Tag Archives: access control

Penn State Upgrades Security System with Tyco Security Products Solution

The Challenge
Penn State University wanted to move to a single security and event management platform for its residence halls and other group facilities on campus.

Penn State

The Solution
Penn State selected a unified Tyco Security Products solution to protect and manage its campus.

Benefits
  • Improved image quality to quickly identify activity in a variety of lighting conditions
  • Reduced expenses retooling locks and replacing lost cards
  • Easily managed access rights and track activity of each user with powerful audit trail
  • Accelerated investigation searches with intuitive video management system interface
  • Streamlined and automated processes

Tyco Security Products’ Connected Partner Program welcomes victor and EntraPass

Tyco Security Products adds American Dynamics victor video management system software and Kantech EntraPass access control system and Hatrix managed access control system to its Connected Partner Program.

Connected Partner Program

This program gives third-party technology partners including access control, alarm/intrusion, building management, elevator, emergency communication and RFID the opportunity to integrate with our security solutions. Our robust integration development packages, including software, documentation, sample codes and engineering support time, offer partners the tools to achieve a direct integration.

Benefits of partnering with Tyco Security Products through the Connected Partner Program:

  • Provide a unified solution to your customers and increase your business potential
  • Access to Tyco Security Products fully equipped labs
  • Easily complete the self-certification process
  • Support from dedicated Connected Partner Program, technical and engineering teams
  • Access the development system from anywhere with a remote login [Kantech only]

View the current victor integrations. Interested third-party partners can submit an online interest form.

Get started today!

If you have questions regarding the Connected Partner Program, contact us at tspconnect@tycoint.com.

Tyco Security Products Connected Partner Program

The Tyco Security Products Connected Program integrates with a range of third-party technology partners to create valuable security systems.  View all of our approved integrations on our new connected program compatibility matrix.

Connected Program

The new Connected Program compatibility matrix allows you to:

  • Select any integrated technology partner solution including access control, intrusion, video, fire alarm, RIFD and more
  • Quickly view integration details including driver version, certifications, supported server and client operating systems and more
  • Download integration details, release notes, user guides and additional resources

Our approved integrations are now displayed in a new compatibility matrix on the American Dynamics and Software House websites.

If you have any questions or comments, contact the Connected Program team at tspconnected@tycoint.com.

Strategies to Avoid Security System Downtime

All of your customers want to avoid system downtime, but yet it continues to be an issue. When it comes to building security, they simply cannot afford to risk any downtime. If the video management system (VMS) software, access control system or other building security systems go down, it can mean sites are compromised and risks increase, often with serious consequences.

Join our webinar to learn more about:

  • Importance of always-on security systems
  • Strategies to increase reliability
  • Steps to maximize recorder and camera uptime

Webinar
Security Systems, Avoid Downtime
Monday, February 22, 2016
16:00 GMT
Register Now
Register

Presenter:
Antony Byford
Stratus Technologies
Antony Byford

How do I join a webinar?

  • Complete the short form.
  • You will then receive an email providing the details and link necessary to join the webinar.
  • Click ‘Join Webinar’ at the scheduled time.
  • You can listen VoIP from a PC, laptop or mobile device or dial-in. A headset is recommended.

Any questions or feedback, please email us.

Airport security soars on strength of integrated platform

Ever expanding and seemingly always in flux, airports present great opportunities but also major challenges for security integrators and security technology providers.

Airport Security Today

Today’s modern airports are security-centric enterprises that have multi-faceted surveillance and access control systems. Although airport security was heightened after the terrorist attacks in the United States on 9/11, anytime these facilities undergo some degree of modernization or add to their footprint, they are presented with the prospect of taking security to the next level.

However, any changes to an airport security system must take into account the substantial technological investment that has already been made as well as the importance of keeping the systems manageable on 24/7 basis.

About Izmir Airport

At Turkey’s Izmir Adnan Menderes Airport, this blending of old and new occurred as the airport constructed a new domestic terminal with a security system that needed to mesh with the one in the existing terminal installed more than 10 years earlier.

While the airport’s operator TAV-Ege was eager to introduce IP-based products into the new terminal, it also wanted to leverage its existing and still highly functional components from the old terminal such as analog cameras.

Izmir Airport

Solution

To meet the airport’s needs, together with the help of integrator Sensormatic Guvenlik Hizmetleri, Tyco Security Products presented airport officials with an integrated solution that could accommodate the 700 analog cameras from the old terminal, while also handling the 600 new IP cameras from the newly constructed building.

The installation of modern VideoEdge network video recorders (NVR) from American Dynamics and backbone systems like the victor unified security solution and Software House’s C-CURE 9000 security and event management platform ensured that the airport would manage both old and new cameras and access systems seamlessly from a single platform.

Izmir Security Center

The new unified platform also brought a fuller feature set to the airport, offering video analytics within the NVRs so security staff could:

  • Recognize and address threats more easily
  • Save time with real-time alerts of objects abandoned
  • Intelligent, powerful analytics automate security operations
  • Greatly reduce time searching for incident evidence
  • Presents better control of restricted areas through the C-CURE access control system
  •  Brings together CCTV and access so system operators can now view video along with any alarms that occurs

Even as the capabilities of the system have increased, however, the ability to manage it remains intuitive and straightforward, which is critical in a potentially high-risk environment like a major airport.

Izmir Security camera

As Turkey’s fourth busiest airport, Tyco Security Products complete solution has poised Izmir Adnan Menderes Airport for growth and scalability to allow for future system upgrades and even camera additions if warranted.

And as more airports undergo this type of expansion, the demand for integrated solutions that bring old and new systems together should only increase.

Read the entire case study.

Learn more about how Tyco Security Products
can help you easily migrate from analog to IP.

Unification = Simplification

There are two things we never seem to have enough of — time and money. Thus, when the opportunity presents itself to save both, wouldn’t we jump at the chance?

The move to a unified security platform is designed to address both of those sweet spots for end users and integrators. Rather than relying on separate servers to run access control and video surveillance systems, under unification, a single server handles both operations.

You can see where the cost savings can come in. Rather than investing in dual servers, you can operate with just one. And one server also means fewer licenses, easier licensing management, improved maintenance through a single health monitoring system, reduced installation time…and the list goes on.

unification, victor, american dynamics, software houseBut investing in a security solution isn’t just about saving money. It’s also about product performance and ensuring that you get the critical information as quickly and accurately as possible.

Unification addresses that piece as well. Bringing access control and video together into one server means bypassing the middleware and extensions that typically are relied upon so one system can communicate with the other.

When time is of the essence, and when it comes to security it is, the ability to retrieve video or access data as quickly as possible is critical.

Under a unified server scenario, while video and access control are tied together, you still have the opportunity to leverage the power of integration. Information from other related peripherals such as smoke alarms, intercoms, motion detectors, building systems, etc. can still be brought into the system for monitoring.

This allows security personnel to have the best of both worlds: unified access and video AND the ability to respond to and provide better information when an event is underway through data from integrated systems.

Additionally, when conducting an investigation after an event, you’re able to reduce the number of steps you would have had to take in a two-server environment. Take for example, someone who is experiencing multiple card rejects, who tries to damage a card reader on the wall and cameras in that area capture the incident. In an unified system, the time it would have taken to match the card reader data with the video is reduced by tools available through unification. Using functions such as data visualization, security personnel can find a high number of card rejects and then go to the corresponding video more quickly than if they were still operating in a two server, two client environment.

In a word, unification comes down to simplification — fewer steps, lower costs, more results.

Learn more about how unified solutions helped Rush University Medical Center in Chicago simplify and secure its security operations in this video.

 

Multi-Airport Access Control and Video Security Unification

Travelers worldwide have come to expect top-notch security whether a flight takes them to an airport terminal at Chicago O’Hare International Airport, London Heathrow Airport, or Haneda Airport in Toyko.

Security is an expected part of the airport travel experience, starting from the moment people enter the parking garage with their vehicle, as a person walks up to the ticket counter at the airport, and as they go through the security screening checkpoint for passengers.

Multi Airport Access Control and Video Security UnificationAccording to The International Air Transport Association, airlines project 3.6 billion passengers globally in 2016. The IATA has identified Latin America as an emerging economy that will see the strongest passenger growth.

Despite all airports around the globe being required to meet a minimum set of security requirements, every location has a slightly different take on the type of access control solution deployed to manage the coming and goings of employees, or the video system used to monitor passengers.

At 12 airports across the Pacific Coast in Mexico, the company that manages these airports has recognized the benefits of taking an integrated and standardized approach with its security.

The Pacific Airport Group (PAC), which manages airports in Los Cabos, Tijuana, Mexicali, Guadalajara and other locations in Mexico, reports more than 21.3 million passengers traveled through its terminals in 2012. Needing to upgrade its security technology and move from a standalone security approach, PAC decided it was time to integrate its cameras, recording devices and video management software with its access control system.

While an integrated approach isn’t unique, the standardization at multiple locations is what sets this project apart as many airports had previously installed standalone security solutions. In addition, the integration of cameras, recording devices and video management software with the access control system was a priority at each terminal since the objective was to have sufficient information at a moment’s notice in case an unauthorized individual crossed a critical access point.

In total, the PAC reports 910 cameras installed, all managed by American Dynamics recording systems, including VideoEdge NVRs. In addition, the access control component of the project is built around the C∙CURE 9000 event management system from Software House.

Read the entire case study on the Tyco Security Products website for more details about this successful multi-airport access control and video security unification project.

The scale and the scope of the PAC project alone is a testament to the progress being made relating to security at airports around the world. The next time you take flight to the Pacific Coast of Mexico, you can be assured the access and video surveillance systems here are some of the best in the industry.

 

What road blocks have you encountered when trying to integrate access control and video security integrations across multiple facilities? Please leave me a comment below.

Technology to help go with the flow | preventing card user fraud

In the post-9/11 world, access control has become ubiquitous, especially in the corporate world where thousands of people stream into and out of individual office buildings every day.

Workers equipped with access cards enter through turnstiles, actual and virtual, or gain entry into buildings through card-controlled doorways. A swipe of a card allows the cardholder access. But what is there to prevent the wrong person from using someone else’s card to gain admission to the site?

A form of identity theft, if you will, card user fraud takes place when a person who isn’t the actual cardholder enters a building under false pretenses. Security personnel may react when an unfamiliar face comes through the entryway, even if the card still works. But in a setting such as a corporate headquarters, where hundreds of people are converging on the entrance at one time, security may not be able to visually identify illegal card users. And even if they can, they want to ensure that the flow of people continues unimpeded.

Fortunately, technology has advanced to the point where, through the unification of video management and access control systems, security personnel can stay on top of potential identity fraud at the point of access. Unification means that personnel can avoid operating multiple programs, having to toggle between various screens or stopping everyone to determine whose access is being denied.

Consider the example of the corporate office building. At the height of the morning rush, dozens of people may be passing through the access point each minute. Under the unified “swipe and show” technology, a security officer will see an image of each individual card user from the database as they pass through the access point, and can use that to visually compare it with what they are seeing live. If there is an anomaly, they can pull the person aside and verify their identity without stopping the flow of other entrants.

card user fraudAdditionally, policies programmed into each cardholders’ access information may trigger alerts for security personnel. For example, if someone is entering at the correct time with an active credential, the officer will see an image in the software with a green border. But if the person has broken a policy, such as trying to gain access after hours or through the wrong door, the border may appear as yellow for a minor violation that still allows them access, but needs to be addressed in person; or red, which means access is denied.

Remote access is another application for the “swipe and show” technology. The security officer in the control center sees both the image on file as well as live video as a person seeks entry at the remote location and has the ability to react quickly to allow or deny admission.

While the focus is on proper identification, the side benefits of “swipe and show” are that access continues seamlessly for those who should be allowed entry and security personnel have yet another tool for quick and easy card fraud prevention.

 

Are you using “swipe and show” security technology? If so, how has it impacted your business? Please leave me a comment below.

Yale-New Haven Hospital: Meeting a Unique Security Challenge

It’s a 24-hour, non-stop enterprise with the added challenge of dealing with staff, patients, and visitors in high stress situations on a regular basis.  Because of this hospitals and health care settings continue to be one of the most challenging environments in which security professional’s work.

Not only do security professionals need to maintain a sterile environment when working in a hospital as they upgrade existing systems or install new, but often times they are asked to implement anaccess control or video system with as little disruption as possible to patients, employees and the overall security of the site.

Working in a health care environment is unlike any other setting. According to the International Association for Healthcare Security and Safety, healthcare facilities are high-stress environments, requiring special security considerations.

Yale-New Haven Hospital - Security Challenge - Tyco Security Products - American DynamicsSo what is a security professional to do when it comes to embarking on a new security project? What are some of the steps systems integrators and security directors need to take to ensure a smooth transition with minimal interruptions to patients, nurses, doctors and also the security project itself?

Take a look at Yale-New Haven Hospital and Yale-New Haven Health Systems which recently underwent a large-scale security technology upgrade. It needed to occur with the least amount of disruption yet with the highest level of successful outcome.

Officials for the Connecticut-based, 1,500-bed, Level-I Trauma hospital, world-renowned for outstanding patient care and medical technology, undertook a sweeping overhaul of the hospital’s security technology.  This was done to maintain and enhance security and safety throughout the facility and campus while contributing to the premiere standards of patient care.

A significant part of the multi-tiered plan involved updating access control and credentials for more than 12,000 workers in both the hospital’s and the health care system’s network. More than 1,000 doors and readers were impacted.

So how does this occur without a major disruption in the critical workflow that the hospital undertakes each day? Unlike a 9-to-5 business, there are no opportunities to pause the system overnight or on a weekend so everyone can be outfitted with new cards and to swap out all the readers and associated hardware.

To accomplish this comprehensive and multi-stage migration and expansion, a strategy was deployed to run the new platform — Software House’s C•CURE 9000 security and event management system — on the front end using proximity technology, while still running the legacy access control system on the backend to support the existing card technology.

As new people were added to the credentialing system, they were placed, via the HR database, into both the new and the legacy systems so cardholders could use readers from both systems. This way the deployment could happen over time, without interfering with daily activities.

Also behind the scenes, YNHH upgraded its CCTV system to an IP surveillance network, added its first thermal imaging camera, continued its migration to IP cameras and made improvements in its centralized reporting functions. And yet, to the doctors, nurses, administrators, and most importantly to the patients, there were minimal outward signs that this was all taking place.

The benefits of improved security are myriad, from the ability to follow in real time, throughout the system, critical visuals, alarms and data; to the cost savings that come from streamlining and centralizing operations; to the ability to better meet the regulatory expectations from the various groups that govern hospital operations.

Yale-New Haven Hospital has always been at the forefront of technology, whether it was the first X-ray in 1896 or the development of the first artificial heart pump in 1949. Now, with its migration to a cutting-edge security network, it continues that long tradition and provides security professionals with great example of a successful security project in a health care setting.

To find out more about the full solution deployed at Yale-New Haven Hospital, click here to download the full case study.

 

Click Here to Download the Full Case Study

Security: There is an app for that

mobile security apps

If there is a smart phone in your pocket, purse or briefcase, then chances are you are also someone who has downloaded an app—or 10 or 20, or probably even more.

As mobile networks have advanced since their inception in the 1980s, so too have the capabilities of the devices we use. It’s pretty much standard practice today to have a built-in camera, GPS capability and voice activation in our smart phones. Apple, creators of the iPhone, offers more than 650,000 apps, which have been downloaded more than 30 billion times. And Android, the other leader in this field, is close behind.

In the security world, creating apps to go with the smart phones that travel with us wherever we go helps to extend the capabilities of existing security products, whether it’s a video management system or the software tied to an access control product. But the key goal in creating these apps isn’t to replicate what security professionals or even homeowners are doing on their desktops, but ratherapps should be about creating a value-added user experience.

In some instances, that may mean using these apps, developed with security in mind, for non-security purposes. A retailer, for instance, who already has security cameras in place and is able to monitor them via a smart phone app, could also use this same video for monitoring inventory as it moves in and out of the stockroom, or for evaluating staffing levels at certain times of the day. Manufacturers could use those same security-developed apps for supervising product flow in the factory, or movement of those items within the warehouse.

Of course, anytime security is involved, there is a concern about protecting the information. Fortunately, those who are developing apps for the security field are ensuring that the proper authentication processes are in place.

So where are we likely to see the app world heading in the next few years, especially when it comes to security? Consider the concept of near field communications (NFC) —a standard whereby smart phones in close proximity can carry out transactions or exchange data. Developers are also exploring the use of a single app to bring multiple, independent systems together on a single platform, such as connecting video monitoring, event management and access control. This is an example of a great value-added for the end user, which is what apps should be all about.

 

What non security related tasks are you performing with a security-developed app? Leave us a comment below with your examples.