In Security Magazine February 2024

Page 1

IN SECURITY

IN SECURITY | February 2024 | 1
THE MAGAZINE WITH THE INSIDE STORY ON SECURITY ISSUE 67 FEBRUARY 2024 HANWHA VISION, HAS IDENTIFIED THE FIVE TRENDS TO WATCH IN 2024 8 INDUSTRY NEWS Latest developments in the industry 22 BUILD ON SUCCESS Paxton shows a new manufacturing facility 26 REMAIN RELEVANT 38 CCTV TO BIOMETRICS Traditional surveillance is being replaced Physical security’s role in protecting critical assets

Connected access for smarter working

Incedo™ Cloud. Flexible, convenient, simple.

Download the Solution Guide:

Editor Chris Hewett editorial@mebmedia.co.uk

Accounts Jay Kempisty accounts@mebmedia.co.uk

Publisher Wayne Banks +44 (0)1622 201207 wayne.banks@mebmedia.co.uk

Website and Circulation Manager Kevin Villa website@mebmedia.co.uk

Design and Production Charles David production@mebmedia.co.uk

In Security Magazine is published 6 times a year by

MEB Media Publishing Ltd 13 Princes Street Maidstone Kent ME14 1UR United Kingdom Tel: +44 (0)1622 201207, info@mebmedia.co.uk www.mebmedia.co.uk

Articles and art may not be reproduced or reprinted without the express written permission of the publisher.

Exclusion of Liability

Although every effort will be made to ensure the accuracy of all materials published, the publisher takes no responsibility for errors or omissions.

Copyright © MEB Media Publishing Ltd 2010 - 2023, all rights reserved.

4 Cover story - Video surveillance trends for 2024 Hanwha Vision, has identified the five trends to watch in 2024

8 Product & Industry News

Latest developments from the security industry

22 Building on success Paxton shows a new manufacturing facility

26 Remain relevant Physical security’s role in protecting critical assets

30 Past, present, and future

How sustainability and integration will underpin the future of access control

34 The fourth emergency service AUCSO talks about the biggest threats to campus

38 From CCTV to biometrics How traditional surveillance is gradually being replaced

42 “Polycrises” new normal How corporate security must adjust its strategy

IN SECURITY | February 2024 | 3
34 26 22
Contents

Video surveillance trends for 2024

Hanwha Vision, has identified the five trends to watch in 2024

Hanwha Vision, a global vision solution provider, has identified the five trends in video surveillance to watch in 2024. Already commanding significant attention, these are set to take even greater prominence in 2024 as technology develops further and users put video systems to new and innovative business uses.

Video surveillance technology has evolved over the past decade, and significant opportunities have now opened up for video users, as well as installers and integrators. Those who embrace the transformation of video - from single application security technology to a solution

that leverages AI and the cloud to help users meet wider business challenges - will reap considerable benefits.

Indeed, this evolution of video technology, from its roots in security to taking pride of place in the business technology toolkit alongside 5G and the Internet of Things (IoT), for example, is confirmed in research from Hanwha Vision Europe. A recent survey of 1,000 business leaders in the UK, Netherlands, Italy, Germany and France reveals that almost one-third (31%) now champion AI-enabled video as a means of solving their business challenges. For context, this is nearly double the number who favour automation and

robotics (17%) and almost the same as those who see 5G and the Internet of Things (IoT) as key to solving their challenges (32%).

As Pread Um (Suk Bong), Product and Marketing Director at Hanwha Vision Europe, notes: “Video holds huge potential in streamlining operations, providing valuable data to inform strategy and planning and helping to secure people and assets. In 2024, video looks set to establish itself as an essential tool for business.”

1 An AI-powered business game changer

The increasing combination of security cameras and AI is key to the

4 | February 2024 | IN SECURITY
COVER STORY

transformation of video technology from pure surveillance functions to wider business use.

Hanwha Vision has long championed trustworthy AI for video, rightly predicting that the technology would accelerate to enable data insights and forecasting through deep real-time event and postincident analysis.

Given the development of the technology, Pread Um (Suk Bong) highlights its increasing value: “Data and AI-driven predictive analytics provide valuable insights into critical business processes and help identify risks before they emerge.”

AI-based predictive analytics in video consists of three processes: video information collection, exploratory data analysis, and scenario modelling. Sectors, including smart cities, retail, manufacturing, logistics, and healthcare, are putting the technology to work to gain efficiency through cost reduction, process optimisation and service quality improvements. They are also using video to improve safety and prevent accidents.

2024 could be the year that AI-enabled video breaks through to mainstream business use!

2 The edge continues to gain momentum

The considerable interest in AI ‘at the edge’ will only grow in 2024.

By combining AI and edge computing in the camera itself (‘at the edge’), data is processed when

and where it is generated. This helps users gain immediate insights from their video data and save time and money, as large amounts of data do not need to be transferred to separate locations for storage and processing. A single edge device takes care of everything - from video capture and storage to analysis and cloud connectivity - instead of requiring separate system infrastructure.

According to Pread Um (Suk Bong), “The biggest advantage of edge AI cameras is that video analysis takes place on-site, providing faster insights to facilitate real-time decision-making in critical scenarios.”

Having pioneered AI at the edge, Hanwha Vision continues to add more features to edge AI cameras to meet the needs of different verticals. In 2024, more sector-specific edge AI functions will be introduced to address common challenges in retail, manufacturing, and logistics applications.

As part of Hanwha Vision’s commitment to developing solutions at the edge, 2023 also saw its introduction of SolidEDGE, the first solid-state drive (SSD)-based camera that allows recording at the edge itself.

3 The transition to the cloud gathers speed

The benefits of cloud services were demonstrated during the pandemic, with business trust in the cloud increasing significantly as a result.

Pread Um (Suk Bong) explains further: “Now, as AI becomes prevalent, we see businesses investing in cloud-based services to support video strategies built around AI.”

Unlike building an on-premise solution, cloud technology can be scaled according to demand, with many European firms increasing their cost-efficiency through cloud services that do not require a large initial investment and can be managed centrally and scaled up or down with ease.

What’s more, a cloud-based video surveillance system, or VSaaS (Video Surveillance as a Service), can be easily incorporated into an existing system and integrated with other security systems such as access control, fire detection and building management, as well as AI and data analytics solutions.

4 Cybersecurity will continue to dominate the business agenda The convergence of new technologies, such as the cloud and AI, has advanced the capabilities of video cameras and ensured their widespread adoption across sectors of all types. At the same time, cybersecurity threats have increased. In response, 2024 is expected to see the introduction of the Cyber Resilience Act (CRA) and Network and Information Security Directive 2nd Edition (NIS2) across the EU.

CRA is a regulation that sets minimum cybersecurity requirements for products with digital elements.

IN SECURITY | February 2024 | 5

Under the regulation, products, including video cameras, must be designed and developed with security in mind, protected against known vulnerabilities and updated regularly with security patches.

NIS2, meanwhile, is a directive adopted by the European Parliament and the Council of the European Union in December 2020. EU member states are expected to comply with NIS2 by October 2024 to meet specific measures aimed at improving the cybersecurity of network and information systems across the EU.

Pread Um (Suk Bong) explains: “As the CRA and NIS2 come online, users, installers and integrators must ensure the manufacturers they work with are compliant. Hanwha Vision has already announced its preparedness for the upcoming legislation.”

Indeed, Hanwha Vision has been hardening its security measures for many years, including removing chipsets manufactured in blacklisted countries from its products and basing its manufacturing operations in South Korea and Vietnam. Hanwha Vision also operates a dedicated cybersecurity team, S-CERT, that conducts regular security tests

to discover and address security vulnerabilities promptly. The company continuously obtains certifications from reputable global accreditation bodies such as UL CAP, FIPS, TTA, and ISO 27001 to strengthen its overall security processes. Now widely recognised for its expertise and efforts in cybersecurity, Hanwha Vision was authorised in 2023 as a CVE® Numbering Authority (CNA).

5 Sustainability: a condition of doing business

In 2024, European businesses will be required to report more widely about their sustainability achievements as the Corporate Sustainability Reporting Directive (CSRD) rolls out across the EU in a phased approach. It is anticipated that almost 50,000 firms will be impacted by the CSRD, making up some three-quarters of businesses in the European Economic Area.

For its part, the video surveillance industry must address the growing importance of sustainable development, such as low-impact manufacturing that reduces waste and uses renewable forms of energy. Fortunately, this is already the

case at Hanwha Vision’s plant in Bac Ninh Province, Vietnam. The 60,000-square-metre manufacturing facility, which recently celebrated the production of its 10 millionth product since opening in 2018, is built around environmental best practice. The smart factory runs on power generated by solar panels installed on the roof of the building.

Beyond manufacturing, there is the ongoing impact of video cameras, for example, across energy usage. According to Pread Um (Suk Bong). “Energy prices continue to present a challenge for organisations around Europe, so Hanwha Vision is working on new technologies that reduce the energy consumption associated with camera operation and data analysis.”

These include low-light camera technology that saves energy while still delivering clear images and the power savings resulting from AI ‘at the edge’, which reduces bandwidth and storage needs as less data must be transmitted back to a server for analysis. Finally, Hanwha Vision’s SolidEdge cameras lower energy usage by employing an edge-based VMS, removing the need for separate servers to store video and enable event management.

6 | February 2024 | IN SECURITY

HIGH-END CAMERA

PERFORMANCE LENS X

THE NEW FUJINON SX800. THE BEST OF BOTH. With the new SX800, Fujinon combines both in one for the first time: camera and lens. For long range surveillance at the highest level with 40x optical magnification and constantly sharp images. www.fujifilm.eu/fujinon. Fujinon. To see more is to know more.

TOP

Genetec introduces enterprise-grade, unified, SaaS solution

Security Center SaaS redefines the possibilities for cloud-based physical security.

Genetec Inc. (“Genetec”), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, today announced Security Center SaaS. Built with cybersecurity and privacy at its core, the new offering is a massively scalable, open, and unified software as a service solution (SaaS). Combining access control, video management, forensic search, intrusion monitoring, automation, and many other advanced security capabilities, Security Center SaaS ushers in a new chapter in the technology evolution of the physical security industry.

“The physical security industry has not been able to get cloud or software as a service quite right, especially for enterprise customers,” said Christian Morin, Vice President of Product Engineering and CSO, Genetec Inc. “With Security Center SaaS, organisations are no longer beholden to proprietary or feature-poor as a service solutions that needlessly force a choice of either all on-prem or all cloud. The enterprise capabilities and open architecture of Security Center SaaS are designed to enable systems to handle complex workloads where they make the most sense to be deployed. This flexibility addresses a longstanding need of end users and fills an important gap in the market.”

A hybrid SaaS solution built for channel partners

As deployments become increasingly sophisticated, end users rely on trusted security professionals to guide them through their transition to cloud and hybrid environments. To bring this new SaaS solution to the market, Genetec has transformed its entire approach to procurement, deployment, and maintenance without compromising the enterprise-grade capabilities for which its solutions are known.

“Current approaches to SaaS have undercut the role of channel partners, whom we see as central to customer and project success. Security Center SaaS represents an important opportunity for our systems integrators. It means better margins and long-term customer satisfaction, with no additional investment in time or resources on the part of partners,” said Michel Chalouhi, Vice President of Global Sales, Genetec Inc.

With an automated quoting and ordering process, systems can be fully operational within minutes from when the order is placed. The brand-new Genetec Portal makes it easy to quote, order, deploy, and manage large deployments so that channel partners can continue growing their business and deliver the technology and ownership options that their end users demand.

A seamless evolution to the cloud

Security Center SaaS is a deployment-agnostic platform that supports a range of configurations. Based on a hybrid-SaaS architecture, the new solution allows organisations to move components and sites to the cloud based on their needs and requirements using a combination of cloud-native services and cloudmanaged appliances, with storage and processing at the edge. Because of its open architecture, Security Center SaaS gives organisations the freedom to choose the devices, cameras, and door controllers that work best for their business.

Security Center SaaS can also connect seamlessly with existing on-premises security devices and infrastructure. Access control devices and cameras that are not cloud-ready can easily be connected to Security Center SaaS using Genetec edge appliances.

For more information, please visit: https://www. genetec.com/a/security-center-saas-launch

8 | February 2024 | IN SECURITY PRODUCT & INDUSTRY NEWS

KNX extends KNX secure with a free online training and security check tool

Two additional KNX security tools for a safer smart living experience!

In the age of smart living, homes and buildings become more and more connected. The global demand for innovative building automation solutions based on KNX is increasing rapidly, with countless applications and equipment available. But like any other communication technology, smart homes and buildings can become a target for hackers. For years, KNX Association has been delivering the state-of-the-art solution to secure building automation systems at the highest level: KNX Secure. The mission: Protecting the most sensitive data from the most sensitive spaces, our homes and buildings!

Highest security with KNX: Protecting all types of communication from TP to IP (IPv4/IPv6) at internal data level and external IP level KNX is designed to meet the highest security requirements thanks to KNX Secure and KNX IoT. On the one hand, KNX Secure supports the most secure encryption standards according to ISO 18033-3, such as AES 128 CCM encryption, to effectively prevent attacks on the digital infrastructure of buildings. It secures the IP communication between KNX Secure devices by extending the IP protocol in such a way that all the exchanged data are completely encrypted. At the same time, KNX Secure protects user data against unauthorised access and manipulation by means of encryption and authentication. On the other hand, KNX IoT implements the strongest protocols to secure IoT devices and solutions with the adoption of the new OSCORE messaging protocol using CoAP and CBOR. OSCORE has been optimised for resource constrained

communications and is utilised to encrypt all types of messages end-to-end between endpoints.

Preventing access to KNX installations

In addition to the security features of KNX Secure and KNX IoT, an online training in MyKNX provides KNX professionals with special security know-how. The course informs about advanced strategies that they can employ to ensure solid security of all the systems they install. The KNX Association’s 30-minute online training “How to Prevent Access to KNX Installations” gives system integrators a comprehensive understanding of how to set up a secure KNX installation. All they need is a MyKNX account. The online training, which is free of charge, is an ideal complement to the ETS eCampus and is strongly recommended before enrolling on a certified KNX Basic Course. Those who complete the course will receive an official certificate.

KNX Security check: Verify your KNX installation’s protection online!

With the KNX Security check, KNX intensifies its efforts to provide the best security environment for building automation solutions and devices. Thanks to this new online tool, KNX professionals and users can check whether their KNX installation is protected against contacts over the Internet. With a simple click on a button, they can find out if the setup of their KNX installation is truly secure. The easy-to-use KNX Security check is also part of MyKNX and available in six languages for free after the login.

For more information and an overview of all the security features of KNX, please visit https://secure.knx.org.

IN SECURITY | February 2024 | 9

Save energy with Paxton’s Net2 access control

Ofgem has announced the energy price cap will increase by 5% starting January. Paxton offers access control systems that can help save building energy by utilising smart features. This not only has a positive environmental impact but importantly helps save businesses money.

Paxton’s Net2 is a PC-based access control system that is ideal for granting or restricting access to a building. The system comes with functionality that provide a simple way to save energy.

Use Triggers and Actions to Enable Automated Events

Many appliances still use energy when on standby mode or being left on accidentally. This phantom energy can contribute to around 30% of the average energy bill.

Triggers and Actions is a powerful feature offered by Net2. It is a series of rules that enable site activities and can support lower energy consumption when implemented correctly.

Steve Woodbridge, Paxton’s Global Training Manager, explains: “Facility managers can set an event within Net2 software to automatically switch off appliances. By utilising the Triggers and Actions feature, lights or heating can be set to turn off when the last person leaves the building. This avoids appliances being left on after working hours and saves energy.”

Manage Machines with Energy Saving Readers

The Net2 Proximity Energy Saving Reader is another useful energy saving option. It can act like a power switch, to help save energy in a simple and automated way. Used with the Net2 software, building managers can easily tailor access privileges to up to 50,000 users and manage access to energy-intensive appliances.

Steve said: “In some industries, like manufacturing, there are machines that consume a high-level of energy. Site managers can use Net2 to give access only to employees who are trained to use the equipment.

“The energy saving readers are specially designed with a cover to retain a user’s card which turns the power on and off. The product can be installed on highenergy consuming machines, and building managers can use Net2 to set that power will only come on when a valid user card is inserted.”

Steve continues: “When a person leaves a room and takes out the card, the machines will automatically turn off as it’s like switching off the power. This stops unauthorised access and energy wastage, ensuring the machines are always switched off when not in use as default.”

Watch Paxton’s new Net2 video to discover how Net2 can help you save energy and secure your site.

10 | February 2024 | IN SECURITY

Titan Security Europe’s

concierge security service expanded further than its typical use to provide a top-notch and effective security service to a business in Berlin

The business in Germany was undergoing major construction of one of their headquarters. While construction was ongoing, there were still many people passing through the office – workers, visitors and delivery drivers – and concerns started to grow for the safety of the property.

As a result, Titan Security Europe were asked to step in to provide their security services.

Concierge Security for Business

Concierge security combines the roles of front-ofhouse concierge and security guard into one neat, cost-effective package. While using this for buildings undergoing construction was not the norm, given the main concerns of the client it was a viable and effective option.

The client had the following concerns:

• Ensuring that no unauthorised persons entered into the building while construction was ongoing.

• Ensuring that deliveries could pass into the building without security being breached.

• Ensuring that tools and equipment used in the ongoing construction were not stolen or damaged.

Concierge security was the best option as this was a security job that would involve a lot of dealing with the public. Before now, we had only used our concierge guards on hotel, residential and up-and-running

corporate receptions, so placing them on a construction site was an expansion of our normal services.

Guards were tasked with:

• Checking the identifications of any worker entering the building.

• Checking identifications and appointments of any visitors entering into the building.

• Bag checks on entrance and exit of the building to ensure nothing unathorised entered or left the building.

• Greeting delivery drivers at the entrance of the building, to take the deliveries and pass them through to the relevant persons within the construction site.

Expansion of Services

This job saw our concierge services expand beyond the norm. It is now a service we reach to for any job that involves heavily dealing with the public, including ongoing constructions such as these and events, too.

Titan Security Europe is always going above and beyond expectations. We are always looking for creative and proactive solutions to the issues our clients are facing to provide them with the best services we can.

This is just one example of how we adapt our specialist services to suit the individual needs of each client. With a free initial consultation, we identify the key security issues our clients face and find the most effective and efficient solution to them.

12 | February 2024 | IN SECURITY

Mayflex awarded EcoVadis Silver Medal

Mayflex, the distributor of Converged IP Solutions, has been awarded the silver medal by EcoVadis.

EcoVadis is a globally recognised assessment platform that rates businesses’ sustainability based on four key categories: environmental impact, labour, human rights standards, ethics, and procurement practices. To date, EcoVadis has rated over 75,000 trading partners worldwide, mitigating risk for some of the world’s largest organisations, while positively impacting the environments, fostering transparency, and driving innovation.

Siobhan Bourke, Mayflex’s People and Sustainability Manager commented “We are delighted to have achieved the silver medal from our previous bronze status. This acknowledges the extensive work that we have been doing and are continuing to do. We were so close to achieving the gold medal with just three points

off the mark.”

Siobhan continued “As part of the Sonepar Group, People, Planet and Purpose is a key focus area for the business and we have numerous initiatives in place with a goal of reducing our carbon footprint and emissions, reducing our energy use, and working towards a more circular economy. There is much work going on in the background and we have several market leading initiatives that will be launched in 2024.”

Siobhan concluded “Our associates are integral to Mayflex and whether it’s around continual learning, diversity and inclusion or working with our local communities we have focused teams and committees driving these activities across the business.”

To find out more about EcoVadis and their business sustainability ratings please visit www.ecovadis.com.

IN SECURITY | February 2024 | 13

Protecting a manufacturing site with Incedo™ access control solution

To ensure smooth and secure access control at commercial or manufacturing sites, it’s crucial to have a reliable, secure, and convenient solution. The software and hardware should be easy to control through a unified interface, and adaptable to the organization’s changes over time.

Resstende, an Italian sun protection manufacturer known for roller-shutter systems, was in need of such a solution. With over 60 employees and a yearly turnover of €12.4m, they expanded their facilities to a new headquarters to accommodate their growth. The new site, spanning 6,000 sq.m across four floors, includes workspaces, training rooms, showrooms, and collaboration areas. Resstende wanted an access management system that aligned with the modern and collaborative nature of their workplace.

Incedo: management flexibility and simplicity that a business needs

They chose an Incedo™ Lite system from ASSA ABLOY which seamlessly incorporates ASSA ABLOY access devices including controllers, Signo readers and effeff electric strikes. The Lite version of ASSA ABLOY’s Incedo platform-based access control solution works right out the box. Incedo controllers and modules connect all hardware to the Incedo software; everything works seamlessly and is managed from a single interface, saving admin time.

“We built a valuable, attractive location where we

could cultivate innovation,” explains Riccardo Gasparini, Resstende’s Managing Director. “The Incedo solution immediately seemed right to us, as it is an autonomous and easy-to-use system, offering both cost and energy savings in line with the modernity of our headquarters.”

Incedo Lite streamlines access management for Resstende. It’s user-friendly on the web and works on any device, eliminating the need for a dedicated admin computer. Security personnel can easily grant customized access to groups for specific doors. Time limits can be set, ideal for meeting room reservations and granting role-specific access. The use of Seos® ensures high credential security, and the diverse credential options prioritize user convenience.

“Incedo is flexible, convenient to use and streamlines access management, which saves us time and costs,” he adds.

Resstende is prepared for unexpected challenges. Incedo, a flexible solution, can be easily expanded and adjusted as needed. If Resstende’s business processes change, they can increase access control or enable remote management through Incedo Cloud with a simple software upgrade.

To learn more about ASSA ABLOY’s Incedoä access control platform, visit https://www.assaabloy.com/ group/emeia/solutions/topics/access-control/incedo/ incedo-software-options

14 | February 2024 | IN SECURITY
500 One of the most versatile work utility vehicles on the market, the Carryall 500 has the power to replace pickup trucks at a fraction of the cost. With a rustproof, aircraft-grade aluminum frame, and cargo box, along with best-in-class ergonomics, the Carryall 500 is the perfect solution for your industrial and commercial jobs. DO YOUR BEST WORK www.clubcar.com info@clubcar.com

Lausanne’s state-of-the-art Alarm Receiving Center (ARC) goes live with high-performance workplace solutions from WEYTEC

WEY Technology (WEYTEC), a leading global provider of high-performance workplace solutions on trading floors and in control rooms, announces that the new Alarm Receiving Center (ARC) in Lausanne has completed the inauguration of its new 24/7 Emergency Call Center serving citizens in the City of Lausanne and the Cantons of Vaud and Neuchâtel, Switzerland.

The new facility is a state-of-the-art command and control room housing a broad range of highly skilled emergency response teams. Multiple public organizations (Health, Ambulance, Police, Fire and Civil Defense) that were previously separate have moved together and consolidated their operations in the beautiful new ECAvenir building located on the outskirts of Lausanne. Designed by renowned Swiss architects, Architram Architecture et Urbanisme, the Minergie complex houses over 300 employees who share the modern IT infrastructure and can collaborate more effectively to protect life and property.

WEYTEC is proud to have provided 60+ ergonomic, high-performance operator workplaces and an extralarge videowall for ARC. The WEYTEC solution includes

flagship smartTOUCH keyboards, the visualization solution smartVISUAL for screens and the videowall, and a network architecture design that heightens IT security, preserves autonomy among the different emergency response teams, and ensures operational continuity with redundancy and resilience.

About WEYTEC

WEY Technology is a Swiss-based global IT company that develops and manufactures virtually all its products and solutions in-house in Switzerland. WEYTEC is the specialist for high-performance workplaces on trading floors and in control rooms in any sector (public security, utilities, traffic management, aviation, process-controlled industry). WEYTEC has deployed over 50,000 workplaces at 500+ customer sites around the world. With almost 40 years of experience and expertise, the company offers a full portfolio of professional services to customers and partners in 45 countries.

For more information, please visit www.weytec.com

16 | February 2024 | IN SECURITY

Genetec State of Physical Security Report reveals physical security market is rapidly embracing cloud and hybrid solutions

Cyber-concerns about cloud security are lessening; channel partners expect increased demand for cloud and hybrid solutions from end users

Genetec Inc. (“Genetec”), a leading technology provider of unified security, public safety, operations, and business intelligence solutions, today shared the results of its 2024 State of Physical Security report. Based on insights from over 5,500 physical security leaders worldwide (including end users and channel partners), the report looks at the security strategies organisations are putting in place to effectively navigate the realities of a changing industry.

Cloud adoption is picking up speed

The adoption of cloud-based solutions for physical security has been gradually increasing over the past decade, but it is now picking up speed. According to the survey, 44% of end users reported that more than 25% of their physical security setups are now either in the cloud or use a combination of cloud and on-premises solutions. This is a significant jump from the 24% reported in last year’s survey.

Cyber concerns about the cloud are diminishing Cyber concerns about cloud-based solutions are lessening significantly. In last year’s survey, end-users considered perceived cybersecurity risks to be the primary factor discouraging their organisations from adopting cloud-based security systems. However, there seems to be a shift in attitudes. This shift underscores growing confidence in the capabilities of cloud solution providers to establish robust cybersecurity measures. As a result, in the 2024 survey, respondents have relegated perceived cybersecurity risks to the sixth position among the factors deterring their organisations from adopting security systems in the cloud.

Channel expects increased demand for cloud and hybrid solutions

Feedback from channel partners also supports the idea that end-users are eagerly shifting towards cloud solutions. A substantial 74% of channel partner respondents anticipate that more of their current customers will embrace cloud connectivity for security in the coming year. Furthermore, 39% of channel partners stated that they prioritize cloud-based solutions whenever possible, and an additional 52% offer cloud-based solutions upon customer request.

IT and physical security departments are increasingly interconnected

The increasing adoption of cloud-based physical security systems has led to a rise in cybersecurity threats, data

handling, and compliance requirements. As a result, IT and physical security teams are becoming increasingly interconnected as evidenced by 55% of end users indicating that the IT department has access to physical security data. As technology adoption grows and remote access from external networks becomes more common, the partnership between IT and physical security will continue to develop.

The future looks hybrid

It appears that most organisations will prefer a hybrid approach, combining both on-premises and cloud-based solutions. 60% percent of end-user respondents revealed that their organisations aim for a security deployment strategy that combines both. The transition to hybrid systems is already in progress, with 15% of end-users stating that their organisations are currently storing video surveillance data both locally and in the cloud, marking a notable increase from the 4% reported in last year’s survey.

“A hybrid cloud deployment clearly emerges as the ideal path forward for many organisations, seamlessly blending local infrastructure with the power of the cloud,” said Christian Morin, Vice President Product Engineering / Chief Security Officer at Genetec Inc. “With a hybrid-cloud solution, organisations can optimize their physical security installation to best fit their business. And no matter how their security needs evolve, their systems will remain agile and adaptable to continue providing them with the capabilities they require.”

Survey methodology

Genetec Inc. surveyed physical security professionals from August 21 to September 15, 2023. Following a review of submissions and data cleansing, 5,554 respondents (including both end users and systems integrators) were included in the sample for analysis. Survey samples were run across all regions including North America, Central America, Caribbean, South America, Europe, Middle East, Africa, East Asia, Southern Asia, South-Eastern Asia, Central Asia, Western Asia, and Australia-New Zealand.

To download a full copy of the report, please go to: https://www.genetec.com/a/physical-security-report.

IN SECURITY | February 2024 | 17
Open-platform
solutions.
body worn
Solutions that work with yours.

Mayflex receives Achievement Award from Suprema

Mayflex, the distributor of Converged IP Solutions, has recently picked up an award to celebrate their achievement and partnership with Suprema.

The awards were presented at the Suprema Global Partner Program SGPP Conference held in Bali on 15th-17th November. Mayflex Sales Director, Ross McLetchie collected the award on behalf of Mayflex from Hanchul Kim the Chief Executive Officer for Suprema Inc.

Ross McLetchie, Mayflex Sales Director commented “I was delighted to attend the conference on behalf of Mayflex, Suprema is a key partner for us when it comes to access control. Their extensive product range brings technology and simplicity into one to create reliable, customer focused solutions that are easy to install and use.”

Ross continued “The Mayflex sales team are regularly trained and updated on the Suprema range to ensure that they can support customers with choosing the right products for their requirements. In addition, we have working examples of the full range of Suprema products in our M-Tech demonstration room at our headquarters in Birmingham, so customers can check out the features and benefits and familiarise themselves with the range.”

Ross concluded “Finally, I would like to take the opportunity to thank Jamie McMillen and the rest of the UK Suprema team for their continued help and support.”

To find out more about the Suprema product range please visit www.mayflex.com/brands/Suprema.

IN SECURITY | February 2024 | 19
Security management with C•CURE is more powerful than ever with the integration of CLIQ® smart keys and cylinders

A new software integration with the CLIQ Web Manager (CWM) brings even greater control and more streamlined processes to teams who deploy the C•CURE security management solution.

Key to this seamless integration is bi-directional communication and synchronization between CWM and C•CURE software. Security managers can minimize potential duplicate work and trust that their master interface is accurate.

Automated sync saves them time, ensures transparency and accountability, and makes security workflows even more efficient. Domains, smart keys, keyholder information, schedules and audit trails are always up to date. Access management becomes truly flexible.

Efficient security management when C•CURE and CLIQ work together

This powerful new integration helps your team to work smarter while enhancing the overall security of their premises. CLIQ Domains and C•CURE Partitions automatically synchronize, so access rights and audits are always current.

Synchronized employee and visitor databases improve the efficiency and accuracy of individual access control: It becomes easier and more secure to give individuals or groups access tailored to their specific needs and authority. Credentials and CLIQ smart keys are easily programmed, reprogrammed or de-authorized.

In addition, contractors or visitors can receive access which expires automatically, ensuring site security is maintained. No one needs to worry about rogue valid keys in circulation. Reminders to revalidate can be automated; everyone’s access is straightforward

to audit on demand, ensuring accountability and compliance.

CLIQ smart key-based access management

CLIQ electronic and electromechanical intelligent locking is trusted to secure all kinds of locations, all over the world. Deploying CLIQ programmable smart keys and cylinders minimizes the risks from lost or stolen mechanical credentials — and saves businesses the time and expense of changing locks.

Both the electromechanical PROTEC² CLIQ and the fully electronic eCLIQ devices offer a selection of over 60 cylinder and padlock types. These devices enable you to enhance physical security and increase resistance against attacks through a variety of wireless options suitable for almost any access point, even in the most challenging climates.

For maximum convenience, users carry one programmable key powered by a standard battery or equipped with battery-free energy-harvesting technology. All the energy needed to power a CLIQ lock’s electronics is inside the user key. So, a CLIQ system brings control and convenience without the expense and disruption of electrical cabling: All PROTEC² CLIQ and eCLIQ cylinders are wire-free to fit and simple to maintain.

A user’s personalized CLIQ key can open not just authorized door locks, but also cabinets, rooftops, gates, vaults, windows and more. CLIQ keys are easy to update via wall, desk or portable programmers — or, with CLIQ Connect Bluetooth-enabled smart keys, via the CLIQ Connect app.

To learn more about CLIQ, visit https://www.assaabloy. com/group/emeia/solutions/topics/access-control/cliq

20 | February 2024 | IN SECURITY
Security made simple. Paxton is easy to quote, easy to install & easy to deal with. Access control, door entry & video management solutions you can rely on. paxton-access.com/training Sign up for free training Get the free Paxton Installer app The ultimate installer tool Sign up to our FREE installer training today Our smart security solutions make it easier for you to do business. Manufactured in the UK with a 5-year guarantee & hassle-free returns policy as standard. Free online & in-person training. Unrivalled tech support. If you need us, we’ll be here for you. Use Paxton access control to save energy and keep costs down this year. We want to support your business, helping you to help your customers during a difficult time. Read our new guide at www.paxton.info/5355

Building on success

Jeremy Malies visits Paxton as the access control company shows a new manufacturing facility to the media at its headquarters in Brighton, East Sussex

Arriving early for the event, I begin reading a Bear Grylls book in the mini library within the Paxton rest & relaxation centre at the company’s headquarters to the north of the city. But you wouldn’t need to be a survivalist to prosper in this set of functional modernist buildings and caring environment. The breakfast I had at the in-house

restaurant sustained me for the rest of the day. And that is all part of a philosophy of treating staff at every level across the organization with the kind of respect that creates a team ethic I’ve rarely seen in the business world.

The logo is green and the green credentials are impeccable; they are deep-set within the company. Solar panels (south-facing) mean that

Paxton is currently self-generating such that it supplies itself with enough electricity to cover at least one month every year. The aim (and this is a company that sets itself demanding targets which it achieves) is to be carbon-neutral. Whenever possible, raw materials are shipped by sea rather than air, and our group of security writers watch excess plastic being harvested carefully on

22 | February 2024 | IN SECURITY
COMPANY TOUR

the production line as components are being made.

Staying with green matters or at least the natural world, there is a living moss wall whose insect inhabitants would have fascinated Darwin. A Darwinian awareness of the need for being adaptable to one’s environment characterizes this set of buildings which you could justifiably call a campus.

Our focus today is the Paxton Electronics Centre, a repurposed building that the company has acquired. It now forms an industryleading manufacturing hub that characterizes Paxton’s continued global expansion amid growing demand from existing and new customers. This is now a cluster of

buildings and they can truly be called a campus or technology park from which Paxton manufactures and exports to 63 countries.

The company employs more than 400 people at 12 locations with offices in the US, France, Germany, South Africa, UAE and Benelux. This set of attractive modernist buildings will allow Paxton to continue its planned rapid growth over the next decade which is based around everything from the very first conceptual discussion of innovative game-changing products to assisting integrators with their installation on site.

The new Paxton Electronics Centre is our focus but like the other security magazine writers and

ublishers in the visiting group, I’m also fascinated by an onsite testing laboratory. It represents a significant investment and will be a focus in this piece. It is a public-facing product test facility and forms a sizable Faraday Cage to keep procedures calibrated.

Presiding over the lab today and surrounded by grey foam cones which I took to be a sound suppressions system is Ray Miller, RF Engineer. He is a senior engineer with something of a high-priest mystique about him. Ray is able to explain complex technical topics involving electro-magnetic compatibility and compliance testing to us in simple terms that we can understand.

IN SECURITY | February 2024 | 23

This is a theme that runs through the company: later in a talk to us, Adam Stroud (Group Chief Executive) and himself a first-rate communicator, stresses how simplicity lies at the heart of the methods here. There is a simple logical quality to everything from design values to the language used in marketing literature.

More formally, the lab is known as Brighton EMC and it is UKAS-accredited. Other companies come here to test their products at development, interoperability and compliance stages in a reproducible environment. Naturally, Paxton make no claim to be an approval body, but this kind of testing can ease a product’s path to certifications.

A quality I detect in Paxton is foresight. They and other users of the lab can identify product shortcomings and snags early in the cycle so benefiting from time savings, avoiding major redesigns and reducing development costs. “We make decisions that are right for the long term” is a soundbite I note down from Adam’s presentation. At least 50 companies have come here

to assess and fine-tune their own products. We leave Ray supervising a vibration test and preparing for a thermal shock test.

Back to Darwin or at least development in the natural world. Apart from the Covid year, Paxton’s turnover has shown impressive year-on-year growth. Crucially, the growth is organic. This is not an acquisitive organization that buys up smaller companies and aggregates their sales into its own reports.

Paxton is growing through excellence in product design, insightful analysis of likely market trends and outstanding support of installers both by phone and in-person. Our group of reporters passes several seminar rooms in which installers are keeping abreast of recent products. Paxton’s route to market is primarily through distributors but relationships with installers are a priority.

This is a company that is truly part of its local community. • Founded in 1985, it is the creation of Founder Tony Ratcliffe who retired in 2022. From a base in East Sussex,

he began to realize and exploit the potential of access control not through a traditional key but using a single door keypad reader. Not quite Darwinian this but more of a single conceptual leap by which the way people move around buildings and other premises has been revolutionised.

Sholto Ratcliffe took over upon Tony’s retirement as the Owner, and continues with other executives to oversee the continuing success of Paxton (against a turbulent backdrop in the last few years) and he provides guidance during regular meetings. This is a multi-talented team that works through grassroots development (apprenticeships and scholarships for ambitious young local people) right through to learning from and exploiting manufacturing knowledge acquired in other industries such as the automotive sector with a hiring at senior level. The company comprises a resourceful and combined multifaceted skillset that will continue to flourish.

24 | February 2024 | IN SECURITY

More Than Access Control

Maxxess eFusion software opens up limitless possibilities, taking you beyond feature-rich, enterprise-level access control to give you all the benefits of a total security and safety management platform – without the cost or complexity.

Ready-made to integrate more than 60 leading technologies, off-the-shelf, Maxxess eFusion now lets you combine access, video, fire, intruder, visitor management, building systems, widely used databases and site-specific applications.

www.maxxess-efusion.com

Flexible
Europe Maxxess Systems Europe Ltd United Kingdom +44 (0) 1344 440083 sales@maxxess-systems.com Middle East Maxxess Systems Middle East United Arab Emirates +971 (0) 509467717 North America Maxxess Systems, Inc. United States +1 (714) 772 1000
security for a changing world

Simon Martindill, G4S Head of

Marketing examines how physical security continues to play a significant role in protecting critical assets Remain relevant

Physical security continues to play a significant role in protecting critical assets.

But, with the postpandemic environment acting as a catalyst, security has moved on in the last few years, bringing the 378,000 licensed security officers in the UK along for the ride.

So, underneath the security bonnet, what exactly has changed and how is the modern security officer evolving?

Security - one size no longer fits all

One key driver is the dynamic and varied threat landscape.

Post-pandemic, the surge in violence and abuse towards frontline workers and the rise in anti-social

behaviour has reinforced the need for core security skills, whilst social acceptance towards the ‘right to protest’ has seen an increase in civil unrest, meaning mediation skills have risen to the fore.

Meanwhile, a trend towards urban exploration and the use of filming and social media when interacting with security means that officers have had to adapt their skills.

Then, there is the changing legislative environment. Whilst we await the introduction of the Protect Duty and what it means, we can be sure that organisations will be looking to ensure they have adequate measures in place to protect against the threat of

terrorism and this will surely impact security officers.

But it is not just the threat landscape driving change, it is market dynamics too.

As businesses have begun to challenge what they want from security and how they spend their money, security contracts have moved into adjacent spaces.

As an example, more and more officers are being asked to perform customer service or front of house roles as part of their service delivery with skills needing to evolve in line.

Then, particularly in harsh or dangerous environments, the worlds of safety and security are coming together with security providing an increasingly important role in delivering medical assistance.

26 | February 2024 | IN SECURITY
PHYSICAL SECURITY

Moving upstream, with public funding under pressure, private security is taking on more of the work undertaken by emergency services, with the security officer needing to adjust to this increased responsibility.

As an example, G4S recently became the first and only UK company and non-police service to gain accreditation to allow specialist security officers to stop and manage traffic as they escort moving Abnormal Indivisible Loads (AILs) on the roads.

So, in summary, changing threat profiles and market dynamics are driving an evolution in the role of the security officer.

Consequently, the traditional association with low-paid, disengaged security officers who offer a limited set of skills and reluctantly perform (and manually record) a minimum set of daily tasks just does not represent modern security.

So how exactly is security responding?

Recruit, Recruit, Recruit and Retain

Given this evolution, working in security is much more exciting and varied than many people may think. It is important that we take this story out into the market, paint an exciting picture of what a career in security looks like and bring talent into the industry that is likely to remain.

Against a backdrop of low unemployment, the reality is that for job hunters a career in security often competes with online retail delivery work or working in a supermarket.

But security has so much to offer. At G4S, we are working hard to share that message. Key staff are going into schools to help educate the young about careers in security and we have even had examples of exciting recruitment events, such as escape rooms, to help attract the right profile of candidate.

Engage, Train and Develop

Once the officers are onboarded, the key to their retention is ongoing engagement, training and development.

From a development perspective, at G4S, we work hard to optimise the use of the Government

apprenticeship scheme to provide a platform for staff to broaden their skills into new and different areas.

We have developed an Enhanced Security Officer course, which is often uniquely tailored to the vertical market or industry that the security officer operates in. This course was created to bridge the gap between a door supervisor qualification and close protection officer.

The course offers a number of modules that focus on the skills needed for security officers to operate effectively in their sector, including:

• Conflict Management

• Behavioural Detection

• Threat & Risk Assessment

• Incident Scene Management

• Conflict Resolution

• Emergency First Aid At Work

• Sector Application

For the customer, the distinct advantage of the course is that it significantly increases the officer’s skill set and overall performance, whilst clearly the officer themselves benefits.

Within our contracts, we actively encourage performance-related pay where the officer sees some reward for developing their skills - such as gaining this accreditation.

Remain Relevant; Be More Diverse

To remain relevant, it is critical that security effectively represents the communities that we serve.

The role that women play in our industry simply has to grow. According to the SIA in September 2022, women still only makeup 11% of licensed officers in the UK. We still even hear instances of the term ‘manned guarding’ which doesn’t set the correct tone.

We can always do more to drive a step change.

At G4S, we are currently working hard on a recruitment campaign to increase women in the industry, using insights from some of our female officers to dispel the myths and provide positive stories.

But the issue goes far beyond female recruitment.

It is critical that other diverse groups are adequately represented, supported and provided with an

equal platform to use their talents. With this in mind, we are the only security organisation that is part of the Social Recruitment Advocacy Group - a positive movement looking to drive recruitment from underrepresented groups.

Remain Relevant; The ESG Ambassadors

We operate in an era where many organisations are committed to environmental, social and governance to support their corporate, social responsibility. Underpinning these programmes is a set of standards and metrics that measure impact on society and the environment.

Surprisingly, security has a huge role to play - particularly as an enabler for the security consumer.

Given that security provides valuable human resources on the ground, officers can undertake activities that support these programmes - like litter picking or avoiding unnecessary power consumption by providing facility checks.

What’s more, officers also have access through technology to record their activities, giving the host organisation powerful data which evidences their commitment to these programmes.

Therefore, the role of the security ESG ambassador is born. So, we are operating in an environment where the threat landscape and market dynamics have changed, and security consumers demand a proactive, data-driven, intelligent, and informed approach to operational delivery.

Security providers must supply their customers with clear and transparent performance data in real-time, to drive better decisionmaking.

But it is not just all about the people - equipping them with the right tools is just as important.

Thus, the Connected Security Officer has emerged and is here to stay.

Significantly, this technologyenabled programme still operates with people at the core but uses technology to drive the service improvement and staff engagement that the modern environment

IN SECURITY | February 2024 | 27

demands.

The programme is already well embedded within some significant security operations, such as the UK’s largest public services department, where the programme has been rolled out to officers operating across 800 UK sites.

Importantly, the programme is just as relevant for small and medium-sized businesses, which require improvements to security, but on a much smaller scale.

So what is a connected officer?

Their appearance will vary depending on the environment in which they work. In some cases, wearable technology will be obvious to the public and for good reason. A first responder may appear bionic, given the multiple devices that they could be wearing, such as body-worn cameras with a visible screen. But in a corporate reception, where officers are expected to balance their security function with customer service, the officer may wear technology that is less apparent to the public, such as smartwatches, tablets and augmented reality glasses that look

like everyday glasses.

What benefits does it bring?

Officer Engagement and Development

The programme uses technology to support the officer by providing simple and easy access to a network of colleagues and learning and development materials – driving more engagement and motivation.

Data-Driven Performance Insight

By using a handheld device to record activities, data is captured centrally. Information captured from officers operating across multiple locations can be consolidated into a simple reporting dashboard– all accessed from a central location, driving resource optimisation, and improved decision-making.

Security Performance Improvement

A real-time connection to a command and control function makes use of developments in artificial intelligence to identify potential incidents before they occur. Unusual motion and activity are flagged in real-time, allowing officers to proactively

investigate incidents, armed with key information and the right equipment, rather than waiting till it is too late.

Security; the same only different Security is changing and security officers are changing.

The post-pandemic environment is driving organisations to challenge their security design and expect new and different things from security officers. As a result, we are seeing a new profile of security officers emerge.

Today’s officer originates from different parts of our communities, goes far beyond the role of traditional security, receives careerlong training and development, is engaged with their employer and remains for the long haul. Operationally, they use technology to underpin their role and provide transparency of their activities.

It is an exciting time to be a security officer and G4S is enjoying powering the evolution.

For further information on G4S please visit their website

28 | February 2024 | IN SECURITY
30 APRIL – 2 MAY 2024 NEC BIRMINGHAM UK T HE U K’S no.1 AWA R D WINNING C OMMERCIAL, ENTERPRISE AND DOMESTIC SECURITY EVENT Co-located with: Lead Media Partner: FIND OUT MORE: WWW.THESECURITYEVENT.CO.UK

Past, present, and future

How sustainability and integration will underpin the future of access control

In a world where information, technology and consumer demands are constantly evolving, the way we control access to physical spaces continues to innovate and develop. Codelocks celebrated 30 years in business last year. Now into its second year of a new decade, Codelocks’ experts recap on successes from 2023, unpack the current trends shaping the access control sector and predict the future changes they think we can expect to see.

Past: 2023 Successes – Dominic Ryan, Codelocks’ Operations Director

“Reflecting on 2023, we’re proud to

have strengthened our position in the access control sector, having grown our product portfolio, partnerships and international presence.

“This year, we’ve continued to innovate and address our customers’ demands and feedback in our product development. In August, we launched the KL10 Public, adding public functionality to one of our best-selling locker locks. The mechanical KitLock now provides multiple users with keyless access to shared storage at public facilities like gyms, leisure centres, spas, offices and shared workspaces.

“Earlier this year, we entered a new partnership with leading gate hardware company, D&D

Technologies, marking our breakthrough into the US fence industry. This was an important step forward for our Gate Solutions by Codelocks range, enabling us to start delivering access control solutions for fenced perimeters and outdoor spaces safeguarding restricted spaces including schools, colleges and hospitals.

“Codelocks has also grown its global customer base. In November, we celebrated two years since our successful launch into Europe. Since establishing our Netherlands offices in 2021, we’ve completed projects with organisations of all sizes and grown our European customer base. We also moved our

30 | February 2024 | IN SECURITY
ACCESS CONTROL

Australian operation to significantly larger premises in Chatswood, near Sydney, enabling us to accommodate a growing market in the Asia Pacific region. And growth in the US necessitated the opening of a new warehouse in Indiana, to better service our central and eastern American customers.

“Another key highlight was the launch of our On the Road training. For the first time, we’ve been able to expand the reach of our expertise by bringing our 101 mechanical and electronic lock troubleshooting courses to distributor sites across the country. From product troubleshooting to specifying locks, it’s been a fantastic opportunity to meet our customers at their home ground and share our expert knowledge.

Finally, we’re incredibly proud of the brilliant team of experts we’ve built at Codelocks. This year, our newly launched Meet the Team blog series enabled us to share the stories and expertise behind the people who help drive Codelocks forward.”

Present: The Current Market –Joanne Milne-Rowe, Codelocks Sales Director

“Unsurprisingly, the evolving access control market reflects wider behavioural and contextual changes. Since the pandemic and as we move towards more sustainable living, we’ve seen the rise of shared spaces like co-working offices, bike storage, parcel collection and phone charging lockers. As a result, self-service and flexibility are dominant customer demands.

“A co-working office, for example, may include cabinet storage, a locked meeting room or even a gym with lockers. Each of these spaces will require some sort of locking solution that allows different people access for a temporary period of time. What’s more, from a management perspective, facilities managers want to take physical presence out of the equation. Having one person manage a large number of keys is time-consuming, costly and simply unnecessary. Therefore, guaranteeing remote management of access control is a top priority for our customers. At the same time, unification has been a key 2023

trend and we’re increasingly seeing previously disparate systems being brought together to offer holistic and seamless security solutions.

“These current trends and consumer demands point to this year’s rise of smart and integrated access control solutions. At Codelocks, our project portfolio increasingly focuses on incorporating our technology into customers’ products. Codelocks NetCode® Technology has been the backbone of a number of exciting and innovative integrated projects, from co-working offices to ‘click and collect’ lockers. It allows companies to control access by creating codes that have a specified start date, time and duration that will automatically expire at the end of the period. Plus, thanks to our Codelocks Connect Portal and application programming interface (API), users can simply receive a code through the same platform the booking is made on, streamlining the user experience. We’ll continue to see these integrated solutions take shape across multiple sectors as businesses explore shared spaces and services.

“As a Sales Director for the UK and Middle East, I’ve also witnessed major differences between the access control markets across regions. For example, in the UK it’s more common to refurbish a building and make use of traditional solutions. Here, we regularly work with customers on retrofit and refurb projects to offer a smart solution that is compatible with quite traditional applications.

In comparison, in Saudi Arabia, it’s much more likely a building would be knocked down and rebuilt from scratch. As a result, the technology we’re seeing there is more advanced and forwardthinking.

In September, I attended Saudi Arabia’s Hotel & Hospitality Expo and was repeatedly asked for biometric solutions for locker applications, which we don’t seem to have demand for in the UK right now.

“Finally, one last observation worth noting is that despite increasing digitalisation in other aspects of the access control market, our customers still desire human expertise and support when

reaching out for help. The aftercare and hands-on technical knowledge from our customer support team remains one of the biggest factors distinguishing us from our competition.”

Future: Trends and Predictions

– Colin Campbell, Codelocks’ Managing Director

“The access control market is growing, set to be worth $12.1 billion by 2024 and the technology is developing at a rapid pace. One of the biggest trends shaping access control moving forward is the growing market of niche rental spaces. The rental market has continued its growth, post pandemic, with all manner of services and collections being offered via lockers, rooms or whole buildings for a short or temporary period of time.

“This trend is being a driven by a number of factors. As Jo highlights, changing behaviours have led to the rise of shared spaces like co-working hubs or co-livings and increasing digitalisation means users are demanding self-service applications and automated access control. Of course, there’s an important commercial driver too. Businesses are interested in how

IN SECURITY | February 2024 | 31

they can manipulate spaces to offer a service and rent it out time and time again to generate repeat revenue. Increasingly, in the niche rental market, we see subscription-based payment models where users will pay a rental fee per month to access a specific service. For example, one of our customers offers bike storage spaces in urban areas, accessed via a monthly subscription on their app.

“At Codelocks, we’re increasingly receiving inquiries from businesses who have an idea for a project about how they can lease a space, but they’re not quite sure how to manage the access control. This is where we come in to deliver a smart, integrated and bespoke access control solution.

“The development of new cloud-based technology and API solutions is at the heart of enabling this sort of smart access control to work successfully. Moving forward, the industry is investing, innovating

and developing its solutions to address this market. For example, at Codelocks, we are exploring the longevity of battery life to last the lifespan of the product, reducing battery changes and associated waste. In the future, I think we’ll see serious innovations in how we can power electronic access control systems, from ambient light technologies to harvesting energy from buildings to run smart locks more sustainably.

“Leading on from this, sustainability and compliance is another key trend influencing the future of access control. Like every industry, the access control sector is grappling with its carbon emissions, net zero targets and putting effective strategies in place to minimise its environmental impact. In the UK, there’s particularly stringent legislation in place, which will influence how the access

control sector evolves moving forward. This will impact everything from communications around sustainability, to life-cycle product assessments and product packaging.

“Codelocks has already made the first steps to address our sustainability such as reducing product and transit packaging and installing electric vehicle chargers at our UK site. However, there’s much more we have yet to do. This year, we hired Paul Campbell as Technical, Quality and Sustainability Manager, to focus on identifying areas for improvement and putting an aggressive plan in place to meet net zero targets.

“In a similar vein, the rise of circular economy will influence the access control sector and vice versa. Firstly, as mentioned, access control solutions are fundamental to facilitating the creation of shared spaces, like coworking offices and shared sport facilities. Secondly, as customers embrace more sustainable practices, I think we’ll see a shift in consumer behaviours countering the throwaway mentality that has prevailed in the last decade. This is a past behaviour that is resurfacing. For example, historically you took shoes to the cobblers to have the soles and heels replaced, rather than buy new. Likewise, to avoid waste, customers will opt for quality access control products that stand the test of time rather than cheaper solutions with a short lifespan. For the vast majority of our products we stock every component part, we offer a full repair service in house, along with comprehensive training modules to extend the life of the product, rather than replace it.

“Overall, technological innovation, societal shifts, evolving security needs and the growing importance of sustainability will continue to influence where the industry is heading. Smart access control solutions will play a key role in facilitating increasingly bespoke, integrated and personalised access control, equipped for the modern lifestyle.”

For more industry insight from Codelocks or for advice on how to future-proof your organisation, contact our experts here.

32 | February 2024 | IN SECURITY

Increase safety on the factory floor?

Visit the Azena Application Store: the largest open platform for IP cameras. Offering groundbreaking software that runs on different models and integrates seamlessly with third party systems. Letting you benefit from AI video analytics – whether optimizing new cameras or retrofitting existing ones.

The range of ready-to-install apps extends beyond security and safety; adding value to operational intelligence, automation, or process control in such industries as healthcare, manufacturing, retail, transportation and tra ic.

Release the power of AI video solutions. www.azena.com

Start with a free trial Our free trial program is an easy way to test our solution with our support – no strings attached.

Get
with AI video analytics.
a head start

The fourth emergency service

Julie Barker, AUCSO talks about the biggest threats to university security on campuses

Julie Barker, Chief Operating Officer at AUCSO and former Non-Exec Director, College and University Business Officers (CUBO), and Chair of The University Caterers Organisation (TUCO) talks about the biggest threats to university security on campuses and says Security Officers working in Higher Education are fast becoming the ‘fourth emergency service’…

The traditional role of a security officer – is it a thing of the past?

The traditional role of a security officer on a higher education campus involves ensuring the safety and security of students, faculty, staff,

and visitors within the campus premises. It’s a vital yet complex role with many different factors coming under the remit of security and individuals are highly trained, skilled operators.

There has been a seismic shift in the last few years away from security officers locking doors and gates, and responding to alarms, to a much more people focussed service where the traditional skill sets of a security team are just the very beginning of something much deeper.

It’s the reason that universities are seeing security teams as “the fourth emergency service”. The sheer logistics of security means that teams cover security on campuses

24 hours a day, 365 days a year. They are there, right in the thick of it, every minute of the day. They have to make quick assessments in challenging and sometimes dangerous situations.

What does being a security officer on a Higher Education site actually mean?

Take Patrol and Surveillance for starters. Security officers often patrol the campus on foot, bicycle, or vehicle to monitor for any suspicious activities, unauthorised individuals, or potential security threats. They use surveillance systems like CCTV cameras to maintain a watchful eye on various campus areas. They

34 | February 2024 | IN SECURITY
CAMPUS SECURITY

utilise a variety of tech and need to be abreast of the latest tech in an era where tech is rapidly advancing.

There’s a saying ‘prevention is better than cure’… Crime Prevention and Investigation is always at the forefront of security officers’ minds – in the prevention of theft, vandalism, and other criminal activities on campus. And at the start of the academic year it’s down to the security team to focus on educating students on ‘staying safe’. Some students are first time away from home, often from countries with different laws and cultures and they are still a vulnerable age group.

Even those returning and moving into the community are not immune - where else can you find a house where each individuals owns a smart phone, a laptop, a TV - those living in student HMO’s, are prime targets for burglary and other offences. Security teams undertake initiatives (sometimes jointly with external partners) advising students on security.

The onsite security team may conduct investigations into incidents, collect evidence, and collaborate with law enforcement if necessary. This might include unauthorised individuals gaining access to campus buildings or student accommodation leading to theft and burglary, to more serious crimes.

If there is an emergency (whether medical or criminal) then Emergency Response needs to be mobilised fast and handled effectively. In case of emergencies such as accidents,

medical incidents, fire outbreaks, or security breaches, security officers are very often the first responders. There are also natural disasters and environmental hazards to be considered – such as flooding, earthquakes, chemical spills, or gas leaks – they all pose risks to campus safety.

Security officers are trained to handle these situations effectively, coordinate responses, and summon additional help if needed.

Enforcement of Campus Policies is a very important part of the security role in order to maintain standards and keep everyone safe. Security officers enforce campus rules and regulations, ensuring that students and visitors adhere to the university’s code of conduct. For example ensuring parking regulations, checking IDs, and managing access control to certain areas.

Security officers on campus always work in close collaboration with local law enforcement agencies, sharing information and cooperating during investigations or emergencies that extend beyond the campus boundaries. They will participate in security planning, developing strategies, and protocols to enhance campus safety and keeping abreast of new features and technologies.

There is also plenty of adminreport writing and documentation all has to be maintained to a high standard around incidents and maintaining accurate records of security-related activities. It’s an

essential part of the role and you never know when it will be needed and referred back to – sometimes in a court of law.

The changing role of a security officer due to increased threats to university security

The role of a security officer is changing as increasingly, we see incidents coming into the frame which are far more serious and potentially dangerous issues.

Incidents of violence, including physical assaults, sexual assaults, robberies, knife crime and acts of vandalism, pose significant threats to campus security and are on the rise, including both interpersonal violence among students and external threats from non-affiliated individuals.

With the increasing reliance on technology and online systems for education, research, and administrative purposes, universities are vulnerable to cyber threats such as hacking, data breaches, phishing attacks, and ransomware that can compromise sensitive information and disrupt hardware and software within the university.

It’s a sad fact that substance abuse, particularly alcohol and drugrelated issues among students, can lead to various security problems including accidents, violence, health emergencies, and risky behaviour that impacts the safety of the campus community. Lately the increase in drinks spiking with security officer teams becoming involved when students have become aware that

IN SECURITY | February 2024 | 35

they have been spiked.

And we all recognise that many students are passionate activists which can lead to demonstrations, protests, or civil unrest on campus can sometimes escalate, leading to sit ins, property damage, and potential clashes between groups, posing security challenges. Equally universities being targeted by external activist groups. These all have an impact on the wider community across campus due to the disruption.

Increasingly, mental health issues e.g. stress, anxiety, depression, and suicidal behaviour among students, faculty, or staff, can impact campus security indirectly by affecting the well-being and behaviour of individuals. Often the security officer teams are the first on scene when students are experience trauma at any time of the day. If a concern is raised regarding a student’s behaviour or mental health, security officer teams are often the ones responding. It’s a fact that the role of security in Higher Education is today more pastoral than it was a decade ago.

And with the increase of international students choosing to study in the UK there are international security concerns to be considered relating to global events, terrorism, and political unrest. Whilst kidnapping / ransom incidents are thankfully, rare, they can pose

a serious safety threat to some students especially in areas that have a history of political instability, armed conflict, or high crime rates. Equally, there are certain universities or individuals / families that may be perceived as high wealth or status, making them a potential target. Or individuals such as researchers, scholars, or activists, targeted for ideological reasons.

Today’s security officers have to be vigilant when it comes to hate crimes which are a threat to the safety, well-being, and inclusivity of the campus community. These crimes are motivated by bias or prejudice against a particular group based on race, ethnicity, religion, gender identity, sexual orientation, disability, or other characteristics and can extend to sexual exploitation, including abuse and harassment within university settings.

The saddest thing that security officers have to cope with is, of course, the death of a student. This is always a tragic occurrence with profound impacts on the campus community.

Addressing these threats involves a multi-faceted approach, including the implementation of comprehensive security measures, emergency response plans, education and awareness campaigns, counselling, and support services, as well as collaboration with law enforcement agencies, external agencies and the

broader community to ensure a safer campus environment.

The majority of the above issues are infrequent. But on a daily basis the security team could be faced with the unknown, therefore they have to be ready.

Recruitment of the next generation of security officers

You can see the complexities involved – security personnel are very special people with many skills at their fingertips.

Here at AUCSO we are focused on widening the net in the recruitment for next generation talent. There are plenty of transferable skills which can help, and the role is far wider than what potential candidates might expect from the title of security officer. It’s also a very rewarding career.

As an industry, we are not immune to the current labour shortages but we’re now thinking differently about recruitment. We’re looking at how we recruit, what hard and soft skills are central to success. Which industries can we recruit from, and which professional backgrounds lend themselves to success.

Certainly, the role in the Higher Education sector is diverse, exciting, and rewarding that embeds security teams in the heart of their communities. This will be key in our recruiting messaging going forward.

36 | February 2024 | IN SECURITY

Ulisse

Thermal

ULISSE EVO THERMAL is the new high-performance PTZ thermal camera with radiometry functions, designed to provide a preventative 24/7 video surveillance system in critical infrastructures, transport, traffic, railways and fire detection applications.

VIDEO SECURITY PRODUCTS
Made in Italy IP66/IP67 IP68 T YPE 4X T YPE 6P
www.videotec.com

From CCTV to biometrics

Simon Alderson, CEO of First Response Group, examines how many of the traditional surveillance systems are gradually being replaced by technology and automation

The proliferation of biometric technologies is growing in both public and private domains. Advancements in biometric technologies, such as facial recognition, voice authentication, fingerprint, or iris scanning, are driving increased affordability, sophistication, and precision for both security and policing. Consequently, these technologies are embedding themselves seamlessly into the fabric of everyday life, emerging as integral

components of security and surveillance frameworks.

Simon Alderson, CEO of First Response Group, examines how many of the traditional surveillance systems are gradually being replaced by technology and automation, with biometrics and in particular facial recognition being at the forefront alongside continued discussions about privacy.

Modern surveillance technology systems increasingly play a vital role in supporting security officers

by providing granular level evidence that proves crucial in investigations, legal proceedings, and insurance claims. The integration of automation not only enhances operational efficiency but also results in cost savings for security measures.

The landscape of surveillance and monitoring has undergone profound transformation with the advent of digital technologies. Traditional systems, once solely reliant on human vigilance, are now being replaced by advanced

38 | February 2024 | IN SECURITY
BIOMETRIC SECURITY

tools and automation. One facet of this is biometrics. This shift not only optimises resource allocation but is transforming the efficiency and capabilities of surveillance as a whole. The march to automation however doesn’t come without its own social challenges and implications.

A report published by the British Security Industry Association (BSIA) estimates that the total number of CCTV cameras in the UK stands at somewhere between 4 million and 6 million. That’s around 7.5 cameras for every 100 people in the country – the third-highest number on the planet behind the US and China. CCTV and surveillance systems are now firmly entrenched as part of the security landscape in the UK, but as new technologies such as facial recognition take their place, so too do safeguards on privacy.

Security personnel frequently encounter situations demanding documentation and evidence gathering. Surveillance technology proves invaluable in this context, as high-definition cameras equipped with facial recognition, capture detailed footage that can serve as vital evidence in investigations. This not only aids in identifying wrongdoers but also safeguards security officers from erroneous scrutiny or worse still accusations. However, facial recognition is not the only constituent in biometric identification.

Biometrics refers to a diverse set of technologies harnessing probabilistic matching to identify individuals based on their unique physiological features (such as fingerprints, iris, face, or hand geometry) or behavioural attributes (such as gait, signature, or in some settings, even their keystroke pattern). These characteristics are generally exclusive to an individual person, making them more effective and reliable for identity verification compared to methods like knowledge-based verification (e.g., passwords or PINs) or token-based systems (e.g., ID cards or licenses).

The use of behavioural biometrics is on the rise, especially for passive authentication, providing an important additional layer of security. This involves measuring and analysing patterns in an individual’s movements, behaviours, or physical interactions. Examples range from how someone handles a device, such as a mobile phone, to more nuanced characteristics, such as their finger taps on a screen, or the force applied. Even linguistic aspects, like word choice, grammar, and sentence structure, can serve as measurable biometric characteristics.

Now clearly, this level of biometric data and analysis is a long way from being commonplace in the professional security industry, at least today, being much more the preserve of counter-terror or national security operations, but it

does serve to highlight the degree to which biometrics are becoming ever more embedded in the process of identification, and it may well be that general security gradually introduces more of these systems as criminals and illegal groups wise up to the more robust defences they need to breech.

A notable advantage is that biometric traits are less prone to being shared, lost, or duplicated compared to passwords or tokens. Consequently, biometrics find increasing applications in identity management, particularly for authentication purposes—to ensure that a person is genuinely who they claim to be.

The rise of biometric technology introduces both opportunities and challenges. While it clearly aids in the identification and apprehension of criminals, concerns about privacy and security are never far away. Recent trials and deployments by UK Police, as I will go on to illustrate, highlight the controversy surrounding live facial recognition technology. The potential for abuse and infringement on individual rights underscores the importance of transparency, industry-accepted protocols, and a generally more holistic approach to surveillance implementation.

Because of these privacy concerns, we are now seeing the introduction of privacy-enhancing technologies. Techniques such as

IN SECURITY | February 2024 | 39

anonymisation, video-masking, and encryption aim to preserve individual privacy without compromising surveillance functionality.

Facial recognition surveillance is rapidly advancing. As recently as October this year (2023), Essex Police reported three arrests, including one for rape, during their first trial using live facial recognition (LFR) technology. Similarly, in the same month, The Metropolitan Police utilised live facial recognition technology for the first time at a Premier League football match, resulting in three arrests, including one for a breach of a football banning order. Whilst this technology is clearly effective at apprehending serious offenders, privacy advocates, like Big Brother Watch, criticise it as ‘dangerously authoritarian’ and a threat to personal privacy and freedoms. Despite privacy concerns and criticisms from campaigners, minister of state for crime, policing & fire, Chris Philp, defended the technology’s ability to assist police in identifying serious criminals, thus freeing up resources.

While facial recognition technology, especially in video surveillance, faces scrutiny due to potential impacts on privacy

and security, its deployment is transforming how CCTV video surveillance is utilised in security and policing. In Europe, the European Union (EU) is developing an international facial recognition system. Concerns surrounding surveillance primarily revolve around how the technology is programmed and utilised.

Addressing these concerns may be possible through increased transparency and the establishment of industry-accepted procedures and policies. Nevertheless, it is crucial to recognise that facial recognition is not the sole solution for implementing surveillance technology. It must be integrated in combination with other technologies and procedures to enhance security, protect lives, and preserve individual rights and privacy.

As biometrics permeate society and the systems it uses, including within security and policing, organisations must offer clear, user-friendly privacy policies to build trust between those managing data and those it pertains to. Collaboration among industry players and their representative bodies, policymakers, and privacy advocates is crucial in the responsible treatment of

biometric data. Together, they should be able to establish standards which balance technological progress with individual rights.

In conclusion, while biometric data holds significant potential for improving identification and security, it requires careful handling. Upholding privacy, implementing robust security, and addressing ethical concerns are paramount. Adherence to legal frameworks, stringent security measures, and transparency can help strike a balance between the advantages of biometric data and safeguarding individual rights. By adopting a comprehensive approach to privacy, security, and ethics, along with user control and education, it should be possible to embed responsible biometric policies and deployment in countering the impact of increasingly digitally savvy criminals and wouldbe law-breakers.

First Response Group has developed a report on the technological innovations taking place across the security sector entitled ‘Technology Innovation in Security’.

40 | February 2024 | IN SECURITY

P R E P A R E D

F O R I P V O I C E ?

Mitigating risk, protecting your customers A call to installers

THE VOICE OF THE PROFESSIONAL SECURITY INDUSTRY

Polycrises are the new normal

How corporate security must adjust its strategy by Rachel Briggs, CEO, The Clarity Factory

Corporate security and crisis management has changed drastically in recent years. No longer can organisations plan for a crisis happening on an annual or biannual basis – instead the new norm in today’s corporate world is to be constantly on watch for multiple

crises happening simultaneously. Indeed, the term ‘polycrisis’ has emerged as the key descriptor of today’s corporate risk environment.

A recent survey that we undertook of CEOs, COOs and Chief Security Officers in some of the world’s leading multinationals bears this out. Its findings, outlined

in our report The Business Value of Corporate Security, seeks to understand what such trends in the global business operating environment mean for today’s corporate security function.

Significantly, our survey found these business leaders identified geopolitical developments as the

42 | February 2024 | IN SECURITY
CORPORATE SECURITY

area of highest risk. With US-China relations, Russian regional activity, Middle East tensions and war and conflict all cited as specific threats contributing to the increase in the geopolitical shift, many businesses are therefore addressing high impact risk on several fronts.

Geopolitical shifts tend to not only have direct impacts in supply chain breakdowns but also have a knock-on effect into other areas. Russia’s invasion of Ukraine, for example, had both an immediate and long-term effect upon businesses, including the impact of sanctions which cut off western firms from their Russian markets. In the wake of the invasion, some companies realised that they did not have the full picture of how their assets, supply chains, and business operations would be affected. This lack of preparedness for an event that has seemed a reasonable prospect since 2014 demonstrates once again the necessity of staying aware of the impacts of global affairs. In the

wake of the war, a more holistic and centralised approach to risk is a clear necessity - in consultation with security professionals some corporations have changed their method of managing assets, or even extended their definition of assets to better reflect the realities of today’s market.

As well as modern security risks like cyberattack remaining a constant threat, our research also revealed new concerns among organisations. Increasingly, companies are expected to take moral stances on social issues, which brings its own risks. CEOs, previously only required to manage the operations of the company, are now seen as the public representations of businesses.

Senior leadership are expected to be thought leaders, speaking on issues including the recent Israel-Hamas conflict, the Black Lives Matter movement, and others. Tim Cook, the CEO of Apple, for example, has been vocal on issues such as privacy, human rights, and environmental

sustainability. He has advocated for strong privacy regulations and has spoken out on immigration policies, expressing support for comprehensive immigration reform.

If the views of a CEO, or the actions of the company are thought to be out of step with their customer base, today’s consumers are likely to take their business elsewhere, and in some examples, boycott companies en masse for political affiliations, whether perceived or real. A recent example of this is the social mediafuelled global boycotts of western brands McDonalds and Starbucks in recent weeks for the actions of franchisees and leadership that indicated support for Israel, though both companies have publicly issued statements announcing that they do not support or donate to Israel’s military or government, to little reaction from boycotters.

This climate also leaves companies vulnerable to misinformation by individual social media users, which can snowball

IN SECURITY | February 2024 | 43

into devastating consequences for the company. In 2020, for instance, an anonymous QAnon conspiracist alleged that Wayfair, the furniture retailer, was involved in a child trafficking operation. In the wake of this, while the company was embroiled in a crisis communications cycle as the conspiracy achieved global virality, CEO Niraj Shah was personally targeted with hateful and violent messages, and attempts were made to short the company’s stock. This conspiracy was later denounced as false, yet its impact on Wayfair financially, and in regards to its corporate image was longer lasting. Companies therefore need to take greater precautions in protecting brand identity. Brand management is only one area in which integration of corporate security professionals and an enhanced understanding of crisis management structures proves keythe experiences of these individuals in reacting to crises is replicable across other risk aspects of business.

Climate change is also a growing risk. Whether as droughts, floods or storms, as well as the long-term impact of rising sea levels and global warming, 2023 has shown that the impact of climate change will become only more violent and pervasive in years to come. Its risks to corporate security are especially evident in its impact on cost profiles and supply chains, and it also heavily impacts upon geopolitical events by leading to resource scarcity and mass migration. Corporations have already recognised the need to address climate change, as seen in the increasing prominence of environmental, social and governance efforts (ESG). Previously a marginal corporate activity, ESG is now increasingly at the forefront of business leaders’ strategic thinking - 55% of surveyed directors noted that it was a regular part of the board’s agenda. What business leaders must do to maximise the effectiveness of their ESG plans is to

include security leadership, who can help to understand and advise on the impacts of migration and resource conflicts and provide security to new trading routes, among other capabilities, in their decision-making process.

The age of polycrisis is unlikely to wane in the coming years. A hands-on and forward-thinking approach to risk is the best way to ensure business resilience. In the best adapting businesses, Chief Security Officers are taking on an increasingly broad portfolio, as the pervasiveness of security risks throughout business are better identified and ever-connected in the age of geopolitical conflict, activism and climate change. In the coming years, steps must be taken to increase the resilience of multinational corporations on all fronts - to fail to do so will leave corporate security compromised.

44 | February 2024 | IN SECURITY
IN SECURITY | February 2024 | 45 30 April – 2 May 2024 NEC Birmingham THE HOME FOR WORKPLACE AND FACILITIES INNOVATION GET INVOLVED: WWW.THEWORKPLACEEVENT.COM Co-located with Lead Media Partner

DIRECTORY

The ASSA ABLOY Group is the global leader in access solutions. Our offering covers products and services related to openings, such as locks, doors, gates and entrance automation solutions. This also includes expertise in controlling identities with keys, cards, tags, mobile and biometric identity verification systems.

www.assaabloy.com

azena accelerates the next generation of smart security and safety solutions through joint innovation with customers and partners. Our goal is to be the leading open platform and marketplace for smart security and safety solutions. The platform we offer is based on a camera operating system that powers cameras from various manufacturers on the market.

www.azena.com

Club Car boasts nearly 60 years of industry-leading innovation and design, initially focused on golf cars and then expanding to commercial utility vehicles and personal-use transportation.

www.clubcar.com

Innovating for a smarter, safer world by combining intelligent technology and human imagination, at Axis Communications we offer solutions based on sight, sound and analytics to improve security and optimize business performance.

www.axis.com

Buildings today don’t only provide a safe, functional place for people to live and work. They can also cater for – and even respond to – their needs, while helping them work more efficiently and sustainably. At Bosch Building Technologies, we are at the forefront of these new developments.

www.boschbuildingtechnologies.com

With a full HD camera and an optically stabilized, 40x zoom lens from FUJINON, two high-performance components are integrated into one system. This innovation is the result of years of experience in digital cameras and a dedication to the highest optical quality.

www.fujifilm.eu/fujinon

Hanwha Techwin Europe, formerly Samsung Techwin Europe, offers robust and reliable video surveillance products designed to meet the current and future needs of security professionals. Our cameras, video recorders and other devices are built to exacting standards which reflect the heritage of precision engineering associated with the Samsung brand.

www.hanwha-security.eu

HID powers the trusted identities of the world’s people, places and things. We make it possible for people to transact safely, work productively, and travel freely. We are passionate about helping people use a verified, trusted identity to make it more convenient and safer for them to get to where they need to go and achieve what they want to do in everyday life.

www.hidglobal.com

46 | February 2024 | IN SECURITY

Maxxess Systems delivers innovative SaaS and security management software solutions that combine otherwise disparate physical security, communications, business intelligence and data integration capabilities onto one unified management platform.

https://maxxess-systems.com

Panasonic i-PRO Sensing Solutions

Corporation of America a global leader in professional security solutions for surveillance and public safety, is launching their new name, i-PRO Americas Inc., and taking a unique approach to best navigate the evolving business environment and technology demands of the professional security industry.

https://i-pro.com/eu/en

As a trusted advisor and reliable partner, as a system integrator, service provider and a product vendor, Siemens offers energy-efficient, safe and secure buildings and infrastructure. With our people, our global footprint and our technical expertise, it's our passion helping you to create the perfect place – your perfect place.

www.siemens.com

Transforming teaching and learning with creative solutions to engage and inspire every student. Learning’s becoming more interactive. More immersive. More collaborative. At Sony we’re working with universities, colleges and schools to create richer, more rewarding educational experiences for today’s students and teaching staff.

https://pro.sony.com

At Mayflex we lead the way in the distribution of Converged IP Solutions. Bringing together ‘best-in-class’ Infrastructure, Networking and Electronic solutions. We’re a growing international force, enriched by the skills, expertise and unique personalities of our people. Globally owned but with a family and local feel.

www.mayflex.com

With over 30 years of experience, we design and manufacture marketleading security solutions for a range of buildings. Around 25,000 buildings each year are secured globally with Paxton products. Our global Head Office is based in Brighton, we have colleagues in 12 countries and we export to over 60 countries worldwide.

www.paxton-access.com

From its inception in 2001, SALTO was created with one objective: to devise a world-class access control system that was simple to use and extremely efficient, giving users the ability to control all their access needs and secure all their doors without complex and expensive wiring.

www.saltosystems.com

Videx Security is a leading manufacturer and supplier of access control systems across the UK. We are experts in the door entry market. Videx and our team of estimators, technical support and designers are focused on making and providing high quality products and support to customers.

www.videxuk.com

IN SECURITY | February 2024 | 47
siemens.com/desigo Desigo – the state-of-the-art building automation system
system for all requirements of an intelligent building
One
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.