Genetec Releases Access Control Feature to Help Identify People at Increased Risk of Contact With Contagious Individuals

“Contagion/Contaminant Proximity Report” available free of charge to any Genetec Security Center Synergis™ access control customers

Genetec, a leading technology provider of unified security, public safety, operations, and business intelligence solutions, today announced that it has released a new reporting function for its Security Center Synergis™ (Synergis) access control system that is designed to help organizations find all people who went through a door in close proximity to someone thought to be contagious. It is conceivable that they may have contaminated the door handle or other surfaces or left aerosol contaminants in their passage. This report helps identify all people who are at increased risk of being in contact with contaminants or contagious individuals. This feature will be also useful for customers that handle dangerous substances and is made available to all Genetec Synergis Access Control customers at no cost.

Developed at the request of McCormick Place in Chicago, North America’s largest convention Center, the reporting function correlates physical proximity of an infected individual with other employees and badged visitors based on the use of the access control system. A report can quickly be generated to correlate access events by time window to identify people who are at increased risk of being in contact with contaminants or contagious individuals. This will allow enterprises to proactively advise individuals of their potential contamination and take the necessary hygienic precautions, as outlined by health and safety procedures and regulations.

“With Synergis, any organization can produce a detailed report that shows exposure metrics for employees and visitors utilizing existing access control data,” said Thibaut Louvet, Product Group Director, Access Control at Genetec. “It considers that if two people went through the same door in a short period of time, chances are high that they had some level of interaction. This forensic analysis can be extremely beneficial to organizations seeking to use technology they already have to better protect employees, visitors, and the broader community.”

“Our number one priority is to ensure the health and safety of our guests and staff, so we knew we needed to be prepared for any eventuality,” said McCormick Place Security Systems Coordinator Brett Zelnio. “In the fight against a contagion that can be spread easily through surfaces or proximity to infected individuals, knowledge is our best defense to stem the spread of these types of viruses. Being able to utilize technology to provide these additional metrics available through this system is a new and critical tool.”

“Only about half of Security Center features are a result of Genetec anticipating which technology will be useful for our customers. The other half are as a result of what our customers dream up. They regularly imagine clever and innovative ways to use the system and suggest useful new feature ideas. The Contagion/Contaminant Proximity Report is a case in point,” said Pierre Racz, President, Genetec Inc. “A clever member of the technical staff at one of our public infrastructure customers requested the Contagion/Contaminant Proximity Report and we were taken by its usefulness and brilliant simplicity - so we fast tracked its development.”

Existing Synergis customers who want to find out more about the Contagion/Contaminant Proximity Report can go to the Genetec Customer Portal or contact sales@genetec.com.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3