You ingest visual data once and can allow multiple applications access to the information.
  • The model that remains on the central server is not tied to specific data; models can be shared with others without security risks.
  • Because training takes place at the edge, network costs are lower and there’s no need to maintain a centralized data lake.
  • The data marketplace democratizes computer vision for the masses, enabling the sharing and monetization of pre-trained models aligned with specific use cases.

Computer vision’s impact today

Computer vision touches our everyday lives. You probably use computer vision without realizing it. Does your smartphone have facial recognition that lets you unlock the device or authenticate to online banking sites? That’s computer vision. Consider modern cars with embedded cameras. Visual data used from the cameras as well as other sensors gives modern cars the ability to parallel park themselves. Adaptive cruise control regulates a car’s speed while leaving a safe gap between itself and other vehicles, and the accident avoidance system applies the brakes when a car is too close to an object in front of it.

From a business perspective, you can find applications of computer vision across nearly every vertical – retail, transportation, healthcare, manufacturing and energy, to name a few. And you can apply computer vision across those verticals to achieve substantial outcomes, such as personal and facility safety, improved customer experience, operational efficiencies, sustainability and revenue generation. With good visual data and constantly improved models, airports can be run more efficiently, stadium customer service can be customized for each spectator and the healthcare industry can detect tumors more accurately and quickly.

Where is computer vision heading?

To answer this question, let’s look at Figure 2, which depicts the maturity curve of analytics. Over the past few years, many organizations have moved from using Computer Vision as a means to retrieve just descriptive and diagnostic results to being able to be more predictive in their approach, where the models help to predict likely outcomes.

Figure 2. Analytics Maturity Curve

 

Data-driven organizations are now deploying prescriptive solutions that are driving tangible benefits, outcomes and near real-time actionable insights. As these solutions become more adaptive, they will bring dramatic improvements to the performance of systems and automated processes, as well as decision making. And that’s when a real-time continuous improvement loop will be possible, where a model is constantly retraining itself. The later stages of the analytics maturity curve will see processes occur with little or no human interaction or decision making, with resources reaching their destination proactively.

The computer-vision-enabled car will automatically integrate with smart city traffic control systems to avoid and help alleviate traffic congestion, and it will connect with parking information to be guided to the most efficient spot based on its destination. With real-time computing at the edge and an updated model being pushed to the car, your car will “know” how to drive safely whether it’s in a senior community neighborhood or on a high-speed freeway.

Moving forward with a computer vision strategy

Adopting a computer vision solution requires proper testing and validation. Anyone can run compatibility tests and validate an application on a platform in a silo. The trick is to validate multiple applications that are working together on a platform at scale, which support the “ingest once, work on many” concept, and that span the full solution architecture from edge to core to cloud.

A computer vision model design should be validated to ensure the models work properly with specific real-world computer vision applications. Validated design solutions are tested and optimized for each use case. They’re also right-sized to the environment in which they will run, which takes the guesswork out of how much storage, compute and other specs you’ll need for proper purchasing. Opting to conduct real-world testing in-house can put a strain on resources but there are third-party options available. Dell Technologies, for example, offers lab-validated solutions from a curated pool of more than a hundred technology, AI and service partners.

Where validation addresses the technical elements, computer vision is also about the business. Each organization looking to adopt computer vision technology or bring their current implementation to the next level should focus on the insights they want to gain in order to run their business and improve processes. With computing done at the edge, previous boundaries and limitations are lifted. We can now deliver better quality insights, faster and at scale, so organizations should first focus on the outcomes they want to achieve in the areas of safety, customer experience, operational efficiencies, sustainability and generating additional revenue

Computer vision technology provides deeper insights than you can get just from data. Now you can complement that data with visual information, making the data much richer and more useful, and maintain a competitive edge in this new era of how organizations operate and serve customers.

For more information:

 

[1] Forrester report: “Overcome Obstacles To Get To AI At Scale,” January, 2020. https://www.ibm.com/downloads/cas/VBMPEQLN.

[2] Computer Vision 030421 pdf. IDC report: “The Data-Forward Enterprise: How to Maximize Data Leverage for Better Business Outcomes,” May, 2020. DOC #US46264420.

WEBINAR: Specific Security Solutions for Applications in Transport and Logistics

Michael Byrden, Business Development Strategic Partnerships Manager at Vanderbilt & Comnet, delivered a presentation on three different solutions for the transportation and logistics sectors.

Cloud security solutions successfully manage multiple sites coordinated from one center. In addition, the presenter emphasized OSDP protocol as a solution against card cloning at airports and how to protect against it. The third solution is about pre-booking and optimizing car parking using ANPR technology.

Teledyne Flir acquires Noiseless Acoustics in Finland

Teledyne Technologies Incorporated has acquired a majority interest in Noiseless Acoustics Oy. Located in Helsinki, Finland, NL Acoustics designs and manufactures Si124 acoustics imaging instruments and predictive maintenance solutions, including the new cord-free Flir Si-Series cameras.

NL Acoustics’ camera products combined with advanced analytics provide easy-to-use advanced imaging and monitoring solutions. They allow users to detect critical problems and make intelligent maintenance decisions in multiple applications, such as electric power distribution, compressed air systems, and factory condition monitoring.

Kai Saksela and Jonas Nyberg, who founded NL Acoustics in 2015, will retain a minority stake in the business and continue in their current executive leadership roles with the company.

“Having worked with NL Acoustics since 2019, we are delighted to strengthen our partnership with the company,” said Rickard Lindvall, General Manager of Teledyne Flir Solutions. “Collectively, Teledyne and NL Acoustics provide a wide range of condition monitoring and safety solutions, including acoustic imaging systems, optical gas leak detection cameras, and hazardous gas and flame detection instrumentation.”

ASSA ABLOY Opening Solutions EMEIA appoints new Senior Vice President & Head of Digital Access Solutions

London, February 2022 – David Moser has been appointed as Senior Vice President & Head of Digital Access Solutions EMEIA. He succeeds Stephanie Ordan in the post, who became Executive Vice President & Head of ASSA ABLOY Global Solutions late in 2021.

David’s role will focus on continuing to strengthen ASSA ABLOY’s position as the leader in access control solutions across EMEIA. He will oversee the continued efforts in market education and exciting product developments from ASSA ABLOY’s market leading brands across Europe, the Middle East, Africa, India and the SAARC countries. ASSA ABLOY’s access control solutions are trusted in multiple sectors including education, healthcare, multi-family housing, offices, public institutions, critical infrastructure and many more.

David joined ASSA ABLOY in 2017 where he has held the role of CTO and Vice President of Product Innovation for the last four and a half years, leading the transformation of the division’s innovation and product development organisation and has been at the centre of the digital transformation journey.

David joined ASSA ABLOY from the automotive industry, where he held several international management positions in product development and management, operations and marketing.
“I am proud to lead the next chapter of ASSA ABLOY Opening Solutions EMEIA’s digital transformation, with focus on the international expansion of our existing and new product lines. The Incedo Ecosystem remains at the core of our digital strategy, and we will continue to extend this formidable IoT Platform with access control and electro-mechanical locking devices. The next steps of Incedo’s evolution is to provide offline functionality through the Cloud, combined with key-based digital cylinders which do not require batteries and are powered by our sustainable energy-harvesting technology. Incedo will then start combining the best of ASSA ABLOYs leading technologies that will create maximum value for our customers.”

VCA Technology – From Security to Traffic and Business Intelligence Applications

Rob Dupre, Product Manager at VCA Technology presented the company and its technologies, use cases and where these solutions are applied. In addition to the presentation of current technologies and applications, speaker also introduced the new releases and the road map for 2022. In its core, VCA Technology is a UK based software development company designing and developing the applications designed for security to traffic and business intelligence applications.