What change would you like to see in security in 2022?
23 Dec 2021
Here’s a news flash: 2022 will be a pivotal year for the security industry. As we enter the new year, continuing change is a safe prediction for any fast-moving, technology-driven marketplace. Recent history confirms the ability of the security industry to shift and adapt to changing conditions and to provide an ever-expanding menu of technology solutions to make the world a safer place. Given that the new year will bring change, what will that change encompass? More to the point, what should it encompass? We asked this week’s Expert Panel Roundtable: What is the biggest change you would like to see within the security industry in 2022?
I would like to see more transparency and partnership between customers and providers. The purpose of business is to solve problems for customers. Doing this well requires mutual trust. Service providers must be honest with customers about which problems they truly can solve, and where they may not be a good fit. Conversely, customers must be willing to share their needs without being overly focused on the lowest price or fear of somehow being duped into buying something. If there’s no fit, both must be professional and walk away without ill will. A good fit can lead to a long-term, highly valuable partnership. The value of partnership is lost when organisations resort to ‘professional buyers’ or ‘sales closers,’ who are driven solely by cost. Then business becomes – or remains – merely a transaction at the expense of innovation. While transparency has improved over the years, we can still do better.
I’d like to see the industry embrace customer needs beyond perimeter security and into how access control devices including wireless locks and readers can be used to gain a better understanding of the way your space is being used. The security industry can solve new problems and offer unique solutions to hoteling and other flexible workspace needs. The customer’s needs are as much about efficient utilisation of spaces via access control as they are about security. All parties win when we collaborate and rise to the occasion and solve new challenges faced by our customers.
I would like to see faster adoption of new technologies, especially cloud-based technologies. The security industry has traditionally been slow to change. Change has lagged because of the cost of updating equipment, the risk a solution won’t meet your needs, the concern that the cost to implement a solution is more than the benefit it will provide, among other reasons. The number of new technologies is greater than ever, and the benefits they provide are significant. Leading the enablement of new technologies is the functionality of cloud-based solutions. Specifically, cloud-managed access control and cloud-hosted video management are two solutions that provide significant functionality, ease of use, and deliver reduced total cost of ownership.
The biggest change I’d like to see in the security industry next year is the wider adoption of video analytics in security systems and – on top of this – more diversity in the use cases for analytics to deliver added value for customers beyond security. Analytics has a major role in increasing the direct value of security systems by augmenting the role of security staff and making it easier to identify criminal activity, alert quicker, and more easily provide evidence to law enforcement and insurers. However, these systems also have a huge amount of unlocked potential to help customers increase the efficiency of their operations and generate value beyond security. For example, video analytics could inform footfall trends, customer satisfaction, and compliance policies. In 2021 I’d like to see security providers be more imaginative in how they can be a true partner to their customers and help to derive more ROI.
The security industry must adopt audio as an essential element to incorporate into security systems in 2022. Common pitfalls of current security installments, such as false alarms or delayed response times, can be answered with audio monitoring. As industry professionals, it is our job to provide expert level guidance and knowledge to those looking to deploy security measures. By not taking audio into account, the industry is not meeting that expectation. As sight and sound go hand in hand, we must change the conversation, specifications, and standards for modern surveillance systems to deploy both audio and video surveillance. At the end of the day, our collective goal is to keep people and property safe. Expanding our old ideas of a traditional surveillance system must continue to evolve. The time for audio to take its rightful place — not just as an add-on, but as an essential element of surveillance — is now.
We have seen a dramatic increase in safety and security needs in the marketplace, which is forcing security professionals to seek more versatile and well-rounded security solutions. The security solutions being sought include advanced audio solutions, as audio is increasingly recognised as a necessary technology to mitigate security risks. Humans instinctively respond to real-time voice, which makes audio instrumental in any security environment. Access control allows a team to safeguard a facility and allow entry, but it doesn’t provide real-time information. Video surveillance allows security teams to see and detect, but used alone, it has its limits with providing a complete view of a situation, as well. Audio brings those two elements together – it adds interactivity, and it allows people to hear, be heard and be understood, in any situation. Therefore, in 2022 and beyond, we look forward to the security industry continuing to incorporate audio in security solutions.
Recognising diversity needs to be a top priority for the security industry. By fostering diversity in the workplace, the security industry can attract and retain outstanding talent and provide optimal service for their clients. At Allied Universal, our inclusive culture encourages, supports, and celebrates a diverse workplace. It fuels our innovation and connects us closer to our customers and the communities in which we serve. We also believe that Supplier Diversity is an important component of our business strategy. Through subcontracted security partnerships and centrally sourced products and services, we work to integrate Supplier Diversity processes into how our company purchases goods and services. The security industry needs to do a better job on shining a light on this vital sector to attract the next generation of talent. I advise young people to look at industries that are growing, even in tough times, such as the security industry.
Why can't we obtain more clarity on how Government/Federal funding dollars are being allocated for the security industry? Most of this funding seems to be tied into different programs and, sometimes, it is difficult to identify how much funding and where the funding is coming from for the security industry. There are some options our customers can utilise like taking the SIA's Grants Training Course or checking in with FEMA to learn more about their Nonprofit Security Grant Program. They can learn how to navigate and leverage federal grants for security projects including commercial and non-federal projects. It still leads to a lot of work, although it is quicker to do. It would be beneficial if there was a more streamlined solution in finding these dollars. Securing your facility and protecting employees and the public is a top priority. The path to making this happen should be less convoluted.
I think the provision of man guarding needs attention in 2022. Over the last decade it has become a race to the bottom in terms of costs, which means the quality of the people employed and the service provided is too often compromised. Security operators need to realise that if you go cheap, you can cause a lot of potential issues. The UK government’s Protect Duty strategy was formulated after the Manchester Arena bombing in May 2017 to ensure venues do the right assessment, and this is something you can’t do cheaply. Security team providers need to work with each other to improve these provisions, to empower teams and therefore the effectiveness of guarding companies. Naturally, security professionals should be paid what they are worth too! I wouldn’t be surprised if the government’s Protect Duty strategy becomes mandatory in a few years, which would be a positive step in improving this situation.
I’d like to see us continue to evolve as an industry, moving forward by embracing new ways of doing things rather than continuing forward with what we’ve always done. Customers are continuing to grapple with the ongoing constraints related to pandemic controls, emerging risks, labour shortages and supply chain issues, and as technology vendors we can help them address these challenges. There is significant interest in the ability to integrate any technology, regardless of type, manufacturer, or function to support an intelligent, data-driven security strategy. While video surveillance continues to be a priority for customers, we see a growing focus on critical event management with VMS and other security controls as components of a broader, more intelligence focused strategy. We are also seeing an increase in engagements where physical security and cyber security infrastructures are being integrated for greater awareness across the security function.
In 2022, I expect to see an accelerated rate of digitisation across nearly all industries, and I do expect this to happen as organisations address the changing work and business environment. Organisations are looking to find new ways to adapt to evolving market conditions and the technologies available today — from cloud and AI — can help support business, operational, and security initiatives. From a security market perspective, demand for video surveillance, intelligent IoT solutions, and cloud services will grow exponentially in the coming year. Cloud-based video surveillance is in demand because it is a highly valuable option across nearly every market segment. The initial fears around cloud have dissipated somewhat because it has proven to be a highly functional, flexible, and convenient method for businesses looking to protect and modernise their facilities.
Security, of course, is a wide-reaching subject, but from a building security – and specifically a hardware perspective – it’s vital that the industry aims to deliver only the best in security solutions. For too long, ambiguity has eclipsed the product selection process, and change is necessary. For example, I would like to see stakeholders (whether door specialists, hardware manufacturers or access control providers) working together at an earlier stage in projects, in a bid to provide enhanced, tailored solutions – helping set a precedent for building safety and security moving forward. It’s also crucial that we investigate how fire and security certification schemes could better work together, ensuring suppliers can navigate through the latest regulations successfully. In doing so, it will make it easier for suppliers to deliver better products at better value and with that, we’ll see product performance, and thus security, improve even further.
Artificial intelligence (AI) is becoming popular in the security industry, but the sector needs to accelerate this adoption and hone in on its goals and deliverables, through better education about AI. For the security industry to benefit significantly from AI (plus its offshoots, machine learning and deep learning) there must be a baseline level of AI literacy across the organisation. Decision-makers must know the possibilities and limitations of AI, where it’s headed, and its applications unique to their organisation. With this, security leaders will be more informed when introducing AI elements to their security strategy and investing in AI solutions. They won’t buy an AI tool because it’s trendy, but because it aligns with their goals and needs. This knowledge can come in several ways, like short courses or training in AI products. On-the-job experience, such as working on pilot projects or embedding in a data team, can also help.
Security is a constantly evolving. By the time you read this article, there will be a new risk to mitigate, a new threat to analyse, or a new business challenge to solve. The fast-moving nature of this industry demands that manufacturers constantly improve their products or solutions so that security leaders can invest into augmenting their team’s ability to protect and secure. Video surveillance, the backbone of any robust security technology plan, must evolve as it is relied on most to deliver the visual data organisations demand to support ongoing strategies. The technology vendors that will thrive in the coming year will be those that will help security leaders keep pace with the newest trends, all designed to enhance security and operations, and drive increased levels of intelligence.
The security industry must take the lead on strengthening privacy protection. Biometric solutions improve privacy, especially when combined with cloud-based ID management, but they must also protect all biometric templates and identity data. Baseline protection starts with the software provider’s end-user license agreement. It should state that biometric data is anonymised and only used for the application when the user selects the option for capturing their biometric template. It also should include prohibitions against sharing data, and all transactions, photographs, biometric data, and other personal information should be encrypted and stored in a separate section of the operator’s network. Adding end-to-end encryption reinforces the already strong privacy protection of using a biometric in multi-factor authentication. Mobile-based access solutions should also use document scanning technology to read and validate whether a government-issued ID is real or not. Implementing these and other measures will protect privacy while enabling faster and more seamless and secure access experiences.
Our Expert Panel Roundtable is brimming with thoughts about changes they would like to see in the security industry in 2022, from faster adoption of new technologies to better education about artificial intelligence (AI). We should all embrace new ways of doing things, and manufacturers should help customers grab onto the latest trends. The Expert Panelists mention specific technologies that should be more widely adopted, including video and audio. The industry should recognise diversity. Business interactions should be more transparent. We need better clarity about government funding sources. Hopefully, change in 2022 will encompass all these worthy ambitions – and more – as the security marketplace evolves to become better than ever.
- Related links
- TFT CCTV monitors
- ANPR Software CCTV software
- Biometric Access control software
- Control Software CCTV software
- Contact Access control software
- Broadcast Messenger Access control software
- Mifare Access control software
- Drawing Software CCTV software
- IP Surveillance Software CCTV software
- Central Monitoring Option Access control software
- Management Software CCTV software
- Monitoring Software CCTV software
- Surveillance Software CCTV software
- Door Monitoring Option Access control software
- Keypad Commands/Intrusion Zones Access control software
- License Access control software
- Management Systems Upgrade Access control software
- NetVue Interface to Nice Systems Access control software
- Remote software for telecode door entry phone system Access control software
- Server software for MSDE Access control software
- Version Upgrade Access control software
- Ava CCTV software
- Hanwha Techwin CCTV software
- HID Access control software
- Oncam CCTV software
- Progeny Access control software
- TDSi Access control software
- TDSi CCTV software
- Hanwha Techwin CCTV monitors
- Getting to know Dan Grimm, VP and General Manager of Computer Vision at RealNetworks
- Big wins and the importance of showing up: Insights from SourceSecurity.com editor Larry Anderson
- Setting goals, business travels and radioactivity: Success secrets from Tiandy's John van den Elzen
- Getting to know Jeff Burgess, President/CEO at BCDVideo
Mobile access articles
3xLogic's all-in-one offering removes the need for an on-premise server and simplifies the installation process. When using the VISIX V-Series Setup App (iOS/Android), installers can easily configure and set up cameras to get up and running quickly. Cameras can then be brought into VIGIL Client, View Lite II Mobile App (iOS/Android) to view live and recorded video. In addition, vital health information can be gathered in VIGIL Central Management (VCM). This also offers an interim step with these serverless cameras that put users into a ‘per camera’ world. This provides the flexibility to transition to cloud solutions later if required.
As companies continue to explore how to safely return office staff in a post-pandemic environment, Uponor North America (Uponor) is giving its office employees the flexibility to work their own way. The Apple Valley, Minnesota-based PEX pipe manufacturer is introducing Flexible First, an employee-centric model that empowers staff to choose the working pattern that works best for them. Flexible First offers three ways for office staff to work, called ‘personas’: Resident – Employees working in an Uponor office, at least four days a week. Hybrid – Employees who may come into the office, up to three days per week. Remote – Employees that work from locations that aren’t near an Uponor office. Flexible First The company built its Flexible First model, after more than 100 hours of employee-led focus groups The company built its Flexible First model, after more than 100 hours of employee-led focus groups, panel discussions, and the development of a culture team. Using this data, the company established a multi-phased plan for introducing the future of office work at the company. Jen Hauschildt, the Vice President of Human Resources, Uponor North America, said “As we plan for our post-pandemic world, it is essential to evolve with the changing times that are defining what the future of work looks like.” Offering employees more flexibility She adds, “For most people, going back to a traditional work environment doesn’t make sense. Employees want more flexibility. By working with our employees to define a new way of working that fits for them and for our business, we are showing our strong commitment to both the employee and customer experience.” Since the month of March of 2020, the majority of the company’s office-based employees has been working remotely and has demonstrated a high level of productivity. The company has determined that Flexible First will be its ‘new’ normal for work indefinitely. Redesigned office space Jen Hauschildt further stated, “No matter what our working environment looks like, Uponor employees embrace our core values of Connect, Build and Inspire. These values define and motivate how we work with each other, our customers, and our communities.” Uponor is planning to introduce a redesigned office space in late 2022 or early 2023 Flexible First goes into effect in early 2022. Uponor is planning to introduce a redesigned office space in late 2022 or early 2023 that will feature ‘neighbourhoods’ or shared spaces for functional teams to collaborate, while in the office. Workspace reservation through scheduling system Hybrid employees, including leaders, will reserve a hoteling workspace through a scheduling system, for the days they plan to work onsite, rather than having a dedicated workspace. The company has also developed an intranet site that provides resources, to help guide employees with this new way of working. Jen Hauschildt concludes, “Implementing a Flexible First work approach is the right thing for us to do to deliver a great employee experience, retain and recruit key talent, and keep Uponor moving forward into the future.”
Security is of the utmost importance in the healthcare setting so that patients and staff alike can focus their attention on improved clinical outcomes. Unfortunately, visitors are often a contributing factor to safety incidents and the burden on hospital staff has increased exponentially since the onset of the pandemic. Let’s review the current state of healthcare workplace safety and how an automated, cyber-physical approach can help eliminate the administrative hassle and strengthen safety protocols. Global pandemic adds undue strain The ongoing global pandemic has placed enormous strain on healthcare systems and people are only beginning to understand the impact in terms of both patient outcomes and healthcare worker wellbeing. A recent analysis by Press Ganey revealed an increase in patient safety events of all types during 2020. In late 2021, the Johns Hopkins Centre for Health Security released a new report sharing survey results from 1,189 healthcare workers in which 47 percent reported feelings of burnout. Workplace violence in healthcare Incidents of serious workplace violence are four times more common in healthcare than in private industry Even before the current stressors placed on healthcare systems by the pandemic, hospitals were a relatively dangerous place to work. While a high level of danger is expected from industries like construction or manufacturing, healthcare presents a more high-risk environment than both. According to the Occupational Safety and Health Administration, incidents of serious workplace violence are four times more common in healthcare than in private industry. And in 2019, U.S. hospitals recorded 221,400 work-related injuries and illnesses, which amounts to 5.5 work-related injuries and illnesses for every 100 full-time employees. Visitors play a role According to the Bureau of Labor Statistics, violence is among the top five causes of injury among hospital workers. Those acts of violence stem from a mix of patient and visitor aggressions. Among the most common acts committed against nurses, which are shouting and yelling, swearing, and grabbing, visitors account for 35.8, 24.9, and 1.1 percent of incidences according to the American Nursing Association. From 2013-18, roughly 33 percent of nurses reported verbal abuse by visitors and 3.5 percent reported physical abuse. The pandemic has only increased these types of incidences. A Missouri hospital, for example, recently installed panic buttons on their badges to summon hospital security as needed. Fully automated visitor identity management can help VIM software integrates with the Epic HL7 interface to retrieve patient and visitor data A cyber-physical approach to visitor management that incorporates automation can both strengthen vetting protocols and relieve the administrative burden on staff. The Visitor Identity Management (VIM) software, for example, automates the entire visitor identity lifecycle from pre-registration to check-in, on-site experience, and check-out. And compliance never comes into question, since VIM software integrates with the Epic HL7 interface to retrieve patient and visitor data. Here’s how it works: When a patient is admitted to the hospital, Epic generates an HL7 message that processes the event and creates a patient profile. VIM syncs this information, pulling patient information like the patient’s name, department, MRN unique identifier, and more The system pushes back HL7 messages for discharge and updates using the same interface Benefits of VIM Here’s where the practical benefits start to set in. The software creates a visitor profile associated with the appropriate patient. From there, visitors can check-in and out on their own through a self-service kiosk app. Or, staff can issue visitor stickers, technology badges, or advanced mobile credentials using lobby workstation software. VIM automatically vets visitors against internal and third-party watch lists before issuing an approved profile Beyond automation efficiencies, VIM also ensures the highest level of safety and security for everyone in the building. The software automatically vets visitors against internal and third-party watch lists before issuing an approved profile. Additionally, VIM software integrates with physical access control systems so that a visitor’s physical access would remain limited to only approved areas of the hospital. By leveraging both systems, healthcare facilities with heightened security needs, such as children’s hospitals, can create a much more controlled environment for patients and staff. Manage new vaccination and testing data Another major challenge facing the healthcare system complies with the emergency temporary standard issued by OSHA, which requires adequate personal protective equipment, timely exposure reporting, and more. In a survey of over 5,000 registered nurses conducted by National Nurses United (NNU), just 23 percent said their employer reported COVID-19 exposures promptly. Using VIM software, healthcare providers can automate workflows related to COVID-19 health and safety compliance, as well as vaccination checks, to expedite the management and flow of critical health data. And with a secure record of all visitor comings and goings, healthcare systems have one more reliable, auditable data point to conduct contact tracing. Cyber-physical approach An automated, cyber-physical approach to managing the visitor experience increases the number of checks and balances available to secure an already stressful working environment. In short, visitors get a better experience and staff have more time to focus on higher-value work. Meanwhile, automated workflows for vaccination and physical access can help expedite compliance with new requirements and contact tracing in the event of an exposure. Due to the integration with Epic software, an organisation can reap these benefits using the systems they already have in place
The global pandemic fuelled the need to use technology to overcome challenges and support safety. An expansive global study has revealed that 88% of citizens globally now want to see public safety transformed through the use of advanced technology. Additionally, 71% consider technologies such as video cameras, data analytics, and cloud solutions as necessary to address the challenges of the modern world. At Intersec 2022 (Jan 16-18, Dubai), Motorola Solutions will showcase its integrated technology ecosystem that unifies voice, data, video security, and access control solutions. Highlights will include video cameras and analytics software, advanced mission-critical broadband push-to-talk services, and digital radio solutions. Accelerating business productivity Motorola Solutions will share the following innovations at Intersec 2022: M500 in-car video system: On display for the first time in the Middle East, the new M500 in-car video system is enabled by artificial intelligence (AI). It features new backseat passenger analytics that automatically starts the in-car camera recording as soon as an individual enters the back seat of a police car. This is a major step forward in automating an everyday policing challenge to ensure that the presence of an individual in a police vehicle is securely recorded and the video evidence is automatically tagged and saved to the incident record. This software solution connects individuals and groups over a carrier's network Mission-critical broadband push-to-talk (PTT) solution: This software solution connects individuals and groups over a carrier's network to improve operational efficiency, accelerate business productivity and enhance customer service. It offers a broad set of multimedia services, such as push-to-video, push-to-text, geo-location and geo-fencing, device sharing, and operational status messages. The solution can be easily scaled to support new staff or third-party partners, enabling rapid response to developing situations or changing needs. Additional vehicle information L5M mobile Automatic Number Plate Recognition (ANPR) camera system: The high-performance ANPR solution is designed to accurately capture number plates and additional vehicle information, such as the car model, even when moving at high speed. The software also identifies vehicles of interest by providing officers with real-time alerts and quick searches to boost insight and awareness. H5A rugged PTZ (Pan-Tilt-Zoom) camera: This camera combines high-resolution imaging, 360-degree views, and up to 36x zoom with an extremely robust design to perform reliably in the harshest environments. Its wide dynamic range captures critical details in very bright and dark areas and its optional infrared and white light illuminators can also provide ideal brightness in low-light scenes. Simplified device management The VB400 is designed to improve responder safety and increase transparency between police and citizens MXP600 compact TETRA radio: The MXP600 radio is small, lightweight, and extremely rugged. It features intelligent microphone technology for high-performing noise cancellation and simplified device management via over-the-air programming (OTAP). VB400 body-worn camera and VideoManager Software: The VB400 is designed to improve responder safety and increase transparency between police and citizens. It offers long battery life of up to twelve hours and a pre-recording function, allowing events to be documented up to two minutes before manual recording starts. This enables police officers to record unexpected situations without missing the start of an incident. Remote management capabilities Cloud-based access control software solution: Openpath’s cloud-based access control platform is a scalable and reliable solution that offers touchless access, remote management capabilities, and a suite of safety and wellness features designed to improve safety and security while reducing friction for end-users. Openpath’s triple-patented ‘Wave to Unlock’ technology offers touchless access for doors, elevators, or turnstiles. Openpath also offers occupancy management capabilities to comply with social distancing, health-check, and fever detection enforcement. The Video Reader Pro can easily integrate with many third-party video management systems Openpath Video Reader Pro: Combining the heightened security of a built-in, high-resolution camera with the form factor of a mullion door reader, the Video Reader Pro automatically associates video footage with access events, alerts, and motion and visually monitors entries in the Openpath Control Center. Designed with open video standards, the Video Reader Pro can easily integrate with many third-party video management systems. Access control solutions Compass Decision Management System: This intuitive operational interface supports the decision-making process for control room security operators, as well as provides a structured response to incidents with custom standard operating procedures. "The public's expectation for and acceptance of the use of technology to ensure their safety and security has never been greater," said Patrick Fitting, regional Vice President of Middle East and Africa at Motorola Solutions. "Customers are accelerating technology deployments, particularly when it comes to the adoption of easy-to-use PTT services offering greater interoperability between systems, cloud-based software, video security, and access control solutions. Motorola Solutions is connecting these technologies into truly integrated workflows to unlock new levels of collaboration between workgroups and provide access to information in real-time to help make the world safer.”
The globally renowned Software as a Service (SaaS) company, Safeture AB, based in Lund, Sweden, has won, together with its partner, Falck Global Assistance, a public procurement for a four-year framework agreement, regarding travel risk management for the European Central Bank (ECB), located in Frankfurt, Germany. Four-year framework agreement The four-year framework agreement also opens up the opportunity to join other institutions, such as the Central Banks of the Eurosystem and other members of the Eurosystem Procurement Coordination Office (EPCO). The total contract value depends on how many employees will use the service The total contract value depends on how many employees will use the service and which of the other national central banks and institutions join. With this partnership agreement, the European Central Bank has access to Safeture’s unique platform for managing employee safety, no matter where they are. Business model based on collaboration with partners Magnus Hultman, the Chief Executive Officer (CEO) of Safeture, said “The fact that we have won a prestigious assignment in fierce competition testifies to the strength of our offer. It also shows that our business model, which is based on collaboration with leading partners, such as Falck Global Assistance, works well.” Magnus Hultman adds, “The framework agreement contributes to strengthening our position in the important German market and holds great potential with other central banks as potential customers.”
Johnson Controls, the globally renowned company in smart, healthy and sustainable building solutions, has launched Tyco Software House iSTAR Ultra G2, a next generation door controller, which is designed for cyber resiliency, providing customers with faster processing power, advanced enterprise functionality and the building blocks needed for future expansion. iSTAR Ultra G2 door controller Ideal for mid-size to large scale deployments in higher education, healthcare, government, data center, industrial and manufacturing facilities, the iSTAR Ultra G2 is a highly flexible door controller, supporting both wired and wireless locksets, with expanded memory capacity, to ensure the device grows with customer needs. It can manage up to one million credentials, for up to 32 doors. Advanced enterprise features such as dual GigE network ports using TLS 1.3 network authentication and cluster-based anti-passback provide the power to handle the most demanding access control applications. Advanced hardware-based cyber security protection Its advanced hardware-based cyber security protection using Trusted Execution Environment (TEE) means that the iSTAR Ultra G2 assures confidentiality of code and data, to help combat the most sophisticated hackers. The TEE guards against cyber-attacks, while the OSDP Secure Channel communication standard provides encrypted two-way communication between devices, including readers and controllers. The addition of the iSTAR Ultra G2 expands our portfolio of door controllers" “The addition of the iSTAR Ultra G2 expands our portfolio of door controllers, to include one of the most expandable solutions, available in the market,” said Rick Focke, the Director of Product Management, Enterprise Access Control, Security Products at Johnson Controls. Rick Focke adds, “This device is an important solution for customers who need a highly scalable and cyber-resilient solution that serves as the heart of the access control system, connecting readers, sensors, software and locking devices.” Onboard Public Key Infrastructure authentication services Onboard Public Key Infrastructure (PKI) authentication services mean that the iSTAR Ultra G2 door controller is a self-contained, high-assurance solution and does not require third-party devices for authentication, thereby saving money and installation time. Global and peer-to-peer anti-passback technology prevent consecutive entries from single access control cards, to keep multiple people from using the same credential. iSTAR Ultra door controller has been built using the Johnson Controls’ ISASecure certified development process, in accordance with the ISA/IEC 62443 control systems security standard and includes a back-up communication path, in the event of a primary network failure, so as to eliminate system downtime. Additionally, iSTAR Ultra G2 uses the same form factor as other iSTAR door controllers, so it fits easily into existing control panel boxes.
SureCloud, a globally renowned provider of Governance, Risk, and Compliance (GRC) solutions and cyber security services, has announced the launch of its Internal Audit Management solution. Combined with its tools for managing enterprise risk, IT risk and compliance, SureCloud now offers customers the ability to implement the full ‘three lines of defence’ as recommended in the Institute of Internal Auditors’ model for effective and efficient governance, risk management and control. This widely used model is designed to coordinate risk and control management across the organisation, by mapping out responsibilities for day-to-day management (the ‘first line’), monitoring and oversight (the ‘second line’), and independent assurance (internal audit; the ‘third line’). Internal Audit Management cloud-based solution Internal Audit Management is a cloud-based solution designed to help organisations manage the audit process Internal Audit Management is a cloud-based solution designed to help organisations efficiently manage the entire audit process, from planning, risk assessments, and fieldwork to findings, issue management, and reporting. With Internal Audit Management, organisations gain total oversight and visibility. Utilising pre-built work papers, workflow, and notifications, Internal Audit Management streamlines and accelerates audit engagements, removing the need for manual and repetitive tasks. Real-time reporting, with built-in business logic, helps organisations identify which areas are at risk so they can act quickly to mitigate them. Effective management of audit workload “We worked with our clients to understand their needs and designed a solution that will help any organisation become more effective at managing its audit workload. Organisations face an audit burden that is increasingly difficult to implement, execute and evidence, to ensure they meet their regulatory requirements,” said Alex Brown, the Vice President (VP) of Product at SureCloud. Alex Brown adds, “Too many still manage their processes inefficiently, using documents, spreadsheets, and email chains. Now, more than ever, it’s vital that organisations take an agile and streamlined approach to internal audit management that is fully scalable and flexible, enables accurate and comprehensive reporting and ultimately, will support the business now and into the future.”
Getac announced the launch of its ZX10 fully rugged tablet, a versatile new 10-inch device built around the Android 11 operating system (OS). The ZX10 will sit alongside Getac’s popular ZX70 fully rugged 7-inch Android tablet, giving customers in industries such as public safety, utilities, energy, transport & logistics, manufacturing, automotive, and defence more options when choosing rugged Android devices that best suit their operational needs. Powerful operational efficiency The ZX10’s combination of Android 11 OS, Qualcomm Snapdragon 660 Mobile Platform, and Adreno™ 512 GPU delivers a seamless user experience, enabling efficient workflow in a wide range of field scenarios. LumiBond® sunlight-readable display with rain and glove touch capability helps maintain productivity Dual hot-swappable batteries ensure full-shift operation, while the LumiBond® sunlight-readable display (boasting 800nits of brightness) with rain and glove touch capability helps maintain productivity in a range of weather conditions. The ZX10 also has options of up to 6GB LPDDR4 RAM and 128GB storage to help customers prepare for future industry demands. Excellent field communications An 8MP front camera and best-in-class 16MP rear camera deliver exceptionally high-quality photo/video capture, while dual integrated microphones filter out loud background noise for enhanced audio quality. Elsewhere, Wi-Fi 802.11 ac, Bluetooth (v5.0), dedicated GPS and an optional 4G LTE module offers rapid data transfer and location positioning capabilities in remote field locations. Dual LTE SIM card slots allow field workers to quickly switch between two 4G network carriers. The support to CBRS private network further increases operational flexibility. Rugged reliability ZX10 is still only 17.9mm thick and weighs just over 1kg, offering excellent portability and mobility Like all Getac devices, the ZX10 is built rugged from the ground up to provide exceptional reliability and peace of mind. MIL-STD-810H and IP66 certification mean it can easily withstand drops of up to six feet, shocks, rain, vibration, dust, and liquid spillages. Furthermore, an operating temperature range of -29°C to 63°C (-20°F~145°F) delivers year-round usability. With all these built-in rugged features, the ZX10 is still only 17.9mm thick and weighs just over 1kg, offering excellent portability and mobility in the field. Ideally suited to key industry applications The ZX10 is designed to meet the needs of public safety, utilities, energy, transport & logistics, manufacturing, automotive, and defence professionals who utilise Android-based devices. As part of Getac Select®, it is available in a range of industry-specific builds that combine different features, accessories, and software utilities to help customers quickly solve everyday challenges. Below are some example use cases: 1) Data capture and ePCR access for emergency first responders Optional barcode/RFID and smart card readers help verify IDs and ensure patient confidentiality Emergency first responders require real-time access to electronic patient health records (ePCRs) to deliver the appropriate care and medication, often in high-pressure environments. The ZX10’s powerful connectivity options allow them to quickly access this information, while optional barcode/RFID and smart card readers help verify IDs, check operational procedures, and ensure patient confidentiality. 2) Rugged, full-shift reliability for field utility engineers When conducting outdoor activities like GIS mapping, utility engineers need devices they can rely on in a variety of weather conditions. Furthermore, a lack of access to charging facilities while working in remote locations means long battery life is vitally important. The ZX10’s fully rugged design, dedicated GPS, versatile LumiBond® display with rain and glove touch capability, and dual hot-swappable battery design gives field engineers the peace of mind they need, wherever their duties are taking them. 3) Remote communications and asset maintenance Energy workers must regularly inspect and maintain assets in the field, but often require remote support from experts to do so effectively. The ZX10’s mobile connectivity, best-in-class 8MP front camera, and 16MP rear camera, and dedicated GPS lets workers interact with colleagues around the world in real-time, quickly share/exchange information, and complete tasks at the first time of asking. Dual LTE SIM card slots also let them quickly switch between two different carrier networks without having to swap SIM cards and staying connected conveniently. 4) Optimising efficiency for warehouse employees ZX10 can seamlessly transition between multiple environments without fear of damage or disruption Warehouse employees and forklift drivers need to collect and move goods between multiple different environments, ranging from internal cold storage and climate-controlled areas to external yards that are exposed to the weather and elements. The ZX10’s compact yet rugged design and wide operating temperature range means it can seamlessly transition between these environments without fear of damage or disruption. Additionally, the optional barcode/RFID reader and range of programmable buttons make it quick and easy to identify/process items in a matter of seconds. Versatile Android solutions “As Android continues to gain popularity, a growing number of organisations are looking for rugged Android solutions that enable them to enjoy the versatility it has to offer, even when working in harsh and/or challenging environments,” says Rick Hwang, President of Getac Technology Corporation. “The ZX10 does exactly that, expanding our line-up of Android-based solutions and helping customers optimise their operational efficiency, while also hitting the all-important total cost of ownership targets.” The ZX10 is available in March 2022.
In its latest tech round-up video, IDIS highlights its complete lineup of NDAA-compliant cameras and recorders. Featuring HD and UHD network cameras, plus powerful NVR and enterprise-class PC servers that connect seamlessly to a choice of VMS, IDIS’s end-to-end, NDAA-compliant solutions are being chosen for a growing list of projects in sectors ranging from education, retail, hotels, data centres, and commercial office space. Dome, bullet, and IR cameras The updated IDIS camera line-up, designed for a wide range of settings and environments, includes a range of 2MP, 5MP, and 8MP domes, bullets, and turret cameras, plus the company’s best-selling and award-winning 5MP and 12MP IR Super Fisheyes. The new NDAA-compliant models come with IR, True WDR, IDIS Smart Failover, alarm in/out, and two-way audio and vandal resistance options. Network video recorders Multi-site users can choose PC servers that come pre-installed with IDIS Solution Suite VMS New NDAA-compliant recording is enabled with 16- to 32-channel network recorders (NVRs), featuring built-in PoE switches, incoming throughput of up to 370Mbps, and allow 960ips UHD real-time recording. Large and multi-site users can choose PC servers that come pre-installed with IDIS Solution Suite VMS and support up to 256 Full HD cameras in real-time. With redundant power and equipped with RAID 5 & 6, they offer mission-critical reliability and feature a two-rack-mount chassis for easy maintenance and options for sliding rails and cable management. Both the NVRs and PC servers are powered by Intel chipsets, and support H.264/H.265 dual codec, allowing users to utilise existing monitors, making premature screen, smartphone, or tablet upgrades unnecessary. IDIS DirectIP® plug-and-play technology All IDIS equipment is backed by the IDIS Ultimate Warranty and benefit from IDIS DirectIP® plug-and-play technology, enabling easy and fast installation, streamlined cybersecurity, and simple maintenance and firmware updates. Customers can choose to seamlessly connect to the cost-free IDIS Centre VMS for applications encompassing up to 1,024 devices or the enterprise-class and modular IDIS Solution Suite to manage an unlimited number of sites and devices. The flexible end-to-end solution, combined with forwarding and backward compatibility, results in a compelling low total cost of ownership (TCO). NDAA-compliant range U.S. President Joe Biden recently signed the Secure Equipment Act of 2021, which requires the Federal Communications Commission (FCC) to establish rules stating that it will no longer review or approve any authorisation application for equipment that is on the list of covered communications or services. “The IDIS NDAA-compliant range follows the rules imposed by the U.S. government,” says Andrew Myung, President, IDIS America. “All IDIS products are designed and manufactured in South Korea, bringing the reassurance needed for enterprises that have businesses in the U.S. or plan to enter the market in the future.”
As people slowly emerge from the coronavirus pandemic and businesses begin planning a return to the office, it is a good time to consider whether the access and security system needs a rethink too. Inner Range's entry-level integrated access control system, Inception, offers small businesses and single sites excellent security and intruder detection, as well as remote access, integration with Milestone Access CCTV, and the ability to manage and control occupancy levels, all at an affordable price. Security and intruder detection All Inner Range systems, including Inception, provide intruder detection certified as Grade 3, according to European Standard EN5013-1. This robust protection gives clients peace of mind and is the level required by most insurance companies for business cover. Remote access In addition, the app provides access to a ‘review’ log of actions or events on the system Inception is unusual among Entry-level access control products because it allows users web browser access any time, any place including via tablets and mobile phones. In addition, Sky Command App is a proprietary cloud service allowing very secure access to the system, providing security managers with interactive control and live status of areas, inputs, doors, and outputs as well as simple or multimode area arming options. It means if someone forgets to set an alarm, this can be done remotely. In addition, the app provides access to a ‘review’ log of actions or events on the system, for example, if alarm sensors have been triggered. Security managers can see if any faults have been registered and take appropriate action to correct these if need be. Milestone XProtect Access Integration with video management platform Milestone XProtect Access, means door and other access controls are seamlessly linked with CCTV via one centralised interface. The integration means security managers can control full door, area, and output states and keep track of activity with a live digital site map and icons that provide ‘at a glance’ information on whether doors are locked, in-use, or may have been forced. Alerts can trigger live CCTV footage, and/or it is easy to retrieve relevant archive footage, offering security managers much more – and immediate – information to help them manage access and security issues. The integration also allows for automatic syncing of user credentials across the systems and multiple Inception controllers can be added. Managing occupancy Limiting the number of users on-site, or in a particular area, can help to build managers ensure social distancing measures are maintained. Inception allows building managers to count users in and out of specific spaces and restrict access once a set occupancy threshold has been reached. Occupancy thresholds can be set for: The whole building A specific area Individual offices or rooms Car parking Lifts Once the level is reached, further users’ permissions are suspended until the occupancy count has a spare space. All information about occupancy can be transmitted to the site health and safety manager for real-time monitoring and alerts. Affordable By offering reliable protection in a scalable system, customers can enjoy flexibility and only pay for what they need. They’ll also be pleased to discover that we’re competitive on price about similar products on the market. Installation is fast and fuss-free Inner Range will provide a step-by-step commissioning guide, including checklist prompts to help set up and run the client’s system quickly and easily.
With decades of experience serving the real estate community with innovative security products, The Master Lock Company is announcing a new partnership to become the new official electronic lockbox provider of MIBOR REALTOR® Association, the professional association representing central Indiana's REALTORS®. Citing integrations with BrokerBay, strong brand reputation, and expertise in the global supply chain, MIBOR will offer Master Lock’s Bluetooth-enabled lock boxes and Master Lock Vault Enterprise software to its Broker Listing Cooperative beginning in 2022. Electronic lockbox solution provider “As technology evolves, we must move together, forward, and consistently review the products and services we provide to ensure we are offering best-in-class solutions to meet our members’ needs,” said MIBOR’s Chief Executive Officer, Shelley Specchio. “With this as our motivation, MIBOR is pleased to partner with Master Lock as our electronic lockbox box solution provider.” MIBOR and Master Lock represent two of the most venerated names in real estate and security Together, MIBOR and Master Lock represent two of the most venerated names in real estate and security. MIBOR, founded in 1912, is an association dedicated to providing its members with leading tools, training, and technology. Master Lock, founded in 1921, has been the longtime leader in security and safety products, continuously updating their lockbox products to serve the real estate industry. Meeting integration needs “We’ve spent years interviewing key contacts across organised real estate, to better understand their product and integration needs,” said Brian Smith, Master Lock Connected Products Business Development Manager. “This latest partnership with MIBOR, a top-40 MLS, is proof-positive that we are meeting the needs of the industry at a critical time. With experience in global supply chain management, our expertise in technology integrations, and our truly flexible, secure product line, we are confident that Master Lock will continue to be the preferred vendor for leading MLSs across the U.S.” The Master Lock advantage After much consideration, Master Lock was identified as the best solution for MIBOR’s growing marketplace. Master Lock’s real estate solution includes a variety of features and integrations that enable REALTORS® to run their businesses more efficiently and securely. Showing solution integration With the option to fully integrate with popular showing solutions including BrokerBay, Master Lock offers a simplified experience for MIBOR’s members, who can use one convenient solution to manage the entire property showing process, from scheduling to accessing properties. Flexible, secure access With Master Lock, REALTORS® can access listings via Bluetooth-enabled technology or manual keycodes provided by the listing agent. This allows the lockbox to work even if there is a technology failure, spotty service, or if the lockbox needs to be accessed by someone without Bluetooth or app access. Expertise in supply chain management As global supply chain issues continue to affect the production and issuance of many items, including lockboxes, MIBOR stated that Master Lock’s reliability and experience in global distribution and supply chain management was a primary factor in the newly announced partnership.
Yeastar, a provider of SME PBX systems, and Bluechip Infotech, a specialist provider focused on delivering the latest IT products to a wide channel base, jointly announced a new distribution partnership in Australia. Yeastar welcomes this new partnership with Bluechip Infotech to provide the full line of innovative VoIP products and Unified Communications solutions to resellers and businesses throughout Australia. “We are thrilled to bring Bluechip Infotech on as a distribution partner and will work with Bluechip Infotech to meet SME's needs with flexible, reliable, and powerful communication solutions consistently,” said Alan Shen, CEO of Yeastar. “Through this new partnership, we strongly believe that Bluechip Infotech will help us expand our presence in Australia and we pledge our continued commitment to enabling success for our partners and their customers.” Strengthening unified communications portfolio Bluechip Infotech will distribute the complete range of Yeastar innovative and high-performance VoIP products “Yeastar’s addition to the Bluechip Infotech portfolio will strengthen our overall offering in the Unified Communications and reinforce our position and ability to service the Australian SMB and mid-market business sector,” Bluechip managing director Johnson Hsiung said. “We are also excited about the market opportunity which Yeastar will provide to both our direct and in-direct partner who is always looking for innovative, new, and easy to deploy IP PBX solutions to meet changing customer demands.” As a distributor of Yeastar solutions, Bluechip Infotech will distribute the complete range of Yeastar innovative and high-performance VoIP products including: S-Series VoIP PBX: Easy to manage, configure, and install, the feature-rich S-Series unleashes the power of unified communications and meets the growing needs of SMEs. Yeastar Cloud PBX: A robust, flexible and easy-to-use hosted business phone system. VoIP Gateways: A complete portfolio of VoIP Gateways that covers the business need of connecting FXS, FXO, GSM/3G/4G, ISDN PRI to VoIP.
Figures show one in ten employees will have their security username or password compromised by cybercriminals. For people operating access and security systems, preventing this kind of cyber breach is even more important. Tim Northwood, director of Inner Range, discusses how Two Factor Authentication (2FA) provides an extra layer of cyber security for customers. Benefits of 2FA Two Factor Authentication (2FA), which is offered by Inner Range’s intelligent integrated access and security management system, Integriti, ensures operators must present their usual username and password as well as an additional security credential. This includes extra security passwords or memorable information, biometrics such as thumb or fingerprints and facial scans, or a code received on a registered device, such as via an app on a mobile phone. Using 2FA means customers can rest assured that any potential rogue users with stolen usernames and passwords will still be denied access. Easy company-wide setup If anyone forgets their device needed to generate 2FA codes, a system administrator can provide a single-use login token The initial set-up for company-wide use of 2FA within Integriti can be completed within a few minutes by activating 2FA and adding it to a security policy that makes 2FA a requirement for system operators. Operators are then asked to enroll in 2FA at their next login. For this, they are prompted to scan a QR code using a compatible authenticator app on a mobile phone or another device and enter the 6-digit code provided. Enrolled operators need to enter the code provided by the authenticator each time they log in. The codes time out after 30 seconds to ensure maximum security. If anyone forgets their phone or device needed to generate 2FA codes, a system administrator can provide a single-use login token. Robust cyber strategy Inner Range is proud of its 30+ years with not a single reported cyber breach. In 2020, it announced a new coordinated cyber strategy to ensure the most robust security for customers. This included forming a cross-functional cyber security governance committee that brings together senior representatives from research and development, production, technical support, and IT as well as the executive leadership team. They manage and update cyber security policies and procedures affecting all Inner Range activities consistently and holistically. It also ensures all networked products undergo penetration testing by independent accredited laboratories to assess security and probe for vulnerabilities. Cyber threat assessment and installation Inner Range offers cyber hardening installation guidelines to integrators and end-users Cyber threat assessment is included at every stage of Inner Range’s product development process. Aside from penetration testing, strict access control permissions are allocated to source code to ensure only relevant staff have access to code repositories. Inner Range only deploys hardened cyber security technologies. For example, cloud services Multipath and SkyCommand are hosted in an industry-pioneering cloud hosting environment that offers redundancy and load-balancing across multiple locations and comes with certifications from ISO/IEC, CSA, ITAR, CJIS, HPIAA, and IRS 1075. Finally, it offers cyber hardening installation guidelines to integrators and end-users to ensure systems are installed and managed securely. The guides include recommendations around security, network access control, firewalls, identity management, and vulnerability management.
Connected Technologies LLC, the maker of the award-winning Connect ONE® cloud management platform that controls intrusion, access control, video surveillance, critical environmental monitoring, and energy management systems, recently completed a comprehensive update to its application. Starting with a fresh new look that offers an improved sense of intuitiveness and ease of use, especially in mobile applications, users will find more detailed information in an easier-to-locate interface screen. Dealers can still rely on the same functionality and general layout of actionable buttons for a consistent experience without re-training necessary. Connect ONE® platform updates Other features of the newly improved platform include: 1) A new card layout style that shows all relevant record information at a glance. 2) If the original list style is preferred it can be toggled at the bottom of the page, choosing either the new or former list layout view. 3) Users can retain their viewing preference across sessions and save that choice as default. Dealers can set a default for all customers and/or individually per customer. 4) Improved dark mode support, which reduces the amount of blue light for an upgraded experience. 5) Expansion of automated reports via scheduled task rules – now many more reports can be delivered on a schedule: Event Activity Report (List all selected activities in chronological order) Site Occupancy Report (List users who accessed each site and calculate total occupancy) In/Out by User (List user in and out times for each area and calculate total time in an area) Exit Exception (List users who have logged in but not logged out) Asset Status List (List assets with the selected status such as return overdue) User Status List (List users and their last activity such as all users not active in the last 90 days) User Safe Passage Status List (List users and their Safe Passage status, such as all users with unapproved status) System Code Expiration List (List all system codes and authority levels, including expiration status) Environmental Zone Historical Data Report (List and graph environmental zones with associated alarm status for regulatory compliance) Thermostat Historical Data Report (List and graph HVAC status recorded from the thermostats) 6) In addition, since incoming events can trigger task rules to activate, the report can also be delivered in response to certain critical events occurring. For example, a fire alarm event can trigger an Exit Exception report to be delivered. The report will show who has accessed the building but not exited (exit readers required to detect if the person left, otherwise the report will include all entries for the reporting period). Frictionless entrance control Along with the award-winning Safe Passage module for access control user authorisation and ScanPass® mobile credential for frictionless entrance control, dealers and their customers have the latest services to manage multiple locations through a single Connect ONE user interface. Connect ONE works with Bosch B and G, DMP XR/XT, ELK M1, and Honeywell Vista Turbo security and access control panels. It also integrates with ASSA ABLOY Aperio® wireless locks as well as Digital Watchdog, OpenEye, ExacqVision, and Eagle Eye Networks video technologies.
Matrix has announced that it will be participating in the prestigious and the world’s premier trade fair for Security, Safety & Fire Protection, Intersec 2022. The expo is in the Dubai World Trade Centre, Dubai from 16th to 18th January 2022. Matrix will be launching its new door controller and exhibiting its time-attendance, access control, and IP video surveillance solutions at the event. About Matrix Comsec Matrix is well-known for its indigenous and innovative range of solutions for IP video surveillance, access control, time-attendance, and unified communications. The solutions are specifically designed for large, multi-location enterprises, SME, and SMB organisations. Matrix Comsec continuously works towards keeping abreast with the constantly upgrading technology by designing and manufacturing solutions that are equipped with the latest technology. Matrix will be presenting some of its indigenously engineered Security solutions at Intersec 2022 in Dubai. Face recognition software COSEC face recognition software enables it to be the best security product with awe-inspiring features In INTERSEC 2022, Matrix looks forward to proudly presenting - COSEC ARGO FACE. A Stalwart among its products and pinnacle of world-class technology, it imbibes various contactless credentials. This includes face, smart cards, PIN, mobile phone using BLE. This product has been created with security, elegance, and performance in its make. With Bluetooth, Wi-Fi, PoE, and USB, top-class certifications such as IP65 and IK08, COSEC ARGO FACE is an engineering feat. It adapts to all challenging and outdoor environments. Supporting this marvellous piece of tech is COSEC face recognition software that enables it to be the best security product with awe-inspiring features. Cloud-based management solution This event would also be seeing Matrix presenting COSEC VYOM - a cloud-based management solution. This solution makes use of cloud technology to operate applications, hardware, and infrastructure unified into one. This provides the best of time-attendance, access control, and its dependent solutions to all its users. This solution revamps organisational working and works on improving productivity, enhancing security, and increasing efficiency. All the while, it stays cost-effective, keeps area-secure, and provides on-demand network access with minimal hardware needs. Live demonstrations Matrix will do a live demonstration of two of its unique and innovative solutions: COSEC VYOM – Solution experts will discuss how COSEC VYOM assists users in using applications, hardware, and software as a service. COSEC ARGO – Solution experts will discuss at length its differentiating features and how they make the device the next-gen door controller when it comes to Access Control. IP video surveillance products and solutions Matrix Range of IP Cameras - A diverse range of IP cameras available in 2MP, 5MP, and 8MP resolutions available in bullet, dome, PTZ variants. Apart from this, a new range of Turret series and ruggedised series of IP cameras are designed to meet the needs of modern enterprises. Core Technologies like STARVIS series sensors, image optimising technologies, intelligent video analytics ensure that a persistent performance is delivered. ENTERPRISE NVR: Matrix would be showcasing their new range of network video recorders that are designed for medium and large enterprises. A turnkey solution that has been designed by embedding a VMS application with the hardware. A complete solution for enterprises that are looking for an integrated solution. The product is designed to combine all the three functionalities of surveillance i.e. video management, recording, and storage in one device. SATATYA SAMAS: Centralised video management solution that has been designed on an open platform. A scalable video management solution that has a versatile integration range with ancillary devices and other security systems such as access control systems and perimeter security systems. Designed to optimise existing resources as well as establish proactive security by real-time notifications. A comprehensive video management solution that automates video management, monitoring, and security. Authority comment “INTERSEC is an ideal platform for unveiling the latest innovations from Matrix. We look forward to meeting new customers as well as system integrators to give them a hands-on experience of technologically advanced security solutions”, Kaushal Kadakia - Marketing Manager, Matrix Comsec. To learn more about innovative solutions and how they can aid in resolving the enterprise security challenges, visit and talk to the experts at the Dubai World Trade Centre, from 16th to 18th January 2022 at S1-H19 Intersec 2022.
Charting the path to safe citiesDownload
Assessing the total cost of ownership (TCO) of VMS and NVR systemsDownload
Securing unmanned infrastructure at the network edgeDownload
Webcast: Access control integration increases security while reducing costsDownload