Vigitron, Inc, the manufacturer of complete networking solutions designed for security applications announces major new product releases for ISC West 2019. These products cover areas of PoE Midspans, Network Health Monitoring, Testing and Installation Tools, Building Infrastructure and Network Switching. Reliable and cost-effective products “Vigitron continues to lead as a comprehensive source of networking solutions,” stated Neil Heller, Vigitron’s Vice President of Business...
The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in t...
Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announces the global launch of their new Access Now Partner Program. Designed to offer partners the opportunity to establish themselves as a go-to source with a solution in Secure Access, Access Now provides an enhanced opportunity for top line revenue and bottom line profit growth while setting them apart from the competition. “Enterprises are looking to fortify cyber defences, be more respon...
Ping Identity, the provider of Identity Defined Security, announces that it has made several significant updates to PingIntelligence for APIs, its AI-powered API cybersecurity solution. These latest enhancements include an AI-based cloud trial, the ability to detect new types of attacks, support for Splunk environments, and additional integration with API gateways. The lack of visibility into how APIs are consumed is becoming commonplace in today’s enterprise environment. In fact, a recen...
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Radware, a provider of cybersecurity and application delivery solutions, announced it has released its 2018-2019 Global Application and Network Security Report, in which survey respondents estimate the average cost of a cyberattack has climbed to $1.1M. For those organisations that calculate (versus estimate) the cost of an attack, that number increases to $1.67M. Cyberattack impact The top impact of cyberattacks, as reported by respondents, is operational/productivity loss (54%), followed by...
Security expert Abloy UK is highlighting the importance of access control systems that offer dynamic lockdown, following recent reports that retail stores are being advised by counter-terror police launching the Protect and Prepare campaign, to develop emergency contingency plans recommending a 'sixty second' security checklist to avoid panic during reports of terror attacks. High street shops throughout the country hit their busiest period during Christmas. With large numbers of people around, counter-terror police are providing stores with a security checklist that can be implemented in sixty seconds to prevent widespread panic in terror or emergency situations. Threat awareness and preparedness To improve reaction times and ensure evacuations can take place as smoothly as possible, staff should know who is in charge of emergency plans, when it is appropriate to evacuate a store, when to order a lockdown, and the best places to hide in the event of an attack. An effective way for retailers to be prepared for such a threat is with Dynamic Lockdown An effective way for retailers to be prepared for such a threat is with Dynamic Lockdown, which is the ability to provide for basic life safety in the event of such eventualities as a terror attack or other unforeseen threats. It offers the capability to compartmentalise buildings and sites by controlling the flow of people by preventing access to unauthorised intruders, providing real physical security from the secure side of the door, while also allowing exit and escape where required. This can have vital importance in protecting members of the public by preventing access for threats to enter a building but at the same time allowing them to leave the building if necessary. Dynamic Lockdown applications With this in mind, Abloy UK has developed solutions that can provide for Dynamic Lockdown for a wide range of applications. For the retail sector specifically, Abloy systems are available to secure doors between public and non-public areas and exits from main staff areas. Products include Abloy’s range of compliant electric locks and the Escape Door System (EDS). Abloy continuously promotes the importance of emergency escape systems with free training on standards" Electric locks - such as the Abloy EL560 solenoid lock and EL520 motorised lock - work by controlling either the latch or the handle, or by motorising the bolt back once a proximity card is presented or a request to exit device is used. This ensures that only authorised personnel are able to gain access to the building, and the system will prevent any unauthorised persons from entering. Fail-unlocked locking element What’s more, the EDS offers blocking with a fail-unlocked locking element that does not require any mechanical input to operate, and intelligent control that allows connection to fire alarm systems or other building control systems to ensure escape in an emergency. The Trigger unit incorporates a key-switch and a push button that tells the controller to release the locking mechanism to allow safe escape. Pat Jefferies, Commercial Director at Abloy UK, commented, “This is a superb initiative by counter-terror police as it will make retailers more proactive and able to respond faster to potentially life-threatening events. Egress from a building can be a matter of life and death, so here at Abloy we continuously promote the importance of emergency escape systems with free training on standards and compliance via our Academy.”
Aqua Security, the platform provider for securing container-based and cloud native applications, announced the integration of its platform with Datadog’s cloud monitoring and analytics platform. With this integration, Aqua provides real-time visibility into the security posture of cloud native applications to Datadog users, including information on vulnerable images, untrusted running containers, and security anomalies found by Aqua in the runtime environment. For DevOps teams that continuously monitor applications for operational parameters such as performance, bug tracking, and errors, security events are often a blind spot that is handled elsewhere although they may directly affect application uptime and resiliency. The integration of Aqua’s granular security information into Datadog’s comprehensive monitoring makes it possible to identify issues quickly and analyse their impact on application availability. Bridging the gap between application and security teams We are helping organisations bridge the gap between these traditionally siloed teams" "As organisations shift to more dynamic infrastructure through cloud and container technologies, communication between application and security teams is more important than ever,” said Ilan Rabinovitch, VP Product and Community at Datadog. “By combining Datadog's deep insights into containerised application performance with Aqua Security’s enforcement of security best practices, we are helping organisations bridge the gap between these traditionally siloed teams.” The integration between Datadog and Aqua CSP features pre-built Datadog dashboards that display: Container images currently in Aqua’s scan queue Known vulnerabilities and security issues found in existing images Containers running from unauthorised images Aqua runtime policy violations and audit events Detecting and fixing security issues Additionally, Datadog users can use the data provided in the Aqua dashboards to set up their own alerts, aggregate data streams from different applications, and customise how data is displayed. “We are excited to be partnering with Datadog to deliver a more complete security view to DevOps teams,” said Amir Jerbi, CTO and co-founder of Aqua Security. “In the cloud native era, ensuring security can no longer be the exclusive burden of security teams, and instead should be part of the overall operational soundness of applications throughout their lifecycle. Our integration with Datadog creates a valuable shortcut that allows security issues to be detected early and fixed quickly, preventing escalated security incidents in production.”
Achieving another major milestone toward volume shipments of its pioneering HAMR (heat-assisted magnetic recording) technology, Seagate announces it has used its advanced HAMR technology to build and test the world’s first formatted and fully functioning 16TB enterprise hard drive platform in a standard 3.5-inch form factor — the highest capacity hard drives ever produced. Seagate is on track to grow beyond 20TB per drive in calendar 2020. Seagate is using this 16TB pre-release version of its HAMR-based Exos hard drive to run the tests customers commonly use when integrating hard drives into enterprise applications. The successful tests have confirmed the HAMR drives are plug-and-play and operate just as any other hard drive in standard enterprise application environments. Deployable storage capacity In today’s dawning Data Age, the hunger for greater storage capacity continues to accelerate, as data capture and creation at the edge proliferates No architectural changes are needed to integrate HAMR drives into current data centers and systems. Customers simply plug the drives in as with any other enterprise hard drive. In today’s dawning Data Age, the hunger for greater storage capacity continues to accelerate, as data capture and creation at the edge proliferates, and rapidly-evolving Artificial Intelligence applications demand access to ever-larger datasets to extract crucial learnings. Affordable, deployable storage capacity enables the digitisation of the world. Seagate has developed HAMR to enable the next big increase in the amount of data that can be stored on a hard drive. HAMR uses a new kind of media magnetic technology on each disk that allows data bits, or grains, to become smaller and more densely packed than ever, while remaining magnetically stable. Standard benchmark tests A small laser diode attached to each recording head heats a tiny spot on the disk, which enables the recording head to flip the magnetic polarity of each very stable bit, enabling data to be written. Seagate’s proprietary execution of HAMR technology will be delivered in the industry’s standard form factor, thus reducing total cost of ownership by getting a lot more terabytes (TB) into the same space as a conventional hard drive. Seagate Exos HAMR 16TB internal test unit “Seagate has begun running early Exos HAMR units through the full set of standard benchmark tests used to prepare and optimise each new hard drive product for deployment,” says Jason Feist, Seagate’s senior director of enterprise product line management. “Our testing has demonstrated the drives’ compatibility for enterprise systems that are being used today. No system level changes are needed to run the HAMR drives in these evaluations, or to deploy them in customer environments.” Power efficiency tests “The Exos HAMR drives run like all other drives in a standard suite of integration benchmarks. At this point in early testing, they’re meeting our expectations for how a drive should interact in each benchmark,” Feist explains. These new product-level HAMR tests provide further weight to the groundbreaking results from last year’s in-lab reliability tests “These are the same tests that customers use to qualify every new drive, including power efficiency tests, sg3_utils utilities that test SCSI commands to devices, standard smartmontools utility programs that will enable customers to characterise and compare HAMR drives in their environment right next to PMR drives, and several four-corners tests of reads, writes, random, sequential and mixed workloads.” These new product-level HAMR tests provide further weight to the groundbreaking results from last year’s in-lab reliability tests. Surpassing customer requirements In those tests Seagate HAMR read/write heads far exceeded industry standards for reliability and lifetime data transfer capability, surpassing customer requirements and standard hard drive specifications by a factor of 20. Combined with HAMR’s plug-and-play compatibility with standard systems, the results have further cemented customers’ confidence in HAMR’s readiness to launch into standard cloud and IT environments. “The HAMR technology we demo’ed last year is now being fully integrated into Seagate’s industry-leading high-capacity enterprise product portfolio,” says Feist. “We continue on track to deliver the future generations of Seagate Exos hard drives equipped with HAMR to achieve industry-leading areal density and capacity.”
Evolv Technology, creator of the Evolv EdgeTM people screening system that detects weapons and bombs, today announced the addition of Alan Cohen and David Orfao of General Catalyst to its Board of Directors. Both have deep experience scaling sales, marketing and distribution, ultimately building organisations that have created new multi-billion-dollar disruptive companies. Most recently, Cohen was a Board Member and Chief Commercial Officer at Illumio. A long-time enterprise tech veteran, his prior two companies, Airespace (acquired by Cisco for $450 million) and Nicira (acquired by VMware for $1.26 billion), were the market leaders in software-driven, cutting-edge technologies. Experience in organisational scaling Allaire grew from a venture-backed start-up to a $119 million public corporation trading Prior to Airespace, Cohen held executive roles at Cisco and IBM. He is well known for his experience in marketing and organisational scaling in several industries including networking, security, Software-as-a-Service (SaaS), and enterprise software. Cohen also serves as an advisor at Cohesity, Mist, and Netskope. Before co-founding General Catalyst, Orfao led Allaire Corporation from 1997 to 2000 as president, CEO and member of the Board of Directors. During his tenure, Allaire grew from a venture-backed start-up to a $119 million public corporation trading on the NASDAQ. Successfully completing IPOs on the NASDAQ The company pioneered the internet application server market before merging with Macromedia. Prior to Allaire, Orfao held executive positions at Frame Technology Corporation, Claris Corporation and SQA Corporation, successfully completing Initial Public Offerings on the NASDAQ with Frame Technology and SQA Corporation. Orfao sits on the Board of Directors for several General Catalyst-backed companies including Circle, Envoy, OG Systems and RStudio. Their extensive experience scaling and transforming businesses will be invaluable" “We welcome Alan and David to the board – their extensive experience scaling and transforming businesses will be invaluable as we expand beyond the initial markets we have developed in 2018,” said Mike Ellenbogen, CEO at Evolv Technology. “These additions and the rest of our board and team of advisors share the same passion for applying technology to help solve important challenges. With their support and influence, we are well-equipped to extend our reach.” From battle-hardened security personnel, to former CIA and FBI operatives, Evolv’s list of advisors and board members includes the following experts that are helping improve the people screening experience with technology to keep people safe from mass shooting and mass casualty events. Advisors: David Cohen, one of the world’s leading authorities on intelligence analysis and operations from the CIA and NYPD. Juliette Kayyem, who has spent over 15 years working to make our nation more secure as Massachusetts’ Homeland Security Chief and Assistant Secretary at the U.S. Department of Homeland Security (DHS). John Pistole, former Transportation Security Administration (TSA) Administrator who helped transform the organisation from a one-size fits all agency, to a risk-based, intelligence-driven agency. Board Members: Mark Sullivan, a federal law enforcement agent for nearly 35 years and former Director of the U.S. Secret Service. Bilal Zuberi, a partner at Lux Capital and former entrepreneur focused on backing entrepreneurs who imagine and build the world they want to live in. Mike Ellenbogen, co-founder and CEO of Evolv Technology focused on applying advanced technology to help make our world a safer place. Evolv Edge is used by a variety of venues including Oakland International Airport, a top NFL sports stadium, performing arts venues in New York City, iconic tourist attractions and airports across the U.S. and Europe.
Door security solutions involve more than just the product being deployed – they also include the impact a solution can have and the support available throughout the life of the installation. While ASSA ABLOY sustainable solutions contribute a number of impressive sustainability benefits, the support for architects, designers, integrators and other security professionals is also robust. ASSA ABLOY sustainable solutions Efficient and cost-effective building design requires everyone to be on the same page from the first day of planning. And for solutions that take security and sustainability into account, you want to be assured products are both ordered and installed correctly. To help combat missteps that result in costly change orders, lost project time and potential compromises to building design and sustainability components, ASSA ABLOY has introduced ASSA ABLOY Openings Studio, a plugin to the world’s most common Building Information Management (BIM) software – Revit 3D. The plugin allows users to define secure and sustainable openings, set standards across an entire facility and keep everyone in the loop for the seamless integration of sustainable door security solutions. ASSA ABLOY Openings Studio ASSA ABLOY is making sure no installer is left without the proper instructions and support on the job through two new mobile apps Openings Studio can supplement or replace written facility guideline standards for enforcement and coordination with the architect and specification writer during the design process. By integrating with industry standard Revit 3D, Openings Studio allows you to plan, review and track the design of your openings throughout the planning process and avoid miscommunication and the potential for costly change orders. ASSA ABLOY is making sure no installer is left without the proper instructions and support on the job through two new mobile apps. ASSA ABLOY Customer Support App The ASSA ABLOY Customer Support App provides a troubleshooting, e-learning and support experience that is immediate and intuitive. It is powered with live, interactive video and live chat support from a technician. It also ensures support hours are displayed accurately within the app depending on device location and offers email options that are ideal for afterhours support inquiries. BILT app Through BILT, ASSA ABLOY provides interactive 3D models and step-by-step instructions to make installations easier Meanwhile, the BILT app’s product instructions provide fully interactive, voice narrated step-by-step guides that simplify installation. Through BILT, ASSA ABLOY provides interactive 3D models and step-by-step instructions to make installations easier, ensure products are installed properly, and store warranties for future reference. The instructions are fully-interactive, voice narrated guides that simplify installation and shorten the time it takes to accomplish the job. Both apps are currently available for download on Apple and Android mobile devices. Integrating sustainable solutions “We’re always looking for ways to streamline the process for those specifying and integrating sustainable solutions in their facilities,” said Amy Vigneux, Director- Sustainable Building Solutions at ASSA ABLOY. “Utilising intelligent applications that make our partners’ jobs easier is just one way we accomplish that.” ASSA ABLOY staff is also readily available to discuss your project and the sustainable solutions that can help you achieve your goals.
Pivot3, global provider of security, Internet of Things (IoT) and hybrid cloud infrastructure solutions, has announced the introduction of the Pivot3 Architect and Engineer (A&E) Program. This initiative will provide architects, engineers and consultants with the resources and support needed to make intelligent decisions when specifying infrastructure platforms at the core of enterprise-class IoT, video surveillance and security solutions for their clients. Pivot3 A&E Program The Pivot3 A&E Program is intended to help specifiers and their clients address the complexities of planning, designing, deploying and managing compute and storage infrastructure for today’s sophisticated security applications including video surveillance, analytics, access control, building management and all other integrated systems. Pivot3 understands the specific needs of both the security and IT markets" A&E firms will gain access to a wide variety of resources that can be used to facilitate projects based on Pivot3's high-performance, ultra-dense, highly resilient solutions that reduce risk, eliminate downtime and data loss, and simplify scale and management. With Pivot3, A&E firms can specify one common infrastructure to consolidate multiple applications and solutions — all manageable through a single pane of glass. Advanced tools and support “Pivot3’s A&E program seeks to provide the advanced tools and enhanced support necessary to specify infrastructure solutions that serve as the backbone of intelligent environments,” said Ray Bernard, president and principal consultant, Ray Bernard Consulting Services. “Pivot3 understands the specific needs of both the security and IT markets, as well as the design and deployment challenges in each domain." "The company has the in-depth deployment experience needed in both to effectively support system designers and specifiers in all stages of design and deployment work. The team also understands the client perspectives and issues, and the IT-physical security collaboration dynamics. This new program demonstrates Pivot3’s commitment to helping system designers access the expertise and tools needed to design enterprise-class, IT-proven solutions.” Pivot3 A&E Program members will have access to: Document development and review assistance with specifications, proposals, and commissioning and acceptance plans. A&E resources including CSI MasterFormat 2018 specification documents, 3D BIM Modules for AutoDesk Revit, MS Visio stencils and templates, and CAD drawings. Solution development and design support including review of system architecture, sizing and workload/throughput calculations, and application validation. Dedicated A&E support contact and local support from Pivot3’s Solution Architects and Regional Sales Directors. Design guides, best practices and white papers. Training, webinars and newsletters. Mission-critical infrastructure solutions “The availability of dedicated Pivot3 contacts and resources will help the A&E community consider, design and ultimately, deliver infrastructure solutions that ensure the performance resiliency, and scalability that their customers’ mission-critical environments demand,” said Mike Maddox, director of A&E programs, Pivot3. “The Pivot3 A&E Program will provide the tools, insight and support necessary to achieve the successful design of enterprise-grade, IT-ready infrastructure solutions for a variety of applications and markets.”
Edward Snowden’s name entered the cultural lexicon in 2013, after he leaked thousands of classified National Security Agency documents to journalists. He’s been variously called a traitor, a patriot, a revolutionary, a dissident and a whistleblower, but however you personally feel about him, there’s one way to categorise him that no one can dispute: He’s a thief. There’s no doubt about it: Snowden’s information didn’t belong to him, and the scary truth is that he is neither the first nor the last employee to attempt to smuggle secrets out of a building – and we need to learn from his success to try to prevent it from happening again. Since the dawn of the digital age, we’ve fought cyber pirates with tools like firewalls, encryption, strong passwords, antivirus software and white-hat hackers. But with so much attention on protecting against cyber risks, we sometimes forget about the other side of the coin: the risk that data will be physically removed from the building. Douglas Miorandi, director of federal programs, counter-terrorism and physical data security for Metrasens, recently discussed the major risks to physical data security with SourceSecurity.com. Q: What do you believe are the main physical threats to data? The biggest threats I have seen in the physical data security space have varied over the years, but there are four specific risks that remain the same across the board for any organisation, which are: Every organisation is at risk of having data walk out the building with that employee The Insider Threat The Outsider Threat The Seemingly Innocent Personal Item Poor or Nonexistent Screening To beginning with, every company or government agency has at least one disgruntled employee working for them, whether they know it or not, and that means every organisation is at risk of having data walk out the building with that employee. That is what security experts call the insider threat. Q: What do you think influences employees to steal data from their own organisation? People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially – meaning they don’t even need to be disgruntled; they might just want a quick way to make a buck. Financial data, too, is attractive, both for insider trading and selling to the competition. People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially This can happen to both private companies as well as government agencies. Take Natalie Mayflower Sours Edwards for example, a Treasury Department employee who was caught in the act just last month, when she disclosed sensitive government information about figures connected to the Russia investigation to a reporter. She didn’t hack the system, she simply used a flash drive. And let’s not forget that Snowden was a contractor working for the NSA. Q: Many of us think of security threats coming from an outsider, do companies still face these type of threats? Yes. Unfortunately, organisations do not only need to worry about their own employees – companies and government agencies need to be wary of threats from outsiders. COTS devices include SD cards, external hard drives, audio recorders and even smart phones They can come in the form of the corporate spy – someone specifically hired to pose as a legitimate employee or private contractor in order to extract information – or the opportunistic thief – a contractor hired to work on a server or in sensitive areas who sees an opening and seizes it. Either one is equally damaging to sensitive data because of the physical access they have. Q: Whether it be an insider threat or an outsider threat, what are ways these individuals can steal sensitive data? There are two types of personal items that can be used to steal data: the commercially available off-the-shelf (COTS) variety, and the intentionally disguised variety. This is considered risk number three – the seemingly innocent personal item. COTS devices include SD cards, external hard drives, audio recorders and even smart phones, any of which can be used to transport audio, video and computer data in and out of a building. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom Q: What is the difference between COTS and disguised devices? The difference between COTS and disguised devices is that if someone gets caught with a COTS device, security will know what it is and can confiscate it. The disguised device looks like a security-approved item anyone could be carrying into the workplace, making it especially devious. Sometimes these devices don’t just function to bring information out of a building; they are used to damage a server or hard drive once it’s plugged in to a computer or the network. Some are both – a recording device that extracts data and then destroys the hard drive. Companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening peopleQ: With these types of discrete items, can security personnel still catch individuals in the act? For example, through security screenings? Poor or nonexistent screening is the most substantial security threat to any organisation when it comes to sensitive data. Whether it’s an employee, an outside contractor or a device, the physical security risks are real, and everyone and everything entering and leaving a building needs to be screened. Unfortunately, screening often isn’t occurring at all, or is ineffective or inconsistent when it does occur. Even companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening people and stopping them from stealing data through recording devices. Q: It’s surprising that so many organisations would neglect physical security when protecting their data. It’s a huge mistake, and the consequences can be dire. They range from loss of customer trust, exorbitant lawsuits and tanking stock prices in the private sector; and risks to national security in the public sector. Costs and resource allocation increase as well during efforts to reactively fix or mitigate the effects of physically stolen data. For both the private and public sectors, the risk for data to be physically removed from a building has never been greater. Years ago, it was much harder for the average Joe to figure out where they could sell stolen data. Now, with the Deep Web, anyone with Tor can access forums requesting specific information from competing spy agencies, with instructions on how to deliver it, greatly reducing the risk of getting caught – and increasing the likelihood people will try it. Although it’s getting easier to sell data, the good news is that all of these threats are avoidable with the right measures. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack Q: So how can an organisation protect against these risks? There are a number of ways – and the first one requires a change of mindset. Not long ago, the building/physical security department and the IT/cybersecurity department were considered two different entities within an organisation, with little overlap or communication. Organisations now are realising that, because of the level of risk they face from both internal and external threats, they must take a holistic approach to data security. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack. Q: How can companies and government agencies combine both physical data security and cybersecurity initiatives? Physical security managers can advise cybersecurity managers on ways to reinforce their protocols – perhaps by implementing the newest surveillance cameras in sensitive areas, or removing ports on servers so that external drives cannot be used. Organisations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try In turn, the cybersecurity team can let the physical security team know that they have outside contractors coming in to work on the server, and the physical security team can escort the contractors in and stand guard as they work. Constant communication and a symbiotic relationship between the two departments are crucial to creating an effective holistic security protocol and, once you’ve got the momentum going, don’t let it slow down. Sometimes efforts start off strong and then peter out if priorities change. When guards are down, it’s an excellent time for a malicious actor to strike. Organisations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try. It’s not just about the mentality, though. Using the right technology is just as important. Q: What type of technology can you use to protect physical data? Many problems can be avoided by simply using the right technology to detect devices that bring threats in and carry proprietary information out. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them. Using a ferromagnetic detection system (FMDS) as people enter and exit a building or restricted area means that anything down to a small microSD card triggers an alert, allowing confiscation or further action as needed. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them Q: How does FMDS work? In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects the magnetic signature, down to a millionth of the earth’s magnetic field. FMDS is the most reliable method of finding small electronics items and should be part of the “trust, but verify” model Although it is a passive technology, it is more effective and reliable than using hand wands or the walk-through metal detectors typically seen in an airport, which cannot detect very small ferrous metal objects. FMDS can see through body tissue and liquids, so items cannot be concealed anywhere on a person or with their belongings. Whether or not the items are turned on doesn’t matter; FMDS doesn’t work by detecting a signal, but rather by spotting the magnetic signature that electronics contain. This is ideal, because most recording devices do not emit any signal whatsoever. In my experience, FMDS is the most reliable method of finding small electronics items (as well as other ferrous metal objects, like weapons), and should be part of the “trust, but verify” model, in which companies assume the best of their employees and anyone else entering the building, but still take necessary precautions. Q: What are the key takeaways for organisations looking to enhance data security? The toughest challenge in the security sector – whether it’s cyber or physical – is remembering that the bad guys are constantly looking for ways to slip in through the cracks, and security departments need to stay one step ahead to ward off both internal and external threats. Recognising the existing threats, putting together a holistic security strategy, and using the right technology to detect illicit devices comprises an effective three-pronged approach to protecting an organisation’s data. Organisations cannot afford to be passive about security and assume employees won’t steal data and spies won’t sneak in. Strong countermeasures are necessary because data loss can come from both inside and outside, in both private and public sectors, from places not everyone thinks of – and with technology like FMDS acting as a backup to the human element, organisations can lock down their data and keep the wolves in sheep’s clothing from getting through the door.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban on Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes a Splash with Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact of Data-Driven Smart Cities on Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing the Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends for 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How to Prevent ATM Jackpotting with Physical and Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve- how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need to Look Beyond Technology for Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organisation. 10. The Evolution of Facial Recognition from Body-Cams to Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of security — it’s here. If you’re hesitant to make the move to the cloud, consider these six reasons to embrace this new technology now.Cloud technology has created an opportunity for integrators to offer managed services to their customers Increased RMR Cloud technology has created an opportunity for integrators to offer managed services to their customers, producing a new business model that generates more stable and predictable income streams. By offering managed services on a subscription basis, integrators can build a part of their business to provide recurring monthly revenue (RMR), allowing them to scale faster. This business model is especially beneficial for customers who prefer to pay a fixed monthly or yearly rate for services rather than a large upfront fee, which can help attract new business while growing revenue from current customers. Stickier customers Providing managed services fosters a more involved relationship between integrators and their customers, which can help boost customer retention. This is primarily the result of three factors. Firstly, customers who buy managed services are committed for a specified term, which helps develop an ongoing business relationship between them and the integrator. Secondly, providing managed services creates an opportunity for more customer contact — each interaction is an opportunity to build rapport and monitor customer satisfaction.While the functionalities of each system vary, their potential is evident in the cloud-based services available Third, customers who purchase managed services generally tend to do business longer than customers who purchase products or services individually; with the monthly purchase of their services on autopilot, customers get into the habit of receiving these services, which helps reduce the chance that they’ll cancel their subscription while also building customer loyalty. High gross profit margins Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. On an ongoing basis, cloud service platforms offer a new level of accessibility to integrators, helping to provide better insight on activity trends to identify opportunities to continuously grow their revenue through subscription-based streams. Easier to provide managed services Traditionally, serving more sites required integrators to hire more technicians to meet the needs of their growing customer base, but the cloud has helped overcome this demand. While the functionalities of each system vary, their potential is evident in the cloud-based service platforms that are available today. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue The Avigilon Blue™ platform, for example, is a powerful new cloud service platform that helps integrators address the needs of their customer sites using fewer resources by offering the ability to administer system upgrades, fixes, health checks, and camera or system settings adjustments remotely. The Avigilon Blue platform automatically sends, and stores video analytics highlights in the cloud, which can easily be accessed from any PC browser or mobile device. This data can be used to efficiently manage customer sites and maintain the health of those sites, helping to increase speed of service and expand the capacity to have more sites up and running. Cloud service platforms have the potential to revolutionise the security industry by providing new opportunities for integrators Not only does this help integrators scale their business faster, it creates an opportunity to provide added value to the customer at a lower cost as new upgrades and services come out. Proactively fix problems before they occur In addition to automating notifications and tedious maintenance tasks, cloud service platforms help provide integrators with the information and abilities they need to keep their customer sites running smoothly. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue — possibly before the customer even notices a disruption in service. They can then identify the problem and determine whether it can be resolved remotely or requires a technician to be deployed. By having the capacity to pinpoint service needs and make certain adjustments via the cloud, integrators can streamline their customer service processes and lower their response times to provide better, more efficient service. Increased valuation of business Companies that utilise cloud technologies are experiencing as much as 53 percent higher revenue growth rates The ability of cloud service platforms to help integrators manage more sites remotely and expand their revenue through subscription-based streams offers a competitive business advantage. Security innovators have harnessed the power of the cloud to enhance integrator efficiency so that they can spare their attention, resources and effort for where it’s needed most. As a service that helps offer scalability and a high gross profit margin while requiring fewer resources to maintain customer sites, cloud service platforms have the potential to revolutionise the security industry by providing new opportunities for integrators that may ultimately increase their business valuation. According to a study by Dell, companies that utilise cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Integrators who adopt cloud service platforms can benefit from numerous advantages — cost-saving maintenance capabilities, the potential to generate new monthly recurring revenue, and user-friendly design and data security — which make them a significant development within the industry as well as a potential lucrative new business model. The dream of cloud technology is no longer a distant idea of the future, it can become a present reality — and integrators who harness its power can reap its business benefits now.
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality, smart homes, smart cities, and machine intelligence. Video is an important element at CES. This year, the focus is on intelligent video. For example, Eyecloud.ai, Santa Clara, Calif., is displaying a home security camera with on-device face recognition that uses AI. Powered by a 12-core Intel Movidius VPU (video processing unit), the camera combines AI-on-the-edge with easy setup and wirefree operation for up to six months per battery charge. On-device artificial intelligence On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation SimCam, an Intel partner, demonstrates how the Intel Movidius VPU can turn a security camera into ‘the ultimate vision-based sensor’. On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation. A variety of other residential video systems are also on display at CES. For example, Swann Security is displaying 4K wired security systems featuring Google integration, a wireless smart security camera with True Detect heat-based PIR (photo infrared) motion detection, a video doorbell and chime with two-way talk, and indoor and outdoor wi-fi cameras with Alexa integrations. Intelligent automotive solutions Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES. It combines advanced image processing, high-resolution video encoding and CVflow computer vision (video analytics) processing in a single, extremely low-power design. The CVflow architecture provides Deep Neural Network (DNN) processing required for a new generation of affordable and intelligent home monitoring, professional surveillance and aftermarket automotive solutions. CV25 offers half the performance of Ambarella’s previously released CV22 chip, but the new chip’s lower cost will bring intelligent cameras to a price point desirable for home systems. All Ambarella’s chips have hardware-based cybersecurity. A suite of advanced cybersecurity features protects against hacking, including secure boot, TrustZone, and I/O virtualisation. Based on 10nm ultra-low power processing technology, the CV25 chip is optimised for wirefree cameras applications that require long battery life and small form factors. Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES Virtual security guards Elsewhere, the Deep Sentinel home security system applies video and AI to predict residential break-ins ‘before they happen’. The Pleasanton, Calif.-based tech startup uses ‘AI-infused security cameras’ to keep an eye on your home. Three wireless 1080p full HD cameras provide night vision and PIR motion sensing, connected by a smart hub. Using proprietary artificial intelligence, the cameras act as virtual guards, watching activity around a house and providing alerts to situations that may lead to burglaries, break-ins, package thefts and other dangers. My Safe Patrol is an AI-driven platform that analyses data aggregated from security personnel, citizen alert systems and IoT smart devices, and responds with geolocated alerts in real-time. My Safe Patrol effectively supports the security/safety ecosystem of a building, a campus, a city or a district through a dynamic dashboard that helps command and control operations manage and deploy security plans. AI-integrated devices Showcased solutions include Smart Living integration of video surveillance applications to enable real-time two-way audio and video streaming simultaneously MicroVision, Redmond, Wash., showcases an interactive display engine for AI-connected devices, providing an integrated solution for projected display and interactivity through multi-point touch and air gestures. MicroVision’s new consumer 3D LiDAR engine provides high-fidelity spatial awareness to smart home hubs, for input to smart devices such as lighting, security, entertainment, and thermostats. The Internet of Things (IoT) is another big topic at CES, and ThroughTek Co., Ltd., Taiwan, demonstrates IoT developments to transmit voice, video and data over both wide- and narrow-band channels in smart home applications. Showcased solutions include Smart Living integration of video surveillance applications combined with voice assistant to companion robots, wireless doorbells, and battery cameras to enable real-time two-way audio and video streaming simultaneously. Advanced Capacitive Touchscreen Decayeux Group, a European manufacturer of mailboxes and high security doors, is displaying MyColisBox, a secure and connected parcel box delivery system designed to provide online shoppers a secure pickup point accessible by a PIN code sent via SMS message to a smartphone. Walter is the new mobile app for MyColisBox. Kwikset, a division of Spectrum Brands, showcases its smart lock portfolio – including three new smart locks – in the CES Smart Home Marketplace. Kwikset is showing the SmartCode 888, Kwikset Convert, Obsidian, and new designs of the SmartCode 914 and SmartCode 916, as well as a new wi-fi lock. Baldwin, Kwikset’s ‘luxury lock’ sister company, is offering a preview of its new TouchScreen Collection, launching this summer, available in five styles and featuring Advanced Capacitive Touchscreen technology. The Internet of Things (IoT) is another big topic at CES, with many companies demonstrating IoT developments Cyber security standards Privacy is increasingly a concern in the consumer space, and Private Discuss, from PIMAN Security, is a premium, secure, white label communication solution. Their active AI-powered defense architecture provides encrypted audio and video calls, messaging and file sharing. It renders a confidential, secure messaging platform that adheres to the highest standards of cybersecurity. FLIR provides virtual reality demonstrations at their CES booth, allowing attendees to put on a virtual fire helmet and try out a FLIR camera in a real-world residential fire response scenario. Participants may also use a FLIR optical gas imaging camera virtually to stop fugitive emissions in a natural gas refinery. Booth visitors may also take “thermal selfies” to post on social media.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion. Q: What new developments in emerging technologies do you see in the coming years? There’s opportunity for implementation of the technology to solve real problems" Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems. Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions. Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently" Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently. Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities. Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem? Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life. Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?” Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers? Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can. Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities. As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem" Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem. Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned? Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication. We have different architectures within our lock base and among our software partners to allow a mix of technology" Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology. Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future. Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
Has there ever been a better time for a security trade show in Europe? Shifting threats such as terrorism and a volatile political climate serve as reminders every day of the importance of security in our lives, and even the role of technology. IFSEC opened in London on Tuesday at the ExCeL centre, covering every aspect of security, from access control and video surveillance to home automation and perimeter security. Amid sweltering heat, attendees came to find the latest-and-greatest innovations to meet changing security challenges. Substance over style Many of the technology announcements were "repurposed" news previously unveiled in the United States at the spring ISC West show in Las Vegas. Even so, there was plenty to see, although foot traffic seemed a little slow on the first day. Several people commented on how IFSEC is different from ISC West. The US market, exemplified by ISC West, tends to emphasise superlatives and flashy market claims, while the European market is more about substance. That observation comes from Moti Shabtai, CEO and President of Qognify, who said he has a larger share of conversations at IFSEC about how a solution can address specific needs. "Europe isn't one single market," he reminds us. "There are more different kinds of customers and different approaches, while the US market has a more unified way of thinking." Safe and secure cities applications (and "smart cities") are more prominent in Europe. While in the US, utility applications are higher profile, driven by a need to conform to NERC/FERC standards. The European market has more different kinds of customers and different approaches "The competition in Europe is more varied, with more smaller players, depending on which product and market," adds Kim Loy, Director of Marketing for Vanderbilt. "It makes it a more dynamic landscape." One variable Loy points to is how advanced each European market is from a technology perspective. For example, the Nordic countries -- Sweden, Norway, Denmark and Finland -- tend to embrace technology, and Vanderbilt is already seeing success there with its cloud-based products, the ACT365 cloud access control and video system and SBC Connect for cloud-managed intrusion detection. Current events in Europe add an air of urgency to the show. Several recent terrorist attacks have highlighted the need for more and better security. In emergency situations, often the security industry's contributions come after the fact, notes Shabtai. It took police in Brussels, Belgium, five days to find a suspect in the 2016 terrorist attack there. However, technologies such as Qognify's Suspect Search can now sift through databases to find video clips relevant to an investigation within minutes. More analysis of disparate information can in some cases provide predictive capabilities, or at least help direct investigations aimed at preventing such events. Adapting to vertical markets Many exhibits at IFSEC reflect the trend we are seeing of companies expanding their product selection beyond what was previously their core competency. Several video companies, in particular, are displaying an expanding array of products. It's a continuation of the familiar trend of video companies like Genetec, Avigilon, Hikvision and others expanding into access control systems. At IFSEC, Genetec says they are focusing on outcomes rather than technology, highlighting systems designed for specific use cases and vertical markets. Importantly, Genetec's systems provide flexibility to adapt to a variety of issues in various markets, whether a specific vertical or in the United States, Europe, or anywhere in the world. Privacy and cybersecurity are especially relevant in Europe Privacy and cybersecurity are hot-button issues for Genetec, says Jean-Philippe Deby, EMEA Business Development Director. It's especially relevant in Europe, where the European Union has embraced general data protection regulations (GDPR) that require compliance by May 2018 (The UK has committed to compliance despite the Brexit vote.) It's another element in the industry's growing focus on cybersecurity and systems highlighting "privacy by design." But global business trends are eliminating some of the differences in the security industry around the world, says Dr. Peter Kim, Senior Director of IDIS. Globalisation trumps regional phasing "Perhaps the biggest difference at IFSEC this year is the realisation that there is less of a difference than ever before between the US and European markets," he says. "Globalisation increasingly means access in Europe to brands and their product offerings is more equal than ever before—something you see here at this and all of the major security shows around the world. New technologies are increasingly rolled out globally either at the same time or close together, as opposed to regional phasing." Europe and America have different drivers and priorities at different times, including those influenced by geopolitics and recent crises, which can drive demand for technology to meet specific security requirements, Kim notes. One thing both markets have in common right now is geopolitical churn in various forms—including the threat of terror and a number of significant elections—which can lead to increased uncertainty. "This is especially relevant for government contracts, as public projects, which can be quite substantial from a security standpoint, often stall in such environments," Kim notes. Avigilon dominates the signage and video displays as visitors enter the ExCeL Centre Avigilon dominates the show Avigilon is one company that is introducing new products at IFSEC (that were not previously viewed at ISC West). They include the Avigilon Presence Detector (APD), a sensor that combines self-learning analytics with impulse radar technology to accurately detect the presence of a person even if they have stopped moving or are hidden. The sensor is designed for indoor locations such as vestibules within banks, pharmacies, retail stores and health care facilities. Avigilon is also highlighting a new Mini Dome Camera Line, and integration of its Access Control Manager (ACM) system with biometrics, among other products. Avigilon is making a big splash at the show. They dominate the signage and video displays as visitors enter the ExCeL Centre. I'm looking forward to seeing more interesting technologies in the remaining two days of the show.
Boon Edam Inc., a provider of security entrances and architectural revolving doors, announces that RagingWire Data Centers has installed Boon Edam’s Tourlock 180+90 security revolving doors as part of its integrated access systems that protect their data centers in Ashburn, Va. and Sacramento, Calif. Founded in 2000, RagingWire was one of the first companies that helped to build the multi-billion dollar global data center colocation industry. Now, RagingWire is the North American data center platform within the portfolio of NTT Communications, which operates 140 data centers in 20 countries worldwide, making RagingWire one of the largest and most financially solid data center companies in the world. Demanding hyperscale cloud RagingWire is recognised as an industry leader in data center security and overall customer experience" RagingWire uses Tourlock security revolving doors at its Ashburn VA3 Data Center, which features 245,000 square feet of space and 16 megawatts of critical power, and its Sacramento CA3 Data Center, which is a 180,000 square foot facility with 14 megawatts of critical power. VA3 and CA3 are part of RagingWire’s portfolio of data centers in Ashburn, Northern California and Dallas, Texas. “As the colocation data center of choice for some of the most demanding hyperscale cloud and enterprise companies, RagingWire is recognised as an industry leader in data center security and overall customer experience,” said Mark Borto, CEO of Boon Edam Inc. “We are proud to provide an important part of RagingWire’s sophisticated, multi-layer, integrated security system.” Provide efficient passage Boon Edam’s security revolving doors provide efficient passage for hundreds of people daily at RagingWire’s data centers. The doors prevent piggybacking and tailgating during both entry and exit by using a combination of sensors to recognise shapes, size and volume in three dimensions, and then stopping the door when a violation occurs. Our customers expect our security entrances and anti-tailgating technologies to be extremely fast and accurate"The state-of-the-art system also generates an accurate picture of exactly who is in the building at all times. “Our customers expect our security entrances and anti-tailgating technologies to be extremely fast and accurate,” said Eddie Ankers, Director of Corporate Security at RagingWire. Analyse suspicious behavior “By adding these doors to our defense-in-depth security strategy, we are providing the best possible protection system for our customers’ mission critical equipment.” In addition to Boon Edam’s Tourlock security revolving doors, RagingWire’s layered security approach features highly trained, 24x7 security staff, biometric scanners, badge readers, intelligent high-definition video cameras that analyse suspicious behavior, anti-tailgate mantraps, a building-within-a-building design, anti-climb perimeter fencing, concrete bollards in front of building entryways, and an anti-ram security gate.
Vicon Industries Inc. (VCON: OTCQB Venture Market) ("Vicon"), designer and manufacturer of video surveillance and access control software, hardware and components, announced today that Louisa County Public Schools, in Northern Virginia, has completed installation of a district-wide Vicon Valerus video management solution that encompasses its six school buildings and connects nearly 400 cameras. The system includes multiple application servers and NVRs running Valerus VMS software, as well as a wide range of Vicon IP megapixel camera models. The district has opted to share camera access with the Louisa County Sheriff’s Department, whose officers can use iPads and smartphones to immediately call up video through the Valerus VMS interface in case of an emergency. This allows them to visually assess any situation and locate the perpetrator before sending in officers. Vicon sponsored training class The Valerus solution was chosen by Louisa County Public Schools because of Vicon’s willingness to provide the district’s in-house electricians and technical team with as much autonomy as possible in setting up and managing the system. After participating in a Vicon sponsored training class, the district has been self-sufficient in its ability to install, program and troubleshoot Valerus. David Szalankiewicz, LCPS Facilities Director, says "Vicon’s technical team has supported our in-house guys directly with training and certification so that we feel completely in control." Ron Lapsley, Vicon’s Regional Sales Manager who worked on the project, explains, "Vicon understands that the technical capabilities and service needs are different for each customer, and we’re glad to provide the right level of support that makes sense. In many cases, the manufacturer relationship is as important as the product itself in making sure a customer is satisfied."
HID Global, a worldwide provider in trusted identity solutions, announced that 85-year-old fire protection provider RAEL Automatic Sprinkler Company and integrator Automated Decision have deployed HID Trusted Tag Services at one of Manhattan’s most iconic skyscrapers. The combined solutions help secure, digitise, automate and streamline inspection and maintenance of the building’s massive fire and safety sprinkler system. "HID Trusted Tag Services are a real competitive differentiator for us when we bid for projects now," said David Israel, President, RAEL Automatic Sprinkler Company. "We plan to deploy it in other noteworthy buildings and we’re exploring using it for other mission-critical equipment we inspect and repair as well." The RAEL solution incorporates HID Trusted Tag Services into Automated Decisions’ work order management system and mobile inspection app HID Trusted Tag Services HID Trusted Tag Services empower robust Internet of Things (IoT) applications by attaching unique and trusted identities to virtually any object that can be read by mobile devices. Smartphones and other devices can then be used for innovative use cases, without compromising the privacy of end users. The RAEL solution incorporates HID Trusted Tag Services into Automated Decisions’ work order management system and mobile inspection app. The deployment includes HID’s trusted and tamper-evident NFC tag using dual NFC and QR code technology; unique cryptographic authentication and a unique QR code placed on every component of the RAEL sprinklers. After authenticating to HID’s cloud authentication service, RAEL technicians move through the building, tapping each applied tag with their mobile devices to authenticate upon completion of their component inspection or repair. Proof of presence Each individual tap generates a unique encrypted code appended to a URL to provide proof of presence. This process confirms the technician was physically at the site and conducted the required sprinkler inspections and repairs. "Proof of presence was critical for us,” said Israel, “as property managers are now expected to deliver a much higher level of compliance reporting." The solution also logs the user, tap time and date into the Automated Decisions work order management platform. Mobile online access provides inspectors with service request maintenance records, sprinkler part specifications, diagrams and photographs. Combined HID and Automated Decisions solution has enabled faster, more efficient inspections and repairs Combined tag services and mobile devices "That RAEL and Automated Decisions are leveraging our offering for fire and safety at an immense, iconic skyscraper reinforces the breadth of IoT use cases that our identification and sensing portfolio addresses," said Mark Robinton, Director of Business Development & Strategic Innovation, Identification Technologies with HID Global. "Facility managers are also increasingly seeking to combine the use of HID Trusted Tag Services and mobile devices to automate other safety and security functions, including guard tour and key management, as buildings become more intelligent and connected." In addition to providing peace of mind to RAEL and their property management clients, RAEL also reported the combined HID and Automated Decisions solution has enabled faster, more efficient inspections and repairs, improved first-time fix rates and fewer repeat visits.
The Italian city of Venice has selected Project Automation to implement Nedap’s smart parking solution to improve on-street parking. Nedap – leading specialist in vehicle detection technology – developed SENSIT. This sensor-based vehicle detection system is implemented at a total of 1949 parking bays in two paid parking zones in Venice. SENSIT enables motorists to quickly find an available parking spot by using dynamic signs alongside the streets that display parking availability. Project Automation, Nedap’s certified wireless vehicle detection partner in Italy, is responsible for the implementation of SENSIT in the city of Venice. The Italian partner AVM developed a dedicated parking app. Real-time parking occupancy data Venice, famous for its canals and gondolas, is a very popular tourist destination. Due to its historical city centre, parking areas are limited. On the mainland, in the Mestre area, Venice has over 2000 parking bays. To easily guide tourists to these parking bays, the WES solution from Project Automation was selected. The real-time parking occupancy data optimizes the parking and payment process and used for the development of the city’s mobility policy in the future This system uses Nedap’s SENSIT: smart parking sensors that detect whether or not a specific parking bay is occupied and for how long. The real-time parking occupancy data optimises the parking and payment process. In addition, this data is used for the development of the city’s mobility policy in the future. Intensive testing earlier this year proved that Nedap’s SENSIT is highly accurate and robust. Mobile app to find parking space Nedap-partner Project Automation is responsible for the city wide implementation of the ICT solution for smart parking. AVM – also a partner – developed a dedicated app that can be used by motorists to help them find an available parking space effectively and ensuring a smooth running mobile payment process. Evidently, payment at parking meters is also available. The SENSIT-project in Venice is part of the POM Metro project, which is based on the European Union Horizon 2020 initiative, in order to improve mobility in cities.
Located in Milpitas, California, Jang Su Jang restaurant offers high quality, authentic Korean cuisine offering an extensive menu to satisfy even the pickiest taste buds. Their main goal is to provide delicious meals served with great service in a clean, modern and upscale environment. Jang Su Jang prides themselves by only using the freshest produce for their side dishes and quality meats for their BBQ, providing an excellence to the Jang Su Jang brand. Highly committed to creating an exceptional dining experience not only with great food, but through superior service and an attractive atmosphere, Jang Su Jang employees will always do their best to provide the highest level of Korean cuisine and customer service.The primary objectives of a security overhaul are to monitor staff and provide overall coverage of dining areas as well as entrances and exits Management acknowledges that security plays a crucial role influencing sustainability of operations. The primary objective of a security overhaul including maintenance with camera additions and upgrades will allow management to monitor staff, provide overall coverage of dining areas as well as entrances and exits. Solution by VIVOTEK VIVOTEK’s camera deployment was crucial to assist management in the day-to-day operations of the restaurant. Remotely monitoring employees, customer disputes, damage to customer property and car break-ins are all concerns upper management must address. Also, being able to monitor the main dining areas, assist hosts with seating and table occupancy and camera installations always provide security during non-business hours. Since 2015, management at Jang Su Jang restaurant have always wanted, at a security level, no blind spots left uncovered in the kitchen and dining areas. At the same time, it is critical to maintain the restaurant’s upscale design, making sure cameras are discrete but fully functional. The new video surveillance system features twelve VIVOTEK Network cameras including a 16-channel network video recorder, ND8401. A security overhaul will allow management to monitor staff, provide overall coverage of dining areas as well as entrances and exits Perfect fit for overall coverage FD816BA-HT 2 megapixel fixed dome network camera is equipped with a Full HD sensor enabling a viewing resolution of 1920x1080 at 30 fps. Featuring WDR Pro and Supreme Night Visibility technology, this camera can capture high quality and high visibility video in high contrast or low light environments.Armed with a removable IR-cut filter, VIVOTEK's solution can maintain optimal image quality around the clock As a professional day/night camera, the FD816BA-HT features a removable IR-cut filter as well as IR illuminators effective up to 30 meters for superior image quality around the clock making this camera a perfect fit for overall coverage of the main dining area. Following with the FE9191 H.265 fisheye network camera was used to cover the large banquet area. Covering 360° surrounding view, restaurant staff has no blind spots and can easily run the floor without having to constantly walk the area. The 12 megapixel camera guarantees superb image quality utilizing the latest in panomorph lens technology for 180°panoramic view (wall mount) or 360°surround view (ceiling/wall/floor mount). Armed with a removable IR-cut filter and WDR Enhancement technology, the camera can maintain optimal image quality around the clock for unparalleled visibility under high-contrast lighting environments. Jang Su Jang’s kitchen area was outfitted with FE8174V, VIVOTEK fisheye network camera featuring 5 megapixels.The restaurant uses VAST as the central management software designed to manage all surveillance products Finally, the FD8134 fixed dome network camera completed the deployment and was installed at various exits and entrances, hallways and the cash register area. Specifically designed for indoor applications with its compact and stylish exterior, FD8134 allows discrete surveillance by capturing high quality, high resolution video. In addition to completely outfitting the property in VIVOTEK cameras, the restaurant uses VAST as the central management software designed to manage all surveillance products. VAST allows owners to operate their business efficiently on premises or remotely. VIVOTEK's effective solution “When we originally started improving our security system, we chose VIVOTEK cameras and were continually impressed with the quality and reliability, we continued to do upgrades as new VIVOTEK equipment was released. Delicious, quality food is not our only priority; safety is also fundamental to our business. Our staff and customers well-being is of immense importance and helps our business operations run smoothly,” said Manager of Jang Su Jang restaurant Brian Chung.
Ellams, a global manufacturer and supplier of telephone scratch cards based in Nairobi, Kenya, required a foolproof security solution, integrated with access control and video surveillance for their manufacturing units. Matrix provided Ellams with an Integrated Access Control solution comprising of Card based Entry and Exit Readers. Established in the year 1977, Ellams primarily started off as a Security Documents Printer and Business Forms Manufacturer. In the year 2001, Ellams started off with the new venture of developing Telephone Scratch Cards for local telecom and cellular operators. Ellams has two manufacturing units based in Nairobi that supply secure pre-paid scratch cards to Central, Western, Eastern, and Northern Africa. Security being crucial for Ellams with respect to its manufacturing unit, the company was on a look out for a vendor who could meet the below mentioned requirements. Challenges: Dual verification of credentials at main entrance Allow entry or exit to a user in an employee zone if a guard is present in his cabin Guard does not leave while employees are present in an employee zone Keep a check on employees’ movements – whether they enter after gaining access or not, etc. Access Control in each department Pre-defined number of users allowed in a department When a user enters an area, the event is recorded till he/she leaves Generate alarm on violation of access rules Solutions: Web-based access control solution with card-based entry and exit readers Integration with beam detector for checking user availability in an area after entering the premises Man-Trap feature to open one gate at a time Employees allowed access only if guard is present Occupancy control to ensure defined number of people are allowed in the respective zone Camera remains on in presence of employees in a respective zone and turns off in their absence Instant alarm notification to take immediate action upon violation of access rules Benefits: Improves security with integrated solution Real-time alarm notification helps take immediate action upon violation of access rules Ensures the guard continuously monitors entry and exit of employees Products: COSEC DOOR CAP - RF card based premium door controller COSEC PATH RDCE – EM proximity card-based reader COSEC PANEL LITE- Site controller for multiple door controllers COSEC CENTRA GE- Application software for 100 users, expandable up to 500 users COSEC GE ACM- Access control module for COSEC CENTRA GE