RemoteLock, the provider of universal access control, announces that it has expanded the number of August and Yale locks that are supported on its platform to include Wi-Fi-enabled August smart locks and the line of Yale Assure Locks with Wi-Fi. RemoteLock customers can now leverage RemoteLock to manage these locks in large scale installations, gaining greater efficiencies by administering access to every lock from a single dashboard. The expanded partnership is expected to provide new access c...
Radio Physics is pleased to announce the global launch of Optracon, a stand-off threat detection solution. Optracon is a fully automated multi-sensor fusion solution for detecting concealed mass casualty threats at distances of up to 30m. Harvesting data from state-of-the-art radar, video analytics, LiDAR, machine learning algorithms and artificial intelligence to produce the world’s leading concealed threat detection solution. Following more than 18 months of development, greatly aided...
SmartTask, a UK-based developer of cloud workforce management solutions, has announced the availability of its mobile operations app. Fully integrated smartphone app streamlines mobile patrols, alarm response callouts and keyholding for security officers and controllers helping demonstrate BS7984 compliance. Designed specifically for UK security services providers in collaboration with the UK security industry, SmartTask mobile operations keep field officers in contact with the control room....
Codelocks has expanded its Marine by Codelocks range, giving customers a wider choice of weather-resistant keyless access solutions. Due to the popularity of its CL510 and CL515 Marine by Codelocks products, launched in October last year, Codelocks has added a number of new locks to its Marine by Codelocks range. The new additions include light and medium duty locks from the CL200 and CL400 mechanical range, as well as further heavy-duty locks from the CL500 mechanical range – all of whic...
Hanwha Techwin America, a supplier of IP and analogue video surveillance solutions, announced a new app for systems integrators. The new Wisenet QR Scanner App is designed to help quickly create a list of all Wisenet devices associated with a specific project, without having to take the products out of their packaging. The QR code is found on the outside of the product carton, the bottom of the device, as well as on an included extra sticker for Wisenet modular cameras. This allows a technicia...
Particularly affordable, particularly compact and particularly powerful when the essentials matter: the new uEye XLE camera family from IDS has been specially developed for high-volume and price-sensitive projects. Thanks to their space-saving design, practical USB3 interface and support of the USB3 Vision Standard, the industrial cameras can be easily integrated into any machine vision system. Customers can choose between single-board cameras with or without C-/CS-mount or S-mount as well as v...
AlgoSec, a provider of business-driven network security management solutions, announces that AlgoSec CloudFlow, its cloud-native solution that is designed to deliver complete visibility and management of security control layers across enterprise cloud estates, is now available in AWS Marketplace, a digital catalogue with thousands of software listings from independent software vendors (ISVs). AWS Marketplace makes it easy for organisations to find, test, buy, and deploy software that runs on Amazon Web Services (AWS), giving them a further option to benefit from AlgoSec CloudFlow. Central policy management CloudFlow provides organisations with instant visibility and in-depth risk analysis and remediation. CloudFlow provides multiple unique capabilities such as cloud security groups clean-up, as well as central policy management, allowing organisations to efficiently manage multiple similar security controls in a single policy. This strengthens enterprises’ cloud security postures and ensures continuous audit-readiness. With the addition of CloudFlow in AWS Marketplace, customers can benefit from simplified sourcing and contracting, as well as consolidated billing, ultimately resulting in cost savings. The new listing also gives organisations the ability to apply their use of AlgoSec CloudFlow to their AWS Enterprise Discount Program (EDP) spend commitment. Ensuring continuous security CloudFlow extends end-to-end automation of security policy management to multi-cloud estates" “Getting comprehensive visibility and management of security across cloud environments is one of the biggest security challenges that enterprises are facing today. Organisations need an efficient, automated security management approach to ensure consistent security across their hybrid-cloud estates,” said Eran Shiff, VP Product at AlgoSec. “As a cloud-native solution, CloudFlow extends end-to-end automation of security policy management to multi-cloud estates. This drives agility while ensuring continuous security for next-generation enterprise environments. We’re delighted to give our customers an additional way to procure CloudFlow via AWS Marketplace.” Troubleshooting connectivity issues The addition of AlgoSec CloudFlow in AWS Marketplace is the latest development in the relationship between AlgoSec and AWS. AlgoSec CloudFlow, which is part of the AlgoSec Cloud offering, integrates seamlessly with AlgoSec’s Security Management Solution, providing efficient and easier management of complex, heterogenous networks. Organisations can define and enforce security across their entire network environment, using a cohesive security policy to assess risk and troubleshoot connectivity issues and change management problems.
CP Communications, a pioneer in innovative solutions and services for live event productions, has acquired the assets of SportsCam, the groundbreaking innovator and creator of a wide range of wireless and robotic camera products for live sports production. The acquisition expands CP Communications’ range of wired, wireless and cellular content acquisition and streaming systems for its Red House Streaming brand, while also opening the door for new business opportunities in security and public safety. SportsCam changed the fan engagement game with wearable wireless cameras, among the first technologies to embed camera and transmission equipment into clothing. Cloud-connected cameras Their products emphasise wearable, cloud-connected cameras to capture close-up sports action from varied points of view. The SportsCam products have been used in hockey, boxing and College Football broadcasts. They are also used by remote newsgathering teams, and serve many other content acquisition needs for broadcast and professional AV events. CEO Kurt Heitmann is bullish about where SportsCam can take the company beyond sports production CEO Kurt Heitmann is bullish about where SportsCam can take the company beyond sports production, most notably markets such as law enforcement, public safety, and oil and gas that rely on wearable and robotic cameras to document events. He sees strong synergies between SportsCam and products that CP Communications and Red House Streaming regularly leverage for sports and live events, including Mobile Viewpoint’s IP streaming and bonded cellular solutions. Impressive product family “SportsCam has developed an impressive product family that allow our customers to capture and stream live events as they happen, and deliver secure, encrypted streams back to a studio or command and control centre,” said Heitmann. “We have long used these products in sports production, and we can now apply the operational efficiencies and benefits to a broader range of acquisition and streaming applications under our Red House Streaming brand. We are excited to bring a proven broadcast-quality technology to markets that today often use consumer technology to record and backhaul live video to central locations.” Virtual corporate events Our Red House Streaming brand was established to bring the cost-effectiveness and operational efficiency of IP" “Our 35 years of broadcast experience has gradually transitioned into a wider universe of streaming applications for virtual corporate events, houses of worship and live-streamed athletic events such as bike races, marathons and triathlons,” said Heitmann. “Our Red House Streaming brand was established to bring the cost-effectiveness and operational efficiency of IP, cloud services and bonded networking to more customers and markets. The SportsCam acquisition amplifies this strategy.” New imaging systems Heitmann adds that SportsCam’s founder, Chris Stramacchia, will remain with CP Communications and work closely with the company’s engineering and R&D teams. “I am very excited that SportsCam is now a part of CP Communications,” said Stramacchia. “The combination of our specialty camera expertise with CP’s strengths in wireless acquisition, along with streaming and bonded technologies, will allow the creation of exciting new imaging systems for a wide range of applications from sports to corporate and industrial. CP Communications’ longevity and reputation as an innovator in broadcast and media technology services provides a perfect platform for the growth of SportsCam products and services.”
SureCloud, the provider of Cybersecurity and Risk Advisory services, and cloud-based, Governance, Risk, and Compliance software, announces the launch of its new tech-enabled service - ‘Max’. Organisations often struggle to balance their need for expert cybersecurity services with time and financial constraints. With a rapidly evolving threat landscape, accurately budgeting for a year of cybersecurity costs is becoming ever more challenging. Extensive consulting team In addition to this, the COVID-19 pandemic has resulted in large portions of the workforce being furloughed (in the UK) or, unfortunately, being made redundant, which in some cases has left IT teams without expertise in critical areas such as cybersecurity. Max is focused on outcomes and has 200 years’ worth of cybersecurity expertise SureCloud’s new, tech-enabled Max service provides organisations with a solution to these challenges by granting them access to the perfect cybersecurity department, made up of experts in all domains, ready to be called upon in an instant. Max is focused on outcomes and has 200 years’ worth of cybersecurity expertise, harnessing the skills of an extensive consulting team, each member with more than 10 years of hands-on experience. Robotic process automation Max is skilled in all aspects of cybersecurity, from strategy and operational execution to reporting, and enables organisations to run their cybersecurity functions in a highly efficient, cost effective way. Organisations can engage Max on a starting salary subscription, which offers a low cost, entry-level way to access a vast amount of expertise only the pioneer organisations could hope to afford. Being tech-enabled, Max is turbo-boosted through the power of robotic process automation (RPA), which automates and optimises the traditional manual processes associated with delivering a service. Smart decision making Max is also supported in smart decision making by artificial intelligence (AI). These technology-components empower SureCloud’s consultants to concentrate their time on the human decision-making aspect of cybersecurity to help reduce risk, as well as deliver a better customer experience. SureCloud’s ‘Max does Cybersecurity’ is available as a subscription model across 3 levels of service In addition to in-person consulting engagements, Max can also be accessed as a chatbot via SureCloud’s central, cloud-based Gartner recognised platform, where customers can request assistance or ask cybersecurity related questions. SureCloud’s ‘Max does Cybersecurity’ is available as a subscription model across 3 levels of service, building on each other, and offering different levels of expert consultant-led outcomes and cloud-based software applications. Accredited cybersecurity consultants Commenting on the launch, Richard Hibbert, SureCloud CEO, said: “With Max, SureCloud is addressing the operational fracture between software and services, by combining the power of technology with our existing expert advisors. We have been market-leading cybersecurity service specialists for over 14 years, and this offering is the natural next step, giving organisations round the clock access to our accredited cybersecurity consultants, as and when they need them.” “By harnessing AI and RPA across our platform, we have essentially created living applications that evolve to both support our consultants, and give our customers the outcomes they need." Max does Cybersecurity is Max’s first service. In the near future, Max will also be extended to include additional service-lines, including, Max does Continuous Security Testing, Max does Compliance (including PCI) and Max does Third-Party Risk Management.
SonicWall announces the expansion of its Capture Cloud Platform with the addition of the high-performance NSa 2700 firewall and three new cost-effective TZ firewall options. The company also debuted SonicWall Cloud Edge Secure Access that delivers easy-to-deploy, easy-to-use zero-trust security for organisations operating in a modern work-from-anywhere model. Making necessary investments “As emerging technologies mature, it’s imperative that companies make the necessary investments to ensure they are prepared for what is to come while making it seamless to the operation of their organisations,” said SonicWall President and CEO Bill Conner. “As remote users require more and more devices, the reliance upon IoT continues to rise and extended distributed networks are challenged with evolving security and connectivity measures, we look to provide tailored options to address growing needs.” Advanced security control The new TZ270, TZ370 and TZ470 were especially designed for mid-sized organisations and distributed enterprises The new SonicWall NSa 2700 expands multi-gigabit threat performance to enterprises, MSSPs, government agencies, as well as key retail, healthcare and hospitality verticals. It’s also the company’s first mid-level appliance on the new SonicOS 7.0 platform, delivering a modern UX/UI, device views, advanced security control, plus critical networking and management capabilities. Like the rest of SonicWall’s newest generation of firewall appliances, the NSa 2700 is ready to be managed by SonicWall’s cloud-native Network Security Manager (NSM), giving organisations a single, easy-to-use cloud interface for streamlined management, analytics and reporting. To secure increasingly relied upon SD-Branch solutions, SonicWall is adding more security choices for SMBs with new cost-effective TZ firewall options. The new TZ270, TZ370 and TZ470 were especially designed for mid-sized organisations and distributed enterprises with SD-WAN locations. Protecting network access 5G- and LTE-ready, the full line of TZ firewalls comes with a convenient USB 3.0 port to quickly and reliably add 5G connectivity. “The performance of the new TZ firewall is a tremendous increase, which is necessary for DPI-SSL inspection,” said Data-Sec Senior IT Security Solutions Architect Daniel Franz. “It has awesome security features like Capture ATP and unified endpoint integration.” SonicWall is debuting its new zero-trust network access (ZTNA) solution Providing a robust Secure Access Service Edge (SASE) offering, SonicWall is debuting its new zero-trust network access (ZTNA) solution. SonicWall Cloud Edge Secure Access enables organisations to control and protect network access to both managed and unmanaged devices based on identity, location and device parameters. The cloud-native solution provides a fast and safe authenticated on-ramp to any cloud and on-premise network using authorise-first, connect-later zero-trust model. Remote working solutions “Cloud Edge has been very impressive so far. All functions have worked reliably and performance has been exceptional,” said Harry Boyne, Technical Director, Chalkline Solutions Limited (UK). “We’ve worked with SonicWall firewalls for the best part of a decade, and have found them to work consistently and be a key component of our clients’ on-premise network boundaries.” “We are really excited to work with Cloud Edge as it helps extend that same secure, reliable boundary to client home and remote environments, without the requirement of hardware or significant costs. We’re confident that this solution will have a real impact on our clients, especially with the massive increase in demand of remote working solutions this year.” Meeting security standards SonicWall also updated key products with new enterprise and MSSP capabilities Cloud Edge Secure Access is easy to set up and easy to scale. An IT administrator can configure the zero-trust security solution in as little as 15 minutes; end-users can self-install the client application in just five minutes. SonicWall Cloud Edge Secure Access joins SonicWall Secure Mobile Access and SSL-VPN technology in providing remote security that meets security standards established prior to responses made prior to ‘the new business normal’ set in motion in response to the COVID-19 pandemic. SonicWall also updated key products with new enterprise and MSSP capabilities. Network Security Manager (NSM) 2.1 adds various options for NSM on-premises deployments to help SOCs run with greater ease and control. SonicWall Capture Client 3.5 endpoint protection helps organisations manage multiple tenants, translating to lower operational costs and faster response times.
Quantum Corp. unveils the all-new data and storage management platform - Quantum ATFS. It is the first network-attached storage platform to integrate real-time data classification and insights with the needs of applications, determining how storage resources are allocated and consumed. Data insights enable organisations to visualise data without the constraints of a file system, automate purposeful data placement based on policies, and optimise resources using just-in-time data movement policies. The ability to support the needs of data and applications on premise or in the cloud advances Quantum’s strategy to be the provider of management and storage services for unstructured data anywhere. Crawling file systems “The engineering teams at Quantum worked with storage experts to address the many challenges IT teams face with growing storage needs. They designed an innovative and unchained solution with cutting edge technology, data provenance and analytics to provide a storage platform that works for IT, instead of IT that works for storage,” noted Jeffrey McDonald, PhD, Director of Information Technology, The Hormel Institute. Customers are performing ‘unnatural acts’ to manage their data – guessing at capacity and where data lives, or crawling file systems for days to find what is needed by the business. They are often uncertain about what they can delete and when they can delete it. The results are silos of data, and a loss of control and visibility. Optimising storage resource ATFS delivers a consistent end user experience to deploy resources on premise or in the cloud ATFS (All-Terrain File System) meets this challenge. It is designed to ensure just-in-time purposeful placement of data, meeting the performance, resiliency, availability, and access demands of applications and workflows. As a result, ATFS delivers a consistent end user experience to deploy resources on premise or in the cloud. By leveraging data classification, metadata and business-oriented tagging to streamline and optimise storage resource consumption, ATFS transforms storage economics, eliminating the premium organisations pay for performance. It is designed to manage hardware resources as a service to the application when and where it is needed it at scale. Achieving greater efficiencies “The ATFS system we have at 5 Guys Named Moe is the backbone of our extremely high bandwidth cloud data migration work,” said Eric A. Reid, Head of Post-Production, 5 Guys Named Moe, Inc. “Utilising the metadata tagging built into the ATFS platform allows us to prioritise data efficiently and make sure that NVMe space is automatically allocated to the most resource intensive tasks without any manual input. This reduces costs overall while ensuring we have the right balance of storage space and high-end performance available for our workflows.” ATFS ingests data, which can be placed into flash, bulk, or the cloud based on policies, application defined tags, or manually. Performance may be tuned based on the size of the active data set. Automated policies place data ‘just-in-time’ to support workloads while achieving greater efficiencies and improved productivity per unit of storage. Asset management tools By automating data classification and placement, ATFS serves a wide range of use cases: Automate Application Workflows: Integrate with asset management tools, schedulers, and other applications to automate tasks using API in life sciences, media and entertainment, finance, and more. Active Data Retention: Metadata and tags simplify access to data over time. Deploy Resources in the Cloud: Burst into the cloud using cloud-based applications or use ATFS for large data set retention. Collaboration: Secure data sharing across the organisation and externally without creating duplicates. Control Data: Execute on retention, protection, and access guidelines per regulations, best practices, to ensure data. Providing deeper insights ATFS is available to order beginning this December as software installed on a Quantum appliance ATFS is available to order beginning this December as software installed on a Quantum appliance. Scott Sinclaire, Senior Analyst, ESG: “Cloud adoption continues to accelerate, as businesses demand greater elasticity from their storage resources, their compute capabilities, and their budgets. ATFS is designed for this new data landscape, to provide businesses with the insight necessary to extract value from their unstructured data.” Ed Fiore, General Manager, Primary Storage at Quantum: “For customers with millions or billions of files, classifying those files so they can be organised, searched, and then placed based on rules is a key advancement toward getting control of massive unstructured data sprawl. We designed the ATFS platform to address these challenges, to align an application’s needs with storage resources in real time, and to provide deeper insights into data.” Unique industry perspectives Quantum will host VirtualQ | Transform, an online forum for unlocking the value of unstructured data, November 17th in Europe, and November 19th in North America. The company will showcase the latest offerings to capture, store, manage, protect, and archive unstructured data in all its forms. Participants will gain unique industry perspectives on the forces and trends shaping Quantum’s technology roadmap and get exclusive access to executives, as well as product and technical leaders.
Sonatype, the globally renowned provider of innovation-friendly open source security tools, has announced entering into a strategic partnership with Fugue, the company putting engineers in command of cloud security, to deliver the first Infrastructure-as-code (IaC) solution that shifts cloud security left into the developer workflow. Sonatype and Fugue partnership The partnership further advances the missions of Sonatype and Fugue to empower software developers with best-in-class tools so they can accelerate innovation and simultaneously improve application security, cloud infrastructure security, and continuous compliance with defined policy. The combined capabilities of Sonatype and Fugue enable developers to find and fix security vulnerabilities when actively developing cloud applications, while at the same time preventing security vulnerabilities and compliance issues from surfacing in production due to misconfigured cloud infrastructure. Out-of-the-box guidance for developers The joint solution includes out-of-the-box guidance to assist developers when configuring IaC The joint solution includes out-of-the-box guidance to assist developers when configuring IaC and automatically foster compliance with privacy and security standards, including CIS Foundations Benchmarks, GDPR, HIPAA, ISO 27001, NIST 800-53, PCI, SOC 2, and custom rules. “Sonatype has a long and successful history of providing front-line software developers with friendly feedback pertaining to the health of open source libraries, making it easy for them to identify and remediate security risk, without slowing down innovation,” said Wayne Jackson, the Chief Executive Officer (CEO) of Sonatype. Configuring secure cloud infrastructure Wayne adds, “In the cloud-native world, developers are not just responsible for building secure applications, they’re also responsible for configuring and provisioning secure cloud infrastructure using tools like Terraform.” He further said, “By working with Fugue, we’re equipping developers with the right information at the right time so they can always make healthy decisions when configuring IaC.” Nexus IaC capabilities In Q1 2021, Sonatype will offer new Nexus IaC capabilities as an add-on to its Nexus Lifecycle product that incorporates Fugue's cloud infrastructure security and compliance technology. This will make it possible for developers using Nexus Lifecycle to find and easily fix misconfigurations in Terraform plans before being applied to production infrastructure, and use those same policies with Fugue to ensure continuous compliance in production. Additionally, Sonatype and Fugue will collaborate to bring the Fugue runtime SaaS continuous compliance solution to Sonatype customers. Addressing cloud vulnerabilities The mutable nature of cloud APIs brings serious risk of post-deployment misconfiguration" “Sonatype and Fugue have a strong history of leadership in empowering developers to securely build and operate in order to keep their data safe. We’re proud to partner with them to deliver a single solution to address the full breadth of cloud security and compliance challenges,” said Phillip Merrick, the Chief Executive Officer (CEO) of Fugue. Phillip adds, “The mutable nature of cloud APIs brings serious risk of post-deployment misconfiguration, and Sonatype and Fugue are making it possible for the first time to address all relevant cloud vulnerability surfaces, from initial development to runtime production environments, with a single solution using the same policies.” Unified cloud security and compliance solution Sonatype and Fugue are delivering a unified cloud security and compliance solution that empowers software developers to address the entire cloud threat landscape with: Open-source governance with Sonatype’s Nexus platform to shift security of software applications left to address open source risk and known vulnerabilities automatically at every phase of the CI/CD pipeline. Infrastructure-as-code governance with Sonatype’s new IaC capabilities, which integrate Fugue’s cloud infrastructure security and compliance technology for Terraform. Continuous cloud compliance with Fugue to ensure cloud environments remain in compliance and free of misconfiguration vulnerabilities post-deployment, and demonstrate it at all times with automated reporting.
Indoor positioning is, in many ways, an inside version of the satellite-navigation apps we rely on for outdoor navigation, but with an added twist – it can also be used to help locate people and things. Let’s say you’re at home and misplaced your car keys, or you’re in a grocery store and can’t find your favorite brand of coffee. Or maybe you’re working in a factory and need a particular tool from a storage bin, or you’re a site manager dealing with an emergency and need to make sure everyone’s exited the building. Indoor positioning helps in all these situations, because it can locate items and guide you to where they are. The importance of “where” Knowing where an asset is located in real time is useful in many ways. In industrial settings, it improves item utilisation rates and saves time spent searching for things. It opens the door for a new level of “just in time” efficiency on factory floors, and for inventory management in warehouses and retail environments. Safety is another benefit of accurate location, because knowing where people, automatic guided vehicles, and robots are in real time can help prevent accidents and keep people out of harm’s way. Accurate location in real time also enables contextual decision-making, so your smart house adjusts your stereo automatically as you move from to room or lets you control objects by simply pointing at them. Lets you control objects by simply pointing at them Security authorisations based on location is another possibility. Precise real-time location is something that can be hard to fake, so it can be used to restrict access to an area or used to add protections based on where an asset sits, where a piece of data resides, or the origination point of a communication. Getting the technology right Developing an effective technology for indoor positioning requires several things. To begin with, location readings needs to be very precise, with accuracy down to as small an area as possible. The technology has to be secure, because location often needs to be kept private. The technology has to be reliable, even in harsh environments, and easily scalable, too, so it can address the thousands of people and assets in large venues. It has to be low power and affordable, so it can be embedded in everything from high-end, complex devices like smartphones to low-end, simple devices like asset tags. And, of course, the technology has to have latency low enough that it can track movement in real time. Various wireless technologies, including Bluetooth and Wi-Fi, are already used for indoor positioning, but they don’t deliver on the full set of requirements, especially in terms of accuracy. A different kind of wireless, called Ultra-Wideband (UWB) checks all the boxes. It has the potential to change the way we do all kinds of everyday tasks. What is UWB? UWB is based on the IEEE standard 802.15.4a/z, which has been optimized for micro-location and secure communication. UWB is highly accurate. It can pinpoint people and things to within just a few centimeters, making it 100 times more accurate than the current implementations of Bluetooth Low Energy (BLE) and Wi-Fi. UWB is reliable because it has high immunity to various types of interference, including multipath, which is when a wave from a transmitter traveling to a receiver by two or more paths causes interference. UWB also offers very low latency, with update rates of up to 1000 times per second and readings that are as much as 50 times faster than satellite navigation. UWB is also implemented using mainstream technology, so it’s both affordable and optimised for low power. Lastly, UWB leverages distance-bounding techniques defined by the IEEE to provide a level of security that makes it extremely difficult to hack. Ultra-Wideband (UWB) checks all the boxes How is all this possible? Physics! UWB out-performs other location technology because, unlike Bluetooth and Wi-Fi, which transmit narrowband signals and use Received Signal Strength Indicator (RSSI) to determine location, UWB transmits wideband signals (500 MHz) and uses Time-of-Flight to determine location. Already in 40+ verticals UWB is already bringing value to products and services in more than forty verticals covering the consumer, automotive, industrial, and commercial market segments. For example, it brings operational visibility to manufacturing and logistics, helps businesses protect workers, and reduces safety-management costs. UWB also lets robots and drones self-navigate, and enables secure, hands-free access to cars, front doors, and other secure locations. It even helps with contact tracing and social distancing in the fight against COVID-19. Now in smartphones Recent adoption in smartphones means UWB is ready to grow quickly. Developers are using UWB as part of new services, with an eye toward making various everyday activities more convenient and safer. With UWB as part of smartphone apps, purchases will be more secure, accessing your car will be possible without a key fob, and misplaced items won’t stay hidden for long. Retail outlets will use location for targeted marketing, and finding things on store shelves will be easier than ever. Home automation will become seamless, and friends and family will be easy to find even if they’re in a crowd. The question of interoperability Having UWB in smartphones is an important first step Having UWB in smartphones is an important first step toward making UWB an everyday part of life, but interoperability is another key factor, since smartphones have to interact with a wide range of other devices and services. That’s where the FiRa Consortium comes in. Launched just over a year ago, the FiRa Consortium is a member-driven organisation of market leaders from the consumer, mobile, industrial, enterprise, and semiconductor industries. FiRa members work collectively to define the future standards that will make interoperability across UWB products a reality. With FiRa making it possible for developers to use UWB in all kinds of new ways, the future of indoor location is really only limited by the developer’s imagination.
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data centre, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. CV-19 means that huge numbers of people are getting access to the same desktop and files, and collaborative communication toolsBut as we know, CV-19 means that huge numbers of people are getting access to the same desktop and files, applications and collaborative communication tools that they do on a regular basis from the office or on the train. Indeed, the new generation of video conferencing technologies come very close to providing an “almost there” feeling. Hackers lie in wait Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical servers. Less than a month ago, we emerged from a period of chaos. For months hackers had been exploiting a vulnerability in VPN products from Pulse Secure, Fortinet, Palo Alto Networks, and Citrix. Patches were provided by vendors, and either companies applied the patch or withdrew remote access. As a result, the problem of attacks died back. But as companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on. That’s because remote desktop protocol (RDP) has been for the most part of 2019, and continues to be, the most important attack vector for ransomware. Managing a ransomware attack on top of everything else would certainly give you sleepless nights. As companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical serversExposing new services makes them also susceptible to denial of service attacks. Such attacks create large volumes of fake traffic to saturate the available capacity of the internet connection. They can also be used to attack the intricacies of the VPN protocol. A flow as little as 1Mbps can perturbate the VPN service and knock it offline. CIOs, therefore, need to acknowledge that introducing or extending home working broadens the attack surface. So now more than ever it’s vital to adapt risk models. You can’t roll out new services with an emphasis on access and usability and not consider security. You simply won’t survive otherwise. Social engineering Aside from securing VPNs, what else should CIO and CTOs be doing to ensure security? The first thing to do is to look at employee behaviour, starting with passwords. It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposed. Best practice would be to get all employees to reset their passwords as they connect remotely and force them to choose a new password that complies with strong password complexity guidelines. As we know, people have a habit of reusing their passwords for one or more online services – services that might have fallen victim to a breach. Hackers will happily It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposedleverage these breaches because it is such easy and rich pickings. Secondly, the inherent fear of the virus makes for perfect conditions for hackers. Sadly, a lot of phishing campaigns are already luring people in with the promise of important or breaking information on COVID-19. In the UK alone, coronavirus scams cost victims over £800,000 in February 2020. A staggering number that can only go up. That’s why CIOs need to remind everyone in the company of the risks of clickbait and comment spamming - the most popular and obvious bot techniques for infiltrating a network. Notorious hacking attempts And as any security specialist will tell you, some people have no ethics and will exploit the horrendous repercussions of CV-19. In January we saw just how unscrupulous hackers are when they started leveraging public fear of the virus to spread the notorious Emotet malware. Emotet, first detected in 2014, is a banking trojan that primarily spreads through ‘malspam’ and attempts to sneak into computers to steal sensitive and private information. In addition, in early February the Maze ransomware crippled more than 230 workstations of the New Jersey Medical Diagnostics Lab and when they refused to pay, the vicious attackers leaked 9.5GB or research data in an attempt to force negotiations. And in March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHO and healthcare organisations in general since the pandemic broke. We’ll see lots more opportunist attacks like this in the coming months. More speed less haste In March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHOFinally, we also have bots to contend with. We’ve yet to see reports of fake news content generated by machines, but we know there’s a high probability it will happen. Spambots are already creating pharmaceutical spam campaigns thriving on the buying behaviour of people in times of fear from infection. Using comment spamming – where comments are tactically placed in the comments following an update or news story - the bots take advantage of the popularity of the Google search term ‘Coronavirus’ to increase the visibility and ranking of sites and products in search results. There is clearly much for CIOs to think about, but it is possible to secure a network by applying some well thought through tactics. I believe it comes down to having a ‘more speed, less haste’ approach to rolling out, scaling up and integrating technologies for home working, but above all, it should be mixed with an employee education programme. As in reality, great technology and a coherent security strategy will never work if it is undermined by the poor practices of employees.
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organisation Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organisation. They can cause brand and financial damage, along with physical and mental damage. Insider threat programme Once you determine you need an insider threat programme, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a programme Next, get a top to bottom risk assessment to learn your organisation’s risks. A risk assessment will help you prioritise your risks and provide recommendations about what you need to include in your programme. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat programme will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a programme and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of programme needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the programme. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the programme, build the culture and promote awareness. Teach employees about the behaviours you are looking for and how to report them. Behavioural analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organisation need to detect insider threats? Organisations need software solutions that monitor, aggregate and analyse data to identify potential threats. Behavioural analysis software looks at patterns of behaviour and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behaviour of people and notifies security staff when behaviour changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviours and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behaviour, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behaviour. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organisation has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat programme. Big companies should invest in trained counterintelligence investigators to operate the programme. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behaviour Using the right technology along with thorough processes will result in a successful programme You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behaviour and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat programme. IT is the most privileged department in an organisation. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat programme takes time and patience. Using the right technology along with thorough processes will result in a successful programme. It’s okay to start small and build.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-time access control security updates Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analogue to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change – is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more. Missed the rest our healthcare mini series? Read part one here and part two here.
A video analytics system that provides ‘behavioural understanding’ can yield more meaningful and actionable data for a range of applications. In public safety and security, such a system can alert on violent or suspicious behaviours, such as people fighting, vandalism, people with weapons, etc. In advanced traffic surveillance and monitoring, it can provide alerts to vehicle collisions (accidents), traffic hazards or vehicle that aren’t using the road properly, such as a car that stops in the middle of the junction. For enterprise and campus security, it can provide advanced anti-tailgating and detect unauthorised activity. Video surveillance infrastructure viisights was founded by a group of entrepreneurs with track records in developing technology businesses These uses are among the benefits of viisights’ video analytics technology based on behavioural understanding of video content. “It means we can extract more meaningful data from the huge amount of video content that is captured, and we can transform that data to actionable insights that eventually justify the massive investment in video surveillance infrastructure,” says Asaf Birenzvieg, CEO of viisights. Their behavioural understanding systems for real-time video intelligence leverage artificial intelligence technology. viisights was founded by a group of serial entrepreneurs with track records in developing technology businesses. The Israeli company’s founders recognised a growing global need for intelligence to make physical and virtual public areas safer – and realised the role that smart video understanding technology can play. Developing artificial intelligence technologies viisights is committed to developing artificial intelligence technologies that facilitate human-like video understanding, which in turn serves as the basis for fully autonomous video intelligence systems powered by pattern prediction technology. “Behavioural recognition is the future of video analytics and the next generation of the object classification analytics systems that hold the majority of the market today,” says Birenzvieg. viisights has developed a video understanding technology for real-time video processing “To date most video analytics systems still base their product features on static analysis of objects from images using image recognition, even the ones that use ‘AI analytics.’ Products built using such object classification technology are extremely limited.” For example, object classification analytics cannot recognise behavioural events in a video such as people fighting or a car collision because such behaviours can’t accurately be concluded in large scale from analysing a single static image/frame. Video understanding technology viisights has developed a video understanding technology for real-time video processing. The technology can process live video feeds. In addition to recognising a particular object (e.g., person) and its attributes (e.g., red shirt), the system can understand an object’s actions, interactions with other objects (events), the scene being viewed (i.e., crowd is gathering, riots) and the context (a car is driving on the road or on the sidewalk). The main verticals are smart cities, enterprises and campuses, banks and ATM security “Basically, we are able to extract more meaningful data from a live video feed and therefore create actionable insights and greater ROI,” says Birenzvieg. The company focuses mostly on security and safety use-cases. The main verticals are smart cities, enterprises and campuses, banks and ATM security, security guard companies and transportation hubs. The company is working on a new product for in-vehicle monitoring mostly for security, safety, vehicle protection and proper vehicle use; it monitors passengers’ behaviour inside a bus, train, or taxi. The product will come to market next year. Video management system viisights’ video analytics offering is currently optimised for server-side deployment, and the integration architecture is similar to most video analytics systems. From one side it is integrated with the video management system (VMS). They are a Milestone verified partner and soon will be part of Milestone's marketplace. From the other end, it is connected to a command-and-control system for processing the data and presenting the alerts to the end-user. The analytics company makes most sales through system integrators. They have partnerships with big system integrators like Motorola Solutions and NEC and are also working with smaller ones. They are looking to expand their system integrator network, mostly in the USA and Europe. Behaviours can have many variations and they can be very diverse Cloud video surveillance “We will continue to invest in performance and accuracy, meaning higher recall and lower false positive rate,” says Birenzvieg. “Since our major value proposition is in behaviour recognition, behaviour events many times are not clearly defined, which is very different from object classification. Behaviours can have many variations and they can be very diverse.” An example is a simple behaviour like a person falling on the floor. A person can fall on the floor in many ways, but the challenge is to ignore similar behaviours that are not a person falling and that confuse the system, such as a person bending over to tie his shoelaces. With cloud video surveillance becoming a trend, viisights is also looking into offering some of their advanced functionalities in a video-analytics-as-a-service-model.
As a security service provider with a rich history in manguarding, Allied Universal is launching a new technology platform to increase productivity and accountability of security officers and to transform guard service operations from an ‘observe and report’ mission to a ‘detect and respond’ function. Mark Mullison, Allied Universal’s Chief Information Officer (CIO), says the new Heliaus platform also uses artificial intelligence (AI) to analyse data, predict outcomes, and prescribe optimum responses. The platform includes a smart phone app that guides security officers to ensure post orders are followed and provides a ‘virtual’ coach or supervisor to guide security officers throughout the day. “The walls between technology and people need to come down in the future,” says Mullison. “We need an ecosystem in which people and technology can cooperate well and respond to threats and drive outcomes.” Real-time situational awareness Technology plays an increasing role in security and safety, but it will never replace humans"Heliaus is a step in that direction. It has two components – the mobile app used by security officers; and a cloud-based portal, like a command and control centre that compiles information from the app and other inputs and performs AI analysis of data. Heliaus is an add-on for Allied Universal customers and is offered for a per-device subscription fee of $199 per month. A customer company’s managers can also access the portal for data visualisation tools and real-time situational awareness, or to input data such as ‘approving’ an incident report or action. “Technology plays an increasing role in security and safety, but it will never replace humans,” says Mullison. “It will augment and enhance the workflow and make people more effective.” “We are focussing on delivering better outcomes for safety and security,” he adds. “The impacts are as broad and diverse as the clients we serve.” Customisation of forms enables the system to collect and use any information that was previously collected on paper. Monitoring and Response Center (MaRC) A system is effective only to the extent that it is used, and Allied Universal has engineered the user experience to make the mobile app easy – almost fun – to use, says Mullison. Elements of ‘gamification’ drive greater user adoption. “It is designed to support the work [security officers] do and make information collection a by-product of people doing their jobs.” The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design Effective AI depends on data, and Heliaus pulls data from Allied Universal’s Monitoring and Response Center (MaRC), where a cloud server integrates the company’s managed security services, including access control, video surveillance and video analytics. It also incorporates current weather information and forecasts, and information specific to the industry segment. Additional data is generated as officers enter data through the mobile app. The system brings together rich data, AI, location-aware workflow automation, and friendly user experience design. It provides insight into the drivers of risk, makes recommendations about how to reduce incidents, and, through dynamic workflow automation, ensures that those recommendations are implemented. Location awareness is a combination of the global positioning system (GPS), Bluetooth beacons, and near-field communication (NFC) tags. Improves the accuracy of responses AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response“Information is organised to facilitate AI analysis. If you have the right knowledge representation then problem-solving is easy,” says Mullison, echoing a common principle of artificial intelligence. AI works to analyse data and make predictions and recommendations to guide responses by security personnel. AI understands the data and applies reasoning capabilities to predict an outcome and prescribe a response. The AI system also learns and improves the accuracy of responses with more data and over time. Responses come much faster than older ‘trial and error’ models of analysis. Another element of Heliaus is a ‘robust workflow engine’ that ensures recommendations are carried out, either by a security professional on site or by the client. Mullison says implementation of the system can result in a 20% reduction of security and safety incidents. Multiple applications of Heliaus Heliaus is already being used by some Allied Universal customers. For example, a major Hollywood production studio is using it to identify and address workplace hazards such as stray electrical cords, dripping water hoses, etc., across a 50-acre area. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard A manufacturer created a custom compliance application using the platform to track more than 140 unique incident types, such as monitoring elevated temperature in a truck trailer or drivers without proper identification. In the logistics sector, Heliaus is being used to facilitate checking delivery vehicles in and out of a truckyard. The flexibility of the platform can enable expansion to incorporate other technologies in the future, too. For example, sources of data for the system could include robots, drones or various Internet of Things (IoT) sensors; or workflow engines could be used to dispatch a robot or drone to handle a situation (rather than a human).
Supra, a provider of mobile credentialing and entry management systems for automotive and real estate sectors, announces that its TRAC-Box key management solution has been selected by Oregon-based Guaranty RV Super Centres to help secure and track keys while keeping pace with a growing demand for recreational vehicle (RV) travel. Supra is a part of Carrier Global Corporation, a global provider of healthy, safe and sustainable building and cold chain solutions. Located in Junction City, Oregon, Guaranty is the state’s largest dealer of recreational vehicles, from entry-level tent campers to luxurious diesel-powered RVs that sell for more than $400,000. Gaining valuable sales An industry publication, RV Business, has named Guaranty one of North America’s top 50 dealers for six consecutive years and a top 10 dealership based on customer reviews. “With our large footprint of 25 acres and long dark winters, it is difficult to have visibility of activity,” said Marty Nill, managing partner, Guaranty. “With the Supra TRAC-Box, we’ve improved security and gained valuable sales and marketing insights, and assigning permissions is simple. We’re confident we have authorised access to our vehicles with tracking controls in place. Our vehicles are retail-ready using the Supra TRAC-Box.” Providing greater visibility Supra’s TRAC-Box solution offers a convenient method for tracking the keys and fobs used to open vehicles Supra’s TRAC-Box solution offers a convenient method for tracking the keys and fobs used to open vehicles. Each TRAC-Box uses Bluetooth to communicate with Supra’s eKEY® mobile app on smartphones carried by Guaranty sales associates. They enter a PIN code into the app to unlock the keybox and acquire the keys from a built-in container. “Each time an authorised user opens a keybox, a record of the activity is stored in both the TRAC-Box and eKEY app, so managers and users can see the history of openings without having to return to the office,” said André Lalande, vice president – sales, Supra. “The app also transmits activity to the TRACcess Manager software to create an audit trail providing greater visibility to lock-up activities.” Removing access permissions TRACcess Manager also provides prompt visibility to the activity and frequency of RV showings, enabling management to see which RVs are most popular and reposition vehicles more efficiently. Notifications can also be set to alert management of keybox activity on specific inventory they want to monitor, for example, each time the 10 most expensive RVs are accessed. The TRAC-Box system also promotes accountability among associates and saves time looking for misplaced keys needed to show vehicles. When salespeople leave the company, managers can remove access permissions in easy, streamlined steps via any internet-connected computer or mobile device within a few minutes. Supra is featuring the TRAC-Box system in its virtual exhibit at the RV Dealers Virtual Convention & Expo, Nov. 9-20, 2020.
Empire House, the luxury business members' club due to launch in West Yorkshire in a few weeks, has invested a five-figure sum in state-of-the-art, automated security systems to create a slick customer experience, intensify site security and help protect clients from COVID-19. In readiness for opening in a few weeks’ time, the Slaithwaite-based business centre – which will incorporate offices, a ‘lounge’ area with stocked bar and corporate and event facilities – is set to attract businesspeople from all over West Yorkshire and offer 24-hour access to tenants. CCTV and intruder system Recognising a need to heighten client experience and reduce the manpower required, Empire House has invested in CCTV, access control, fire and intruder alarm support from Huddersfield-based specialists, Centurion Fire & Security Ltd. The automated system has been designed to make the management of the building simple. The access control, which can screen visitors via a camera, also offers the option of COVID-19 functionality Able to be programmed to allow and deny access around the building, the system ensures that no unauthorised individuals can gain entry. It is wholly integrated with the CCTV and intruder system, permitting ‘triggers’ and push-notifications to key holders when an area has been ‘breached’. The access control, which can screen visitors via a camera, also offers the option of COVID-19 functionality, allowing or denying entry based on whether they are wearing a mask or not. Manned onsite teams Amy Byram is the founder of Empire House. Commenting on the investment, she said: “We wanted to provide the utmost security for our clients, whilst ensuring that their experience is slick and uninterrupted – the last thing that people want is to feel that their privacy is being intruded, and we have got that balance just right.” “I am impressed with the functionality of the software, which will allow the management team to ensure security is maximal at all times, without the costly need for manned onsite teams. We can lock and unlock doors directly from an app, whilst enabling us to mark people as safe or missing in an emergency. We hope our clients will be as equally as impressed by the technology as we are.”
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announces that the Santa Cruz Beach Boardwalk, an iconic amusement park in California, has recently upgraded its security infrastructure with the Security Centre platform. By unifying video and access control park-wide, the park’s security team is able to speed up investigations and emergency response. Touted as the ‘Coney Island of the West’, the seaside park features about 40 rides, 30 restaurants, 15 retail shops, arcades, miniature golf, bowling, and conference and banquet facilities. Video surveillance technology As an admission-free park, guests can enter through multiple entrances to buy food, purchase ride tickets, or simply walk around and enjoy the surroundings. Unlike gated parks which typically have a main security checkpoint, the park’s security team must be hyper-vigilant to spot potential security threats before they can develop. Security operators constantly monitor video cameras and work directly with field officers to handle issues. While video surveillance technology helped security teams watch over the large park, aging equipment began compromising their efficiency. As the search for a new video management system began, the team prioritised openness, reliability, and a vendor’s reputation in the market. Moreover, their aging access control system would soon need replacing too. Actively monitoring cameras The team at Santa Cruz Beach Boardwalk uses the Security Centre platform to manage over 400 cameras and 220 doors The Santa Cruz Beach Boardwalk team chose the Genetec Security Centre platform because of its unique ability to unify video surveillance, access control, and other systems and sensors. The flexibility of the platform was a key selling point and enabled them to choose their preferred cameras and door hardware. Today, the team at Santa Cruz Beach Boardwalk uses the Security Centre platform to manage over 400 cameras and 220 doors across the entire amusement park. From one single interface, operators actively monitor cameras and doors, respond to alarms, handle investigations, and export and share video evidence. This ensures that every security incident is effectively resolved without having to switch applications. Video surveillance system “Like any busy amusement park, our guests sometimes become separated from their groups. When this happens, we are now able to use the Security Centre Omnicast™ video surveillance system, along with assistance from our field officers, to quickly reunite guests with their parties,” said Will Graham, Security Technology Administrator at Santa Cruz Beach Boardwalk. If motion is detected near a perimetre after opening hours, the platform will trigger an alarm and display live video and a 10-second replay of the event on a dispatcher’s monitor. This allows them to quickly identify if it’s an actual threat. Unique access privileges The team has also expedited investigations by sharing system access with other departments. This includes food service, loss prevention and ticket sales who can handle their own preliminary investigations, if needed. The team has set up different door schedules and rules and created over 200 cardholder groups “Using the Security Centre platform, all door events are linked to video which means our team can quickly gather the information needed and solve cases faster,” said Graham. With Security Centre, operators get an instant view of an event as it’s unfolding. So before sending an officer to check on the area, they can quickly identify if it’s a threat or a false alarm. Using the Synergis system, the team has set up different door schedules and rules and created over 200 cardholder groups with unique access privileges for various roles and responsibilities. Managed software maintenance For added peace-of-mind, the Santa Cruz Boardwalk team receives fully managed software maintenance and monitoring via the Genetec Advantage maintenance package to help ensure their systems always available and up to date. “Using Security Centre has definitely heightened our response efficiency at Santa Cruz Beach Boardwalk. Everything from video surveillance and access control to alarm management has been consolidated into one solution—it’s just a better, more effective way to work. And we’re confident that with this unified platform, we’ll be keeping our guests happy and safe well into the future,” concluded Graham.
La Maison Royale, Nairobi, is a 4-star superior boutique business hotel with a ‘French taste’, State-of-the-art facility and close to the entertainment in the Westland neighbourhood, La Maison Royale is a unique experience. La Maison Royale prides itself with friendly staff and the practical touches that make being away from home easier, whether a person books their rooms by the day, week or longer. Travelling for business, looking for temporary or corporate housing, needing short-term housing during relocation, or planning a weekend getaway? La Maison Royale has a solution that will fit everyone’s budget. Unified communication server La Maison Royale has their prominent presence across several locations in Nairobi. Considering this, they required seamless connectivity within sites. A system for call accounting, budgeting and routing with hospitality features was their primary requirement. Furthermore, a comprehensive and scalable solution that does not need a transformation in the coming years was their main challenge. Matrix addressed these challenges by proposing SARVAM UCS The hotel infrastructure required a centralised communication management of all business communication. Besides, they were looking for a multi-site connectivity with call accounting and call budgeting. Matrix addressed these challenges by proposing SARVAM UCS, which is a unified communication server for modern enterprises that manages all business communications from one place. SARVAM UCS is an enterprise-grade Unified Communications solution that offers La Maison Royale the much needed collaboration, communication, messaging and mobility between multi-locational sites. Unifying all the communication networks and devices provides users with the flexibility of accessing the calls, messaging and voicemails from any of the devices irrespective of their location. Better customer responsiveness Unified communication for workforce collaboration and better customer responsiveness Call Management and the ability to connect from anywhere, anytime and with anyone Simple administration and management due to web-based configuration Enhanced customer responsiveness to customer/clients Scalability to expand their business footprints in the future Leverages existing infrastructure and connect on a common communication platform IP-solution at core and application upgradation paths that renews and extends investment Efficient call management SPARSH Series of IP extensions are elegantly designed to offer reliable performance SARVAM UCS SME is a server software which runs on ETERNITY GENX– The next-generation hardware platform. The next-generation platform supports up to 99 VOIP (SIP) trunks, 40 GSM ports, 8 T1/E1 ISDN PRI ports, and 64 analogue trunks with up to 999 UC users, 96 digital users and 240 analogue users. Both AC and DC power supply options are available. SPARSH Series of IP extensions are elegantly designed to offer reliable performance, quality of business communication and efficient call management. It provides high quality speakerphone, programmable feature and DSS keys, corporate directory, message wait lamp, voice mail and intuitive user interface. Hotel management software Matrix offered complete hotel management software with built-in hospitality features like: web-based front desk management, check-in/check-out, guest-in/guest-out, room shift, wake-up calls and reminders, mini-bar, built-in call cost calculation, emergency call detection and more. Matrix VARTA application essentially shifts all of the desk phone functionalities to the smartphone or desktop computer which makes the desks wire-free and clutter-free. Place or receive calls through the extended communication endpoints and give a chance to effective communication without the mess. Furthermore, softphone offers additional features using smartphone or desktop computer hardware that adds to staff productivity and easy call management.
Installation company Nessence recently integrated Vanderbilt’s ACT365 cloud-based access control and video management system with Mobile BankID in Sweden. Mobile BankID is a citizen identification solution that allows companies, banks, and government agencies to authenticate and conclude agreements with individuals over the internet. The integration with ACT365 comes together to solve a brief put forward by the supermarket chain, ICA Sweden. Web API for integration Tobias Olofsson, Project Sales Manager at Vanderbilt, explains that ICA Sweden is a retailer with a focus on food and health, and they wanted to be open earlier in the morning and later in the evening. “It would be too expensive to hire staff to stay open during these times in smaller locations. This is because the number of customers shopping early in the morning or late at night is minimal. But the store wants to be able to provide its customers with this value-added service,” says Olofsson. ACT365 was the perfect solution for this project due to its easy deployment, easy operation To solve this, the supermarket wanted to open unmanned and needed a solution to allow customers to enter the store in a functioning and approved manner by the insurance company. In Olofsson’s opinion, ACT365 was the perfect solution for this project due to its easy deployment, easy operation, and a smooth web API for integration. Increased accessibility and convenience “The success of this project means it is now possible for shoppers to open the supermarket’s entrance door by digitally signing into the Mobile BankID on their phone and presenting it to the ACT365 reader located on the outside of the door,” states Olofsson. Moreover, good accessibility is maintained as all customers do not need to have specific cards or tags for the access system to be able to enter the supermarket. “A new modern solution has been developed to facilitate trade for private individuals, especially in smaller towns where food stores do not tend to stay open for as long as in the big cities. This project has resulted in increased profits for the supermarket, as well as increased accessibility and convenience for its customers,” concludes Olofsson.
Global professional services provider Equiom has 14+ offices across the globe with more than 600 employees. In 2014, Equiom employed just 200 people across two offices in two jurisdictions and had ambitious plans to grow into a global business. But while the business had plans to scale, its infrastructure was that of a small business and not able to support its ambitions. As such, the company undertook a review of its entire IT infrastructure, including the network, software, and servers, with a key focus on cybersecurity, to develop systems that could support the business’ growth strategy. External vulnerability testing Furthermore, Equiom believed its security had to be robust enough to provide peace of mind to regulators, investors, and shareholders. To address this challenge Equiom wanted to work with a specialist cybersecurity partner that could both help identify any weaknesses and vulnerabilities within the infrastructure and provide recommendations and training for improving its security posture. Equiom selected SureCloud to provide services globally including cybersecurity penetration testing services Following a competitive process Equiom selected SureCloud to provide services globally including cybersecurity penetration testing services, internal and external vulnerability testing and management, social engineering including simulated phishing exercises and simulated ransomware attacks and physical social engineering. All services were delivered as part of our Pentest-as-a-Service, which provides a centralised platform for managing of all elements of the projects, including Equiom’s vulnerability remediation programme. Cloud-based platform Stephen Roberts, Global Chief Information Officer for Equiom Group, commented: “SureCloud was the obvious choice as the team is extremely knowledgeable, and the company had invested heavily in its cloud-based platform to create a technical solution that is far more developed than anything else in the marketplace.” “We felt working with SureCloud would enable us to provide a single snapshot of our security posture at any given time. Ultimately, the platform offered us the ability to simplify the overall management process, which was a key differentiator for us. SureCloud takes what is, in reality, a highly complex set of requirements and makes it as simple as possible.” Accurately monitor progress “Through centralisation of all reports and data, including output from penetration tests, vulnerability scans and social engineering exercises, we have complete visibility over our infrastructure and can develop remediation action plans and accurately monitor progress in real time,” said Roberts. SureCloud provides peace of mind to our stakeholders and customers" “As we continue to grow, SureCloud provides peace of mind to our stakeholders and customers. When we compare new acquisitions to those parts of our business that have gone through the SureCloud process, we can see a very clear difference in the respective postures. This is a testament to SureCloud’s success in keeping our security posture in excellent health,” commented Roberts. Overall security posture “We have also worked with SureCloud to address additional challenges in the business. We are currently using its GDPR application, which feeds data back into the platform enabling us to assess our compliance status against our overall security posture. Now we have complete oversight of our infrastructure,” said Roberts. “The fact that SureCloud is easy to use and highly scalable means that as we work to triple the size of the business over the next four years, we can do so while confidently relying on the platform to ensure that security is not compromised during that process. Through SureCloud we have raised our security posture to a level where our systems can help detect threats so that we can prevent attacks before they impact the business”, concluded Roberts.
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Ethical hackers are familiar to the world of cybersecurity. As cybersecurity awareness increases in physical security, they are also playing a larger role to ensure the safety of networked and information technologies used in our market. We asked this week’s Expert Panel Roundtable: What is the role of ‘ethical hackers’ to ensure cybersecurity of networked products in the physical security market?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?