Tag Archives: Infrastructure

Videx introduces vandal-resistant GSM access control system

Videx has launched its vandal-resistant GSM system that can provide access control to a wide range of gated properties, office blocks and commercial buildings. The new system uses mobile technology to communicate and operate doors, automatic gates, car parks and remote site applications, making it a perfect security solution for unmanned sites and communications outside of normal business hours.

The solution is available as part of the 4000 Series modular door entry system in a range of styles including surface and flush panels in 12 gauge 316 grade stainless steel. Custom panel sizes are also available. All vandal-resistant panel variations can be engraved with a legend or provided with back-lit name plate windows. The system also provides optional proximity access control for up to 1,000 users.

Neil Thomas, national sales manager at Videx, said: “GSM systems enable calls to be placed from an entrance point to any mobile or landline telephone. Entry can then be granted using the telephone keypad. Two key and innovative features of our new vandal-resistant GSM system is that it can call up to 24 users, with a divert facility of up to three numbers if the others are engaged or unanswered, while up to 1,000 telephone numbers can be stored to take advantage of the ‘dial to open’ feature which enables callers to dial the intercom and release the door/gate without being charged for the call.”

Proximity access control is also an option. A voice annunciation and LCD display can be connected if required, which can then include scroll buttons to search for specific users via the screen.

VidexVandalResistantGSM

GSM systems require minimum installation and set-up time, allowing them to be installed in places which would be too difficult or too expensive to hard-wire. There’s no need for any cabling to telephone points as the system uses the existing mobile network infrastructure, allowing calls to be made to anywhere in the world.

Thomas added: “Systems can be installed in a very short space of time requiring only the mounting of the entrance panel and connection to a power supply, antenna and gate or door releasing device. Our new system also comes with an event log to record events that can be viewed using PC software.”

Programming and maintenance of the user’s details, access control codes and fobs may all be controlled via SMS text messages and via a PC using a USB connection. The GSM system’s flexibility allows changes to be made remotely without the need to revisit the site. Dry contact relay output, additional switched 0V output, push to exit button input and auxiliary inputs are all available.

Leave a comment

Filed under Risk UK News

Abloy UK publishes White Paper focused on Smart Infrastructure Integration

Access control technology is increasingly forming part of a greater, fully-ntegrated infrastructure system that links every aspect of a building together. Successfully integrating digital automation and control systems, smart devices and data analytics with physical infrastructure can offer exciting opportunities for businesses, communities and Governments.

Next-generation Smart Integrated Infrastructure offers new prospects for effectively managing the way in which we live, work and grow, while at the same time allowing us all to remain safe and secure.

AbloyUKWhitePaper

With this in mind, Abloy UK has created a Smart Infrastructure Integration White Paper. This document explores how organisations in all sectors can take advantage of cutting-edge security and access controls, and how they can link into a wider connected ecosystem to deliver operational efficiencies to potentially under-resourced businesses.

*To view the full White Paper visit https://www.abloy.co.uk/en/abloy/abloy-co-uk/about-abloy/white-paper/smart-infrastructure-white-paper/

Leave a comment

Filed under Risk UK News

ECA/SELECT Survey finds buildings at heightened risk from cyber attack

The use of cyber attacks is becoming more prevalent as an effective tool to disrupt both business and politics. As a result of this, within industry it’s vital that steps are taken to protect buildings and infrastructure against potential threats.

To find out the current state of play, the Electrical Contractors’ Association (ECA) and Scottish Trade Association SELECT surveyed a range of clients in November and December last year on their approach to cyber security.

The feedback received from the ‘Connected Technology Survey for Clients’ emanated from a range of respondents, including consultants, engineers, end clients, local authorities and facilities managers.

ecacybersurvey

The results show that almost four-in-ten clients (39%) don’t take any steps to protect smart installations in buildings from cyber threats. A further 49% cited the risk of hacking as a barrier to installing connected technology.

Steve Martin, head of specialist groups at the ECA, commented: “Given that ‘connected technology’ covers any technology, such as lighting or HVAC installations, this enables devices to communicate with each other over the Internet and undertake tasks. The risks from hacking are substantial.”

Currently, only 20% of the UK’s commercial buildings are considered to be ‘smart’. However, over the next four years, the global ‘Internet of Things’ market is expected to be worth over £1 trillion annually. “If we’re to keep pace with developments,” concluded Martin, “the issue of cyber security needs to be addressed as a matter of urgency.”

Leave a comment

Filed under Risk UK News, Uncategorized

Milestone Systems and Community Partners deliver high profile retail surveillance solution across Middle East and North Africa

Milestone Systems, the developer of open platform IP VMS, has delivered a flexible and scalable surveillance solution for Majid Al Futtaim’s multi-site operations across the Middle East and North Africa. The solution integrates Best-in-Class technologies from Community Partners.

As a fast-growing business, Majid Al Futtaim realised that managing large camera networks and risks across multiple sites and countries posed several challenges. First, the outdated analogue surveillance infrastructure was in need of being modernised. Second, the sheer size of the operation, with multiple sites across several countries and more than a thousand cameras at some sites, had to be addressed.

Following a comprehensive vetting process, Majid Al Futtaim chose a state-of-the-art security and video surveillance solution in order for the business to remain at the forefront of operating safe and secure retail and leisure environments.

The Milestone XProtect Corporate VMS permits Majid Al Futtaim to operate the entire surveillance solution from a single management interface in the UAE. Being able to access all the sites from one location enables the operations team to co-ordinate surveillance and management efforts across those sites. Other relevant parties can also leverage the information directly from mobile clients, in turn enabling more efficient safety operations.

milestonemenacasestudy

Top-of-the-range Axis Communications cameras and Pivot3 hyper-converged server infrastructure guarantee the host business lives up to Government regulations. iCetana’s dynamic live monitoring system helps offset the challenges of actively monitoring the large camera networks and enables a real-time assessment and response capability.

Operational costs related to the hardware, servers and cameras have been reduced from 23% to 7%. Real-time response capability helps make overall security operations more effective by immediately identifying risks. Today, there are approximately 10-12 incidents actioned per 300 cameras.

“We are honoured Majid Al Futtaim has chosen Milestone as its primary VMS and we look forward to continuing to support them now and into the future,” enthused Peter Biltsted, director for the Middle East and Africa at Milestone Systems.

“iCetana is proud to provide ongoing support to Majid Al Futtaim throughout the MENA region, and also to be part of Milestone’s Partner Community as key components of Majid Al Futtaim’s video surveillance infrastructure,” added Stephen Bose, head of business development at iCetana.

Leave a comment

Filed under Risk UK News, Uncategorized

“Hybrid cloud and the CIO will rule in 2017” asserts Informatica

Cloud has reached maturity. No longer seen as the dangerous option, widespread cloud adoption will enable more flexible and rapid service in 2017. As a result, businesses will need to have total control of their infrastructure and sensitive data if they’re to keep up. With this in mind, Greg Hanson (vice-president for worldwide consulting at data specialist Informatica), has moved to explain the four areas businesses must prepare for in 2017 if they’re to perfect their cloud strategy.

Enterprises will embrace a hybrid cloud approach to dispel data fragmentation

Widespread adoption of Software-as-a-Service (SaaS) has traditionally been the preserve of SMEs looking for subscription-based models and easily scalable software. Yet pockets of SaaS investment have crept into the enterprise in 2016, occurring within individual lines of business and causing data fragmentation which hampers agility.

In 2017, rather than shying away from SaaS deployments business-wide, successful enterprises will embrace a hybrid approach to the cloud and reclaim their single view of data assets.

Security will no longer be a question of on-premise or cloud

It’s no longer about whether on-premise or cloud is more secure, but rather about understanding that breaches come from the inside. Threats exist inside the firewall and, as a result, perimeter defence has long since been ineffective.

After all, the biggest threat to an organisation’s security posture doesn’t come from the kind of infrastructure and software it uses, but rather its people.

greghansoninformatica

Greg Hanson

The amount of data that business users are consuming and demanding means it’s the data management strategy that’s imperative. Security posture in 2017 will be defined by an organisation’s ability to carve out a cohesive data management strategy to track data wherever it resides, and then secure it at its source. 

Brands will live and die by their customer experience

From financial institutions to retailers and manufacturers, customer experience will overtake price as the new differentiator for customers. As such, data stewardship and governance will become the priority for those delivering second-to-none experiences and successful transformation projects.

It’s all very well pulling data assets together and sharing them with lines of business for these initiatives, but they will need to know that the quality of the data they’re implementing into systems is pristine.

What’s more, they will need the right guidance and tools to access the data in the first place and visualise it in such a way that it can travel the last mile and be put into real use. This is where a cohesive data management strategy is essential for bridging the disconnect between data scientists and business users. 

CIOs will secure their future by reclaiming ownership of data initiatives

With CIOs increasingly facing competition from a tech-savvy set of business IT buyers, it will be imperative that the former step up and take ownership of business agility and transformation to ensure they still lead their organisation’s digital journey.

Lines of business are increasingly looking to do things cheaper and quicker without the involvement of IT. This means that CIOs will need to reclaim control of data management at its root to drive enterprise-wide security and improve accessibility of data.

Only then can they fully ensure that the single view of the company’s data assets doesn’t become somewhat ‘muddied’ by a disjointed IT spend and independent data management across the business.

Leave a comment

Filed under Risk UK News, Uncategorized