People and vehicle access control specialist Nortech will be exhibiting at Elevate 2019, the meeting place for UK’s growing physical activity sectors at London’s ExCel on the 8-9 May to introduce its innovative products to the market. 2019 is Nortech’s first time at the show and they will be demonstrating the flexibility of the Norpass access control solution, which provides a wide range of features that are ideally suited to the leisure sector. Access control sector With No...
ADT, a provider of monitored security and interactive home and business automation solutions in the United States and Canada, unveils its new ADT Commercial brand and positioning video, as part of its multi-year expansion plans. Since the merger with Protection 1, ADT has built upon its commercial capabilities and customer focused approach combining more than ten strategic acquisitions, bringing decades of experience to commercial and national account customers. ADT’s announcement is part...
Johnson Controls announces that the Tyco Visual Intelligence from Software House, a unique metric-based reporting tool for C•CURE 9000, receives the award for Best New Product in the Convergence and Integrated Software and Solutions category. The award was presented at the 2019 SIA New Product Showcase, during ISC West in Las Vegas. Sponsored by the Security Industry Association, the annual awards program is one of the most prestigious recognitions in the security industry. The program rec...
The excitement of ISC West 2019 continued until the very end – almost. Exhilarated by the first two busy days of the show, attendees and exhibitors seemed to welcome a slower third day. There were no complaints about booth traffic, and still plenty of thoughtful conversations taking place, everyone determined to maximise the value of face time with customers until the last second. Building an IoT ecosystem in SAST At a show lacking in high-profile new technology announcements, the bigges...
Winner of the coveted iF award for its superior design, DOOR FOT is a versatile device designed for reliability, modularity and performance. COSEC DOOR FOT, a well-engineered door controller, can be used for applications like time-attendance and cafeteria management. It records exact time of a user using fingerprint, RF card or PIN as credential in less than one second. Features of DOOR FOT: 128*64 Dot Matrix display with touch sense keypad Identification in less than one second 5,00,000 e...
Johnson Controls recently unveiled the findings of its 2018 Energy Efficiency Indicator (EEI) survey that examined the current and planned investments and key drivers to improve energy efficiency and building systems integration in facilities. Systems integration was identified as one of the top technologies expected to have the biggest impact on the implementation in smart buildings over the next five years, with respondents planning to invest in security, fire and life-safety integrations mo...
Matrix, a manufacturer and provider of telecom and security solutions, is conducting Matrix Insight 2019 Jeddah and Riyadh on 18th and 22nd April respectively from 09:00 AM to 12:30 PM. Matrix welcomes everyone in the telecom and security industry from new prospects, strategic partners to existing customers and suppliers. At the event, Matrix will highlight ETERNITY NENX, newly launched unified communication platform for SOHO and SMB. Increasing number of small and medium organisations are migrating to leverage benefits of IP, for such applications, Matrix ETERNITY NENX is a perfect fit. Enhance guest experience Matrix Hospitality solution which is specifically designed to enhance guest experience at Hotels will also be one of the major highlights Matrix Telecom domain will also be showcasing its comprehensive telecom solutions which includes IP-PBX, communication endpoints, media gateways, mobile application and much more. Along with that, Matrix Hospitality solution which is specifically designed to enhance guest experience at Hotels will also be one of the major highlights. Hotel staff can enhance guest experience and improve staff productivity with hospitality features, front desk, PMS integration, staff mobility extensions and voicemail with personalised greetings. In the events, Matrix will showcase futuristic technologies from the security domain. Matrix access control and time-attendance domain will showcase its newly launched face recognition technology for authentication through IP cameras/tablet/mobile. The technology enables contactless authentication with precise and accurate authentication. Apart from this, Matrix will display our high-end cloud based time-attendance and access control solution. Access control solution Mobile being the next generation technology in the security domain, Matrix will showcase mobile based access control solution whereby user can either scan QR code or just twist his/her phone for authentication. User can mark attendance automatically using GPS or Wi-Fi through mobile application. Matrix being the front face in innovation, Matrix is going to show some extraordinary biometric door controllers useful for applications in time-attendance, access control, visitor management, cafeteria management and many more. Furthermore, access control being the prime requirement in terms of security, Matrix will present its standalone access control solution with license free environment, whereby a single panel can handle up to 255 doors and 25,000 users. Get a glimpse into the cutting-edge Matrix biometric solutions with multiple credentials such as face, fingerprint, palm vein, RF card and PIN options at Matrix Insight, Jeddah and Riyadh. Better bandwidth optimisation The entire solution focuses on automating processes, easy integration with Access Control and enhancing efficiency of organisations Matrix will also be showcasing an enterprise-grade IP video surveillance solution designed, engineered and built specifically for growing multi-location organisations. The entire solution focuses on automating processes, easy integration with access control and enhancing efficiency of organisations. Matrix will also be showcasing a new range of audio compatible and compact professional series IP cameras powered by SONY STARVIS series sensors with EXMOR technology. This gives the cameras an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimisation and many other features. Intelligent software Furthermore, Matrix will be showcasing new extreme series of Network Video Recorder (NVRX) at the event. This NVR is equipped with 4K decoding capacity and characteristics like cascading (up to 20 NVRs), camera-wise recording retention and database level integration. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for real-time Security. “Events like Matrix Insight are important to us because they give us the chance to connect with our partners, SIs and prospects. We look forward to explore and spread our footprints in the territory through this product expo, showcasing our innovative solutions that can help accelerate business growth”, said Ganesh Jivani, Managing Director.
HID Global, a global provider of trusted identity solutions, introduced a game-changing augmented reality tool that innovates how integrators, installers and consultants deploy and use HID’s access control products. The new HID AR Reader Tool optimises and expedites installation, while simplifying onsite upgrades and support with a powerful combination of 3D data and guided animations in real-world environments. “The HID AR Reader Tool is the natural next step in our digital transformation and our commitment to continually make it easier to do business with HID – including simplifying the deployment and use of our products,” said Stephen Carney, Vice President of Product Marketing, Physical Access Control Solutions with HID Global. “By taking 3D data and placing it in the real world, the tool goes a long way in using AR technology to provide HID’s installer, integrator, consultant and specifier community with enhanced access control project design, review, collaboration, installation and support capabilities.” Reduces maintenance call times Organisations can leverage the HID AR Reader Tool to maximise investments in building information modellingThe augmented reality tool makes it possible to reduce maintenance call times as well as downtime by enhancing communication and collaboration between local and remote teams. It also improves install training and streamlines reworking installs with guided, step-by-step deployment, upgrade and troubleshooting walkthroughs using 3D models in the real deployment scenario. Organisations can leverage the HID AR Reader Tool to maximise investments in building information modelling, the process of generating digital representations of physical places. BIM can then be used to track installation progress, identify discrepancies, and assure quality by overlaying models and relevant information in the real world. It can also clearly and confidently illustrate the design intent and impact for all access control stakeholders to accelerate decision making. Capabilities of HID AR Reader Tool app Initial capabilities are available by simply downloading the HID AR Reader Tool app to an Android or iOS tablet for the following use cases: OSDP/Bluetooth Low Energy (BLE) Module Upgrades: The tool renders and animates reader, the process of opening the reader, removing its foil cover, and plugging in the OSDP and/or BLE module to the reader. Backplate Installation: The tool renders and animates the mounting box and animates mounting the backplate onto the junction box, including animated detail such as the screws for mounting. OSDP Wiring of the Reader to Panel: The tool renders and animates reader wiring and animates controller and wiring. Demonstration at ISC West Popular iCLASS SE readers are immediately available in the complementary HID AR Reader Tool and additional readers are being added on a regular basis. The tool will be extended to include additional augmented reality capabilities throughout 2019 and beyond. Visit HID Global in Booth #11063 for hands-on demonstrations of the HID AR Reader Tool at ISC West from April 10-12, 2019 at the Sands Expo in Las Vegas.
LenelS2, a provider in advanced security systems, and Milestone Systems, an international open platform developer of networked video management software (VMS), announces a 10-year agreement for LenelS2 to distribute Milestone products globally. The companies had a previous agreement for North America. LenelS2 is a part of Carrier, a global provider of innovative heating, ventilating and air conditioning (HVAC), refrigeration, fire, security and building automation technologies. Founded in 1998, Milestone is a stand-alone company in the Canon Group. Seamless user experience The joint offering of LenelS2 OnGuard access control and Milestone XProtect video management software through the LenelS2 channel lowers the total cost of ownership for end users and integrators by offering reduced licensing fees and efficient pre- and post-sales support. This integration, which has been successful through the LenelS2 OpenAccess Alliance Program (OAAP) and Milestone Certified Solution, provides customers with tight, efficient interoperability between the OnGuard and Milestone XProtect systems. We’re excited to expand this proven, integrated access-video offering to customers globally" “We’re excited to expand this proven, integrated access-video offering to customers globally,” said Jeff Stanek, president, LenelS2. “This strategic integration will provide our partners the benefit of an offering from the VMS and access control solution providers in the global security industry. This integration includes a seamless user experience and specific interface enhancements across our systems, a direct outcome of the collaborative effort.” Leverage the momentum “Customers have reacted very well to our collaboration,” said Kenneth Hune Petersen, chief sales & marketing officer, Milestone Systems. “Rather than being locked into a single provider, customers can work with two companies that have real synergies. As security threats become more sophisticated, continuous innovations with strong interfaces between industry pioneers are in demand. That’s what this alliance delivers.” “We are excited that this agreement has been expanded into a global partnership,” said Stephane Baudena, managing director, Fire & Security Products, EMEA, LenelS2. “This will allow us to leverage the momentum and proven success achieved by the North American team.” LenelS2 and Milestone Systems have a combined 40 years of industry experience in providing customers with proven security solution technologies. Both companies offer open platform solutions that provide customers flexibility to select the optimal security systems to meet their needs. Milestone Systems has been a member of the LenelS2 OAAP since 2012.
Senstar, global provider of video management and perimeter intrusion detection solutions, is pleased to introduce two new products at ISC West - Senstar Symphony Access Control (AC) and the FiberPatrol FP400 zone-based intrusion detection system for fence applications. Symphony AC is an open software solution designed to support the industry’s most trusted brands of access control and intrusion hardware. Available as an extension to the Symphony Video Management Software (VMS), the module provides a full set of access control functions, including enrollment, scheduling, monitoring, and reporting. FiberPatrol FP400 intrusion detection system The FiberPatrol FP400 is one of the most affordable fiber optic perimeter intrusion sensors on the market. Each processor provides up to 4 zones of detection and supports insensitive lead-in enabling electronics to be installed up to 12 miles from the perimeter fence. It is ideal for small sites with concerns over EMI, lightning, or conductive elements on the perimeter. Symphony AC and FiberPatrol FP400 are examples of Senstar’s continued commitment to developing products" “Symphony AC and FiberPatrol FP400 are examples of Senstar’s continued commitment to developing products to meet the evolving security needs of our customers," said Kristen Cory, Vice President Sales, North America. "Both these products address very specific site requirements, allowing Senstar to offer more options to our customers and continue to build on our success as one of the industry’s most trusted and reliable security providers." Senstar Symphony VMS To learn more about Senstar Symphony AC and the FiberPatrol FP400, visit Senstar at ISC West Booth 17109. Also check out other award-winning products, including Senstar Symphony VMS, the Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system, FlexZone ranging fence-mounted intrusion detection system, and the Senstar Thin Client PC-alternative for video management. Senstar is also proud to be working with valued partners at ISC West. Senstar will be exhibiting on the Axis booth 14051 and is a sponsor at the Anixter booth 16039 at the event.
ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, has announced the introduction of “touch io”, a new Bluetooth reader and credentialing option for smartphones designed for use with the company’s cloud-based access control solution, pdk io. Touch io Bluetooth reader touch io does not require the user to unlock the phone in order to gain access through a protected door Touch io brings new levels of convenience and security for the communication between smart phones and access control door readers, eliminating the need for cards or fobs. Unlike other systems, touch io does not require the user to unlock the phone, or to even remove it from pocket or purse, in order to gain access through a protected door. The individual’s identity is validated through communication directly between his/her credentialed device and the reader, via Bluetooth, bypassing the need for internet or cellular connectivity. This can occur from distances as far as 30 feet away, as defined by the customer. By the time the user reaches the door and indicates an intent to enter, by simply touching or tapping a hand to the reader, door activation is immediate and seamless. A combination of machine-learning algorithms that learn door opening patterns, combined with directional antennae placed on each side of controlled doorways, ensure that credentials are not inadvertently validated when employees pass in proximity to the doors from the unlocked side. Superior security Compared to traditional RFID proximity cards, as well as to more high-tech 13MHz contactless smart cards, PDK’s mobile credentials offer superior security on many fronts. Touch io credentials are impossible to clone, each possessing a randomly-generated, unique ID, are authenticated by the Bluetooth reader at each use, and employ a session-unique encryption key for communication with the reader. Furthermore, if a phone is lost or stolen, its owner can immediately deactivate the credential by remotely wiping the phone with a tool like “Find My Phone,” a precaution he or she is likely to take out of concern for other personal data also stored on the device. By contrast, if a wallet or keys are lost that contain a card or fob, the credential remains active until the company’s system administrator is notified of the loss – which may sometimes take days. Cloud-based access control We are making the use of smartphones both more convenient and more secure than traditional methods" The touch io reader is compatible with legacy systems, capable of reading traditional proximity cards. Mobile credentialing is available as part of the pdk io affordable system licensing plan, offering users an unlimited number of credentials for a low, per reader, annual subscription. System administrator can easily generate and assign these to employees with just a few clicks from within the pdk io software management interface. Josh Perry, Chief Technology Officer at PDK, explains, “Until now, the access control market has been filled with Bluetooth mobile credentialing options that offer an inferior customer experience to traditional RFID cards which are, quite frankly, reliable and convenient. With PDK’s touch io, we are redefining the category, making the use of smartphones both more convenient and more secure than traditional methods. It’s the latest example of how our corporate commitment to innovation is bringing a litany of tangible benefits to the security professionals, system administrators and the employees who use our systems every day.”
Matrix, global manufacturer and provider of telecom and security solutions, is participating in the Secutech India 2019, to be held at the Bombay Convention & Exhibition Centre (BEC) in Mumbai from the 25th to the 27th of April 2019. Matrix will be showcasing its high-tech range of IP video surveillance and access control solutions at the event. IP cameras with SONY STARVIS series sensors The entire solution focuses on automating processes and enhancing efficiency Matrix will be showcasing an enterprise-grade video management solution (VMS) designed, engineered and built specifically for growing multi-location organisations. The entire solution focuses on automating processes and enhancing efficiency of organisations. We will also be showcasing a new range of Audio compatible and compact Professional Series IP cameras powered by SONY STARVIS series sensors with EXMOR technology. This gives the cameras an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimisation and many other features. Furthermore, we will be showcasing our new Extreme series of network video recorders (NVRX) at the event. This NVR is equipped with 4K decoding capacity and characteristics like cascading (up to 20 NVRs), camera-wise recording retention and database level integration. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for real-time security. COSEC ARGO door controller Matrix is known for offering technology driven, innovative, futuristic solutions catering to diverse and complex deployments especially for the SMB, SME and large enterprises. At this event, Matrix Comsec is going to unveil COSEC ARGO – the next generation door controller with a blend of performance and aesthetics. The door controller is equipped with features like 3.5” IPS touchscreen LCD with Gorilla Glass The new door controller is equipped with features like 3.5” IPS touchscreen LCD with Gorilla Glass, powerful processor for ultra-fast user identification, intuitive user experience, vandal resistance (IK08). Our solution experts will be demonstrating the standalone access control solution and exhibiting the Aadhaar-enabled biometric attendance system. Or solution experts will also showcase some extraordinary biometric door controllers useful for applications in time-attendance, access control, visitor management, cafeteria management and more. PARISAT MS100 video conferencing solution Matrix Telecom domain will be showcasing its enterprise meeting server – PARISAT. An enterprise-grade video conferencing solution, PARISAT MS100 can conduct meetings between people spread across multiple locations and time zones. It brings all the participants face-to-face in a virtual conference. This makes their presence, communication and information sharing as good and as easy as if they all were physically present in a real conference room. With 12-party HD video conferencing, PARISAT brings meetings to life. At the event, Matrix will also highlight ETERNITY NENX, newly launched unified communication platform for SOHO and SMB. Increasing number of small and medium organisations are migrating to leverage benefits of IP, for such applications, Matrix ETERNITY NENX is a perfect fit.
ISC West continues to innovate and adapt to the changing needs of the security marketplace. In 2019, there will be 200 new exhibitors, 100 new speakers and an expanding mix of attendees that includes more end users and international attendees. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas. Among the more than 200 new exhibitors on the show floor will be Dell Technologies, Resideo, SAST (a Bosch IoT startup), Belkin International, NetApp, Lenovo, Kingston Technology and many others. The event continues to see more and more solutions in the area of IoT/connected security, a surge in barrier/bollards exhibitors, an increased number of start-up companies, and an emphasis this year on stadium/major events security. Plus, the new exhibit area of ISC West, Venetian Ballroom, will include a mix of solutions from mid-sized domestic and international companies, and is the home of the Emerging Technology Zone – back for its second year with 50-plus start-up companies expected. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas “ISC West is no longer just about video cameras, access control systems and alarms,” says Will Wise, Group Vice President, Security Portfolio for Reed Exhibitions, which produces and manages ISC West. Embracing and stimulating the market dynamic of comprehensive security for a safer, connected world, solutions on display at the show reflect convergence across physical security, IT (information technology) and OT (operational technology). The ISC West expo floor includes specialised featured areas such Connected Home, Public Safety & Security, Connected Security, Unmanned Security Expo and the Emerging Technology Zone. Plus, complimentary education sessions in the Unmanned Security Expo theatre will include topics such as drones, counter-drone solutions, ground robotics and regulations/policies that support autonomous technology. This year’s event will feature more than 1,000 products and brands covering everything from video surveillance, access control and alarms/alerts, to IoT, IT/cybersecurity convergence, AI, embedded systems, drones and robotics, smart homes, smart cities, public safety and more. The ISC West expo floor includes specialised featured areas such Connected Home and the Emerging Technology Zone Elevating the Keynote Series Over the past few years, ISC West has elevated its Keynote Series (open to all attendee types) to include more speakers and dynamic content covering relevant topics. Attendees should be sure to head to the Keynote room Wednesday and Thursday mornings at 8:30 a.m. before the expo floor opens at 10 a.m. Relating to attendance, ISC West continues to diversify and grow the attendee universe by attracting additional enterprise government end-users across physical and IT/OT responsibilities. The show also continues to attract and grow the channel audience, and there will be an increasing number of International attendees. “Years ago, ISC West was known exclusively as a dealer/integrator/installer show, but not anymore,” says Wise. “Today, the demographic mix continues to evolve as the event diversifies its product and educational offerings, embracing the current market reality of collaboration among integrators/dealers/installers, end-user decision-makers, and public safety and security professionals.” When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities Within the SIA Education@ISC West conference program, there are over 100 new speakers. Through ISC West’s strong partnership with the Security Industry Association (SIA, the Premier Sponsor of ISC), the SIA Education@ISC West program has expanded and become increasingly dynamic and diverse over the last three years. In addition, ISC West and SIA are hosting a Women in Security breakfast on Friday morning April 12th. Women in Security is a new track for the education program. “Our attendance data reflects the demand for a mix of physical security integrator and end-user content, a balance of technical and management/strategic topics, and diverse topics incorporating IoT and cybersecurity/physical security convergence, and analytics expertise,” says Wise. “Last year was a record year for conference program attendance, and 2019 will yet again set new benchmarks.” Mobile apps, information desks and ease of registration ISC West is also focusing on the attendee experience. Need advice on what exhibitors are a fit for your business needs and interests? The Information Desk adjacent to the main expo entrance will provide customised recommendations based on the information attendees provided during the registration process. Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website to research exhibitors and product categories, receive exhibitor recommendations that best fit business needs, review complimentary educational opportunities as well as 85-plus sessions from the paid SIA Education@ISC program. There are many networking opportunities being offered at the show this year. When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities. Whether attendees want to network with peers or customers at an awards ceremony (Sammy Awards, Fast 50, New Product Showcase Awards), Charity event (AIREF Golf Classic, Mission 500 Security 5K-2K Run/Walk), or an industry party (SIA Market Leaders Reception, ISC West Customer Appreciation Party at Tao), there are a variety of special events offered, all designed to help you make new connections. Make sure to check out the ISC West website for all the Special Events taking place at ISC West.
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging defacto Weigand wiring standard. Updating OSDP-readers simultaneously One recent addition enables end users to push firmware and software updates to thousands of OSDP-enabled card readers simultaneouslyOSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. One recent addition enables end users to push firmware and/or software updates to a few or thousands of OSDP-enabled card readers simultaneously. Weigand technology requires updates to be made one at a time at each reader. Regularly changing reader encryption keys is an excellent way to enhance facility security. It’s easy using the OSDP file transfer capability and the latest DESFire EV2 credentials containing multiple encryption keys. You can transfer the next code on the card to all readers and the job is done. And there’s no need to create a new card for each user or reprogram each individual reader. AES-128 encryption ensures cybersecurity It’s time to migrate entirely away from Weigand technology. If greater security, convenience and reduced labour from the latest OSDP updates isn’t reason enough, here are a few more things to consider. The 40-year-old Weigand protocol provides no signal encryption, making it easy for hackers to capture the raw data transmitted between cards and readers. OSDP readers support AES-128 encryption while providing continuous monitoring of wires to guard against cybercriminals. Weigand reader installations require homerun cable pulls from the control panel to each peripheral device. OSDP readers can be daisy chained, providing additional savings on cabling and installation time. Weigand technology is simply too slow to work with today’s most versatile and secure card technologies. OSDP readers work with virtually all modern access control cards. The OSDP standard also works with biometric devices; Weigand does not. Meeting requirements of FICAM guidelines SIA is pushing to make the latest OSDP version a standard recognised by the ANSI, a move to enhance the global competitiveness of U.S. security businessesAlso, OSDP is becoming a must-have standard for organisations demanding the highest security levels. The standard meets requirements of the Federal Identity, Credential and Access Management (FICAM) guidelines that affect how the access control industry does business with the federal government. SIA is pushing to make the latest OSDP version a standard recognised by the American National Standard Institute (ANSI), a move to enhance the global competitiveness of U.S. security businesses. There’s still a large worldwide reader installation base that works solely with the Weigand protocol. Admittedly, changing them all at one time may be prohibitively expensive; however, standards should be viewed as a journey, not a destination. That’s why a measured migration is the right choice for many organisations. Begin by securing the perimeter. Replace only the outside-facing Weigand readers. As long as the walls are secured, the inside can remain a softer target until OSDP-compatible readers can be added indoors. The case for moving to OSDP as a standard is compelling. It offers our industry the opportunity to design access control software and products that provide what end users want most – greater security, flexibility and convenience.
With the coming of a New Year, we know these things to be certain: death, taxes, and… security breaches. No doubt, some of you are making personal resolutions to improve your physical and financial health. But what about your organisation’s web and mobile application security? Any set of New Year’s resolutions is incomplete without plans for protecting some of the most important customer touch points you have — web and mobile apps. Every year, data breaches grow in scope and impact. Security professionals have largely accepted the inevitability of a breach and are shifting their defense-in-depth strategy by including a goal to reduce their time-to-detect and time-to-respond to an attack. Despite these efforts, we haven’t seen the end of headline-grabbing data breaches like recent ones affecting brands such as Marriott, Air Canada, British Airways and Ticketmaster. App-level threats The apps that control or drive these new innovations have become today’s endpoint The truth of the matter is that the complexity of an organisation’s IT environment is dynamic and growing. As new technologies and products go from production into the real world, there will invariably be some areas that are less protected than others. The apps that control or drive these new innovations have become today’s endpoint — they are the first customer touch point for many organisations. Bad actors have realised that apps contain a treasure trove of information, and because they are often left unprotected, offer attackers easier access to data directly from the app or via attacks directed at back office systems. That’s why it’s imperative that security organisations protect their apps and ensure they are capable of detecting and responding to app-level threats as quickly as they arise. It’s imperative that security organisations protect their apps and ensure they are capable of detecting and responding to app-level threats as quickly as they arise In-progress attack detection Unfortunately, the capability to detect in-progress attacks at the app level is an area that IT and security teams have yet to address. This became painfully obvious in light of the recent Magecart attacks leveraged against British Airways and Ticketmaster, among others. Thanks to research by RiskIQ and Volexity, we know that the Magecart attacks target the web app client-side. During a Magecart attack, the transaction processes are otherwise undisturbed Attackers gained write access to app code, either by compromising or using stolen credentials, and then inserted a digital card skimmer into the web app. When customers visited the infected web sites and completed a payment form, the digital card skimmer was activated where it intercepted payment card data and transmitted it to the attacker(s). Data exfiltration detection During a Magecart attack, the transaction processes are otherwise undisturbed. The target companies receive payment, and customers receive the services or goods they purchased. As a result, no one is wise to a breach — until some 380,000 customers are impacted, as in the case of the attack against British Airways. The target companies’ web application firewalls and data loss prevention systems didn’t detect the data exfiltration because those controls don’t monitor or protect front-end code. Instead, they watch traffic going to and from servers. In the case of the Magecart attacks, the organisation was compromised and data was stolen before it even got to the network or servers. Today’s proven obfuscation techniques can help prevent application reverse engineering, deter tampering, and protect personal identifiable information and API communications Best practice resolutions The Magecart attacks highlight the need to apply the same vigilance and best practices to web and mobile application source code that organisations apply to their networks—which brings us to this year’s New Year’s resolutions for protecting your app source code in 2019: Alert The key to success is quickly understanding when and how an app is being attacked First, organisations must obtain real-time visibility into their application threat landscape given they are operating in a zero-trust environment. Similar to how your organisation monitors the network and the systems connected to it, you must be able to monitor your apps. This will allow you to see what users are doing with your code so that you can customise protection to counter attacks your app faces. Throughout the app’s lifecycle, you can respond to malicious behavior early, quarantine suspicious accounts, and make continuous code modifications to stay a step ahead of new attacks. Protect Next, informed by threat analytics, adapt your application source code protection. Deter attackers from analysing or reverse engineering application code through obfuscation. Today’s proven obfuscation techniques can help prevent application reverse engineering, deter tampering, and protect personal identifiable information and API communications. If an attacker tries to understand app operation though the use of a debugger or in the unlikely event an attacker manages to get past obfuscation, threat analytics will alert you to the malicious activity while your app begins to self-repair attacked source code or disable portions of the affected web app. The key to success is quickly understanding when and how an app is being attacked and taking rapid action to limit the risk of data theft and exfiltration. Protecting encryption keys is often overlooked but should be considered a best practice as you forge into the new year with a renewed commitment to app security to ensure your organisation’s health and well-being in 2019 Encrypt Finally, access to local digital content and data, as well as communications with back office systems, should be protected by encryption as a second line of defense, after implementing app protection to guard against piracy and theft. However, the single point of failure remains the instance at which the decryption key is used. Effective encryption requires a sophisticated implementation of White-Box Cryptography This point is easily identifiable through signature patterns and cryptographic routines. Once found, an attacker can easily navigate to where the keys are constructed in memory and exploit them. Effective encryption requires a sophisticated implementation of White-Box Cryptography. One that combines a mathematical algorithm with data and code obfuscation techniques transforming cryptographic keys and related operations into indecipherable text strings. Protecting encryption keys is often overlooked but should be considered a best practice as you forge into the new year with a renewed commitment to app security to ensure your organisation’s health and well-being in 2019. Protecting applications against data breach According to the most recent Cost of a Data Breach Study by the Ponemon Institute, a single breach costs an average of $3.86 million, not to mention the disruption to productivity across the organisation. In 2019, we can count on seeing more breaches and ever-escalating costs. It seems that setting—and fulfilling—New Year’s resolutions to protect your applications has the potential to impact more than just your risk of a data breach. It can protect your company’s financial and corporate health as well. So, what are you waiting for?
The Emerging Technology Zone (ETZ) at ISC West welcomes new startups to the security industry; a requirement for exhibitors is that they have been in business for five years or less. This year, the ETZ will be in the Venetian Ballroom, a new section at ISC West 2019, incorporating companies that were previously featured in the “Global Expo” area along with mid-sized domestic companies and the return of the successful Emerging Technology Zone section. Now located in the Venetian Ballroom adjacent to the Sands Convention Center, this group of exhibitors will also have three large entrances of their own. Latest technology companies The ETZ will be a draw in and of itself and will do better for us than being on the main show floor" “The Emerging Technology Zone is a place for attendees to see the latest technology companies all in one place, rather than searching out individual companies all over the main show floor,” says Tom Buckley, Vice President, Sales and Marketing, for Qumulex, a 2019 exhibitor in the Emerging Technology Zone (ETZ). “The ETZ was an easy choice for us and is, in fact, the deciding factor in our taking a booth,” says Buckley. “As a technology startup, we wanted to be located with the other new companies. The ETZ will be a draw in and of itself and will do better for us than being on the main show floor.” Consistent customer lifetime Qumulex (Booth 40932) was formed in late 2018 by the founders of Exacq and Infinias. The new mobile-first, unified video surveillance and access control platform enables security integrators to increase recurring revenue and achieve consistent customer lifetime value, says Buckley. ”We are launching in the fall of 2019 but are exhibiting at ISC West due to early interest from security integrators wanting an early preview of what is coming.” Also among the 40 or so exhibitors in the Emerging Technology Zone will be a range of new technologies, from artificial intelligence (AI) to cloud solutions to wearables to lighting solutions and more. Video analytics platform Simple, intuitive situational awareness platform that gives first responders a tactical advantage Another ETZ exhibitor is ZeroEyes (Booth 40821), an intelligent video analytics platform, powered by AI, to detect weapons and recognise faces in real time. The company’s goal is to provide school administrators and decision-makers with a simple, intuitive situational awareness platform that gives first responders a tactical advantage. The company was founded by five former Navy SEALS with a combined 50 years of combat experience. “Our platform is being developed right now and has hit an inflection point where artificial intelligence and graphics processors are both capable enough and cost effective,” says Mike Lahiff, ZeroEyes CEO. “This technology is just at the point where it is ready for a wider release and not just for early adopters.” The company will be doing live demonstrations of the product in real time. “It is one thing to tell everyone our capabilities, but it is much more powerful to show our capabilities,” says Rob Huberty, ZeroEyes COO. “We will have cameras set up that are typical of school security systems. These cameras will be linked to the best available hardware on the market. We will showcase our software as it will actually be used in practice.” Companies at ETZ Last year’s Emerging Technology Zone, located downstairs on the lower level of the Sands Convention Center, had a lot of foot traffic and created positive feedback. Some of last year’s Emerging Technology Zone companies are exhibiting in the main exhibit hall this year, emphasising its role as a ‘stepping stone’ as new companies enter the market and then achieve critical mass. This year’s ETZ exhibitors will be looking for a similar level of results from the show. Our expectation is to demonstrate the huge value proposition in proactive security solutions in schools" “We will quantify our success at ISC West in the number of partners and integrators that decide they cannot live without our product,” says Lahiff. “Our expectation is to demonstrate the huge value proposition in proactive security solutions in schools. We want to have partners after the show ready to install our product.” Pre-show preparation will help ensure success. “We are inviting prospects and arranging demos ahead of time,” says Buckley of Qumulex. “Success at any trade show starts before the show. We’re fairly certain about the turnout we will get and the level of interest that integrators will have. We are sending out invites to several thousand security integrators to gain early interest. We also have a suite off the show floor for more in-depth demos.” Affordable solutions The Emerging Technology Zone, along with the other exhibitors in the Venetian Ballroom, will be among the must-see highlights of ISC West. “Attendees will get to see the future in security,” says Huberty. “They will see actual solutions that are affordable and make sense. These solutions will have a clear value proposition.”
A futuristic alternative to plastic cards for access control and other applications is being considered by some corporate users in Sweden and the United Kingdom. The idea involves using a microchip device implanted into a user’s hand. About the size of a grain of rice and provided by Swedish company Biohax, the tiny device employs passive near field communication (NFC) to interface with a user’s digital environment. Access control is just one application for the device, which can be deployed in lieu of a smart card in numerous uses. Biohax says more than 4,000 individuals have implanted the device. Using the device for corporate employees Every user is given plenty of information to make an informed decision whether they want to use the deviceCurrently Biohax is having dialogue with curious corporate customers about using the device for their employees. “It’s a dialogue, not Big Brother planning to chip every employee they have,” says Jowan Österlund, CEO at Biohax. Every user is given plenty of information to make an informed decision whether they want to use the device. Data capture form to appear here! “Proof of concept” demonstrations have been conducted at several companies, including Tui, a travel company in Sweden that uses the device for access management, ID management, printing, gym access and self-checkout in the cafeteria. Biohax is also having dialogue with some big companies in the United Kingdom, including legal and financial firms. Österlund aims to have a full working system in place in the next year or so. A Swedish rail company accepts the implanted chip in lieu of a paper train ticket. They accept existing implants but are not offering to implant the chips. Österlund says his company currently has no plans to enter the U.S. market. The device is large enough to locate easily and extract if needed, and small enough to be unobtrusive Access control credential The device is inserted/injected below the skin between the index finger and the thumb. The circuitry has a 10-year lifespan. The device is large enough to locate easily and extract if needed, and small enough to be unobtrusive. The only risk is the possibility of infection, which is true anytime the skin is pierced, and the risk is mitigated by employing health professionals to inject the chip. Use of the device as an access control credential or any other function is offered as a voluntary option; any requirement by an employer to inject the device would be illegal, says Österlund. It’s a convenient choice that is made “based on a well-informed decision by the customer.” Aversion to needles, for example, would make some users squeamish to implant the device. More education of users helps to allay any concerns: Some 10% of employees typically would agree quickly to the system, but a larger group of 50% to 60% are likely to agree over time as they get more comfortable with the idea and understand the convenience, says Österlund. Protection of information The passive device does not actively send out any signals as you walk. It is only powered up by a reader if a user has access rightsIn terms of privacy concerns, information contained on the device is in physical form and is protected. The passive device does not actively send out any signals as you walk. There is no battery. It is only powered up by a reader if a user has access rights. With use of the device being discussed in the United Kingdom, there has been some backlash. For example, Frances O’Grady, general secretary of the Trades Union Congress (TUC), has said: “Microchipping would give bosses even more power and control over their workers.” A big misconception is that the chip is a tracking device, says Österlund. It isn’t. “We love people to get informed,” says Österlund. “If they’re scared or apprehensive, they can just read up. It’s not used to control you – it’s used to give you control.”
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numerous factors that play into the decline of trade shows in general and not something that is limited to the security industry. Those events that are suffering are no longer serving their target market or have failed to adapt to the changes in the industry they serve. However, what we are seeing now is the rise of focused, more “evolved” trade events which fulfil a gap in the industry event calendar and provide something new and fresh to a disillusioned audience. Q: What will be unique about The Security Event, and what role will it serve in bringing together buyers and sellers in the market? Where (geographically) will attendees come from? What we are seeing is a rise of trade events which provide something fresh to a disillusioned audience Norman: The driving ethos behind The Security Event is that we are “designed by the industry, for the industry.” We were able to start with a blank canvas and take onboard all the feedback from stakeholders throughout the security buying chain and create an event that is sustainable and fit for purpose. We see the role of the event as a very important one – to truly reconnect the currently fragmented UK commercial security industry, back at the NEC in Birmingham. We had originally anticipated that this would be an almost-exclusively UK event in year one. However, we have seen significant interest from potential visitors from across the wider EMEA region who are keen to do business in the UK. We formed a strategic alliance with Security Essen to help facilitate and strengthen our reach in these regions through additional marketing and PR activities. Consequently, early registrations indicate that it will be approximately an 80% UK and 20% international split. Q: What conference programming is being planned to augment the trade show event? Norman: Content will be delivered across three focused theatres, serving the needs of our audience throughout the buying chain. Emphasis will be placed on the latest technology innovations impacting the industry, practical advice on the most pressing issues facing security technicians, and important industry updates and insights. All sessions are focused on delivering tangible benefits to ensure professionals are equipped to stay relevant and to grow their business and we’re excited to be working with key industry bodies, innovators and experts to deliver the programme. We look forward to announcing those in coming weeks. Exhibitors want to re-engage with the thousands of industry colleagues who no longer attend other events on offer Q: Comparisons to IFSEC are inevitable. How will The Security Event be different than the IFSEC Security and Fire shows? What are the advantages of locating at Birmingham NEC? Norman: Both The Security Event and The Fire Safety Event, based at the NEC are completely different to any other trade show in the UK. We pride ourselves in creating a business platform that puts the exhibitors’ needs first, by limiting the size of stands and total number of exhibitors as well as creating a comprehensive CPD accredited educational programme for the visitors. Q: Which big industry players are supporting the launch of The Security Event, and what feedback are you hearing in terms of why they signed up at the show's inception? If a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally Norman: Our founding partners are Assa Abloy, Avigilon, Anixter, Comelit, Dahua, Honeywell, TDSi, Texecom, Tyco and Videcon. The full list of exhibitors and supporting partners can be found on our website. The reasons why they have signed up are very simple. They all see the exact same gap in the industry event landscape as we do. We believe there is a need for a 3-day channel focused commercial security exhibition based at The NEC in Birmingham. Our exhibitors want to re-engage with the thousands of industry colleagues who no longer attend the other events on offer. Q: Your 2019 show will be the same week as ISC West in Las Vegas. Do you think the competitive calendar will be a factor? Norman: In terms of our both our audience and our exhibiting base there is very little overlap with ISC West. Generally, if a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally so we haven’t observed any issues so far. We do acknowledge that having two shows at the same time globally isn’t ideal and we have moved our dates in 2020 to the 28-30 April to mitigate this going forward. The Security Event 2020 will not clash with Las Vegas' ISC West 2020 as it will in 2019, says Norman Q: How will you measure success in the first year of the show? What measurements (show size, number of attendees, exhibitor feedback, etc.) will constitute a "successful" first year for the show?Security Event will continue to evolve year after year, but will intent to stay true to the event's original concept Norman: Great question – the most important barometer of success for me and the team next April is the general industry reaction, after all, this show was created for them. Furthermore, it is vital to us that our exhibitors feel they have achieved their objectives for the show, whether it be quality, quantity of leads or raising awareness of a new product launch. We’ll also be keen to understand how satisfied visitors are with the event, including their views of the content, access to new products/services, effectiveness of the out of hours networking, etc. We are anticipating 6,000 visitors over the 3 days and I believe if we achieve this goal, we will have a strong rebooking on site, laying a great foundation for our 2020 event. Q: How would you expect/hope the show would continue to evolve in coming years? Norman: I hope over the next few years The Security Event cements itself as the industry’s favourite trade show and that exhibitors and visitors alike look forward to every year for both the business opportunities at the event and the networking outside of it. The Security Event will continue to evolve year after year, but I am determined that we stay true to our original concept and the principles on which the show was founded. After all, it is this formula that has proved to be so popular to date.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announces that the Bradley Business Center, located in Chicago, has installed a 3xLOGIC infinias CLOUD access control system throughout the redevelopment project. HTML Global, an IT Managed Services Provider (MSP), oversaw system installation and continues to provide remote system management. Bradley Business Center (BBC) is the largest redevelopment project on Chicago’s north side, comprising over 500,000 square feet, spread over 22 acres. The BBC offers a unique shared office environment for entrepreneurs and professionals and boasts a wide array of features and amenities. Controlling common areas Both organisations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions At present, the 3xLOGIC infinias system manages a total of 43 internal doors throughout the complex, split between BBC-managed doors and those for a tenant company, Compass Health Center. The two organisations manage their own access separately but use some of the same network and PoE switches. BBC doors managed are mainly those controlling common areas and shared amenities— parking, fitness facility, rooftop terrace, and others—but also data rooms and other sensitive areas within the office space. Both organisations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions when requested. “When we started with BBC, they were looking to us for our knowledge base, and we installed a few doors at that time. Then, we built out the system as they added new offices and common areas to be managed,” explained William Hunt, Managing Director, HTML Global. Cloud-based system “The distributed Ethernet network can easily handle all the doors and that simplified installation and on-going management. The BBC property management staff don’t want a server onsite, so a cloud solution nicely fits their needs. Another advantage for BBC is our RMR services and the fact that a cloud-based system is mainly operating expenses, not hardware capital expenses—that’s economically advantageous for a property management business.” “There are so many other advantages to a cloud-based system, especially our ability to add doors when any of the resident companies want to join the system, or to expand the number of doors for existing customers—we can add one door or hundreds of doors upon request,” said Hunt. “Compass likes the system functionality and ease-of-use so much, they recently expanded it to their Northbrook location, too. That way, when staff move between the two facilities, they only need one set of credentials.” Access control system Such high-level control and ease of use is accomplished with minimal hardware on site BBC controls access by zone and/or amenity for each credential holder, administrators can add zones and close access to other zones with a few keystrokes. Door control is granular, making it easy to provide all-areas access to senior staff and highly-limited access, for example, for contractors and temporary workers. Such high-level control and ease of use is accomplished with minimal hardware on site. Many administrators were up and running on the infinias system with very little training, if any. With a cloud-based access control system, new tenants can join the system with ease, or a tenant can be removed from the system in a matter of minutes. Fix things remotely Hunt again, “As an MSP, we are overseeing a system that updates itself automatically, and because BBC management doesn’t have a full-time IT person, that’s where we come in.” The future looks bright for HTML Global with the Bradley Business Center. Current office space is nearing fully-leased status, and BBC management is looking to expand their property offerings into additional buildings located on the same parcel. Hunt is impressed with another feature of the cloud-based system, “The network is set up on PoE switches, so if a door isn’t acting properly, we can fix things remotely, we don’t need to roll a truck—that’s very cost-effective.”
Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. With a wide range of security needs that include protecting staff and patients, securing high-risk facilities, restricting unauthorised access to medication and medical equipment, and streamlining contractor and car park management, Waikato DHB required a security solution that could be applied to both high and low security areas. The system al so needed to provide a comprehensive audit trail and detailed reporting, to identify access movements by employees and help meet legal requirements around the safe and secure storage of medication and equipment. Gallagher single access card control system Gallagher’s access control solution for Waikato DHB utilises a single access-card system that simply and instantly updates access permissions Gallagher’s access control solution for Waikato DHB utilises a single access-card system that simply and instantly updates access permissions, as well as streamlining car parking services. Where high-level security is needed, Gallagher’s system offers Waikato DHB the ability to lock-down areas of the hospital when required, isolating areas and restricting access. Gallagher’s Command Centre Mobile application also delivers duress notifications from buttons located around the hospital directly to a guard's mobile device. Electronic Tag Boards allow contractors to easily sign on and off of the site, ensuring Waikato DHB meets health and safety requirements. In an environment where access profiles change on a daily basis as staff move between different departments, Gallagher’s access control system and Command Centre central management platform ensure staff can approach doors with the confidence that they can enter or leave areas as necessary. The access card system has also reduced the risks associated with handling keys, along with providing detailed reports to meet comprehensive auditing requirements, saving time and cost. 'Security Ward Standard' Waikato DHB's experience with Gallagher products ultimately led them to develop a 'Security Ward Standard' detailing the minimum-security equipment required for new buildings, greatly reducing time spent producing specification documents and gathering approvals. As Waikato DHB's security requirements continue to evolve, Gallagher’s systems provide future-proofing with a software maintenance agreement ensuring they operate the very latest software available. Fast facts about the project Industry: Healthcare Business type: Hospital Number of employees: 6,500 Site Size: 18 hectares with 176,000 sq.metres of buildings Number of doors: Over 730 access-controlled doors; 40 alarmed and monitored refrigerators/freezers; 15 carpark barrier arms; 1 gate. Gallagher solutions and technology utilised: Command Centre Controller 6000 T-Series readers Tag Boards Car park Management
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions announces that the South Grand Community Improvement District (CID) in St. Louis, Missouri is using the Genetec Stratocast cloud-based video monitoring system to deter license plate theft in its parking lot and provide video access to the local police department to help reinforce security. License plate theft One of the services offered by the South Grand CID is free parking. At any time of the day, drivers can park in a central parking lot to visit businesses or residents. While this lot has always been convenient and safe, license plate theft was troubling nearby areas. Video recordings are sent over a wireless network which connects to the South Grand CID main office To deter license plate theft in their own community, the South Grand CID board decided to add video surveillance to the lot. Currently, three cameras monitor the entire 90-space parking lot. Video recordings are sent over a wireless network which connects to the South Grand CID main office, just a few blocks away from the lot. With this cloud-based video monitoring system, Rachel Witt, Executive Director at South Grand CID, can quickly and easily view video from anywhere, at any time. Cloud video system “Using the cloud video system, I am able to find and view the video in seconds. I can narrow down my search based on dates and time and watch the event unfold with all camera feeds up on the monitor. It’s really that simple,” commented Witt. Only two weeks after installing the Stratocast video monitoring system, a visitor reported that their license plates had been stolen. “The visitor provided a description of the car, and a timeframe in which the incident likely happened. Using the Stratocast system, I was able to find and view the video in seconds. I could clearly see the suspect enter the lot, remove the plates and leave in his own car. Since the police are very busy here, I was able to bookmark the video recording and then notify them that the video was ready,” said Witt. View video recordings Stratocast has made it easy for the South Grand CID to give video access to local police so that when a crime is reported in the district, officers can immediately begin to conduct investigations without leaving their desks. While the South Grand CID manages and owns the Stratocast solution, officers can log into the system and view video recordings when required While the South Grand CID manages and owns the Stratocast solution, officers can log into the system and view video recordings when required. This is enabled by the Genetec Federation feature, which gives an organisation access to manage multiple independent Genetec systems as one. A memorandum of understanding was signed so each parties’ responsibilities are clear. Better sense of safety “Instead of driving over and picking up a DVD, officers can directly access video from our cameras to see what happened. Not only does it help speed up investigations, it saves officers’ valuable time,” continued Witt. The installation of Stratocast is not only helping to reduce license plate theft but it is also helping residents and visitors feel safer than ever. “Business owners, residents, and visitors have a better sense of safety when they know cameras are up. But they also need to know that we’re equipped to respond quickly to any disturbance. And that’s what Stratocast helps us achieve. With the addition of Stratocast, we’re able to show everyone that we have strengthened the security in our community,” concluded Witt.
An integrated security system that includes new IP cameras and two-way audio technology has seen the rate of injuries as a result of attacks on Post Office staff decline by 36% in just three years. This follows the deployment of a sophisticated monitoring and intelligent threat detection platform from Morphean, a Video Surveillance-as-a-Service (VSaaS) innovator, which has not only helped to keep staff safe but has also protected ATMs from attack, helping to keep Post Office doors open. Post Office is responsible for the safety and well-being of 14,500 workers in 11,600 branches. The very nature of their combined service offering and the fact they are often located in rural areas, means branches are prime targets for thieves. Threat intelligence Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon. In rural communities, attacks on equipment can leave branches out of operation for long periods. In the last year alone, there were 13,437 violent attacks on convenience store workers, 27% of which involved a weapon and 39% led to injury, according to The Association of Convenience Stores (ACS) annual Crime Report. The Post Office security team wanted to build on its existing threat intelligence and response system, Grapevine, with a network of IP cameras and two-way audio into branches. Axis Communications cameras, microphones and speakers, connected to the Morphean Platform and hosted in the cloud, were installed in pilot branches by Kings Secure Technologies. Security automation Now that trial implementations have been completed successfully, the security team plans to expand coverage rapidly. In addition to the cameras, the networked speakers enable control centre staff to speak directly to customers and suspected criminals, alerting them to the fact they are under surveillance. The solution is also optimised to use low bandwidth dataFurther integrations are under way to bring security automation to other branches, such as providing the ability for remote agents to lock on-site safes in the event of an attack. Because of the challenges around connectivity in the areas where the most vulnerable branches are situated, the solution is also optimised to use low bandwidth data and is capable of streaming video over a 3G mobile network. Built-in intelligence The built-in intelligence of the Morphean Platform means staff are able to monitor footage for suspicious behaviour, such as individuals loitering near an ATM, and issue an alert to security teams who can then decide on the appropriate course of action. If it’s someone trying to find their wallet, no action is taken; if a crime is in progress, police will be notified along with video footage. In addition, staff are able to trigger an alert manually using an under-the-counter activation button, which can be investigated immediately by control centre staff at the alarm receiving centre (ARC). “The safety of our staff is our number one priority,” says Physical Security Manager for Post Office, Mark Dinsdale. Make significant differences Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end" “We’ll never completely eliminate crime in our branches, but we are also not powerless against it and we are able to make significant differences to the safety of our people, as demonstrated by the new technology we are deploying.” “Post Officers, particularly those in remote areas without access to a nearby police station, value the easy access to help and now report feeling much safer at work,” he concludes. Paul Ottley, Account Director at Kings Secure Technologies, says there are more subtle benefits to the Morphean Platform. “Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end. This means that even if criminals attempt to destroy cameras or on-site storage appliances, recordings of any incidents are secured in a manner that is admissible as evidence. This eliminates the challenge of sending out an engineer to collect footage. It’s a simple solution that is flexible and fully compliant with regulations such as the GDPR.”
Maxxess eFusion technology is being used to provide seamless integration and easy management of security, safety and site management systems at Bluewaters Island, Dubai. Maxxess eFusion technology The region’s newest tourism hotspot, Bluewaters opened in November 2018 and is expected to attract more than 3 million visitors every year. The US$ 1.6bn project was completed by Meraas Holdings over five years and comprises four luxury residential complexes, a landmark Caesars Palace hotel, a shopping mall and the world’s largest observation wheel, Ain Dubai, as its centrepiece. Security and safety integration Bluewaters’ management wanted to find the most efficient way to integrate all security, safety and building management functions into one easy operating system Bluewaters’ management wanted to find the most efficient way to integrate all security, safety and building management functions into one easy operating system, with particular emphasis on a solution that would be efficient to use, inexpensive to maintain and robust going forwards Following a sector comparison, Maxxess eFusion technology was identified as providing the best fit. Security management platform The eFusion security management platform was chosen instead of a more costly or complex conventional PSIM solution, because it uses versatile, open-technology software. Omnix International, one of the leading integrators brought in for the project, says eFusion proved particularly straightforward to work with, offering the advantages of a modular, building block approach and allowing maximum freedom to integrate, customise and adapt to future needs. “Thanks to its compatibility with leading surveillance, intruder, access and fire detection systems, eFusion proved to be a highly efficient integration technology for the Bluewater project,” says Mr. Henry Azoury, Senior Security Design and Engineering Manager at Omnix International. ASSA ABLOY Hospitality system The eFusion platform at Bluewaters includes full integration with an ASSA ABLOY Hospitality system The eFusion platform at Bluewaters includes full integration with an ASSA ABLOY Hospitality system. It allows a unified system approach, with a single enrolment protocol for both front- and back-of-house access. The solution enables centralised management of room safes, mini-bars and cupboards, and for control of all alarm transactions. eFusion integration with the Zenitel Stantaphone IP Intercom System ensures that video and transaction data is called-up automatically in the Bluewaters control room as soon as any user press a call button. For maximum efficiency, the system allows the operator to unlock doors and communicate with the user remotely, with full activity logs kept for audit. With easy integration to the SeeTec Video Management System, eFusion also allows seamless control of all cameras. In addition, cameras are linked to the door access system, with video pop-up triggered by pre-defined events. The solution also gives the operators complete PTZ control, playback and video functionality. ID badging integration ID badging and building management systems are also fully integrated, allowing easy operation and control of a wide range of functions including heating, ventilation and air conditioning. The eFusion platform is based on technology that delivers robust, reliable performance" “For maximum efficiency there is no need to switch between different management systems and the eFusion platform is easy to work with, allowing full benefit from integration with individual systems,” says Lee Copland, Managing Director EMEA, Maxxess. eFusion at Intersec 2019 “The eFusion platform is based on technology that delivers robust, reliable performance, as well as being fully scalable as needs change the future. We look forward to our continued work with Omnix International, which is providing the world-class specialist engineering services combined with local, customised support that customers value.” To see Maxxess solutions in action come to Intersec 2019 on stand SA-H12.
Abloy UK and security company Barry Brothers have supplied and installed a CLIQ Go electronic cylinder solution to a communal garden in Kensington, London to provide its subscribers with reliable and secure access. The garden’s previous access control system had proven to be unreliable, at times allowing members of the public unauthorised access which often resulted in damage in the area. Also, previous subscribers had maintained ingress and egress to the garden by retaining their key after their subscription had lapsed. Multiple access requirements Located in an enclosed area, the garden is secured with an external gate that is fully exposed to the elements. The resident committee required a durable locking solution to cope with such conditions, with the technology to control multiple access requirements; to allow subscribing resident’s access to the gardens, and a team of contractors and committee members with higher access permission to enter the internal compound to enable maintenance of the gardens. The new CLIQ Go electronic cylinder solution from Abloy as the ideal technology to cope with the ever-changing access control requirements Sam Moxey, technical sales and project manager at Barry Brothers, London’s longest serving security company, specified the new CLIQ Go electronic cylinder solution from Abloy as the ideal technology to cope with the ever-changing access control requirements. Excellent feedback The CLIQ Go App moves security to a new dimension, enabling controlled security from a mobile device and the ability to easily revoke access permission of non-subscribed individuals. Features include the ability to schedule access to areas and to provide contractors with time-limited access. If a key is lost, access can also be revoked using the CLIQ Go App, all managed from a cloud-based system. The system has been installed for six months with excellent feedback from the committee and subscribers. Membership subscriptions have increased and savings have also been achieved because of the reduced number of locksmith callouts. Sam Moxey, Barry Brothers, Said, “I wanted to ensure that the solution we specified would perform as required and finally resolve what had become an ongoing issue for the committee. Having worked with Abloy UK for a number of years, I had no hesitation in recommending CLIQ Go. It was very easy to set up and the programming of the CLIQ Go locks and keys was achieved easily, fitting with my busy workload.”
Round table discussion
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
In many regards, 2018 was a turbulent year for the physical security marketplace, driven by evolving technologies and changing customer needs, among other factors. Year-end is a great time to reflect, so we asked our Expert Panel Roundtable: What caused the most disruption in the physical security marketplace in 2018?
In the simplest terms, video systems capture and record video. But supporting these basic operations are a growing number of other functions that expand usefulness and the ability to interact with related elements in a larger system. As video system functionality expands, we asked this week’s Expert Panel Roundtable: What is the most important function of a CCTV system and why?