Articles by Derek Arcuri
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile credentials are not secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organisation more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organisation deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All smartcards are equally secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organisation vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organisation if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic locks are more vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorised access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be prepared to unlock future benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
GSX 2019 got off to a jaunty start Tuesday. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their booths. There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side), while the trend toward system sales is continuing. Here's a review of Day 1 from the show floor. Dahua continues to educate market “Traffic-wise, the show is better than last year,” observed Tim Shen, Director of Marketing at Dahua Technology USA, at midday on Tuesday. “We met more people from Latin America,” he added. Shen theorised that Chicago is at the center of a larger territory of customers than last year’s location (Las Vegas). Dahua’s presence at the show makes a statement: We’re still here" Dahua has faced some negative publicity in the last year since they were banned from procurement by U.S. government customers by the National Defense Authorization Act (NDAA). Dahua’s presence at the show makes a statement, says Shen. The statement is “We’re still here.” Shen said only one visitor to the Dahua booth even mentioned the NDAA on the first day of the show, and the visitor was misinformed about the provisions and implications of the law. “There is a lot of misinformation,” he says. “We need to continue to educate the market.” Facial recognition, video metadata, and people counting New at the show is the Dahua Analytics+ line of cameras that feature more in-depth analysis of data such as facial attributes, video metadata, and people counting. For example, the cameras can identify 128 points in a face, with an additional 256 attributes analysed by the back-end recorder. Analysis can provide information such as age and gender, which can help a retailer analyse the demographics of their customers, for instance. Dahua is also adopting some of its consumer line of products for sale through the commercial channel. These include a flood light camera, a 2-megapixel WiFi camera and a doorbell camera. The products might be used outside of a retail store, for example, to complement Dahua commercial cameras that are used inside the store, says Shen. Dahua previewed a new multi-sensor camera that also includes a speed dome. The multi-sensor component combines eight views, each 2 megapixels, for a total of 16 megapixels. Below the multi-sensor camera is mounted a speed dome that can zoom in on regions of interest in the larger multisensor view. The camera will be launched in the fourth quarter. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their exhibits ACRE report continued North American growth “The industry’s momentum will continue to grow,” predicted Joe Grillo, Principal of ACRE. New areas such as cloud and mobile credentialing have the fastest growth rate, but are starting from a much smaller base, he said, so momentum in those categories will take time. ACRE sees continued rapid growth with no slowdown in the North American market Grillo noticed the first morning of GSX was busy, although there was a bit of a lull at midday. In terms of the business outlook, Grillo sees continued rapid growth with no slowdown in the North American market, although there have been some negative elements creeping into the outlook in Europe. Cybersecurity concerns in access control I caught up with Grillo at the booth promoting RS2, a Munster, Ind., access control company that Acre acquired last May. It is the only Acre company that is exhibiting at GSX. RS2 is one of two access control companies acquired by Acre in the last year — the other was Open Options, Addison, Texas. Grillo said the two acquired companies are complementary, especially in terms of their sales channels and geographic strengths. Although both are national companies, RS2 tends to be stronger in the Midwest, while Open Options sales emphasis is centered in Texas and emanates to the rest of the country. Concerns about vulnerabilities are a growing issue in access control, said Grillo, and more large endusers are conducting penetration testing of systems. The industry should welcome the scrutiny, he added. Cybersecurity also represents an business opportunity in access control, noted Grillo. Concerns about the vulnerabilities of legacy technologies such as 125Khz proximity cards and the Wiegand protocol will likely accelerate the pace of companies upgrading their access control systems There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side) Eagle Eye Networks and cloud-based VMS Ken Francis of Eagle Eye Networks had already realised some new client opportunities during the first day of the show, although he was not optimistic at the outset. In contacting potential clients to meet at the show, he had heard that many were not attending. Among Eagle Eye Networks’ news at the show is full integration of body-cams into their cloud-based video management system. “It’s the most unique thing happening from a video management perspective,” Francis said. Previously, if someone needed a video clip from a body cam, they had to use a separate software system.Five years from now, at least 80 percent of all VMS systems will be cloud-managed" Francis continues to be bullish on the subject of cloud adoption of video management and made a bold prediction: “Five years from now, at least 80 percent of all VMS systems will be cloud-managed.” Eagle Eye Networks is doing its part with “rocket growth” that is reflected in an increase of company employees from 27 to 165 or so. Economies of scale have enabled Eagle Eye Networks to lower subscription prices by up to 45 percent. Genetec's release self-service PIAM system Many of the “new” products at GSX 2019 are slight variations on what was introduced at ISC West last spring. An exception is Genetec’s introduction of ClearID, a self-service physical identity and access management (PIAM) system that enforces security policies while improving the flow of people within the organisation. The new system is integrated with the Genetec's Security Center Synergis access control system. PIAM systems have historically been customisable, complex to install and costly, which is why a lot of companies have not used a system. Genetec’s differentiator is that it is an off-the-shelf, out-of-the-box solution for a broader base of customers. “We scanned the market and found a lack of off-the-shelf identity management systems,” said Derek Arcuri, Product Marketing Manager, Genetec. “Targeting the mid-market, we are providing an accessible, ready-to-go cloud-based system that is ‘baked’ for the average company but can be integrated and expanded to include other systems.” The trend toward system sales at the show is continuing ClearID will simplify operation for the security department, which was previously tasked with a lot of administrative work in response to various departments. ClearID “pushes down” the authority to use the system to stakeholders (such as IT and/or facilities directors) and provides a system they can use themselves without involving security. “It empowers stakeholders and employees to work directly through the system rather than going through security,” says Arcuri. “It gives employees access based on stakeholder policies and improves the flow of people through an organisation. The security director is relieved of administrative work and can work on ‘real’ security.” I saw some other things today, too, which I will share in a future GSX article... And more about the show tomorrow.
The security marketplace is talking about a lot of different subjects. Our website’s Expert Panel Roundtable discussions in 2018 reflected some of the “hot topics” in the industry. The very most-clicked-on Expert Panel Roundtable discussion in 2018 was about privacy issues and GDPR’s impact on physical security systems. Other hot topics that made the Top-10 list of roundtable discussions included obstacles to adoption of mobile credentials, what’s new “on the edge,” and the value of physical security data. Here is a listing of the Top 10 Expert Panel Roundtable discussions posted in 2018, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2018 (including the quotable panelists named and linked below). 1. How do privacy issues and GDPR impact physical security systems? "GDPR specifically restricts the capture and use of EU residents’ personal data and is in direct conflict with the adoption of artificial intelligence (AI) platforms to track individual activities. The challenge for manufacturers will be to design solutions capable of capturing valuable information for security or business intelligence purposes while simultaneously anonymising retained data.” - Peter Strom, March Networks 2. What are the security challenges of the hospitality market? "The primary challenge the hospitality industry faces is the fine balance between the delivery of exceptional customer service and maintaining a safe and secure environment. The industry sees a range of threats, including theft, terrorism and natural disasters, and more modern risks, such as those related to cybersecurity, liability and compliance." - Jumbi Edulbehram, Oncam 3. Where is it inappropriate to install video cameras? "The most obvious examples would be in bathrooms or bedrooms, but the more interesting cases are those that are not so obvious – such as religious institutions like a church or a mosque. An increase in the boldness of would-be thieves has led to a recent rise in surveillance outside of houses of worship." - Stuart Rawling, Pelco by Schneider Electric 4. What technology will impact security most in the rest of 2018? "The hottest trend we are currently seeing in 2018 is the continued adoption of intelligent devices and automation into the security framework. We have embraced a model where our software and hardware components continually get smarter and easier for security and IT teams to manage and deploy." - Stuart Tucker, AMAG Technology 5. What are the obstacles to adoption of mobile credentials for access control? "Mobile credentials have been slow to take off because legacy readers traditionally did not have Bluetooth or NFC capacity. However, upgrade kits will soon be available from some access control vendors, and customers will be able to easily upgrade their readers." - Derek Arcuri, Genetec 6. What’s new “on the edge” of security and video surveillance systems? "As more powerful in-camera chipsets are developed, edge devices are capable of even more powerful analytics that can inform operators in real-time of events requiring attention. Part of this significant evolution is from a form of artificial intelligence (AI) called deep learning." - Paul Kong, Hanwha Techwin America 7. Are integrators and end users overwhelmed by too many choices? "Being proactive in tracking new developments and networking with like-minded professionals are critical. Find out what your colleagues are using or testing, and get their feedback on what is working well, especially if their organisation is similar to yours. Join local groups, attend industry conferences, and connect on social media to compare notes on emerging technologies." - Brandon Reich, Pivot3 8. What role does social media play in promoting security? "Social media can help us reduce false police dispatches by drawing in a personal circle of people that can validate an alarm, whether it be a neighbour looking out their window to see what’s going on, or a family member that knows your travel plans and is taking care of your house." - Wayne Jared, 3xLOGIC 9. How should your security company measure total cost of ownership (TCO)? “When looking at TCO you need to consider the obvious initial capital cost – compared to alternatives – and also the operational costs across the lifespan of the systems, across one, three and five years. On top of this, though, security can add additional value through integration.” - John Davies, TDSi 10. What is the value of physical security data? "While active protection is the primary job of a security system, the data generated by today’s networked solutions can provide a wealth of intelligence to help organisations optimise both their security strategies and their business operations.” - Mark Perkins, Boon Edam
Genetec Inc., global technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that Genetec Security Center Synergis, its IP-based access control system, has received the highest level (Niveau de sureté IV) of the Certification de Sécurité de Premier Niveau (CSPN) by the Agence Nationale de la Sécurité des Systèmes d’Information (ANSSI). Genetec Security Center Synergis Built on an open-architecture, the unified Genetec Security Center Synergis platform offers advanced protection—from access card to software—helping organisations efficiently and securely manage access in single or multi-site facilities. The ANSSI agency carefully studied and tested the Synergis software and hardware components to assure the system adhered to one of the most stringent standards for European governments. The CSPN rating certifies that Synergis has the latest cybersecurity standards to secure communication, servers and data at every level of a security architecture. Synergis Cloud Link and SAM cards When Synergis Cloud Link is installed with an expansion module, it supports three secure access module (SAM) card slots. The SAM cards offer reputable protection for storing an organisation's cryptographic secrets such as the keys required to decrypt MIFARE DESFire EV1/2 credential information. Readers are rendered “transparent” as they no longer contain the keys to decrypt credential information—preventing the risk of skimming and taping attacks. There are many more mechanisms within Synergis which secure communication, servers, and data at every level of the architecture, making it one of most cyber-secure access control solutions available today. “Historically, access control systems were designed to manage credentials for cardholders and administer rights and permissions. With the emergence of so many cybersecurity threats today, the security landscape has drastically changed,” said Derek Arcuri, Product Marketing Manager at Genetec Inc. “The CSPN certification gives an additional level of validation and confidence to our channel community and to the European market—providing our customers with peace of mind, and yet another reason to trust Synergis,” added Arcuri.
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at the Johnson Controls booth, referring to the company’s new PowerSeries Pro intrusion devices. It’s the kind of feedback that makes the expense of exhibiting at a big trade show worthwhile. The new PowerSeries Pro is an extension of Johnson Controls’ existing line that is expressly designed for the commercial security market. The ‘hybrid’ (wired or wireless) device offers ease of installation and full cybersecurity including 128bit AES encryption with spread spectrum for no jamming or interference. It employs frequency hopping technology first developed for the Israeli defence force. Wireless technology for cybersecurity PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product PowerSeries Pro uses PowerG wireless technology and expands the portfolio of PowerG devices from residential through commercial. For use in a wired solution, the main advantage is ease of installation; terminal blocks ‘pop out’ easily and can be wired and plugged back in. Alternatively, PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product – wireless at the same level of cybersecurity as wired. Johnson Controls addresses three big factors with the product line: cybersecurity, user control, and easy installation and dependability. It’s part of Johnson Controls’ broader approach to provide ‘one-stop shopping’, enabling an end user to control their environments, video and access, and protect their contents, according to the company. Need for more security in K-12 schools In addition to reaching end users, lock company Allegion sees the show as an opportunity to meet with technology partners. “It’s great to bring together a concentration of people in the industry,” said Brad Aikin, Channel Led Business Leader, Integrator Channel. “We have had good conversations with technology companies here at the show in terms of partnering, both physical access control and OEM partners. We have also had good conversations with the integrator channel.” From speaking with education end users at GSX, Aikin sees a large unmet need for security in K-12 schools, more so than in colleges and universities. “K-12 is underserved,” he says. “They need to identify their priority of needs, and now they can serve needs they couldn’t before, both layering levels of security and phasing in implementation over time. Now things can be applied and tried out without disrupting the environment.” An example is the Von Duprin RU RM (Remote Undogging and Remote Monitoring) door exit devices, which are being integrated by access control partners Sielox, IDenticard and Vanderbilt. Intelligence is added to the door exit device to enable inexpensive monitoring of secondary, previously unconnected doors. The doors can be monitored and locked or unlocked at various points in the day. Lock company Allegion sees the show as an opportunity to meet with technology partners Bridging the gap between IT and physical security One exhibitor – ADT – noticed more information technology (IT) professionals accompanying their physical security counterparts at this year’s GSX exhibition. “They come along to kill dreams on the spot,” said Morgan Harris, Senior Director Enterprise Solutions, noting the IT department’s frequent hesitancy to add untrustworthy elements to the network. ADT is looking to transform and expand its 144-year-old brand in the commercial security space and has completed eight acquisitions in the last year to accomplish the goal. Some of the acquisitions build on ADT’s expanding cybersecurity initiative, which is both a fully-functioning stand-alone business and an effort to bridge the divide between IT and physical security. ADT is positioning itself to manage enterprise risk in the broadest sense. Combining IT and cybersecurity The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?" “The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?” asked Harris. “Projects have failed because information was lost in translation.” ADT seeks to have skillsets, experience and certifications on both sides of the issue. “It enables us to be the in-between,” says Harris. “We can blend the two together and be the translator. It’s great for both sides, advocating for security counterparts and for the network simplifies deployment and processes.” Harris sees a trade-off between cybersecurity and convenience in the industry. For example, if a manufacturer says they have a simplified process and only offers firmware updates once a year, cybersecurity suffers, he said. Lack of third-party testing is another way that manufacturers sometimes trade cybersecurity for convenience, at heightened risk to integrators and end users. Training courses for integrators and partners Milestone Systems is expanding its level of involvement with integrator partners, and now provides Partner Business Reviews (PBR) to assess an integrator’s activities, sales and training, pipeline and marketing initiatives. The partner reviews often uncover issues that can be easily rectified through additional training, says Megan McHugh, Milestone’s Training Marketing Manager, Learning and Performance. Milestone uses a dashboard to track each integrator’s completed training courses and can point out additional courses needed to ensure an integrator partner’s success. Milestone offers a variety of in-person, e-learning and YouTube video courses to train installing partners, systems integrators and self-integrators on best practices Milestone offers a variety of in-person, e-learning and YouTube video courses (in 12 different languages) to train installing partners, systems integrators and self-integrators on best practices. ‘Cloud Labs’ are instructor-led online classes. All courses are linked to a variety of support resources. Sometimes a simple checklist accessed on a smart phone can ensure that every aspect of an install is performed and can instil added confidence in customers. The open platform company’s new agile development cycle – releasing multiple versions of XProtect software throughout the year – creates extra challenges to keep learning initiatives up to date. Along with each new release, various existing courses are updated. The concepts of “training and certification” are being replaced at Milestone with “learning and performance,” says McHugh. Milestone is also looking to hire 170 new R&D staff and open a new centre in Barcelona (in addition to current R&D centres in Copenhagen and Sofia, Bulgaria). Making camera installation easy Hanwha Techwin is another company that is seeing more interest in cybersecurity, as well as concern about whether a product is supported professionally. They have doubled-up production in South Korea and added capacity in Vietnam to avoid manufacturing in China. Thinking about their integrators, Hanwha Techwin is putting more emphasis on making installation easy. Installation costs may be up to 50 percent of a job, so easier installation frees up money to buy more or better cameras. With a new design of their cameras, an electrical contractor can now install the camera base and conduit, and then the integrator can easily plug in the camera later. Camera bases are common across multiple models, so a customer could switch out a 5-megapixel for a 2-megapixel camera later on if they want to (same housing plate). ‘Skins’ allow the colour of cameras to be changed to match surrounding décor. “We are changing the idea of how people approach selling a camera, and it’s a whole new idea of how to install cameras,” said Tom Cook, Senior Vice President, North American Sales, Hanwha Techwin. Hanwha cameras can include a sound classification analytic to detect sounds such as gunshots Cameras with sound detection technology Hanwha offers more flexibility in the field – interchangeable parts are packed together to enable configuration on site. And there is no need to stand on a ladder to position cameras; stepper motors help with remote camera positioning. Multi-sensor cameras have modules (combining lenses and sensors) that can be switched out at installation. Hanwha Techwin cameras can also include a sound classification analytic to detect sounds such as gunshots, screams or glass breaks, especially useful in K-12 education environments. Unification and the customer journey were a key emphasis for Genetec at GSX 2018. Unification for Genetec means combining multiple functions on one platform, from one vendor and using one source code. The company approaches the market by analysing each customer’s journey as it relates to Genetec products. A typical customer journey involves (1) a company looking for standalone systems; (2) the need to centralise systems through integration and unification; (3) increasing automation and workflow; and (4) adding intelligence for more informed decision-making. “Genetec wants to get more in-depth with customers, be more comfortable with their business, and understand their challenges,” said Derek Arcuri, Product Marketing Manager. “We want to get naked with our customers.” Machine learning engine for crime prevention In the city of Chicago, Citigraf detects patterns in crime behaviour and determines where a crime is likely to occur There was a big crowd at the Genetec booth, and not because the comment was applied literally. Genetec has divided itself into multiple parts, each focussed on a vertical market such as retail or transportation. The approach is to operate as a ‘federation of startups’, with each market sector accountable to fill in the gaps in the portfolio to meet the specific needs of each vertical. For example, Genetec’s Citigraf is an unsupervised machine learning engine with an algorithm to detect anomalies and trends from a large pool of data in a municipal environment. In the city of Chicago, Citigraf detects patterns in crime behaviour and determines where a crime is likely to occur. The system alerts operators in a bureau or area that has a higher risk level and should beef up the number of first responders. Chicago has seen a 39 percent decrease in average response time of first responders as a result. In the retail market, Genetec leverages the security infrastructure to analyse shopping trends and provide data for merchandising and operations. “Each customer is getting a portfolio of products tailored to the industry they are in,” says Arcuri. Demonstrating IoT devices Axis Communications displayed its range of products at GSX, demonstrating its almost total transformation from an IP camera company to a supplier of a full range of Internet of Things (IoT) devices. “Axis is broadening its portfolio to include more solutions,” said Scott Dunn, Senior Director, Business Development Systems and Solutions. “Our success is driven by continuing to innovate our portfolio. The market is continuing to grow, and Axis is continuing to expand its market share.” Eight ‘Axis Customer Experience Centers’ around the United States help Axis stay close to their integrators, customers, partners and prospects. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security Axis has offered access control IP edge devices since 2013, and now has a new A1601 door controller being sold with partner-only software (no embedded Axis software like previous A1001 devices). In audio products, Axis has a portfolio of speakers, intercoms, and public address systems. Acquisition of IP door intercom company Enhancing the audio line was acquisition in 2016 of 2N, an IP door intercom company headquartered in Prague, Czech Republic. In North America, the 2N team is now fully part of Axis. The line emphasises simple architecture, programmability, and the ability to integrate widely. The products use Session Initiation Protocol (SIP) to integrate through the cloud or peer-to-peer. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security. Retail, education and enterprise customers are gravitating to IP audio. An IP bridge can tie existing analogue components into the IP system. For perimeter security, Axis offers a radar device to help eliminate false alarms, as well as thermal cameras.
ASIS 2017 was off to a strong start on Tuesday, presenting a new wave of innovation to the U.S. security end user community. Many attendees to the Dallas show are well-placed in their companies to influence or direct the purchase of security products and equipment, and exhibitors sought to impress them with a range of new and enhanced options. Moving from integration to unification In general, the ASIS show has a quieter, less frantic feel than the spring ISC West show in Las Vegas. Conversations are more "intimate" than those common at integrator-focused shows. "End users are very honest about the challenges they are facing," observed Derek Arcuri, Product Marketing Manager of Genetec. "The challenges we are hearing are a symptom of similar problems we hear in conversations with other users. It's more than just technology, it's planning out the strategy and showing them how they can slowly inch toward their vision by investing in a platform that is open and unified." Unification is a buzzword you hear more and more often in the security industry, and unification means something beyond integration. In the case of Genetec, unification summarises a strategy that leverages an identical technology approach underlying every facet of a broad-based solution, including video, access control and other technologies. Arcuri says customers should commit to a unified platform and then use integration to accommodate existing installed products and enable a gradual transition to a systemwide unified system as costs allow. Among Genetec's current and future offerings highlighted at ASIS 2017 are vertical-focused product lines such as Airport Sense, Retail Sense and Traffic Sense, which offer specific capabilities and are all built on the Genetec unified platform. Johnson Controls accelerates product development A year after the headline-making acquisition of Tyco, Johnson Controls kicked off the first day of the ASIS 2017 exhibition with a press event revisiting the big story one year later. Johnson Controls says they are making significant investments in engineering to ensure accelerated introduction of products in the video, access control and intrusion categories – around 100 engineers have been added to the product development team, a 15 percent increase. A press conference by Johnson Controls kicked off the ASIS 2017 exhibition, about a year after their headline-making acquisition of Tyco "As we have come together, all the positives have been realised," said Brian Young, Johnson Controls Senior Vice President of Global Sales and Marketing. The complementary nature of the two businesses -- a prime motivator promoted when the acquisition was announced last year -- has been realised in many ways, including how the technology platforms work together, and even the sales cycles (Johnson Controls typically has a longer sales cycle, while Tyco's business moves faster.) "We are starting to deliver real value," says David Grinstead, Global Vice President and General Manager of Security Products. Johnson Controls executives estimate the overlap of the two businesses is about 15 percent, which translates into 85 percent of new opportunity for crossover business to enhance both operations. March Networks transitions to video software Companies are changing as the market changes. March Networks is transitioning from being a hardware provider to developing software reporting tools that can increase the value of video and data by correlating the two. "Video is becoming more of an operational feature that every institution wants to have. We are more of an information company than ever, focused on software and services," says Peter Strom, President and Chief Executive Officer. "We are seeing how video can play a role beyond security." For example, March Networks' new Searchlight for QSR (quick service restaurants) combines video with various data points, such as those provided by point of sale (POS) systems, to provide a "dashboard" to help a business owner track his business (with data tied into video to enhance the value). Video is stored locally, and data is stored in the cloud; the service is provided for a monthly fee. The company has similar data-driven products in other verticals: Searchlight for Retail and Searchlight for Banking, both providing a "360-degree view" of a business. March Networks has historically emphasised the importance of cybersecurity - driven by demands of its financial and retail verticals Cybersecurity in the video surveillance market March Networks also has historically emphasised the importance of cybersecurity -- driven by demands of the financial and retail verticals they play in. Their cybersecurity approach predates by a decade or more the current concerns in the market, says Strom. March Networks is among the companies that see video taking a new, higher profile among customers -- and not just for security applications. Two verticals that March Networks is active in -- financial and retail -- have been especially impacted by the transition to broader use of video in a company. At ASIS 2017, March Networks is also announcing integration of Patriot One Technologies' covert weapons detection solution with video. The cognitive microwave radar technology detects concealed handguns and other types of weapon, and sends real-time alerts to security. The system is "trained" and continues to "learn" after deployment, getting better and smarter at detecting hidden weapons with each screening. Arecont Vision emphasises ease of use Arecont Vision continues on its theme of making it easier for integrators to install products. They have extended "no-touch" remote setup to the MegaDome G3 Series. A vari-focal motorised lens can be set up remotely in any position with pan, tilt, focus and zoom. The remote setup avoids a technician having to stand on a ladder to adjust and fine-tune the image, which takes extra time and can be hazardous. The MegaVideo 4K 8.3 megapixel camera also has multiple motorised lens options for remote setup. Arecont Vision plans to carry the approach through its entire product line over time, expanding ease of installation to an ever-broadening array of products. This is just a sampling of what I saw and heard on the first day of ASIS, with plenty more still to come. Read SourceSecurity.com's Day 2 coverage here
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, has announced the release of Security Center Synergis™, SaaS edition. This new edition will offer a turnkey access control solution for easier deployment and maintenance. Synergis SaaS edition removes the need to purchase and install costly on-premises servers and streamlines maintenance, allowing the corporate IT staff to focus on other business-critical projects. Synergis SaaS edition is expected to be available in November 2017, and will be demonstrated at ASIS 2017, Booth 3147. Synergis access control solution Synergis is the access control solution in Genetec Security Center, an open-architecture, IP security platform that combines video surveillance, access control, automatic licence plate recognition (ANPR), communications, and analytics. All Synergis access control software editions integrate with a wide selection of access control hardware from leading manufacturers. The new Synergis SaaS edition will give customers the flexibility to adjust their system usage as their needs change, reducing budget requirements for access control capital expenditures. Customers will also be able to quickly and efficiently deploy their access control system, and benefit from automated update notifications. Multi-site organisations will be able to centrally manage their access control systems more efficiently. ACaaS benefits for customers “When we introduced Synergis™ Cloud Link a few years ago, our forward-looking strategy was to offer a future-proof gateway appliance that is cloud-ready,” said Derek Arcuri, Product Marketing Manager for Access Control, Genetec Inc. “Today, we take great pride in announcing Synergis SaaS edition, which will allow customers to leverage all the benefits of Access Control as a service (ACaaS), as they renew their legacy access control systems, while retaining elements of their existing infrastructure”.
With STid readers, customers can manage their own secret keys to read Desfire EV1 cards Genetec, a provider of open architecture security and public safety solutions announced it has added STid, a French developer of RFID door controllers to its growing ecosystem of supported access control partners. Through this agreement, the STid Architect series of ergonomic and highly secure RFID readers, which is supported by the Genetec Synergis access control system in Genetec Security Center—will be available through Genetec and its certified global network of resellers. Genetec Synergis access control system Thanks to the Genetec open-architecture strategy, Synergis end-users now have even more choice for their access control management with the addition of the STid Architect series of ergonomic and highly secure RFID readers. By easing complex ordering processes and reader configurations, Genetec customers can choose the modular, vandal-proof, and highly configurable access control hardware from STid—with a simplified ordering, installation, and maintenance process.“With STid as an active technology partner in our expanding ecosystem of access control partners, Genetec is able to provide customers total control and choice over the security of credential data from readers to the Synergis access control system,” said Derek Arcuri, Product Marketing Manager at Genetec. STid Architect series "STid is in a great position to grow its presence in the North American market with strategic partners like Genetec" The STid Architect series offers secure end-to-end control of an organisation's access control data, from reader to controller, using stringent encryption and authentication methods. With STid readers, customers can manage their own secret keys to read Desfire EV1 cards. The STid readers are available with a standard Wiegand interface or with a secured communication channel that mitigates the risk associated with credentials tapping or man-in-the-middle attacks. This is particularly interesting for compliance reasons in instances where keys cannot be stored on the reader itself.“STid is in a great position to grow its presence in the North American market with strategic partners like Genetec,” said Vincent Dupart, Chief Executive Officer at STid. “Customers are looking for secure, open, and user-friendly solutions—three key success factors that give STid and Genetec solutions stand-out options in their respective markets,” added Dupart.
For systems integrators, this integration will offer a greater choice of industry-standard wireless electronic locks Genetec Inc. (“Genetec”), a provider of open architecture security and public safety solutions announces a technology partnership with SimonsVoss GmbH, a European manufacturer of electronic locks. Through this partnership, Genetec will be able to integrate the SimonsVoss SmartIntego Digital Locking Cylinder, Smart Handle and Padlock Wireless Locks with Genetec Synergis—the IP-based access control core system in Genetec™ Security Centre, the company’s unified IP security platform. This will offer a cost-effective and scalable solution for a wide range of customers, including higher education, healthcare, retail and governmental institutions. Customers will be able to enrol SimonsVoss locks into their Synergis access control system with version 5.6 of Security Centre, which is expected to be available in early Q2, 2017 through the Genetec Channel Partner Program. Cost effective solution With the cost of hardwired access control installation increasing, due to infrastructure complexity and compliance requirements, the ease and speed of installation of a wireless access control solution saves customers money. It also greatly enhances an organisation's security for staff, visitors and property—both physical and intellectual. For systems integrators, this integration will offer a greater choice of industry-standard wireless electronic locks. Overall system design and deployment will be greatly simplified, allowing Genetec certified channel partners to leverage wireless locks and significantly reduce installation time and labour costs typically associated with hardwired solutions. Greater choice in access control hardware “We are thrilled to add the SimonsVoss brand to our expanding portfolio of supported locks," said Derek Arcuri, Product Marketing Manager, Genetec Inc. “Both companies will now be able to offer end-users and systems integrators a greater choice in access control hardware, whether for designing a new physical security system or updating an existing one,” added Arcuri. "The integration of our SmartIntego locks with the enterprise-class Synergis access control software from Genetec, will enable a scalable access control solution that meets today’s needs as well as provide an easy pathway to future upgrades," said Bernhard Sommer, Managing Director at SimonsVoss GmbH. When Synergis and SimonsVoss locks are deployed alongside Genetec video surveillance products, users will be able to view all their lock events and activities seamlessly linked with live or recorded video, giving security professionals a more complete, unified view of their organisation’s security.
New status reflects on-going commitment to innovative access control integrations with Mercury Solutions Genetec Inc., a provider of open architecture security and public safety solutions announces that Mercury Security, the global leader in the supply of OEM access control hardware, has chosen Genetec to join its group of Platinum Elite Partners. The Platinum Elite Programme recognises Mercury's select business partners who demonstrate sustained market growth, and access control technology based on an open architecture with the deepest levels of integration with Mercury solutions. Enhancing relationship with Mercury By achieving Platinum Elite Partner status, Genetec will be able to further enhance its collaborative relationship with Mercury by serving as an extension of both companies engineering and development teams. Together, Genetec and Mercury will be able to collaborate even more closely to provide advanced solutions that address the increasing demand for a more open approach to update legacy access control modules to a unified, IP-based system. "As a Mercury Security technology partner and reseller for just a few short years, we take pride in having achieved Platinum Elite status so rapidly,” said Derek Arcuri, Product Marketing Manager at Genetec. “With our shared commitment to developing advanced access control solutions based on an open architecture, we are confident we will make the market’s transition to IP access control and unified security as simple and cost efficient as possible for our joint customers and integrators," added Arcuri. "Genetec has grown to become a leading force in the Access Control industry, and a trusted partner to Mercury," said Matt Barnette, President of Mercury Security. “We are pleased to add them to our chosen group of Platinum Elite Partners and look forward to working even more closely with their engineering and development teams to deliver open, Authentic Mercury based solutions to the market."
Genetec Retail Intelligence will provide real time insights as well as in-depth analytics based on activity patterns over time At NFR Retail's Big Show Convention and Expo at booth #930, Genetec, a provider of IP security and intelligence solutions will preview a new application designed to transform existing video surveillance content into powerful consumer insights. The new Genetec Retail Intelligence application will filter and analyse incoming video surveillance data to produce actionable intelligence about store operations, buying patterns, and trends. Powerful analytics Armed with this information, marketing, operational, and merchandising staff working at boutique-style stores or large multi-site retailers will be able to improve their customers' experience, increase consumer engagement, and positively affect in-store profitability.By analysing and correlating data provided by multiple sensors such as video surveillance cameras and point-of-sale systems, Genetec Retail Intelligence will help retailers gain a deeper understanding of their customers’ behaviours, needs, and preferences to build a more personal relationship.With powerful analytics such as queue management, heat mapping, directional analysis, people counting and conversion rate analytics, Genetec Retail Intelligence can notify relevant staff in real-time to respond to an influx of shoppers in the store or within a specific department. The application will also inform store management when checkout lanes or changing room lines become long so they can reassign staff as necessary. Optimising inventory strategies Marketing and merchandising professionals will also be able to use the data provided by the application to refine their promotions and optimise inventory strategies, from within a single interface. "There is a wealth of information collected by security systems that has gone virtually untapped until now” "There is a wealth of information collected by security systems that has gone virtually untapped until now,” said Derek Arcuri, Product Marketing Manager for Genetec Retail Intelligence. “Our Genetec Retail Intelligence application will help retailers not only gain insights into store performance and customer buying patterns, but will generate powerful analytics-driven intelligence, delivered in a format that can be easily understood, interpreted and shared. Genetec Retail Intelligence will be available via a cost-effective subscription basis that will work with a wide variety of camera brands, and will not require complex and expensive additional equipment," added Arcuri. Customisable dashboardWith a user-friendly customisable dashboard, Genetec Retail Intelligence will provide real time insights as well as in-depth analytics based on activity patterns over time. Accessible from any Internet-enabled device, Genetec Retail Intelligence will allow retailers to stay connected regardless of where they are located.Genetec Retail Intelligence is designed to be infinitely scalable and optimised to easily interpret data from a multitude of stores—from small franchise operations to large-scale retail chains. Information gathered from multiple stores in different locations will be available for comparison across locations, giving retailers a greater understanding of their entire business operations.Genetec Retail Intelligence is expected to be available in early Q3 2017, and will work with new or existing security installations on a subscription basis. Genetec will provide first-look’ demonstrations next week at the NRF Retail’s Big Show at the Jacob Javits Convention Centre in New York on booth #827.
Customers can expect to enrolAllegion Schlage AD-Series into their Genetec Synergis access control system in Security Center v5.5 Genetec Inc. “Genetec”, a leading provider of open-architecture, unified IP security solutions recently announced plans to support the Allegion Schlage® AD-Series of hardwired and wireless locks. Cost-effective & scalable solution Through this integration, the Schlage AD 300 and 400 Series can be seamlessly integrated into Genetec™ Synergis™ — the IP-based access control module in Genetec™ Security Center, the company’s unified IP security platform that combines access control, video surveillance and automatic license plate recognition (ALPR). This integration will offer a cost-effective and scalable solution for a wide range of customers, including higher education, healthcare and commercial real estate institutions. Customers can expect to enrol Schlage AD-Series into their Synergis™ access control system in Security Center version 5.5 (expected in Q2 2016), and will be available through the Genetec™ Channel Partner Program. Greater choice of hardwired & wireless electronic locks The addition of Allegion to the Genetec™ technology partner ecosystem will also give systems integrators access to an ever-greater choice of industry-standard hardwired and wireless electronic locks. In many cases, overall system design and deployment will be greatly simplified, allowing Genetec™ certified channel partners to leverage wireless locks that significantly reduce installation time and labour costs typically associated with hardwired solutions, without having to compromise on reliability. “We are excited to announce our partnership with Genetec as a leader in access control solutions providing end users with enterprise-class software coupled with responsive and durable locks. The integration with Allegion Schlage AD-Series locks with the Genetec™ Synergis™ access control platform enables organisations to extend the reach of their locks without compromising security,” said Robert Gaulden, Director Aftermarket & Electronic Sales at Allegion Inc. Ability to migrate to true IP access control solution Through this integration, users will be able to leverage interchangeable reader modules that integrate legacy card technologies with newer ones as budgets permit for a phased implementation of new IP-based technology. Existing Allegion customers will also be able to migrate to a true IP access control solution while maintaining their existing investment in Schlage access control hardware. “Genetec is pleased to be able to team up with Allegion to offer our end-users a greater choice in access control hardware, whether they are designing a new physical security system or updating an existing one,” said Derek Arcuri, Product Marketing Manager, Genetec Inc. “Now, customers can leverage the Synergis™ access control solution in Security Center to deploy a scalable IP-based system that brings together both traditional wired access control with Allegion’s family of hardwired and wireless electronic locks," added Arcuri. When Synergis™ and Schlage locks are deployed alongside Genetec™ video surveillance products, users will be able to view all of their lock events and activities seamlessly linked with live or recorded video, giving security professionals a more complete, unified view of their organisation’s security.
RFID and smartphone readers in physical access controlDownload
Access control & intelligent vehicle screeningDownload
How plate reader technology increases your perimeter securityDownload