As the dust settles after ASIS 2017 in Dallas, most agree it was a good show. It was different in some respects from previous shows, but several of the changes seemed to work well. Launching the exhibition on Tuesday instead of Monday was a big hit, and who could fault the idea of happy hour drinks on the show floor? Attendance may not have broken records, but end user VIPs were among the crowd, and foot traffic held up fairly well, even on the final, shortened day.

STANLEY Security virtual reality experience

What the show lacked in big, new product announcements, it made up for in an abundance of industry buzzwords, such as virtual reality, Internet of Things, cybersecurity, and artificial intelligence.

Virtual reality (VR) is among the “enhanced” security solutions highlighted by Stanley Security at its ASIS booth. The interactive “virtual reality experience” provides training for critical response situations, such as active shooter, security assessment and suspicious behavior, and fire safety. The trainee wears VR goggles and holds two controller wands to “teleport” and to interact with elements within the environment, which can be customised to an end-user’s specific site.

The system provides realistic training scenarios to improve decision-making and reduce human error – I tried it out and managed to escape a fire. Stanley is partnering with HTX Labs to provide the system, previewed at ASIS 2017 and available in three to six months.

Another theme at the Stanley Security booth was an emphasis on internet of things (IoT) management and monitoring, specifically a system that monitors a system’s health and event status at a very deep level. Continuous automated oversight of a customer’s system reduces downtime, enhances safety, lowers costs, and delivers automated proof of compliance to standards. The system analyses and monitors performance on a constant basis and is customisable. Stanley partners with Viakoo to provide the cloud-based system.

Cybersecurity challenge

Cybersecurity was emphasised at many ASIS booths, reflecting growing concerns in the industry and a realisation that cybersecurity is a shared challenge among manufacturers, integrators and end users. An example was the CyberVigilant system from IndigoVision, which monitors an IP video network and picks up anomalies that point to cybersecurity risks.

The patented system combines IndigoVision’s IP expertise with specific knowledge of a site’s cameras, NVRs and workstations. It can detect anomalies such as unauthorised configuration access attempts, network reconnaissance/scans, device access from unauthorised clients, shell access, use of unauthorized DNS, NTP and SMTP servers; and denial of service (DoS) attacks.

Stanley Security interactive VR experience
The interactive “virtual reality experience” provides training for critical response situations

CyberVigilant is incorporated into IndigoVision’s new Control Center 15.0 software release, which also includes Control Center Mobile and artificial intelligence powered by BriefCam.

Potential impact of deep learning and AI

Software improvements were also a theme, including, for example, Open Options’ release of Version 7 of its DNA Fusion “flagship” access control software, which embraces an open platform using Mercury access control panels. The system integrates with more than 30 technology partners (to date), including manufacturers of intelligent locks, video management systems, critical communications, elevator systems, and other solutions. Features include an updated user interface, and operation reminiscent of the familiar Microsoft look and feel. A differentiator is a “drag-and-drop” capability, allowing customers to “drag” an access level and associate it with an individual cardholder or a group.

The potential impact of deep learning and artificial intelligence (AI) is just now working its way through the market. Video companies like IDIS are evaluating AI and developing systems to implement it, likely in the next few months (in time for ISC West?)

“We want to make sure our AI-based video analytics meet the needs of the market,” says Josh Keaton, IDIS America regional sales manager. He says much of the early implementations of AI are aimed at showcasing a company’s capabilities rather than solving real-world problems.

IDIS’ Deep Learning Analytics (IDLA) engine, still being developed, is built on 2.6 million images of people, buses, and vehicles, and the company will seek to double that number going forward and to broaden the categories.

“The founders of IDIS have a background in video analytics and AI, so we are committed that when our AI hits the market, it will serve the real world,” says Keaton. “The idea of deep learning is that you can look at a scene and natively understand how the pattern has changed,” he adds. “You can’t categorise everything; the camera has to learn.”

Transport, enterprise and smart cities

Some of the companies seeking to leverage the power of the ASIS show did not have booths on the show floor. Some players, such as VidSys, met with end users and integrators in meeting rooms in the adjacent Omni hotel. (VidSys was also a partner in the Motorola booth.) “It’s the largest turnout we have ever had,” said Neil Chung, VidSys vice president, systems and solutions engineering.

IndigoVision CyberVigilant
IDIS’ Deep Learning Analytics (IDLA) engine contributed to the high profile of artificial intelligence (AI) at the show

The converged security and information management (CSIM) company was highlighting a suite of video and big data analytics capabilities added to their system through a partnership with Micro Focus. The AI system works “in the background” to characterise and filter out anomalies (false positives) to alert customers only to situations that require attention. VidSys focuses on large transportation, commercial campus/enterprise customers, and smart cities, where they interface with a variety of sensors.

“The most excitement is over our social media integration and how external events can affect their business,” says Chung. In addition to security and other internal systems, VidSys can monitor outside sources, such as RSS and Twitter feeds through technology partners such as DataMiner. “If an event happens near a customer facility, we can use our business rules to notify them. People are realising that there’s more information outside the systems that they control, and they want to start taking advantage of it.”

The move to road shows

Another company not exhibiting at ASIS 2017 was Lenel Systems International, which is redirecting the marketing funds from exhibiting at ASIS to a series of “road shows” to spread the word about what’s new with the company. I caught up with Ross McKay, Lenel’s Global Director of Product Management, who provided an update.

Lenel’s new OnGuard release (v7.4) is coming in December, including a thin client monitoring app, the newest element in a trend toward operating OnGuard through mobile devices. “We are at a tipping point,” says McKay. “Customers can do the job without being behind a desktop. Guards can do their jobs while mobile.”

The concept of a centralized control center is being questioned, and security operations are becoming more decentralised and device-independent. “The thick client is dying,” he says. “They will coexist for the immediate future.”

OnGuard v7.4

The next release of OnGuard will also proactively support customers’ move to the cloud. Customers want to be able to put physical security servers in the cloud (such as Microsoft Azure). “The thin client and the cloud story – the webisation and the cloudisation of OnGuard -- go hand-in-hand,” says McKay. The changes are driving adoption of OnGuard into a lower tier of customers (small- and medium-sized businesses), although the enterprise will continue to be Lenel’s main market. A full SAAS solution is forthcoming in April 2018.)

Lenel will also be releasing a new version of the Blue Diamond mobile app, which leverages Bluetooth technology to enable a mobile phone to serve as an access control credential. The new version will enable favourites, allow nicknaming of doors, and quick-connect to favorite doors to simplify operation.

Despite the shift in marketing approach, McKay says Lenel continues to be a big supporter of the ASIS show. “ASIS is alive and healthy and will continue to be vibrant, continuing to reinvent itself,” he says. Attendees at this year’s show would likely agree.

Download PDF version

Author profile

Larry Anderson Editor, SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SourceSecurity.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SourceSecurity.com's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

What are the obstacles to adoption of mobile credentials for access control?
What are the obstacles to adoption of mobile credentials for access control?

Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?

How to choose the right security entrance for effective customer security
How to choose the right security entrance for effective customer security

Security and systems integrators across the nation are recommending and providing long-term security solutions to their customers. But when it comes to physical security entrances, integrators can easily fall into the trap of simply fulfilling an end user’s exact request without much pushback. Why? We believe the complexity and variety of entrances available makes it difficult to consult on the best solution, but also because there are a lot of assumptions at play. 1) Ask questions to determine the correct security entrance solution There is confusion in the security industry on the meaning of the word, “turnstile.” End users, when requesting a solution, tend to use the word “turnstile” to describe anything from an old fashioned, 3-arm turnstile to a high-tech optical turnstile to a security revolving door. We encourage security integrators to ask questions to discover how their clients want to mitigate the risk of unauthorised entry or “tailgating.” This can help determine the correct security entrance solution to meet the end user’s goal and budget. By asking the right questions and offering true solutions, you can enhance a relationship built on trust and consultation leading to potential repeat business. Below are four physical security goals—crowd, deterrence, detection, and prevention—accompanied by the type of “turnstile” and its capabilities. This breakdown can help the integrator to confidently address an end user’s request for a “turnstile,” and then recommend a solution that truly fulfills their security goals. 2) Explore options for crowd control Typically seen in stadiums, amusement parks, universities, and fitness centres, tripod turnstiles are considered a low security solution for crowd management. Designed for counting employees or slowing down high traffic volume to collect tickets or payments, tripod turnstiles are built to withstand the most abusive of conditions. Here’s what security integrators should know about tripod turnstiles: Low capital cost, but high annual operating cost due to needed 24/7 guard supervision Lack of sensors can lead to defeat – turnstiles can be crawled under or jumped over without alarm/notification to guard staff Little to no metrics capabilities available – no sensors or alarms if defeated High throughput, handling 30 persons per minute in one direction Full height turnstiles are a tall, robust solution for perimeter fence lines, metro stations or parking garages 3) Choose an effective deterrent A physical deterrent to infiltration, full height turnstiles are a tall, robust solution for perimeter fence lines, metro stations or parking garages. While full height turnstiles do physically stop tailgating (an unauthorised person following someone in the next compartment), they have no means to prevent piggybacking. Two people in collusion can gain access through the full height turnstile by badging once and then squeezing into the same compartment. Here are some other things to note about full height turnstiles: Low capital cost, low annual operating cost Guard supervision is up to the user Little to no metrics capabilities available – no sensors or alarms if defeated Moderate throughput, handling 18 persons per minute in one direction 4) Ensure your chosen turnstile can detect tailgating A staple in lobby security to accommodate visitors, optical turnstiles utilise complex sensors to detect a tailgating attempt. Most models available today offer sliding or swinging barriers. A very common assumption in the security industry is that optical turnstiles prevent unauthorised entry, which isn’t true. In fact, once the barriers are open, a second user can slip through. Or, in the case of a wide lane for disabled use, two people can walk through side by side. In either case, an alarm is generated and supervision is therefore essential in order to respond swiftly. The cost of 24/7 supervision must be factored into the security budget. Here are some other points to make note of: Moderate capital cost, but high annual operating cost due to need for 24/7 guard supervision Sensors detect tailgating and sound an alarm for post-tailgating reaction, but turnstiles can still be defeated Moderate metrics capabilities available (for example, # times tailgating occurred, passback rejection) High throughput, handling up to 30 persons per minute in one direction 5) Determine prevention tactics for staff and visitor safety The entry solution of choice for Fortune 1000 companies, security revolving doors and mantrap portals completely prevent tailgating due to their working principle, ensuring the safety and security of staff and visitors. Commonly used at employee-only entrances, security doors are an unmanned entrance solution that cannot be defeated; sensors in the ceiling prevent tailgating (following in a trailing compartment). Optional piggybacking detection systems are also available (preventing two people in the same compartment from entering). The benefits of utilising a truly unmanned door are unparalleled: guard staff can be reduced or reallocated, and this entrance offers an ROI of just 1-2 years. Here’s more information security integrators should know about security revolving doors and portals: High capital cost, low annual operating cost due to no required guard supervision Sophisticated metrics capabilities available, allowing the end user to prove the value of their security investment Security revolving doors = 20 persons per minute, simultaneously in two directions; Security portals = 6 persons per minute in one direction Biometric devices and bullet-resistant glass can be incorporated for an even higher level of security As we’ve demonstrated here, “turnstile,” in the eyes of an end user, is a complex term that can range from a low security, crowd control solution to a high security, tailgating prevention entrance. Security integrators need to first accurately determine the security goals of their customers and then break down the “turnstile” barrier of confusion to recommend the best solution for fulfilling those goals.

Why customers should buy products and services from SMBs
Why customers should buy products and services from SMBs

In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalisation and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're likely to find a difference in size between companies. Whether it’s a global retail chain versus a small family-owned store, a corporate restaurant chain versus a mom-and-pop diner or a small bed and breakfast versus a large hotel chain — each side of the coin presents unique characteristics and advantages in a number of areas. Disparity in physical security industry Customers are drawn to products and services from large enterprises as the big names typically imply stability This disparity very clearly exists in the physical security industry, and differences in the sizes of product manufacturers and service providers could have important implications for the quality and type of the products and services offered. All too often, customers are drawn to products and services from large enterprises, as the big names typically imply stability, extensive product offerings and global reach. And that's not to say that these considerations are unwarranted; one could argue that larger companies have more resources for product development and likely possess the combined expertise and experience to provide a wide range of products and services. But the value that a company’s products and services can bring isn’t necessarily directly related to or dependent on its size. In an age where the common wisdom is to scale up to be more efficient and profitable, it’s interesting to pause and think about some of the possible advantages of small- and medium-sized businesses (SMBs). Typically, “small” companies are defined as those with less than 100 employees and “medium” with less than 500. Providing social mobility  Schumacher argued that smaller companies are important engines of economic growth. Indeed, according to the Organisation for Economic Cooperation and Development (OECD), a group of 36 member countries that promotes policies for economic and social well-being, SMBs account for 60 to 70 percent of jobs in most OECD countries. Importantly, SMBs provide resilience in that there are often large economic and social impacts when big companies fail. Smaller companies are better for regional economies in general, as earnings stay more local compared to big businesses, which in turn generates additional economic activity. SMBs are also better at providing social mobility for disadvantaged groups by giving them opportunities and enabling them to realise their potential. Smaller companies are often more innovative, bringing to the market novel technologies and solutions such as Cloud, analytics, AI, and IoT New companies introduce new technologies There's no denying the role of start-ups when it comes to innovation. In the security industry, many new technologies (e.g. Cloud, analytics, AI, IoT) are first brought to the market by newer companies. In general, smaller companies’ products and services often have to be as good or better than others to be competitive in the marketplace. They are therefore often more innovative, bringing to the market novel technologies and solutions. And these companies are also more willing to try out other new B2B solutions, while larger companies tend to be more risk-averse. Customer service Aside from the quality of products and services, arguably one of the most important components of a security company’s success is its ability to interact with and provide customers the support that they deserve. Smaller companies are able to excel and stand out to their customers in a number of ways: Customer service. Customers’ perceptions of a product’s quality are influenced by the quality of support, and smaller manufacturers often possess a strong, motivated customer service team that can be relatively more responsive to customers of all sizes, not just the large ones. A superior level of support generally translates into high marks on customer satisfaction, since customers’ issues with products can be resolved promptly. Flexibility. SMBs have a greater capacity to detect and satisfy small market niches. While large companies generally create products and services for large markets, smaller companies deal more directly with their customers, enabling them to meet their needs and offer customised products and services. And this translates to adaptability, as SMBs become responsive to new market trends. By having a pulse on the market, smaller companies have much more flexibility in their supply chain and can adjust much faster in response to changing demand. Decision-making. Smaller companies are much more agile in decision-making, while larger enterprises often suffer from complex, tedious and lengthy decision-making processes. Communication is easier throughout SMBs, as smaller teams enable new ideas to flow and can solve problems faster. Job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction. SMBs are also generally more connected to local communities and participation in community activities leads to a greater sense of purpose. Additionally, SMBs have a much smaller impact on the environment, which is increasingly becoming an important consideration for today’s employees and customers. Though Schumacher's book takes a much deeper dive into the large global effects of scale on people and profitability, the general impact of a company’s size on its products and services is clear. It’s important for all players in the security industry to remember that the commitment and dedication to product quality can be found in businesses of all sizes. Ensuring safety of people, property and assets Large manufacturers may catch your eye, but small business shouldn’t be forgotten, as they can offer end users a robust set of attributes and benefits. While all security companies are aiming to achieve a common goal of providing safety for people, property and assets, smaller businesses can provide extensive value when it comes to driving the economy, innovating in the industry, providing quality employment and offering superior customer service.