Forescout Technologies, Inc., the pioneer in device visibility and control, announced insights from 75 real healthcare deployments with more than 10,000 virtual local area networks (VLANs) and 1.5 million devices contained within the Forescout Device Cloud, with a specific focus on 1,500 medical VLANs with more than 430,000 devices. Launched in July 2017, the Forescout Device Cloud is one of the world’s largest crowdsourced device repositories and now contains more than eight million devi...
Radiflow, a provider of industrial cybersecurity solutions for industrial automation networks, and Trusted Cyber Security Solutions (TCSS), a provider of cybersecurity services and solution, jointly announce that TCSS has joined Radiflow’s OT MSSP Partner program in order to expand its service offerings and pursue market opportunities to provide managed OT cybersecurity services to its industrial customers across central and southern Europe. TCSS is a growing cybersecurity systems integra...
ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, will host the second annual Cloud Access Summit on June 13, 2019 in Salt Lake City, UT. This exclusive event for dealers, integrators and security professionals offers a day packed with educational sessions focusing on the hottest industry trends and topics related to cloud access and its many complementary technologies, presented by executives and thought leaders representing a cross-sect...
Honeywell announces the launch of new category of software, Enterprise Performance Management for Operations Technology, that will improve the way a variety of companies collect, analyse and act on data from their operations. The software solution, called Honeywell Forge, will leverage the company's more than 100 years of expertise in asset and process control technology and will transform the way work gets done by owners and operators of buildings, airlines, industrial facilities and other crit...
Senstar, a global provider of video management and perimeter intrusion detection solutions, highlights Senstar Symphony Access Control (AC) and the FiberPatrol FP400 zone-based intrusion detection system at IFSEC 2019. “Since first introduced in April, Symphony AC and the FiberPatrol FP400 have garnered a great deal of interest in the security market,” said Fabien Haubert, Vice President Sales, EMEA. “Both of these products address very specific site requirements and provide c...
Vaion, a Ubon Partners company, is emerging from stealth mode to disrupt the physical security market by embedding the power of artificial intelligence (AI) into its complete video surveillance solution. Vaion's product line, which includes high-quality security cameras, a video management system and other intelligent solutions, premieres at IFSEC International, an event that takes place between June 18-June 20 in London, U.K. As a global company with offices in New York, London, and Oslo, Vaio...
Morse Watchmans, the industry pioneer in key control and asset management systems, is showcasing the benefits of their KeyWatcher Touch and AssetWatcher key and asset management solutions at IFSEC International 2019 (stand no. IF620) in London, from June 18-20. The company is also introducing KeyWatcher Fleet, a key control system specifically for fleet management, to IFSEC attendees. “We’re thrilled to once again showcase the exciting features of our AssetWatcher and KeyWatcher Touch solutions,” said Fernando Pires, CEO at Morse Watchmans. “This year, IFSEC attendees can get a demo of our KeyWatcher Fleet, which is purpose-built for fleet managers. We are looking forward to sharing all three key and asset control products with IFSEC 2019 attendees.” Tools to optimise vehicle usage Morse Watchmans’ KeyWatcher Fleet offers fleet managers a wide array of tools to maintain and optimise vehicle usageMorse Watchmans’ KeyWatcher Fleet offers fleet managers a wide array of tools to maintain and optimise vehicle usage while reducing many operational costs. Managers can create user role-based ‘Pools’, or groups of vehicles, to automatically assign each vehicle accordingly. Flexible booking workflows enable customisation to balance usage, ensure vehicle availability and more. A range of service features makes it possible to report problems and automatically initiate new or scheduled work on each vehicle. System alerts notify management to specific issues such as an unauthorised booking attempt or expiring driver’s license, and the system generates a number of useful reports with actionable insights. A convenient dashboard displays real-time status, bookings summary, vehicle use and many other data points to provide the pulse of the fleet in an instant. KeyWatcher Touch key management system The AssetWatcher is Morse Watchmans flexible, scalable, and highly capable RFID-enabled locker systemMorse Watchmans’ KeyWatcher Touch key management system utilises a 7” touchscreen for an easy-to-use interface and patented SmartKey system with KeyAnywhere technology to make it simple to withdraw and return a key securely to any key cabinet in an enterprise. Updates to KeyWatcher Touch for 2018 include a new database design, a desktop fingerprint reader that allows users to enrol fingerprints through TrueTouch software, and the ability to utilise multiple KeyWatcher Touch server instances with a single SQL database. The AssetWatcher is Morse Watchmans flexible, scalable, and highly capable RFID-enabled locker system. Perfect for tools, mobile devices and other valuable items, it can easily support more than 10,000 users on a single system and is configurable in three usage modes for flexible usage. AssetWatcher’s RFID technology allows you to easily track who is removing or replacing an asset, as well as when and where in the system the asset has been taken from or placed. Proven features of KeyWatcher, including email notifications, multi-site operation, and multi-user capability, bring the highest levels of security and capability to AssetWatcher.
Edesix, global provider of Body Worn Cameras (BWC), has announced that it will be launching its latest VideoBadge, the VB-400, at IFSEC 2019. VideoBadge VB-400 BWC The VB-400 will be predominantly aimed at the policing and security sectors, where officers on the front line utilise BWCs to help prevent both criminal and anti-social behaviour when out on patrol. Additionally, the captured footage not only provides greater transparency of interactions with the public, but also significantly increases early guilty pleas when used in a prosecution. This latest Body Worn Camera from Edesix has been designed to be a simple, unobtrusive addition to any uniform This latest Body Worn Camera from Edesix has been designed to be a simple, unobtrusive addition to any uniform. The VB-400 has a market-leading IP67 ingress protection rating and delivers full 1080p HD recording capabilities to capture evidence-quality footage, Bluetooth sensor monitoring, and built-in GPS functionality which will greatly simplify camera asset management across large estates. Other features include a full-shift battery life, Wi-Fi streaming, 120 degree horizontal field of view and haptic and audio feedback alerts to show when recording has been activated. BWCs revolutionise security, policing “The use of BWCs is revolutionising policing and security around the globe, and the launch of our new VB-400 is going to take this protection to the next level,” explains Richie McBride, managing director of Edesix. “Our next generation VB-400 has been built for the connected world, and provides real-time GPS functionality, streaming and the ability to seamlessly interface with its environment." Bluetooth sensor monitoring "The VB-400’s new Bluetooth sensor monitoring also enables hands-free incident recording. All these new features have been designed to assist the connected officer, and undoubtedly means it is the #1 Body Worn Camera for policing and security.” Edesix will be showcasing its new VB-400 at this year’s IFSEC.
Genetec Inc., a provider of unified security, public safety, operations, and business intelligence solutions, announces it will display its flagship security platform, Security Centre 5.8, and its comprehensive suite of new features whilst exhibiting at IFSEC International 2019. This will be the first time the new functionality will have been displayed in Europe, taking place at ExCeL London from 18-20 June (Stand IF710). The unified platform has undergone a significant update recently, providing customisable live dashboards, enhanced privacy protection features, a brand-new mobile app, and new functionalities that help users monitor the health of their security system and ensure compliance with cybersecurity best practices. Version 5.8’s new features will also ensure that operators can optimise their physical security environment while benefiting from greater visibility into their operations. Monitor security system Security Center 5.8 enables operators to create user-friendly, highly customisable dashboards, presenting critical information, including real-time data from the scene of an ongoing incident. These dashboards show live video feeds from the exact locations where an alarm may have been triggered and provides users with insightful reports and charts depending on their interest area. This app allows users to record incidents, access nearby video and access control A key new feature of the Security Center interface is the ability to monitor a security system while on the go - through a mobile app which gives operators a valuable new asset in the security environment. This app allows users to record incidents, access nearby video and access control, as well as sharing video from their phones to Security Center. This provides the user with actionable information, that can be shared across the whole security team – allowing them to respond effectively to any situation that might occur. Increase local awareness Security Center 5.8 also provides a wide range of other valuable features: Video (live and recorded playback, PTZ controls, bookmarking, time - and event-based reports); Access control (check door status, lock/unlock doors, override schedule, set maintenance mode etc.); ALPR (live reads/hits, plate reports, and access hotlists); Interactive maps that increase local awareness and put critical information much closer to the operators, enabling them to easily visualise their environment and respond quickly. Built-in messaging allows for instantaneous sharing of information between operators and personnel in the field. This extends to sharing live or recorded video clips, text messages and other security information.
Digital Defense, Inc. has announced the availability of its Frontline.Cloud integration with Attivo Networks, the award-winning leader in deception for cybersecurity threat detection. Digital Defense’s Frontline.Cloud vulnerability management and threat assessment platform identifies high-risk/critical assets with business context that are highly vulnerable to exploits, remain unpatched, are unpatchable or have already been infected in real-time. Integration with Attivo Networks Frontline.Cloud is the industry's only true threat asset risk posture assessment app built for hybrid cloud environments The integration with the Attivo Networks BOTsink solution allows administrators to quickly and confidently make strategic decisions on where to dynamically deploy additional deception technology assets to enhance their deception deployment and further misdirect attackers. This gives organisations the advantage of time to detect, analyse, and stop an attacker even as their risk posture and critical assets change. Frontline.Cloud is the industry's only true on-demand vulnerability and threat asset risk posture assessment app built for hybrid cloud environments. Frontline.Cloud lets security teams focus on identifying and prioritising the most important assets to proactively harden them against an attack without requiring agents. Frontline.Cloud security platform Frontline.Cloud utilises data from the BOTsink solution to provide risk-based intelligence and for dynamically deploying additional deception technology assets to augment the current deception environment. Additionally, Frontline.Cloud enables security teams to be more effective in identifying compromised assets and assets under immediate attack in order to quickly misdirect attackers and prioritise remediation of the most important systems based on business context. Securing IoT/ICS Networks A significant security capability for ICS networks and critical infrastructure is drawing attackers away from these systems and detecting how they are trying to exploit vulnerabilities. This is especially true in environments where it is often a challenge to patch systems due to limited access and minimal maintenance windows or, in many cases, no patch for a known vulnerability is even available. Attackers continue to exploit different types of vulnerabilities, compromised systems and blind spots in infrastructure" “Attackers continue to exploit different types of vulnerabilities, compromised systems and blind spots in infrastructure. We are now seeing them target critical infrastructure and IoT devices because of the difficulties in patching those assets,” said Larry Hurtado, CEO of Digital Defense. “Security teams have been challenged with identifying and tracking dynamically changing assets, understanding risk in real-time and prioritising patching efforts, while Digital Defense provides the solution to help security teams address these challenges, it is now time to turn the tables on attackers.” Effect threat detection “Attivo has an extensive deception fabric for accurately detecting and derailing threats and the partnership with Digital Defense further ups the game against attackers,” said Tushar Kothari, CEO of Attivo Networks. “The ability to automatically deploy Attivo deception based on shared vulnerability insights provides a unique and innovative way to reduce risk while increasing the difficulty of an attack. It is a powerful example of how organisations can proactively strengthen their security posture while also building out an Active Defense.”
Echodyne, the manufacturer of innovative, high-performance, small electronically scanned array (ESA) radars for government and commercial markets, announced that Maureen Swanson, Manager of Public Policy and Partner Engagement, will speak on June 5th at 2pm at the FAA UAS Symposium in Baltimore. The event takes place at the Baltimore Convention Center. Swanson will participate on the panel entitled ‘UAS Mitigation at Airports’ and discuss the importance of precisely tracking and classifying objects of interest so that mitigation protocols can be triggered when appropriate. Echodyne’s MESA radars are best in class, offering the most detailed position data available. She will also touch on how radar data is useful for prosecuting operators for flying in restricted airspace. Governing future of drone operations The event, presented by the FAA and AUVSI, brings stakeholders from various entities, including the military, government, public safety and unmanned systems sectors, together to discuss the rules and concepts that will govern the future of drone operations. “As the popularity of drones continues to rise, the issue of securing our airports becomes more challenging,” Swanson said. “It’s critical to have technology that can accurately detect and track drones flying in restricted airspace, whether intentionally or not, to keep our airports and communities safe.”
Digital Defense, Inc. announced the availability of its Frontline.Cloud app on Cortex by Palo Alto Networks – the industry’s only open and integrated AI-based continuous security platform. Building on Cortex allows partners to use normalised and stitched together data from customers’ entire enterprises to build cloud-based apps that constantly deliver innovative cybersecurity capabilities to joint customers. Frontline.Cloud is the industry's only true on-demand vulnerability and threat asset risk posture assessment app built for hybrid cloud environments. The app lets security teams focus on identifying and prioritising the most important assets to proactively harden them against an attack without requiring agents. Protection with active threat defence Utilising data from Cortex Data Lake, the Frontline.Cloud app enables security teams to be more effective in identifying compromised assets in order to quickly prioritise and remediate systems under attack with active threat and business context. Palo Alto Networks customers can see the app in action at the Ignite ’19 Conference in Austin, Texas on June 3-6. We are proud to be one of the first vulnerability management and threat assessment apps to be built on Cortex" “Working with Cortex’s breakthrough AI-based continuous security platform accelerates our ability to bring proactive protection with active threat defence to our client’s security operations,” said Rosanna Pellegrino, SVP of Sales and Business Development for Digital Defense. “We are proud to be one of the first vulnerability management and threat assessment apps to be built on Cortex.” AI innovations for accurate security outcomes “Cortex partners can leverage the vast amount of rich data available from across the enterprise to create AI-based innovations that provide more automated and accurate security outcomes to our joint customers,” said Karan Gupta, SVP of Engineering for Cortex at Palo Alto Networks. “We’re proud to welcome Digital Defense to our expanding ecosystem of developers building innovative apps.” Cortex is designed to radically simplify and significantly improve security outcomes. Deployed on a global, scalable public cloud platform, Cortex allows security teams to speed the analysis of massive data sets. Cortex is enabled by the Cortex Data Lake, where customers can securely and privately store and analyse large amounts of data normalised for advanced artificial intelligence and machine learning to find threats and orchestrate responses quickly.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centres and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialised care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in paediatric health care, education and research. Comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priority Also crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
According to the reports of not-for-profit organisation Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organisations in the US, the count of over 300 incidents per year, or about once per day on average, is simply alarming. It raises public safety concerns, ignites debates and protests, which in turn lead to public unrest and potentially more violence, and increases costs for governments from the regional to federal level. Most importantly, the loss of lives demands not only improvement in post-incident handling and investigation, but also new prevention technologies. Gunshot detection solutions AI weapon detection offers a more efficient alternative to prevent active shooting There are several gunshot detection solutions in the security market, commonly used by law enforcement agencies to detect and locate gun fires. These systems function based on acoustic recordings and analyses and often in combination with signals detected by sensors of the optical flash and shockwave when a gun is fired. However, gunshot detection by nature dictates that the law enforcement can only react to a shooting incident that has occurred. With fast action, law enforcement can prevent the incident from escalating, but lives that are lost cannot be recovered. With the development of artificial intelligence in object recognition, AI weapon detection offers a more efficient alternative to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognise firearms in different shapes, sizes, colours, and at different angles in videos, so that the AI weapon detector can be deployed with existing cameras systems, analyse the video feeds, and instantly notify security staff when a gun is spotted. Comparison of the advantages for law enforcement and public security agencies Legacy gunshot detection using sensors AI weapon detection Reactive measure: detect after guns have been fired Proactive measure: detect before guns are fired Time to action: within 1 second Time to action: within 1 second Unable to provide visual data about shooter(s) Can provide data about shooter(s) based on the camera recording: clothing, luggage (backpack, handbag, etc.), facial features, vehicle Unable to track the location of the shooter(s) before and after shooting because of the lack of sound Can track the shooter(s) using AI Person & Vehicle Tracking, AI Face Recognition, and AI License Plate Recognition False detection caused by similar sound such as fireworks and cars backfiring Minimal to no false detection, as AI can distinguish different types of handguns and rifles from normal objects (umbrella, cellphone, etc.) Require physical deployment of gunshot detection sensors Can be used with existing camera systems, do not require special hardware Complicated to deploy, require highly trained professional Easy to deploy as an add-on to existing video surveillance system - Can integrate with gun-shot detection to create a “double knock” audio and video active shooter alert system Gun-shot detection advantages In addition to advantages for law enforcement and public security agencies, this type of visual-based pre-incident detector has three-fold advantages for the public: Save lives by spotting the shooter before the shooting event. Minimise the chaos entailing an incident: panic and chaos caused by a shooting incident often adds to injury, as people run, fall, trample on others… With an AI weapon detector, when a gun is spotted, the system sends an alert to security staff, who can quickly control the situation in an organised manner and apprehend the intending shooter. Can be added as a SaaS (Security as a Service) component to small business and home surveillance systems, e.g., intrusion detection alerts (home invasion incidents with firearms number over 2500 per year nationwide). For a complete active shooter detection system, video-based AI detector can operate in conjunction with gunshot detectors for enhanced security. Traditional X-ray based weapon detection or metal detection entrance systems are complicated and expensive; with AI video technology, active shooter detection system can be cost-effective, and after all, what price tag can one put on a life? Written by Paul Sun and Mai Truong, IronYun
Add March Networks to the growing list of companies in the physical security market that are addressing the possibility of cyber-threats. Cybersecurity is especially relevant to two of March Networks’ primary vertical markets – banking, whose focus on money requires stringent cybersecurity; and retail, which has been the target of recent cybersecurity attacks. “People just don’t know what to do with cybersecurity,” says Dan Cremins, Global Leader, Product Management at March Networks. “The thing is, you have to figure out how to make your products, solutions and networks more secure, and then let them know what you are doing about it.” Cybersecurity mobile app As the profile of cybersecurity has increased in the physical security market, March Networks has added cybersecurity features to its GURU app. GURU is a mobile app for integrators to use when installing and diagnosing equipment in the field. Using a wireless dongle, the system can read the QR (Quick Response) code on a camera, for example, and provide installation information specific to that camera. As the profile of cybersecurityhas increased in the physicalsecurity market, March Networkshas added cybersecurity featuresto GURU GURU’s new Security Audit tool enables the app to scan a unit and check to make sure it is cybersecure; that is, the right ports have been closed and default passwords have been changed. Simple green, yellow and red coding communicates the cybersecurity status of equipment as it is being installed – and it takes less than five minutes. After installation, the GURU app can be used to conduct an extra check to ensure cybersecurity. There is also a section on the March Networks web site identifying security vulnerabilities (listed by CVE [Common Vulnerabilities and Exposures] number), explaining whether they affect March Networks equipment, and the availability of any patches. “Cybersecurity is the number one threat to any industry, including ours,” says Cremins. “We offer a tool to help people address it. We are trying to be as proactive as possible, and stay ahead of it.” Integrating inventory tracking & video There are other developments at March Networks, too, including a new integration partner in the retail sector. Tracking inventory is critical to retail loss management, and March Networks has integrated its video system with the Zebra RFID system for inventory tracking. Zebra uses radio frequency identification (RFID). Asset tags are used in combination with sensors mounted throughout a facility to keep track of where goods are transported in a retail store, warehouse or other location. If something goes missing,video of that item, tied to trackinginformation from the RFID system,is available instantly to aid withan investigation The Zebra RFID system generates inventory tracking information that is integrated with March Networks video in much the same way that point-of-sale (POS) information has been used with video. Information from inventory tracking is associated directly with each frame of video. The integration allows video cameras to watch equipment as it moves around a warehouse or retail space. If something goes missing, video of that item, tied to tracking information from the RFID system, is available instantly to aid with an investigation. In addition to retail, there are also applications of RFID inventory tracking in medical environments, where expensive equipment is used throughout a hospital, for example. Integration of video with inventory control would allow video cameras to watch medical equipment as it travels from floor to floor and room to room. Video provides a valuable investigation tool if a medical device goes missing. “They can review the video to see where it was and see what happened with it,” says Cremins. HDR cameras for banking applications At the recent ASIS show in Orlando, March Networks introduced the new ME4 series of multi-exposure, 4 megapixel cameras. The cameras are aimed at improving video image performance in situations with varied light, such as a glass-enclosed ATM enclosure, bank branch, or a retail location where bright windows can cause backlighting and other problems. In addition to better image quality and resolution, the cameras have been designed very economically, says Cremins. They strike a balance between video clarity and bandwidth and storage efficiency. The cameras use HDR (high dynamic range) technology designed for the most extreme lighting conditions. Even in an environment surrounded completely by glass, the cameras can still see the person in the foreground and details in the background. Facial details are critical in applications at banks and financial institutions.
There was another big trade show last week – the four-day Security Essen event in Germany. I didn’t attend, but several of my SourceSecurity.com colleagues report it was a busy show from start to finish, with the halls devoted to video/CCTV and access control dominating the show. The other halls were quieter, with smaller stands. Hot topics included big data, machine learning, mobile credentials, storage and an emphasis on solutions (rather than products). The exhibit hall was a bit of a maze, but attendees managed to find their way to the various stands. Three big companies – Bosch, Siemens and Honeywell – were conspicuously absent from their usual large role at Security Essen, and there was mixed feedback about the impact of their absence on the larger show. Without three gigantic stands to concentrate the footfall, attendees seemed more spread out than clustered. Hands-on, technical displays Hands-on displays with plenty of technical detail were the norm, encouraging attendees to interact with the products. The ASSA ABLOY stand, huge as always, reflected the continuing popularity of key systems in the German, Swiss and Austrian markets. ASSA ABLOY’s Yale also featured a home automation zone. Hands-on displays with plentyof technical detail were thenorm, encouraging attendeesto interact with the products Hikvision envisions cameras coming very soon with “deep learning” capabilities. These cameras, combined with big data applications, are the future of smart traffic systems, for example. Deep learning systems will replace traditional licence plate recognition (ANPR) and analyse electronic data about cars, rather than relying on number plates, says the company. Hikvision also highlighted multi-sensor cameras that can cover a large area and reduce the cost-per-channel – they have big projects in China and Southeast Asia. Hikvision’s privacy masking functionality is popular in Europe because of privacy regulations. Fujifilm demonstrated its impressive zoom lens series, featuring 60x zoom, long focal length and full HD quality, for use in airports and perimeter protection. Stabilisation is important with zoom because even slight movement can have a large effect, says the company. In Fujifilm lenses, the stabilisation is optical-based (in the lens), rather than software-based. Another stand that drew attention was Nedap, where a tiered seating area was provided for visitors to view video projected on a back wall. New laws in the Netherlands and France require that no information can go outside government buildings, thus requiring closed security systems, according to Nedap. It’s a trend likely to follow in the European Union, with similar laws potentially impacting hospitals and banking as well as government, says Nedap. This is why they are working with partner AET Europe to ensure that encrypted communications are secure between all elements of an IT-based access control system. Solutions – not just products The need to provide solutions rather than “just products” was a repeated theme. One solutions provider is MOBOTIX, which highlighted a new corporate design with fresher and more unified branding. The solutions approach includes analytics and people counting embedded for inventory optimisation and business intelligence. MOBOTIX is releasing new plug-and-play bundles to combat the perception that the company’s technology is not easy to use. There is also a 4K bundle with NAS (network attached) storage – all preconfigured; just power it up and it will run. MOBOTIX is releasing new plug-and-play bundles tocombat the perception thatthe company’s technologyis not easy to use Sony also offered solutions, including their intelligent approach to 4K, which they say overcomes traditional concerns with the higher-resolution technology. Sony also displayed “glass-to-glass” technology, streaming 4K cameras directly to a screen with no PC in between. Even with the company shifting to end-to-end solutions, their cameras are still at the core of the portfolio, including an accent on low-light and changing light conditions. Adding ROI was another hot topic for exhibitors. MOBOTIX emphasised its process monitoring capabilities, as did Geutebrück. VIVOTEK highlighted combining a people-counting solution with other retail data for business intelligence. Contrary to the focus on solutions was LTV Europe, a video company that keeps the attention on products. LTV emphasises personal service and a fresh approach rather than competing with bigger providers. Focus on storage and automation The themes my colleagues heard at Security Essen were not unlike those we heard recently at ASIS and earlier this year at IFSEC and even ISC West. More companies are looking to expand into non-traditional applications beyond security, such as asset tracking and logistics/delivery. Another example: Sony suggested using video to monitor rivers and lakes water levels for flood warnings. Quantum is keeping itsattention on storage, whileaddressing the IT department’sneed for data protection Quantum is keeping its attention on storage, while addressing the IT department’s need for data protection. The new StorNext scalable storage system, which can handle 4K, integrates various tiers of storage appropriate to varying workflows and business needs. For example, retrieval can be faster for more valuable data, thus maximising value while minimising the overall cost. Allegion is rolling out products that combine electronic and mechanical locks from subsidiary SimonsVoss and the Allegion portfolios. Allegion wants to position itself as electronic access control expert. Paxton highlighted a building automation system, Paxton net10, which is aimed at small and medium enterprises (SMEs) and works on mobile credentials as well as cards. They’re looking to build this kind of technology into future products. Another company, AxxonSoft, is pushing strongly to establish its brand in the United States – something to watch in 2017. SALTO also highlighted cloud-based mobile access control: They have developed a Keys as a Service system, SALTO KS, which allows businesses to grant access remotely while viewing a video of the door. Four busy days in Germany Security Essen is an international show, but the emphasis was on German, Austrian and Swiss companies and larger companies targeting those markets. There was more of a continental Europe “flavour” compared to IFSEC’s focus on the U.K. market. Four days is a long time for a trade show – my feet are shot after two and a half days! But my colleagues agree it was time well spent, if for nothing else than getting to watch an 8-foot-tall robot dance around Hall 3.
Wellington is the southernmost capital city in the world and is the centre of New Zealand government. With the second highest population in the country, Wellington is a large coastal city with a diverse range of facilities and attractions. A large portion of those facilities and attractions are the responsibility of the Wellington City Council (WCC) – a local body government organisation employing around 1,800 staff. As with all councils that manage a large number of facilities on behalf of their city, the WCC has a broad range of security needs and an accountability to the rate-paying citizens of Wellington. Since 2001, WCC has met those security needs with Gallagher’s integrated security solutions. Central management platform WCC developed a five year plan to migrate all 150 sites on to the Gallagher system With 1,800 employees and 150 sites located across Wellington, the council has a large number of people and assets to secure. With sites including libraries, swimming pool complexes, community and recreation centres, housing blocks, a city zoo, event facilities, and a multi-story central office building, the security requirements vary considerably. “We’re responsible for securing and monitoring all 150 sites around the clock” said Chetan Prasad, Security Manager for Wellington City Council. “It’s imperative we have a reliable system that provides us with a complete view of activity at all sites”. In order to deliver this, WCC uses Gallagher’s Command Centre central management platform to manage security across numerous sites. Utilising a single security platform has been a long-term objective of the council. Initially operating six different systems, WCC developed a five year plan to migrate all 150 sites on to the Gallagher system. Chetan links the Council’s growth with their need to become smarter about how security is managed. Primary security solution “Gallagher’s system has enabled us to standardise our infrastructure and bring all elements including alarm management, fire systems, vehicle bollards, video surveillance, facility and carpark access, reporting, visitor management, and more, on to one platform. That was a key factor in why we chose Gallagher initially, and why we will continue with them as our primary security solution.” Visibility is critical when you have 150 independent sites to secure. An integration between Command Centre and over 400 cameras located throughout the WCC’s facilities provides live video footage to the security team. “Our camera integration with Command Centre means that in addition to being able to continuously observe critical areas, any site alarm that is triggered will immediately bring up a live video feed for the security staff in our control room. This visibility is invaluable for us in activating appropriate responses and, in the event of a crime, being able to provide crucial evidence to police” said Prasad. Electronic access control WCC is utilising Gallagher security technology to ensure staff are protected In addition to securing facilities and assets, WCC secures and protects staff working at each of its sites. From initiatives like integrating building elevators with access control to prohibit unauthorised entry, to the integration of panic buttons at each site, WCC is utilising Gallagher security technology to ensure staff are protected and that in the event of an incident, a rapid security response is initiated. According to Prasad, the Gallagher system is delivering cost savings to the Council in several key areas. The first area relates to the shift from traditional key systems to smart card technology. “With such a large staff base and so many sites, we inevitably faced challenges with traditional keys being lost or not returned by staff or contractors” said Prasad. Rekeying a site cost the Council approximately $4,000 each time – an expense that has now been eliminated by the replacement of traditional lock and key systems with electronic access control. Visitor management solution “Now if a card is lost or not returned, we simply deactivate it in our system. Not only is it a solution that saves us money” said Prasad, “it is also a solution that can be applied instantly.” Similarly, the ability for security personnel to assess a site and reprogram an alarm remotely, also saves the council considerable costs associated with dispatching guards to site. The second area where cost savings are apparent relates to intelligent automation. An integration with WCC’s HR system means that as staff leave employment, their cardholder profiles are automatically disabled in the system. The use of Gallagher’s Visitor Management solution, means that appropriate staff are automatically notified if a guest or contractor fails to sign out or return a key. These two automations alone, save the WCC security team approximately 4-5 days of cardholder administration each year. Software maintenance contract WCC elected to take a 10 year Software Maintenance agreement with Gallagher In 2014, following 13 years as a Gallagher customer, WCC elected to take a 10 year Software Maintenance agreement with Gallagher. The Software Maintenance contract ensures the Council have access to the latest developments as soon as they are released, keeping WCC at the forefront of security technology. “Software Maintenance makes good business sense” says Prasad. “It gives us access to a comprehensive range of licensable features and benefits, and ensures our upgrade costs are effectively distributed.” Prasad describes the Council’s confidence in Gallagher as another significant factor in the 10 year agreement. “We have found Gallagher’s security solution to be a reliable and versatile, highly secure, modern system. It has supported our significant growth to date, and we are committed to using Gallagher systems for the Wellington City Council’s future.”
The UK's largest water and waste company has awarded two multi-million-pound perimeter protection contracts to security fencing systems manufacturer Zaun. Thames Water Utilities extended its Security and Emergency Measures Direction (SEMD) framework agreement with Zaun for the supply and installation of security fencing and gates for a further two years as part of the current Asset Management Programme, AMP6, to enable the award of the latest contracts. Perimeter security and intruder detection Securing the perimeter is a key part of our plan to deliver safe drinking water to our nine million customers" The first contract is for the design of perimeter protection for seven sites that have been awarded through the Costain Atkins and Black & Veatch eight20 joint venture. Thames Water has awarded the second contract to Zaun to supply and install around 11km of perimeter protection for four of the seven sites. Jon Lorimer at Thames Water said: “Securing the perimeter is a key part of our plan to deliver safe drinking water to our nine million customers. Zaun’s expertise and experience in designing and installing unique solutions with ArmaWeave, not least for Thames Water, has enabled us to deliver the securest solution possible.” ArmaWeave mesh fencing system Zaun will supply its ArmaWeave woven mesh fencing system, which will be installed by subsidiary Binns Fencing, around the perimeters and various compounds and buildings. ArmaWeave – which is unique to Zaun, as is the ability to rake it – one of Zaun’s most intruder-resistant products, is produced on the world’s largest mesh weaving machine at the company’s West Midlands manufacturing base. The two contracts to date form a multi-million-pound package. The work is part of the AMP6 programme to bring Thames Water’s estate up to Defra standards and fully prepare for any security eventuality. Integrated perimeter protection systems Thames and eight20 are leading the way in the utilities sector in toughening their security" Zaun sales and marketing director Chris Plimley said: “Thames and eight20 are leading the way in the utilities sector in toughening their security so we're delighted to continue to help them upgrade their estate with the very best integrated perimeter protection systems on the market.” Thames Water manages more than 4,500 sites that require security to protect the water supply to over 14 million people. Accidental pollution, the safety hazard of sewage, the potential for theft and even mindless vandalism all mean site safety and security is paramount.
Amthal has worked closely with Garrard Windows to install smart CCTV systems for its showroom and factory site, to present ultimate protection for staff, customers and premium products in storage. Garrard Windows is one of the largest suppliers in England, presenting PVC-U and aluminium windows, bifold and patio doors, together with conservatories to the trade, with an objective to remain reliable, efficient and customer orientated. Manufacturing around 2,500 products a week, to ensure the security of products and supply on site, Gerrard Windows called upon Amthal to enhance its security and install CCTV systems throughout its factory and show room site. Smart CCTV facilities Our aim is to supply the window trade with high quality products, always delivered on time and at competitive prices" Adam Webb, Director of Garrard Windows: “Our aim is to supply the window trade with high quality products, always delivered on time and at competitive prices. Many of our existing customers are fabricators themselves, relying on us for extra capacity in busy periods.” “To maintain this commitment and ability to respond quickly to customer requests, we have to ensure maximum security on site at all times. Amthal identified the subtle installation of smart CCTV facilities throughout our premises as added visual protection, to ensure we can view activity on a 24 / 7 / 365 basis, even when we are off site. Our staff are already feeling the benefits and peace of mind security.” Improved technology David Williamson, Amthal Sales Account Manager: “Garrard Windows has a renowned reputation in the industry, not only as one of the largest suppliers, but also in responding quickly to client requests to a high-quality standard. It’s essential security on site is maintained to a maximum standard to sustain this level of efficiency and reliability.” The added visuality provides total peace of mind the right security is in place to protect against any risk" “Following an on-site inspection, Amthal made the recommendation of smart CCTV solutions to ensure Directors can feel the benefits of having new and improved technology helping to safeguard assets. The added visuality provides total peace of mind the right security is in place to protect against any risk, or possible disruption due to theft, to the smooth-running operation and delivery to our customers.” Satisfying end user needs Independently owned, Amthal Fire & Security is dedicated to satisfying end user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire and security solutions, including intruder, Fire, Access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE).
Integrity Security Group is using SmartTask’s SmartForms to gain added visibility and dramatically cut down on its administrative burden. Having adopted the employee scheduling and mobile workforce management software last year for the provision of proof of attendance, control room management and staff rostering, the company is now using its electronic data capture functionality to streamline a range of operational processes. Initially, SmartForms are being used for vacant property and mobile patrol inspections as well as daily vehicle checks, already saving more than 15 hours of admin a month. SmartTask SmartForms The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team “We are now using the SmartTask SmartForms to help reduce administration, capture critical work data and enforce health and safety procedures,” explains James Chittil, General Manager at Integrity Security Group. “We are constantly looking at clever ways to take advantage of the software’s rich functionality, so we can continue to simplify and enhance the way we operate.” The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team. All reporting for vacant property and mobile patrol inspections – for both scheduled patrols and alarm activations – are now completed using a SmartTask-enabled smartphone. By electronically capturing all relevant information, including photo evidence, Integrity can quickly provide customers with a status update and details of all undertaken work as well as respond to any identified issues. Vehicle checks and fleet management Meanwhile, daily vehicle checks for Integrity’s fleet of vans are now completed using a specially-developed SmartForm, so the company can instantly see if drivers are complying with this health and safety procedure. Any vehicle-related problems or damage can be raised by the driver and actioned immediately by the admin team to mitigate fleet risk. Mileage data is also captured through the software, enabling maintenance requirements to be tracked and scheduled at appropriate intervals. “The SmartForms are enabling us to dramatically reduce paperwork and remove manual processes. This is making it much simpler for both our security officers in the field and our office-based admin team to capture, collate and communicate essential operational data. This is not only helping us make better use of our valuable resources, but also enhance the service we are providing to customers,” added James Chittil. Paul Ridden, CEO of SmartTask commented: “Our experience within the security sector means we are continually developing new functionality that overcome real-world problems for our customers. This is the reason we are working in partnership with a growing number of security businesses who recognise the value they can gain and the benefits they can achieve from using the SmartTask software.” Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff Lone worker protection Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff as part of its commitment to lone worker protection. The company is also using the intelligent rostering functionality to streamline internal planning processes, while the interactive dashboard supported the launch of a dedicated, out-of-hours control room operation by providing a live view of all scheduled shifts and expected or missed check calls. SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
MARSS NiDAR system has been selected to secure and protect a critical national infrastructure (CNI) site in the form of a major dam facility. The NiDAR command and control (C2) system has been selected to integrate a thermal camera and a sonar system to protect the dam from potential underwater and surface approaches. NiDAR is an advanced long-range surveillance system designed to protect maritime and land-based critical infrastructure from air, surface and underwater approaches. Tracking objects in real time NiDAR is sensor agnostic, enabling it to integrate with any existing hardware or systems, and due to its modular design, not only does it meet the current contract needs, but it also offers the flexibility to meet any future expansions or requirements. NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time NiDAR can track, monitor, detect, classify, and respond to multiple objects, 360° in real time, of over 1000 known and unknown, air, surface and underwater objects thanks to the software algorithms. It can intelligently analyse and rank unknown objects to determine potential threat levels and automatically trigger the appropriate alert. When the user determined warning and alarm zones are breached the system can automatically or manual deploy integrated countermeasures to deter potential approaches and de-escalate threats. Enhanced awareness picture The intuitive C2 interface provides an enhanced awareness picture, in real-time, through a touchscreen user interface and multi touch control. Rob Balloch, Sales Director of MARSS said, “NiDAR was chosen for this critical national infrastructure as it is robust and suited to all environments, however challenging. Its high availability and reliability, low maintenance and cost effectiveness makes it the perfect choice for any future growth, or change of requirements, with minimum disruption.”
Premier League football club Everton FC has deployed SureCloud’s GDPR suite to manage and monitor its data and GDPR compliance, enabling the club to work towards GDPR compliance, optimise internal processes and position it strategically for the future. The solution replaced Everton FC’s manual data mapping and processing methods. Manual data mapping and processing Everton FC’s databases are extensive, containing details on over 32,000 season ticket holders and over 600,000 registered fans, with details on around 360 employees, players, agents, suppliers, and individuals associated with the club’s community charity and partner school. Much of this information is sensitive. This data and all of the processes associated with it were being manually managed and tracked in a series of Excel spreadsheets. With multiple requests and queries to respond to every day, the club’s Data Protection Officer was struggling to record and manage smaller ad hoc queries, incidents, and tasks. With GDPR due to place much tighter restrictions on how the club processed, managed and shared its data – as well as on the reporting of any incidents that did occur – the club needed a more comprehensive and reliable tool in place before 25th May 2018. SureCloud platform The club approached its long-standing IT support provider NCC to find a solution. NCC recommended the SureCloud GDPR Suite, delivered on the SureCloud platform. After SureCloud had successfully demonstrated the ability to provide full visibility for management and automation of GDPR processes across the organisation, Everton FC selected its cloud-based suite of solutions. Two dashboards were created according to Everton FC’s specific needs Two dashboards were created according to Everton FC’s specific needs: one to show all data mapping and transfers, including where data is being held and who it is being shared with; and one showing incidents and requests, including a subject request register and incident tracker path. This gives an immediate overview of which requests are still outstanding, such as a request for an individual’s personal information to be erased from the database. SureCloud GDPR Suite The five applications Everton FC chose to deploy from the SureCloud GDPR Suite were: GDPR Program Tracker - to enable the club to map all its disparate data and workflows using intelligent risk-based questions GDPR Management – to provide all mandatory GDPR business-as-usual processes Information Asset Management - to record and maintain the club’s entire data inventory Compliance Management for GDPR - to help Everton FC speed up their process of attaining compliance and on-going real-time risk remediation Incident Management for GDPR – to meet the GDPR requirement to log, track and notify the ICO of any data breaches, should an incident arise Ian Garratt, Data Protection Officer at Everton FC said: “The penalties for not achieving GDPR compliance are severe – up to 4% of our revenues, or €20 million. It was imperative that we got a solution in place that could not only help us achieve GDPR compliance but would also make it quick and easy for us to demonstrate that compliance at any point, on request. SureCloud’s GDPR Suite fit the bill.” Centralised data management Now, all of Everton FC’s disparate data are mapped, risk-assessed and tracked in a single centralised system “We are now tracking and recording every single data request in a centralised way. With NCC’s support, SureCloud’s solution has brought a comprehensive clarity to our data processing that was impossible to achieve with manual spreadsheets. The system is so intuitive; it has helped us streamline multiple processes and undertake impact assessments that we couldn’t handle before.” Now, all of Everton FC’s disparate data are mapped, risk-assessed and tracked in a single centralised system. All changes and requests are automatically tracked so that activity records and data audits can be produced at the click of a button. Should an incident like a suspected data breach occur, it is identified and reported immediately and automatically. The club’s data protection team can select which asset has been affected and immediately determine the severity of the incident and whether it needs to be reported to the ICO. Should it need to be escalated, the report is available instantly. Data processing, documentation and risk management Ian Garratt added: “The SureCloud GDPR Suite isn’t just a compliance tool; it’s a comprehensive management tool. We now have a continuous, real-time status of where we are and what we need to be doing in terms of data processing, documentation and risk management. It would have simply been impossible to achieve this manually. SureCloud has not only helped us to work towards GDPR compliance they have optimised our internal processes and positioned us strategically for the future.” In addition to deploying five applications within the GDPR suite, SureCloud is currently adapting its Incident Assessment tool to meet Everton FC’s specific requirements.
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
There is no expectation of privacy in a public space. That’s the premise on which most video surveillance applications are justified. But new concerns about privacy, specifically the General Data Protection Regulation (GDPR) in Europe, are changing expectations. And what if a camera must be positioned where a private area happens to be within its range? Fortunately, there are technology approaches to solving these dilemmas, as our Expert Panellists explain. We asked: What new technologies are helping video systems overcome concerns about privacy?
The obvious reason to buy security systems is to promote greater security. But in some cases, there are more specific and/or immediate motivators that lead to a security purchase. Everybody wants more security in the abstract, but how willing are we to pay for it? Security is sometimes seen as a “grudge purchase,” competing for tight corporate dollars with other investments that may seem more appealing or urgent. But other times an event occurs that moves security to the top of the list of priorities. We asked this week’s Expert Panel Roundtable: What motivators compel customers to buy more security systems?