Axis has a new camera that “shakes like a dog” when it rains -- to get rid of the extra moisture. KiwiSecurity, an Austrian company and IFSEC newcomer, uses video analytics to scramble images of faces in live video to ensure privacy.

These were two of the surprising things I saw on Day Two of IFSEC. Attendance picked up nicely in the halls of London’s ExCeL -- and the show floor seemed to get bigger as the day wore on (at least according to my weary feet!). There definitely were more things to see than time to see them.

Genetec's integration with KiwiVision

The video analytics system that scrambles faces on live video shared a little corner of Genetec’s stand. The KiwiVision Privacy Protector capability is just one of several intelligent functions of the product, with which Genetec has developed a close integration. Other functions include the more familiar license plate recognition, queue detection, intrusion detection, etc.

Genetec is also looking to help end user customers make sense of the “Wild West” of body-worn cameras, which are facing rapid growth. Genetec offers a solution to incorporate body-worn camera feeds into its video management system (VMS). Managing the video from body-worn cameras is an important -- and so far overlooked --  consideration amid the rapid implementation of the cameras, says Andrew Elvish, Genetec’s Vice President, Marketing and Product Management.

Axis and Canon growth plan

The Axis Q61-E Series camera has “Sharpdome technology” to provide sharp images in all directions -- it looks more like a globe than a typical dome camera. The compact PTZ camera is suitable for indoor or outdoor applications, in low light and challenging conditions.The “Speed Dry” function removes water drops from the dome glass (using canine-like vibration) -- to supply sharp images in rainy weather.

Genetec is also looking to help
end user customers make sense
of the “Wild West” of body-worn
cameras, which are facing rapid
growth

There was other news from Axis, too, already arguably the biggest newsmaker in the security market in the last year given its planned acquisition by Canon. At a press conference, Axis again emphasised it will be “business as usual” after the acquisition and that Axis will continue to operate separate from the Japanese giant. (In fact, Canon has not yet acquired the needed 90 percent of shares; therefore Axis is still trading on the Swedish stock exchange. However, eventual completion of the transaction is all but a certainty.)

If anything, the new owners have accelerated the Axis growth path. Axis announced on the second day of IFSEC its plans to build a new 350,000-square-foot (32,000-square-meter) state-of-the-art headquarters directly adjacent to its current location in Lund, Sweden. Building on the new headquarters will begin in January 2016 with completion expected in 2018. The new nine-floor building will accommodate company growth up to 1,100 employees (some of the existing facilities will be retained.)

“The Axis product, innovation and sales structure will remain the same,” says Atul Rajput, Axis regional director, Northern Europe. “We will also gain access to Canon’s knowledge and technology, which will be a foundation for future joint cooperation and benefits. These areas include image technology, manufacturing technology, procurement power, and a strong patent portfolio.”

As far as industry trends, Rajput points to a transition from forensic use of video to deterrence and even to real-time detection. New tools like audio analytics, which can mimic the human ear’s abilities to differentiate various sounds, from gun shots to breaking glass, will enable better real-time response. Other trends include “surveillance as a service” -- and, in fact “everything as a service” -- with more functionality migrating to the cloud. Video will also be used increasingly to improve business efficiency (beyond security). 

Axis will be looking for growth beyond its current focus on video surveillance for security. They have a new camera for broadcast/video conferencing applications. Even beyond cameras, they are looking at temperature alarms to monitor if physical equipment overheats. Axis has already introduced an IP-enabled audio/video door intercom system and a network horn speaker.

HID Global Seos

“We see a clear requirement for open standards within these countries (EMEA),” says Volker Kunz, HID Global Director of Sales, EMEA Physical Access Control

Another big supplier at IFSEC is HID Global, which sees a demand for high security in access control, especially in vertical markets such as utilities, energy, aviation, finance and banking. Throughout the EMEA (Europe, Middle East, Africa) region, demand is strong among enterprise-class customers, typically the top 100 companies in each country (and many of the top 500). “We see a clear requirement for open standards within these countries,” says Volker Kunz, HID Global Director of Sales, EMEA Physical Access Control. There is also demand for custom keys and other specific formats to increase security levels, varying for each end user.

“From an EMEA perspective, especially in the northern part, there is a requirement for a lot of customisation, personalising of credentials -- they want us to give them that fully programmed solution,” says Kunz.

At IFSEC, HID Global is showing of the Seos “Tap In” functionality, which can be used to tap into applications in a tablet environment, for example. There are already 2,400 apps that support the capability, according to HID Global.

Seos is HID Global’s open mobile ID system that can run on various media, whether a mobile device, a card, or whatever, providing companies more options in terms of how they run their access control systems. Using a smartphone as a credential is especially desirable in applications where there is a lot of turnover among users -- such as colleges and universities. Enterprise customers may still require a physical badge/photo ID (therefore less likely to go to smart phone credentialing).

“Seos allows us to create a new ecosystem with partners, including the mechanical lock sister companies in Assa Abloy, says Spencer Marshall, HID Global Regional Sales Manager, Northern Europe. Kunz points to the importance of combining convenience with security -- inconvenient security measures will cause users to bypass them to the detriment of overall security.

Axxonsoft global expansion

AxxonSoft, a VMS vendor, is among the many companies at IFSEC that are supplying a global market but with an eye to addressing the varied needs of each local area. In the last year, AxxonSoft has established more offices around the world, in Morocco and South Africa. By the end of the year, they will open an office in the United Kingdom.

AxxonSoft is among the many
companies at IFSEC that are
supplying a global market but
with an eye to addressing the
varied needs of each local area

AxxonSoft has done many large projects in the Middle East, such as the Abu Dhabi National Oil Company and the Petroleum Institute; in the U.K., they have done projects for the London Underground and a retailer. They are currently working on a huge city surveillance project in the Emirate of Sharjah. “We are one of the top VMSs used in the the Middle East,” says Yury Akhmetov, AxxonSoft business development director. “We started early doing business there and are very well known. We are so busy with large projects we don’t do the smaller projects.”

“Localisation of all the materials is very important,” says Akhmetov. They are starting to develop business in French-speaking countries in northern Africa, and will be looking to localise their offerings in Turkish, Polish, Mandarin, Serbian and Bulgarian.

Developing new markets

Large companies like Milestone also have to think local and act local in a global market. Implementing Milestone’s global strategy in the EMEA region involves a local approach for each region -- investment in training, demo facilities, marketing materials, more resources, and native speaking employees. “We understand the market needs of each locale in a very detailed way,” says Thomas Lausten, Milestone’s vice president, EMEA. “We develop each market in response to data we receive from talking to more end users -- what is the essential piece in a VMS for retail, or other verticals?” Milestone adapts to each area’s need with information gleaned by talking to customers, integrators and consultants, and from feedback about where they are succeeding. More R&D enables a fast response to localised needs.

However, there are universal needs across multiple localities: “We need to be easy to deploy, and everything needs to be based on scalability,” says Lausten. “We grow with existing partners, who are becoming bigger and bigger.” 

Download PDF version Download PDF version

Author profile

Larry Anderson Editor, SecurityInformed.com & SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SourceSecurity.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SourceSecurity.com's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

What change would you like to see in security in 2022?
What change would you like to see in security in 2022?

Here’s a news flash: 2022 will be a pivotal year for the security industry. As we enter the new year, continuing change is a safe prediction for any fast-moving, technology-driven marketplace. Recent history confirms the ability of the security industry to shift and adapt to changing conditions and to provide an ever-expanding menu of technology solutions to make the world a safer place. Given that the new year will bring change, what will that change encompass? More to the point, what should it encompass? We asked this week’s Expert Panel Roundtable: What is the biggest change you would like to see within the security industry in 2022?

2021’s most popular expert panel roundtable discussions
2021’s most popular expert panel roundtable discussions

Topics that dominated our website’s Expert Panel Roundtable articles in 2021 included the effects of COVID-19, the benefits of mobile access, the upcoming potential of deep learning, and the future of access control cards. Our website’s Expert Panel Roundtable discussions in 2021 reflected some of the most timely and important topics in the industry. The very most clicked-on Expert Panel Roundtable discussion in 2021 considered the positive and negative effects of COVID-19. The second most popular was trends in perimeter security technology. Smart video solutions Here is a roundup of the Top 10 Expert Panel Roundtable discussions posted in 2021, along with a ‘sound bite’ from each discussion and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2021 (including the quotable panelists named and linked below). The pandemic has impacted security in many ways, some we are just now realising" What are the positive and negative effects of COVID-19 to security? “The pandemic has impacted security in many ways, some we are just now realising. On the negative side, integrators were limited in their ability to access customer locations, posing significant challenges to supporting customers. Innovation was also halted in many sectors – such as AI and edge computing in healthcare. However, the pandemic increased awareness regarding the need for smart solutions that can aid in these types of crises. Smart video solutions have been identified repeatedly in the media as a potential pathway to better customer experience and increased safety.” – Alexander Harlass. Reducing false alarms What are the latest trends in perimeter security technology? “What’s really important in perimeter security is the minimisation of false alarms, not simply the potential detection of what might be an unauthorised person or object. In light of that, many systems now include alarm validation that can confirm an alarm event using a camera. The utilisation of AI-based technologies can further validate the accuracy of the alarm, making it as accurate and precise as possible. I anticipate seeing more cross-technological integrations to reduce false alarms, so that personnel in an alarm center spend as little time as possible in validating an alarm.” – Leo Levit. What will be the biggest security trends in 2021? “2021 will see artificial intelligence (AI) become more mainstream. There will be increased deployment in edge devices, including cameras, thermographic cameras, radar and LIDAR sensors, entry point readers, etc. Additional algorithms will be developed, greatly expanding the use and function as video surveillance transitions from a forensic tool to real-time analytics. This increases the value of these systems and helps create ROI cases for their deployment.” – Tim Brooks. Access control solutions Investments in tools and platforms to drive digital interactions have accelerated" What will be the security industry’s biggest challenge in 2021? “The security industry is traditional in the sense that it relies heavily on face-to-face interaction to do business with customers and partners alike. COVID-19 has put a hold on in-person meetings, trade shows, etc., and this trend is likely to extend throughout 2021. Virtually recreating these personal touchpoints, while cultivating and strengthening internal and external relationships, will continue to be both a challenge and opportunity for the security industry. Investments in tools and platforms to drive digital interactions have accelerated.” – Robert Moore. What are the challenges and benefits of mobile access control? “Mobile access control solutions are an exciting innovation in a market where the day-to-day user experience hasn’t changed much in the last 20 years. One area that has clear benefits and challenges is in improving the user experience. On one hand, physical credentials are expensive and a hassle to administer; however, they work reliably, quickly, and predictably. Mobile credentials are convenient in that everyone already has a smartphone, and you don’t have to admin or carry cards; however, when you’re actually standing at the door they need to work as well or better than physical credentials, or the benefits are lost.” – Brian Lohse. Attacking critical infrastructure What are the security challenges of protecting critical infrastructure? “It seems so often we hear about a new threat or cyber-attack in the news. Because of the rapid growth in technology over the last few years, cybercriminals are getting bolder and discovering new ways to attack critical infrastructure. One of the biggest challenges boils down to the capabilities of the operating security system and whether the organisation is aware of the current risks they face. Because there are so many points of entry for cybercriminals to target within critical infrastructure, it is vital that the security solution be prepared for attacks at every level.” – Charles (Chuck) O’Leary. They are more aware when they make physical contact with doors and interfaces" Which security technologies will be useful in a post-pandemic world? “People have become more sensitised to crowds and personal space. They are more aware when they make physical contact with doors and interfaces. As the pandemic subsides, these habits will likely remain for a majority of people." "Utilising AI-based cameras to accurately monitor the number of people in a room or in a queue will enable staff to take action to improve the customer experience. For example, AI-based analytics can quickly notify security or operations when people are waiting at a door and initiate 2-way audio for touchless access.” – Aaron Saks. Central monitoring station What is the potential of deep learning in physical security and surveillance? “Deep learning, a subset of artificial intelligence, enables networks to train themselves to perform speech, voice, and image recognition tasks." In video surveillance, these networks learn to make predictions through highly repetitive exposure" "In video surveillance, these networks learn to make predictions through highly repetitive exposure to images of humans and vehicles from a camera feed. That ability is ideal for use with drones patrolling perimeters seeking anomalies or in software that significantly reduces the number of false alarms reported to central monitoring station operators. Through use, the software continues improving its accuracy.” – Brian Baker. Valuable audit trail How soon will access control cards become extinct and why? “Access control cards will go the way of the dinosaur, but they still have some life left in them. For the short term, they have plenty of utility in minimum security use cases and leave a valuable audit trail. But for companies that are more technology-centric, particularly those with high value assets, we’re seeing demand for next-generation access control, which includes increased integration with video surveillance systems and professional monitoring services.” – Sean Foley. Which security markets are embracing touchless and contactless systems? “Touchless technology is not a new trend, but contactless systems and transactions have surged since the COVID-19 pandemic. Even after the pandemic is over, it is likely public perception of what is hygienic and acceptable in public spaces will have changed. [We are] seeing an uptick in touchless access control systems in the education and flexible office space markets.” – Brooke Grigsby.

Identity and access management in 2022 - what will the future look like?
Identity and access management in 2022 - what will the future look like?

As we enter into 2022, there is still a level of uncertainty in place. It’s unclear what the future holds, as companies around the world still contend with the COVID-19 pandemic. Remote working has been encouraged by most organisations and the move to a hybrid working system has become ‘business as usual’, for the majority of businesses. Some have reduced their office space or done away with their locations altogether. Following best security practices With all this change in place, there are problems to deal with. According to research, 32.7% of IT admins say they are concerned about employees using unsecured networks to carry out that work. Alongside this, 74% of IT admins thought that remote work makes it harder for employees to follow best security practices. This need to manage security around remote work is no longer temporary. Instead, companies have to build permanent strategies around remote work and security. The coming year will also create a different landscape for small and mid-sized businesses (SMBs). Here are some key predictions for next year and what to start preparing for in 2022: The reality of SMB spending around security will hit home SMBs had to undertake significant investments to adapt to remote working SMBs had to undertake significant investments to adapt to remote working, especially in comparison to their size. They had to undertake significant digital transformation projects that made it possible to deliver services remotely, during the COVID-19 pandemic. We’ve seen a shift in mindset for these companies, which are now more tech-focused in their approach to problem solving. According to our research, 45% of SMBs plan to increase their spending towards IT services in 2022. Around half of all organisations think their IT budgets are adequate for their needs, while 14.5% of those surveyed believe they will need more, to cover all that needs to be done. Identity management spending to support remote work For others, the COVID-19 pandemic led to over-spending, just to get ahead of things and they will spend in 2022, looking at what they should keep and what they can reduce their spending on. Areas like identity management will stay in place, as companies struggle to support remote work and security, without this in place. However, on-premise IT spending will be reduced or cut, as those solutions are not relevant for the new work model. Services that rely on on-premise IT will be cut or replaced. The device will lead the way for security We rely on our phones to work and to communicate. In 2022, they will become central to how we manage access, to all our assets and locations, IT and physical. When employees can use company devices and their own phones for work, security is more difficult. IT teams have to ensure that they’re prepared for this, by making sure that these devices can be trusted. Wide use of digital certificates and strong MFA factors Rather than requiring a separate smart card or fingerprint reader, devices can be used for access using push authentication There are multiple ways that companies can achieve this, for example - By using digital certificates to identify company devices as trusted, an agent, or strong MFA factors, like a FIDO security key or mobile push authentication. Whichever approach you choose, this can prevent unauthorised access to IT assets and applications, and these same devices can be used for authentication into physical locations too. Rather than requiring a separate smart card or fingerprint reader, devices can be used for access using push authentication. Understanding human behaviour Alongside this, it is important to understand human behaviour. Anything that introduces an extra step for authentication can lead to employees taking workarounds. To stop this, it is important to put an employee education process in place, in order to emphasize on the importance of security. The next step is to think about adopting passwordless security, to further reduce friction and increase adoption. Lastly, as devices become the starting point for security and trust, remote device management will be needed too. More companies will need to manage devices remotely, from wiping an asset remotely if it gets lost or stolen, through to de-provisioning users easily and removing their access rights, when they leave the company. Identity will be a layer cake Zero Trust approaches to security Identity management relies on being able to trust that someone is who they say they are. Zero Trust approaches to security can support this effectively, particularly when aligned with least privilege access models. In order to turn theory into practical easy-to-deploy steps, companies need to use contextual access, as part of their identity management strategy. This involves looking at the context that employees will work in and putting together the right management approach for those circumstances. For typical employee behaviour, using two factor authentication might be enough to help them work, without security getting in the way. How enterprises manage, access and store identity data There will also be a shift in how enterprises manage, access, and store that identity data over time For areas where security is more important, additional security policies can be put over the top, to ensure that only the right people have access. A step-up in authentication can be added, based on the sensitivity of resources or risk-based adaptive authentication policies might be needed. There will also be a shift in how enterprises manage, access, and store that identity data over time, so that it aligns more closely with those use cases. Identity management critical to secure assets in 2022 There are bigger conversations taking place around digital identity for citizenship, as more services move online as well. Any moves that take place in this arena will affect how businesses think about their identity management processes too, encouraging them to look at their requirements in more detail. Overall, 2022 will be the year when identity will be critical to how companies keep their assets secure and their employees productive. With employees working remotely and businesses becoming decentralised, identity strategies will have to take the same approach. This will put the emphasis on strong identity management as the starting point for all security planning.