Brivo Systems unveils its latest Brivo OnAirSM version 10.11 at ASIS 2013
Brivo Systems unveils its latest Brivo OnAirSM version 10.11 at ASIS 2013

Brivo Systems LLC, leader in cloud applications for security management, recently announced the company’s release of Brivo OnAirSM version 10.11, featuring an updated User Interface (UI). Brivo OnAir is the new brand name for the former Brivo ACS WebService cloud-based access control management solution. With the introduction of this updated interface, Brivo further extends its leadership in the cloud-based access control and video surveillance space by offering a more visually rich and responsive experience for its customers. The Brivo OnAir interface is streamlined and designed for usability, reducing the learning curve and simplifying both system deployment and day-to-day security management. For the redesign project, Brivo engaged a team of user experience (UX) experts. The team conducted hundreds of hours of interviews with current and prospective users to determine how they worked. They incorporated this information into profiles of user “personas” in order to bring focus to ensuring that the resulting interface responded to the needs of Brivo’s users. This first phase of the interface re-design incorporates the key findings from this process and sets the stage for additional enhancements to follow. “This is an exciting day for Brivo, our channel partners and end-users,” said John Szczygiel, Executive Vice President. “The Brivo OnAir name better captures the essence of our cloud-based solution. The revamped UI directly reflects feedback from our users and further demonstrates our commitment to continuous improvement. What's more, this major upgrade is delivered automatically and without charge to all of our users. That’s cloud computing, that’s Brivo OnAir.” Among the features the Brivo OnAir version 10.11 offers: A rich user experience that maximises video and access control management. A new top-level video tab provides immediate access to recorded and live Online Video Recorder (OVR) video. Simplified search capability provides a comprehensive view of access and video motion events on a timeline display; events are visually represented and prioritised using color coding, intuitive icons and other visual cues. The system landing page is optimised to provide shortcuts for everyday operations:  create a new user, find a user or a card, change passwords and search video all on this page—saving time navigating through multiple screens.

Add to Compare

Browse Access Control Softwares

Access control software - Expert commentary

Home monitoring at the edge: Advanced security in the hands of consumers
Home monitoring at the edge: Advanced security in the hands of consumers

Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customisable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customise devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarised, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analysing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyse massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyse massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognise residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorised person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.

Top things you need to include in your construction site security checklist
Top things you need to include in your construction site security checklist

One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at. However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson. Improving the security of construction sites It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public. Investing in adequate resources for construction site security can prevent several issues, including: Theft of expensive tools and construction equipment Cybersecurity breaches leading to loss of sensitive information such as invoice data Arson resulting in loss of life and property Vandalism of construction site property Trespassing by unauthorised parties and exposure to construction site dangers Risks of injuries that can result in litigation and legal claims Identifying security issues Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorised personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur. Having a dedicated security team in place is a good first step in bolstering a construction site’s security For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them. Construction site security checklist To guide you, here is a sample template that you can use to form your own construction site security checklist.  SECURITY COORDINATION  YES   NO  1. Does the site have designated security coordinators?     2. Are the security coordinators available for contact during non-business hours?     3.  Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies?     4. Does the construction site have a written security plan, including procedures for specific scenarios?     5. If so, are construction site employees aware of the security plan?       GENERAL MACHINERY  YES   NO  1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.)     2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.)     3. Does the project have a list of the names of operators handling the machinery?     4. Are all the machinery fitted with immobilisers and tracking devices when appropriate?     5. Are all the machinery stored in a secure area with a proper surveillance system?     6. Are the keys to the machinery stored in a separate, secure area?      TOOLS AND OTHER EQUIPMENT  YES   NO  1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.)     2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.)     3. Are tools and equipment fitted with tags and tracking devices when appropriate?     4. Are tools and equipment stored in a secure place?      INVENTORY CONTROL  YES   NO  1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen?     2. Are there procedures in place for checking materials that go in and out of the construction site?     3. Is there a set schedule for checking materials and equipment?     4. If so, do the records show that the schedule is followed strictly?     5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc)      CONSTRUCTION SITE PERIMETER  YES   NO  1. Is there a physical barrier in place to secure the site?     2. Is the number of gates kept to a minimum?     3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site?     4. Are security warnings displayed prominently at all entry points?     5. Are entry points adequately secured? (With  industry-grade padlocks, steel chains, etc.)     6. Is there an alarm system?     7. Is the locking system integrated with the alarm?     8. Is the site perimeter regularly inspected?     9. Are “NO TRESPASSING” signs displayed prominently along the perimeter?      LIGHTING AND SURVEILLANCE  YES   NO  1. Is there sufficient lighting on the construction site?     2. Is there a dedicated staff member assigned to check if the lighting is working properly?     3. Is the site protected by CCTV cameras?     4. Are there signs posted on site indicating the presence of security cameras?     5. Are there motion detection lights installed on-site?      INTERNAL CONTROLS  YES   NO  1. Is there a policy on employee theft?     2. Are employees aware of the policy?     3. Are employees required to check in and check out company properties when using them?     4. Are staff members encouraged to report suspicious activity?     5. Is there a hotline employees can call to report security lapses and breaches?      SITE VISITORS  YES   NO  1. Are visitors checking in and out?     2. Are vehicles entering and exiting the site recorded?      CYBERSECURITY  YES   NO  1. Are the construction site’s documents and other sensitive data stored in the cloud securely?     2. Does the company have a strong password policy?     3. Are asset-tracking data accessible online?     4. Are confidential documents and data regularly backed up?     5. Are employees well-informed about current cyberattack methods such as phishing?     Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties.  Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.

How to build an insider threat programme
How to build an insider threat programme

Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organisation Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organisation. They can cause brand and financial damage, along with physical and mental damage. Insider threat programme Once you determine you need an insider threat programme, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a programme Next, get a top to bottom risk assessment to learn your organisation’s risks. A risk assessment will help you prioritise your risks and provide recommendations about what you need to include in your programme. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat programme will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a programme and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of programme needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the programme. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the programme, build the culture and promote awareness. Teach employees about the behaviours you are looking for and how to report them. Behavioural analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organisation need to detect insider threats? Organisations need software solutions that monitor, aggregate and analyse data to identify potential threats. Behavioural analysis software looks at patterns of behaviour and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behaviour of people and notifies security staff when behaviour changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviours and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behaviour, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behaviour. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organisation has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat programme. Big companies should invest in trained counterintelligence investigators to operate the programme. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behaviour Using the right technology along with thorough processes will result in a successful programme You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behaviour and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat programme. IT is the most privileged department in an organisation. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat programme takes time and patience. Using the right technology along with thorough processes will result in a successful programme. It’s okay to start small and build.

Latest Brivo Inc. news

Brivo enhances its smart building capabilities with the acquisition of Parakeet Technologies
Brivo enhances its smart building capabilities with the acquisition of Parakeet Technologies

Brivo, the global provider of cloud-based physical security, has acquired Parakeet Technologies, a provider of smart building solutions which include sensors, thermostats, wireless locks, and lighting controls. The acquisition accelerates Brivo’s ongoing push to enhance its in-building capabilities beyond its current access control, video, and security. The companies had already been working together as partners, and now plan a deeper integration between their products, including a common user interface, unified billing, and bundled services. Highly reliable remote management “We saw Parakeet’s IoT platform as an ideal way to quickly bring Smart Office capabilities to our channel partners and end users,” said Steve Van Till, President & CEO of Brivo. “Parakeet has a great track record of providing highly reliable remote management to widely dispersed properties, and they share our core values around customer service, cyber security, and innovation.” The Parakeet product leverages cloud services, mobile apps, and an on-premise IoT gateway. The gateway provides connectivity to Z-wave sensors, locks, thermostats, lighting and other devices. Internet connectivity to the gateway is supported via WiFi, Ethernet or an integrated cellular modem with a built-in service plan. Manage smart building infrastructure We uncovered a need for a remotely managed IoT service that would boost productivity and save money" Parakeet’s responsively designed web app enables property managers and security personnel to manage smart building infrastructure from one central dashboard, while collecting data to track, monitor and manage staff. Parakeet launched its product in 2015 in the Vacation Rental market. According to Brad Huber, Founder and CEO of Parakeet, “Among property managers who cover large geographic territories for dozens or hundreds of clients, we uncovered a need for a remotely managed IoT service that would boost productivity and save money.” Professional installation and ongoing service Commenting on the installation challenges across large regions, he added that “being able to provide our products through Brivo’s international base of security dealers will give our customers the convenience of professional installation and ongoing service.” The Parakeet platform will continue to be offered as a stand-alone solution for the Vacation Rental Market under the new name, Brivo Vacation Rental, and will be unified with Brivo’s billing system. All current Parakeet customers will continue to be supported on the existing product, with options to add Brivo offerings to their current service plans.

Security Industry Association awarding scholarships to young professionals towards continuing education and professional development
Security Industry Association awarding scholarships to young professionals towards continuing education and professional development

The Security Industry Association (SIA) has selected five recipients for the 2020 SIA RISE Scholarship, a program offered through SIA’s RISE community of young security professionals that supports the education and career development goals of young industry talent. Through this scholarship program – open to SIA student members and RISE members who are employees at SIA member companies – each awardee will receive a $3,000 scholarship to use toward continuing education and professional development courses, SIA program offerings and/or other academic or education programs. SIA RISE community and scholarship Scholarship funds can be used to expand knowledge in the areas of business, human resources, information technology, marketing/sales, project management, security engineering and/or risk management. SIA is proud to help foster the careers of young talent in the industry through SIA RISE community and scholarship" “SIA is proud to help foster the careers of young talent in the security industry through the SIA RISE community and scholarship,” said Don Erickson, CEO of SIA. “This year’s scholarship honorees are an impressive group of dedicated, accomplished young professionals that represent the next generation of security leaders, and I look forward to supporting their professional growth and celebrating their many successes ahead.” Robust security program The winners for the 2020 SIA RISE Scholarship are: Dr. Hanna Farah, Chief Technology Officer (CTO), Feenics In his role as CTO at Feenics, Hanna Farah is responsible for creating a security and access control platform and developing quality and security processes. Prior to his time at Feenics, Farah has held positions at Deloitte, Graphite Software, the University of Ottawa, Electronic Health Information Laboratory and IBM. He holds a Ph.D., a master’s degree and a bachelor’s degree in software engineering from the University of Ottawa. Farah plans to use the SIA RISE Scholarship to develop further knowledge to build a robust security program at Feenics that ensures the company’s practice and products adhere to high security standards, including acquiring expertise and certifications such as the Certified Cloud Security Professional credential. Integrated security system Kyle Gansemer, Systems Designer, VTI Security At VTI Security, Kyle Gansemer is responsible for integrated security system design and review of system functionality to determine proper operation of access control, IP video and other security systems and controls. Prior to his time at VTI Security, he served as a design/manufacturing engineer at Optical Mechanics Incorporated. Gansemer holds a bachelor’s degree in aerospace engineering from Iowa State University and CompTIA’s Security+ and Network+ credentials. He plans to use the scholarship funds to expand his cyber security expertise through completing courses related to cloud services, ethical hacking/defenses and systems analysis. Data integration Suzanne Holmberg, Data & Analytics Manager – EMEIA & APAC, Allegion Suzanne is responsible for creating teams in Europe and Asia to deliver on data integration and data science projectsIn her role at Allegion, Suzanne Holmberg is responsible for creating new teams in Europe and Asia to deliver on data integration, analysis and data science projects. Prior to her current role, Holmberg served as global analytics manager, analytics leader and sales business analyst at Allegion and held sales operations and marketing positions at Belden, Inc. She holds a bachelor’s degree in business administration from the University of South Carolina and is currently enrolled in the Global Executive MBA program at Duke University’s Fuqua School of Business. Holmberg will use the scholarship funds toward completion of the MBA program, which brings working professionals from around the globe together and grows individuals beyond their comfort zones through international residencies that emphasise how culture and institutions shape business in Asia, Latin America, Europe and North America. Research and development Nelson Jenkins, Mechanical Engineer, Allegion Nelson Jenkins is a design engineer with diverse experience across project lifecycle, including research and development, manufacturing and product leadership. At Allegion, he has started a grassroots organisation to help promote a culture of innovation at the company. Prior to his role as product designer at Allegion, Jenkins served as design strategist consultant at Zeren Fitness and as a researcher with Carnegie Mellon University’s CSSI program; he holds a bachelor’s degree in mechanical engineering from the University of Michigan and a Bachelor of Science in applied physics from Morehouse College. He will use the scholarship funds to complete a course on disruptive theory offered through Harvard Business School. Executing marketing techniques Jessica Sargo, Channel Marketing Manager, Brivo SIA’s RISE community fosters the careers of young professionals in the security industry through fun, in-person networking events In her role at Brivo, Jessica Sargo leads efforts for a cross-departmental partner training program, supports partner recruitment and retention campaigns, develops web and mobile applications for partner conferences, creates communications plans and manages logistics for trade shows and partner events. Prior to her time at Brivo, she held marketing positions with TwentyEighty Strategy Execution and Teaching Strategies, LLC; she holds a bachelor’s degree in public relations from the University of Florida. Sargo plans to use the scholarship funds to complete a digital marketing education course and further her knowledge of executing marketing techniques through social media, mobile applications, search engines and other digital channels. Business skills development In addition to awarding the RISE Scholarship, SIA’s RISE community fosters the careers of young professionals in the security industry through fun, in-person networking events held during top trade shows and in major cities across the country; thought leadership opportunities; career growth webinars on topics of interest; career tracks at ISC West and East each year; and the AcceleRISE conference for tomorrow’s security leaders, featuring top-quality idea sharing, coaching, business skills development, networking and inspiration. SIA RISE is open to all young security professionals employed at SIA member companies who are under 40 and/or have been in the security for less than two years.

Dispatches from Security Essen 2018: New layout, artificial intelligence and GDPR
Dispatches from Security Essen 2018: New layout, artificial intelligence and GDPR

Security Essen 2018, held in Messe Essen, Germany, promised attendees a newly modernised trade show with a simplified layout and more interactive experience. Compared to previous years, halls were reorganised by technology area, with aisles laid out to make more direct pathways for attendees. The fair welcomed 950 exhibitors and more than 36,000 trade visitors from the global security market. Several manufacturers mentioned that footfall had been lighter than expected, but that the show had delivered on its promise to welcome more international visitors, in particular from the Middle East region. Exhibitors also grumbled about higher costs for booth space. Key security industry exhibitors Exhibitors expressed concern that the absence of key players reduced overall foot traffic Exhibitors praised the bigger aisles, which made it easier for visitors to navigate the show. However, some were unsure whether this was due to a better layout or simply because the show was missing key exhibitors. Notably absent were access control provider Dormakaba, security solutions company Honeywell, and surveillance providers Geutebruck and Dallmeier. Exhibitors expressed concern that the absence of key players reduced overall foot traffic. Security Essen hosted a particularly strong access control presence. Halls 2 and 3 were home to companies from across the access control and mechatronics spectrum. Sponsorship by EVVA covered the west entrance. The locking systems manufacturer, which celebrates its 100th anniversary next year, boasted significant floorspace. Exhibitors were pleased with the large access and locking presence, commenting that London-based IFSEC International tends to be dominated by video surveillance providers. EVVA, which celebrates its 100th anniversary next year, boasted significant floorspace Deep learning and artificial intelligence The push toward artificial intelligence (AI) in physical security continues, although the tone at Security Essen seemed to be shifting beyond hype and more toward how the technology can actually add value. For example, Hikvision’s cameras boasted more intelligence and processing power, and the company emphasised faster-paced product cycles. Customers ultimately do not buy AI – they buy benefits and solutions VIVOTEK embraced artificial intelligence as the biggest trend in the industry. The company demonstrated its latest deep learning technology for crowd detection applications. For Dahua, artificial intelligence allows users to easily search metadata in a video, including age and behaviour. Dahua demonstrated its solution for the transportation market, which is able to learn if a bus or train driver is falling asleep at the controls. However, some manufacturers chose not to focus on artificial intelligence. Representatives from Brivo and Eagle Eye Networks highlighted that customers ultimately do not buy AI – they buy benefits and solutions. Historically, video analytics were oversold and underdelivered, and the same could happen to AI if the term is overused in marketing security solutions. VIVOTEK embraced artificial intelligence as the biggest trend in the industry The German market & GDPR While the fair welcomed an increase in international visitors, many stands offered a distinctly German flavour. Exhibitors catered to German customers’ preference for data protection and high levels of privacy. Visitors were welcomed to the show by banners from Genetec, emblazoned with the slogan “Privacy matters… So, remember to forget me.” The video security provider’s stand demonstrated this concept more tangibly, via its Privacy Protector Module.  The surveillance software, which is certified with the European Privacy Seal (EuroPriSe), monitors events while automatically pixelating people and vehicles in real time. If an incident occurs, an authorised operator can securely access the unaltered video. Visitors were welcomed to the show by banners from Genetec Other companies also acknowledged issues of privacy and cybersecurity. Hikvision noted that Europe is more regulated, which limits the implementation of the company’s products compared to those used in China. Dahua emphasised that its data for the German market is stored in Frankfurt to meet demands for data protection. IDIS made a point of saying there are no backdoors to their products. The deep learning products are easy to use and 96% accurate, says the company. FLIR has developed a cybersecurity hardening document, and strives to be transparent about cyber issues, including a web landing page where customers can raise any concerns. Vanderbilt is also pushing the cloud as a way forward with its ACT365 cloud-based access and video solution. Users are not intimidated by the cloud anymore since we all use it in our personal lives, says the company. Also on the access control side, EVVA were clear on the security of their AirKey mobile access system, which uses technology based on internet banking, double encryption and high-quality hardware. As well as demonstrating its SAROS thermal camera, FLIR strived for cybersecurity concerns to be addressed by customers Taking a broader view Nedap views security as being about allowing people to focus on their daily lives and work, safe in the knowledge that security is being taken care of. At the show, Nedap launched its new slogan ‘Security for Life’, stating that “true security is when you don’t have to think about it”. Nedap’s global client program represents a long-term commitment to projects. They are having more discussions with clients about risk management through standardisation and centralised policy.Solutions – as opposed to products – were also a focus at Security Essen, as at IFSEC before it Clients remain with Nedap because they keep investing in the platform, constantly updating the code and simplifying it to improve scalability for organisations, says the company. Nedap had one of the few double-decker booths at Security Essen. Solutions – as opposed to products – were also a focus at Security Essen, as at IFSEC before it. HID Global touted their extensive use of partnerships to provide solutions. SeeTec highlighted their move away from products to a more solution-based approach. FLIR, perhaps best known as a thermal camera company, were pushing their solutions approach to markets including intelligent traffic, smart city, video management and PSIMs.  Nedap had one of the few double-decker booths at Security Essen Vertical markets in focus As vertical markets go, retail was big, and several players were offering some type of retail solution. Retail – along with banking, finance and transportation – was among Hikvision’s vertical markets of choice. Dahua's new panoramic cameras stitch together the image inside the camera instead of on the server SeeTec’s retail solution combines EAS with business intelligence and heat mapping. Dahua’s retail offerings include people counting and emotion detection, which can correlate with weather data, for example. Genetec also showcased a range of retail solutions. Technology improvements announced at Security Essen include FLIR's more robust FB6 series thermal line, Promise Technology's SMARTBOOST technology improved playback performance, and Videotec's cameras with better night performance. The extended 50m range of Optex's intrusion detection laser sensor reduces the need for cameras. Dahua's new panoramic cameras stitch together the image inside the camera instead of on the server. The Hanwha Techwin booth featured Korean flags and a “Korean at heart” motto to set the company apart Signs of the U.S. congressional ban There were signs at Security Essen of an impact of the recent U.S. ban on use of Hikvision and Dahua equipment in government installations, although both big Chinese manufacturers maintained a high profile at the German show. For example, the Hanwha Techwin booth featured Korean flags and a “Korean at heart” motto to set the company apart. Chinese camera manufacturer Uniview were keen to stress that they are not owned by Chinese government (neither is Dahua). Uniview’s all-IP camera line offers high resolution, low-light, multisensor and fisheye options, and AI software provides facial recognition, object detection, and fire and smoke detection at the edge. The company aims to increase its global presence with more international branch offerings and international factories.

Related white papers

3 reasons to migrate to a new access control system

5 steps to finding the right access control system for you

Why outdated access control systems are a big problem