Saving Lives Using ZeroEyes

With shootings on the rise across the United States, along with a lack of information for first responders when on the scene, it was important to develop a tool that could stop intruders before they even got a chance to enter the building. With advancements in security technology, finding an effective solution, is possible now more than ever.

ZeroEyes is an artificial intelligence platform used to prevent casualties and identify weapons. Integrated with camera systems, this platform monitors feeds in order to detect weapons, while sending immediate updates to authorities.

Key Features:

Weapons Detection
Using advanced analytics software, ZeroEyes is able to detect weapons efficiently each time. Once a weapon is detected, an image is taken from the camera and sent to authorities. This image will enable them to understand weapon location and the type of weapon used. Saving time means saving lives.

Alerts
With the ability for each camera to detect weapons in view, immediate alerts will be sent out and key personnel will be notified in real time. This allows necessary authorities to understand where the danger is coming from, where they need to go and what kind of situation they are dealing with.

Analytics
The ZeroEyes algorithm is continually evolving to better identify and detect weapons. The team consists of highly skilled, former American military veterans that aim to make each detection both faster and stronger than the last.

ZeroEyes is not limited to one specific vertical. From education and travel to healthcare, corporations, venues and more, this software can be implemented throughout a variety of different markets. If you are interested in learning more or receiving a demo about this weapon detection system, please give us a call at 215-443-8600 or email sales@accesssecurity.com.

HALO Smart IT Sensor

The need for enhanced safety tools to be installed behind typically closed doors has become exceedingly high. Fights, bullying, vaping and smoking, among just a few things, happen in places where cameras are prohibited including bathrooms, locker rooms, closets, etc. The dangers of not being able to detect what is happening in these areas, most notably in school environments, has been extremely high…until now.

The HALO Smart IT Sensor acts as both a vape detector and security device. With 11 built in sensors, this device can detect changes in the environment to automatically send alerts when any kind of shift in activity occurs. These alerts can be received through an online platform or video management monitoring software. This includes:

  • Chemicals
  • Air Quality
  • Vaping
  • Smoking
  • Noise Levels
  • Gun Shots

One of the benefits surrounding this device is its’ ability to preserve privacy. The HALO Smart Sensor doesn’t record or store any video footage or audio clips. With no cloud fees and less false alarms, this device integrates directly with the security platform and VMS. With the ability to be incorporated into a variety of industries including education, healthcare, hospitality, real estate, manufacturing, commercial properties and more, the HALO Smart Sensor is the answer in the prevention of harmful events.  

Interested in learning more about this smart sensor and its’ capabilities? If you have any questions or are interested in having a demo setup for you, please call us at 215-443-8600 or visit our website at www.AccessSecurity.com.

Importance of an Emergency Notification System: Alertus Technologies

Outside or internal threats to schools, organizations and businesses are rising.  It’s never been a more crucial time to ensure the safety and well-being of students, faculty, employees and visitors. With advanced mass notification technologies, Alertus Emergency Notification Platform notifies people in seconds when time is of the essence.

Alertus offers a variety of mass notification emergency solutions including an Alert beacon, desktop notification, app, panic buttons, text-to-speech, fire alarm interface and more. Built on the Alertus server, the mass notification system is entirely managed through the user interface beginning with alert initiation and server acknowledgement and ending with alert activation.

The system offers unique capabilities including one touch activation, targeted alerts, preset alerts and more.

One Touch Activation
Being able to instantly alert everyone or only a few select people in the building is crucial to providing a safe work environment, using this one touch activation system. With an array of methods, including buttons, desktop activator, VoIP phones and more, the ability for the organization to customize to fit their organization’ needs is easier than ever.


Targeted Alerts
Alert targeting has never been easier with the Alertus system. In critical situations, it’s important to get the message across to the right people. Alertus can pinpoint select audiences using an interactive map with geo-targets, alerting groups, groupings by building and more.


Preset Alerts
Simplify mass alerts by using already preset labels including severe weather, an active shooter, PA voice announcements and more. These can be released through the entire system to everyone or only necessary people with one simple touch at any crucial moment.

Interested in learning more about this intuitive system useful for emergency management professionals? Join us for an emergency management seminar hosted by Access Security Corp. on Tuesday, April 23rd from 11:30am-1:30pm. Click here to register!

How Secure Is Your Entry System?

How secure is your door entry system? Regulation of who has access to and from buildings helps to easily identify visitors and either permit or restrict access to your organization for security purposes. This two way communication device allows for communication between a single building or multiple buildings. Common locations where intercoms are placed include entrance doors, loading docks, gates and in residential homes. Check out the most common types of intercoms and how they can be incorporated into your organization.


Basic Intercom

Most likely found in an organizational setting, which can include a master station and multiple sub stations. A receptionist can directly communicate with each sub-station at multiple entrances to either allow or deny entry to visitors.

  • Wireless Systems
    Wireless intercoms rely on radio frequencies for the transmission of signals. The cheaper option compared to hard wired, these typically don’t require the need for installation, resulting in a much more user-friendly system.
  • Wired Systems
    One of the most common types of systems, these are built into the walls of your building. While a little more expensive, their signals tend to be clearer than wireless systems.


Video Intercom
Video intercoms come with built in cameras that can be stationed at door entrances for users to visually see and communicate with whomever is at the door, speakers and push buttons. This allows them to verify before allowing entry to ensure optimal security inside the organization.

The Aiphone JK Series Entry-Level Video Intercom supports up to two master stations and a single door station. The memory can record up to 40 calls while featuring a PTZ control for enhanced viewing.


Full Intercom
See, speak and unlock the door from anywhere using Aiphone’s JO Series Mobile App Entry Level Video Intercom. This includes a mobile app which gives users the ability to monitor exactly who shows up at the site while also allowing visitors entry from anywhere with the simple press of a button on their mobile device.

Enhance the communication and security of your organization with the right intercom systems for you. Contact Access Security Corporation at 215-443-8600 or email sales@accesssecurity.com.

Use Avigilon Appearance Search to Find What You Need…Fast

Stop sorting through hours of video and improve overall response time by compiling specific information about a person or incident. With Avigilon Appearance Search, finding exactly what you need is a quick and easy process. Using advanced video analytics, you will be able to easily locate the specific object or person you are looking for using an artificial intelligence search engine through descriptions, facial analytics and more.

Search Using Descriptions
Trying to locate a person that left their purse on a table in a large hospital? Easily narrow in on the person or object you are looking for by searching using descriptions. Using specific characteristics including shirt color, gender, height, etc., you will be able to quickly scroll through the footage you need in order to locate the person more easily.

Facial Analytics
Focus on specific facial features and narrow down your search. While people’s faces, hair color, clothing and accessories change over the time, Avigilon Appearance Search focuses on the key person, even if other attributes change over time. Appearance Search can pinpoint down to the correct analytical characteristics to easily find who you are looking for.

Blurred Exporting
Wish you could blur out elements of a video to make finding certain people or objects easier? You can! Focus solely on the person or object you are following by blurring out all other elements in view. This allows the attention to be focused on the object or person so time can be used more efficiently in narrowing in on other parts of the search.


Avigilon’s Appearance Search uses artificial intelligence searching to focus on specific people or objects. Using characteristics, facial analytics and blurred exporting, the daunting task of searching through hours of video can be made simpler using this video analytics tool. Take your searches to the next level and improve overall responder time.

For more information about how to use this search tool, please call 215-443-8600 or visit us at www.AccessSecurity.com.

How to Ensure a Secure Campus Environment

It’s important to carry a focused approach towards protecting the grounds of your school’s campus. It’s essential for all campuses to properly prepare for incidents in the case that they do occur. Improve the security of your buildings, both inside and out, by considering the following tips:

  1. Maintain clear lines of communication. Encourage your students to speak out if they notice any suspicious activity or feel uncomfortable! Let them know that school officials or campus security will listen closely as they express their concerns and will do everything to investigate and resolve the issue. Your student body plays an important role in the security of your campus; essentially, they’re the eyes and ears of your facility. Make sure they know that their input is important! Easily communicate with staff, students and parents in the event of an emergency. Mass notification systems that easily alert all necessary parties of impending danger can be the difference between life and death.
  2. Security presence around campus. A visible presence of security around campus can have a strong effect on the message of the school. Whether this be through cameras, security systems, guards, etc. the simple existence of these security measures can stop a criminal in their tracks, providing for a safer environment. It will make your students and faculty feel more secure knowing they are well protected and looked out for.
  3. Proactive planning. Planning is always key, but especially critical when it comes down to the safety of faculty and students on a campus. Consider possibilities from all angles, both inside and out. Have a system down pat that works seamlessly between your faculty, staff and authorities. When you receive service and support from a company like Access Security Corp., specialists will help you cover all the bases; from designing and engineering the best safeguard possible, to supporting you with a reassuring central monitoring system. Add the appropriate tools to your school’s security plan, and you’ll be ready to respond to a potentially life-threatening situation in the community.
  4. Access control systems. The advancements in security technology has been astounding for campuses. From wireless locks to card readers and even facial recognition, the ability to track who enters and leaves buildings throughout campus is an effective method in preventing harm. From residence halls to classrooms, dining halls and recreational buildings, the use of access cards, biometric readers, proximity readers and video analytics can provide great benefits and enhanced safety measures. The use of access control in order to enter buildings prevents unwanted individuals and suspicious activity, restricting access to only trusted personnel. It can allow you to monitor these systems remotely, lock and unlock entryways from your phone and receive real time data and insight into the amount of traffic in and out of certain buildings throughout the day.
  5. Ask for a professional security consultation. With Access Security, our team will visit your site to listen to and acknowledge the needs and concerns of your faculty. Then, we will evaluate each building to identify possible threats and figure out how your current security measures can be improved. Maybe you need to install a better video surveillance system to monitor the behavior of your students, or you want to invest in an access control system, shooter detection system or intrusion alarm. Whichever route you choose, our team will help to ensure the safety of your students, faculty and visitors.

    Ready to learn more about enhancing your security measures? Call 1-800-886-5625 or contact via email at sales@accesssecurity.com.

Preventing Commercial Electrical Fires

Electrical fires can happen anywhere, especially in colder weather, due to the increased use of heating and electric systems. While electrical fires rank the highest as the leading cause of commercial fires, organizations consistently don’t do as much as they could to prevent them. While many factors can expose an organization to risk, check out some of the most common causes listed below.

Circuit Overload
One of the most common causes of an electrical fire is an overloaded circuit. When various energy sources all share the same outlet, including microwaves, refrigerators, computers and heaters, the amount of energy it takes for all of them to run can exceed the capacity of what the circuit can handle.

Preventative Tip #1: Reduce the amount of systems using the same circuit. From refrigerators and microwaves, to printers, TV’s and computers, these common office appliances have the potential to exceed the maximum wattage amount. Avoid using the microwave at the same time someone is trying to print or turn off the tv before starting to vacuum. These small steps can help to avoid a detrimental situation.

Defective Wiring
Depending upon where the wiring is, it can be damaged much quicker in exposed areas. Weather factors, animals and temperature changes are all forces that can destroy it. All wiring is at risk of deteriorating and should be watched both in and outside of commercial buildings.

Outdated wiring is also a cause for concern. Due to an increase in electrical use as compared to years ago, the wiring that once fared well for certain buildings, might be unable to handle the larger amounts that are used today.

Preventative Tip #2: Pay special attention to wiring that is exposed to outdoor elements. These should be checked periodically for any signs of wear and tear. Wiring that appears frayed or broken down should immediately be looked at before risk of it turning dangerous.  

Wires and systems should be kept in a clean, dry, temperature-controlled area to prevent elements from ruining these materials.

Hot Spots
What are these exactly? Trouble.

When faulty wires, overloaded circuits, or an imbalance in the electrical system come into play, too much heat can be produced in certain spots on a panel. These hot spots can lead to dangerous electrical fires that can destroy buildings in minutes.

Preventative Tip #3: How to prevent these? Cooling methods such as fans or air conditioners can be an effective method to lower the air temperature. Air deflectors help with the flow of air and can be redirected to hotter points to lower the chance of hot spots.  You can locate these easily through techniques such as infrared testing, thermal imaging and even flashlights.  

How Access Security Can Help
Fire safety should be one of the main priorities of any organization and with a properly installed fire alarm and detection system, you are on the right track. With a team of highly trained professionals, Access Security can meet those needs and install a comprehensive fire alarm system that complies with the requirements of the National Fire Protection code. We offer a full line of fire alarm systems consisting of initiating devices, notification appliances, control panels and annunciators.

We strive to create an outstanding and lasting partnership with each one of our customers. By providing the best technical support, we can ensure we efficiently meet your most pressing needs.

Interested in learning more about how we can help your organization? Head on over to www.AccessSecurity.com or call 1-(800) 886-5625.

Wireless Locks Significantly Lower Costs

Organizations are making the switch to the more advanced electronic access control systems as opposed to the more traditional turn key locks. Many have implemented fully wired systems throughout their buildings. These locks are hardwired into a door frame and connected to both a reader and controller which communicate back to the access control system. While an effective door lock, organizations also pay the expensive price in installation and labor upkeep fees.

Implementing completely wireless locks into organizations, not only saves time but also money. NDE Networked Wireless Locks eliminate the need for wiring and can function as is since the wireless lock is able to talk directly to the access control system through the gateway. They can be managed from both web and mobile applications with access gained based on proximity and smart credentials, allowing for a much higher level of security. The functions of a wireless access control system can be obtained at nearly half the cost than that of a wired system. They run on less power and the total cost of ownership and labor time is reduced, specifically when it comes down to installing the hardwired system. Their ability to provide the benefits of online access control at a much lower cost allows for more organizations than before, such as colleges, apartments, schools and offices to reap the benefits.

Lower your access control costs with the installation of NDE wireless locksets. Secure your organization in an affordable and convenient way that not only protects, but also saves you both time and money. Visit www.AccessSecurity.com or call 1-800-886-5625 for more information or to request a demo!

How Multi-Sensor Cameras Help Improve Security

With increasingly dangerous situations occurring more frequently than before, the need for enhanced security measures is essential to protect your organization and employees. Surveillance systems have gone through significant advances in technology, with multi-sensor cameras now providing a plethora of benefits.

Not only do they provide high definition (HD) resolution, but their versatility allows for the elimination of other cameras such as traditional Pan-Tilt-Zoom (PTZ) cameras.  They capture 180, 270 and 360-degree views, and feature 2, 3 or 4 cameras in a single camera dome/enclosure.  By combining multiple sensors into a single camera enclosure, you save the cost of multiple camera installations, cabling, video management licenses and overall system maintenance.

Multi-sensors provide overall higher definition, high resolution coverage, stable image quality in dimly lit areas and even reduced motion blur in some cameras. Customers in various industries can benefit from the use of multi-sensor cameras as compared to PTZ standard cameras. With detailed, 360-degree views, capturing images from multiple angles, end users can feel confident about protecting their organization’s facility.

The security experts at Access Security Corporation can effectively implement the most fitting surveillance systems for your organization! Please visit www.AccessSecurity.com or call 1-800-886-5625 for more information.

Are your it closets secure? The consequences of not securing your network with physical security can be costly…

Your IT closets contain critical infrastructure your organization needs for daily operations and workflow. Having your network interrupted could be detrimental for your employees, customers, and day-to-day business practices. When it comes to your IT closet – you should implement the highest security measures possible to prevent criminals from gaining access to your organization from the inside.

  • Sensitive Information Might Get stolen
    • After a break in, a criminal can easily gain access to sensitive company and employee information. Think of all the information you gather from your employees throughout their tenure. You may have sensitive health information for insurance purposes or even access to their finances for payroll deposits or expenses. If this information is not properly encrypted and protected, it can cause employees a lot of turmoil if stolen.
    • This is precisely what happened to Coca Cola in 2014 when equipment was stolen from their largest bottling plant. Personal health, financial, and vehicle information of over 74,000 employees were stored on some of the stolen devices. The employees are still affected today. Many of them had their identities stolen and are still attempting to build their credit scores back up and get their finances in order.
  • Loss of Revenue
    • Besides the fees that could come along with any legal action associated with a data breach or burglary, your company needs to replace anything that was stolen. This could cost you tens of thousands of dollars depending on what was taken.
  • Damage to Reputation
    • Not securing your IT closets puts your customers at risk as well. If their information is compromised because you failed to protect it – they are sure to lose confidence in you as a business partner. The same goes for your investors.
    • In fact, Target is still picking up the pieces when it comes to their reputation. After their 2013 security breach, Target saw their CSR (Corporate Social Responsibility) score, which is an enterprise measurement combining workplace, governance, and citizenship metrics, fall dramatically. According to Market Watch, it was the largest CSR drop among any retail company in the United States.
  • Workplace Culture
    • Similar to both customers and partners, your employees could also lose trust in your company. You may see a shift in company culture after a theft or data breach and employees may start looking to work for more secure organizations.
  • Delayed Business Operations
    • Depending on what was taken, your day-to-day operations could potentially come to a complete stop for several hours or days after a physical security breach. What if your file-sharing sever was taken or compromised? Your entire company shared drive would be gone. All sales documents, invoices, HR files – everything would be lost. Or, what if they took the sever that controlled your phone and internet? Your office would definitely be out of sync for a number of days. Imagine what would happen if someone took your entire server rack…

 

Not sure if your IT closets are up to par? Follow these security best practices to prevent a physical security breach.

  1. Make sure you are keeping your IT equipment in a locked separate room. Having these devices in a person’s office or even in a shared storage space leaves your system vulnerable to damage or theft.
    1. If you can’t keep your equipment in a separate room, you should try to organize the equipment into separate locked sections.
  2. Allow only authorized personnel access to your IDF/ MDF and server rooms. You can even limit access to specific racks for added security!
  3. Utilize an access control system to properly secure your server room. This system will also be able to document all employees who enter your server room, which can prove to be extremely beneficial if anything should happen to your operating system or if you feel that an employee is tampering with your equipment.
  4. Place cameras in and around these secured rooms. As mentioned before, documentation is key if your system goes down unexpectedly. You can even opt to use motion-activated cameras that can trigger an alarm should anyone enter the sever room after hours.
  5. Install temperature and moisture monitoring devices that will notify authorized users if anything malfunctions or seems out of the ordinary. The security experts at Access Security suggest keeping the temperature of your server room between 65 and 68 degrees Fahrenheit. The temperature should never exceed 82 degrees Fahrenheit.
  6. Servers create a lot of heat. Make sure to have your security partner install fire alarms within your server room to protect equipment and data.

The security experts at Access Security Corporation can help your organization effectively implement any of these best practices. Contact your sales representative today or email sales@accesssecurity.com to start the discussion.