In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalisation and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're like...
Lenel, a provider in advanced security systems, offers an extensive set of new features and utilities with the introduction of OnGuard version 7.5. The enhanced OnGuard 7.5 access control solution deepens Lenel’s focus on unification, mobility, cybersecurity and cloud compatibility with platform updates, including enriched browser clients and a next-generation visitor management suite - all adding to its already substantial capabilities. Lenel is part of UTC Climate, Controls & Securit...
Following the successful launch of Kisi Labs with its first product vision ‘Drone Guard’, Kisi Inc., a pioneer in cloud-based keyless access control and security management, has reported the launch of a new security card test to drive physical access innovation through exposing the vulnerability of key cards. Anyone concerned about the security of their access card can send it to Kisi Labs to be tested for free. The original access card will be sent back to the user with a cloned or...
Arecont Vision Costar, global provider of IP-based megapixel camera technology and video surveillance solutions, announces the immediate availability of all ConteraIP single-sensor cameras. The four new bullet and dome models are part of the Arecont Vision Total Video Solution, composed of megapixel cameras, video management system, cloud-enabled web services, and video recorders. The Total Video Solution and its components will be on display this week at both GSX 2018 Las Vegas, in Conference R...
TIANDY Technologies, global supplier of versatile surveillance solutions catering to customers from enterprise to entry level, has announced the execution of a distribution agreement with SecureNet, one of the premier value-added IT Surveillance, cybersecurity and video conferencing distributors (VAD) in the United Arab Emirates. SecureNet will promote TIANDY's complete portfolio of surveillance solutions to its network of channel partners throughout the Middle East region. TIANDY-SecureNet col...
LifeSafety Power Inc. heads to the Global Security Exchange (formerly ASIS International Conference and Exhibits), September 24- September 27 in Las Vegas, riding the coattails of recent product awards and groundbreaking innovation in power, security and access control. With continued advancements created by LifeSafety Power in intelligent networking, users can now get a real-time look at the health of power-connected solutions across an enterprise or single location. This data, helps them proa...
Plasco ID, an integrator of identification solutions, announced it has been chosen as a trusted provider of HID FARGO Connect, the cloud-based card personalisation and issuance solution by HID Global that untethers printers from dedicated computers and eliminates the need for locally installed ID management software or ID card printer drivers. Now, previously ‘isolated’ card printers are transformed into smart edge devices, bringing enhanced flexibility and productivity to end-user customers. Centralised visibility and management Available through select partners, the HID FARGO Connect solution delivers centralised visibility and management of all HID FARGO Connect printers. Customers benefit from the industry’s first cloud-based solution that simplifies and streamlines the issuance of ID cards and credentials to address their most challenging business needs. Further, a specialised dashboard provides a single view to enterprise-wide consumable usage and inventory levels, while also offering instant feedback on any technical issues that may arise. The dashboard drives extended customer support which in turn provides bottom line ROI to Plasco ID customers. Plasco ID has proven to be a reliable, cutting-edge technology partner, providing secure solutions that ultimately add value for the end user" “HID Global and Plasco ID have a shared vision for improving a customer’s current system challenges when it comes to card issuance and personalisation,” said David O'Driscoll, Sr. Director of Strategic Initiatives, HID Secure Issuance. “Plasco ID is an ideal partner for delivering HID FARGO Connect to customers due to their reputation and success in the marketplace. Over the years, Plasco ID has proven time and again to be a reliable, cutting-edge technology partner, providing secure solutions that ultimately add value for the end user.” Connected solutions Innovation is a core characteristic of the Plasco ID brand, woven into its mission to provide best in class solutions and support to its customers. To that end, it is thrilled to share opportunities like the one afforded through the HID FARGO Connect solution with its customers. “We are excited to be partnering with industry leader HID and their HID FARGO Connect solution. Our enterprise customers look to us as their solution provider for connected solutions that fit their global strategy and management requirements across the enterprise,” stated Bob Fidler, Senior Vice President of Sales for Plasco ID. “We look forward to helping our customers meet these requirements with HID FARGO Connect.”
Inspired by SPS IPC Drives in Nuremberg, Germany and its first sister event in China, SIAF – SPS Industrial Automation Fair Guangzhou, Smart Industry Solutions Shanghai (SISS) was successfully held on 4 September. The conference took place concurrently with Shanghai Intelligent Building Technology (SIBT) and Shanghai Smart Home Technology (SSHT) this year for the first time, providing a supplementary programme for these fairs’ visitors to discover more about the latest manufacturing solutions for their technology products. Smart Industry Solutions Shanghai (SISS) The third edition of SISS presented an overview of the application of Internet of Things (IoT) in the smart industrial automation industry Organised by Guangzhou Guangya Messe Frankfurt Co Ltd, the third edition of SISS successfully achieved its aim of presenting an overview of the application of Internet of Things (IoT) in the smart industrial automation industry. SISS was concurrently held with Shanghai Intelligent Building Technology (SIBT) and Shanghai Smart Home Technology (SSHT) for the first time. SISS acted as an effective avenue for the exchange of market intelligence, with expert speakers delivering thought-provoking presentations touching every facet of intelligent industrial automation system. This year’s speakers represented renowned companies, institutes and associations including Contrinex Electronic Technology, Datalogic (Shenzhen) Industrial Automation, Pepperl+Fuchs Automation, Rockwell Automation and Wintelligence. For these companies, the conference helped them to get their innovative ideas across to different sectors of the industry. Conversely, 85 conference attendees from the smart industrial automation and manufacturing sectors were impressed by the engaging dialogue, and found it rewarding to network with key players within the industry. IoT and Artificial Intelligence This year, several key developments of Industry 4.0, ranging from smart factories to automotive applications and intralogistics, were pinpointed, including the idea of utilising IoT technologies to develop revolutionary manufacturing methods. Speakers from different sectors also shared their thoughts on the latest trends related to big data analytics, IT/OT convergence, digital twin and artificial intelligence.
There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country. Regardless of the size of the retailer, there are many different technologies that can be used within a retail store to improve security and loss prevention, yet none should be used in a silo. There are tremendous benefits to integrating security technologies and communications systems together, including enhancing overall safety and security, reducing shrink, and improving operations. There are many different technologies that can be used within a retail store to improve security and loss prevention As the existing security infrastructure is evaluated and plans for the future are developed, the team responsible should consider some of the following questions. Are there areas of the store that require greater security? Are there notifications or other technologies that could improve the efficiency of personnel and the safety of shoppers? Are there other departments within the organisation that could benefit from the data gathered by the security technology? Understanding current pain points within the stores and how integrated security solutions can address these is the key to implementing the best solution. Here are a few “hot spots” within a typical retail store that easily demonstrate the power of integrated solutions. Point of sale terminals Whether it’s loss through sweet hearting or other fraud, point of sale terminals present a significant shrink risk for retailers. Integrated systems enhance security at these locations. Video recording of HD or megapixel cameras integrated with point of sale data makes it easy to locate video associated with transactions and exception reporting. This allows for visual verification of each transaction when needed.There are tremendous benefits to integrating security technologies and communications systems together Other risks like robbery not only result in loss, but also impact the safety of employees and shoppers alike. Panic buttons or bill trap sensors connected to the intrusion detection system ensure silent alarms are issued when employees are at risk. When the intrusion detection system is integrated with the video system, pressing a panic button or pulling the bill from the sensor can automatically trigger a video snapshot to be sent to the monitoring station to provide verification of the alarm and more information for law enforcement when they are dispatched. Adding audio integration to the intrusion system can also result in a message sent to the store security personnel’s two-way radio when a panic button is pushed, or a bill trap sensor is activated. If no security guard is onsite, video monitoring services can allow the monitoring centre to intervene through audio, alerting the perpetrator that his or her actions are being monitored and that the authorities have been contacted. This may cause the offender to flee the area, helping to mitigate the safety risk as well as the potential for loss. Panic buttons or bill trap sensors connected to the intrusion detection system ensure silent alarms are issued when employees are at risk High value displays Protect high-value or frequently-stolen items such as electronics, using video analytics integrated with audio communication Protect high-value or frequently-stolen items such as electronics, using video analytics integrated with audio communications. For example, a person standing at a display for longer than a pre-defined time or touching items on display can trigger a video snapshot to be sent to the store manager and an audio message to play through a nearby loudspeaker, such as: “Thank you for your interest in our smartphone selection; an associate will be there soon to assist you.” This not only alerts potential offenders that their actions are being watched, it also serves to improve customer service for legitimate shoppers – as a retail floor associate is notified that a customer may need assistance. Cash office An access control reader at the door to the cash office restricts access to only authorised individuals. Integrating video can automatically capture an image of the person requesting access for verifying an employee’s identification prior to granting access or for retrospective analysis in the event of a theft. Exit doors If an employee props open a back door – either for easy re-entry after a break or to allow access to another person with intentions of theft – integration of the intrusion detection system to the video and audio system can significantly reduce risk of loss. For example, the intrusion detection system can monitor doors for abnormal conditions, even when the system is disarmed.Loss can also occur when a cooler or freezer malfunctions or when the door is accidentally left open A door left open for longer than a pre-defined time can cause an alarm on the intrusion panel, which can trigger a nearby camera to send a snapshot of the open door to the store manager and trigger the public address system to play a pre-recorded message through a nearby speaker. This prompts the employee to close the door, reducing risk of theft. Coolers and freezers Loss isn’t just about theft. Loss can also occur when a cooler or freezer malfunctions or when the door of one of these units is accidentally left open. The same concept for monitoring exit doors can also apply to doors for coolers and freezers to prevent spoilage. A cooler or freezer door monitored by the intrusion detection system can trigger an alert or chime to play in the area to remind an employee to close the door or to alert the store manager to the issue. While providing surveillance of the cash register area, the camera's video analytics can be used to trigger an alert in case the queue exceeds the pre-defined threshold Serving a dual purpose Retailers can use the metadata from the cameras to gather business statistics like counts of people entering the store While the technology solutions described above positively impact loss prevention in a retail store, they can also extend beyond security to improve health and safety and enhance customer service as well as customer engagement and sales. For example, while securing a store’s main entrance with IP cameras featuring on-board video analytics, retailers can use the metadata from the cameras to gather business statistics like counts of people entering the store. This data can help them understand peak days and times when making decisions about staffing. Or while providing surveillance of the cash register area, the camera's video analytics can also be used to trigger an alert in case the number of people in a queue exceeds the pre-defined threshold. At this point, the same public address system and loudspeakers used to play background music to enhance the shopping experience could be activated to broadcast a message to request another cash register to be opened, improving store operations. For security and loss prevention purposes, video analytics can also be used to ensure that no one enters or leaves the retail shop using the emergency exit. To address health and safety issues, these same cameras can also trigger an alarm if that emergency exit is blocked by an object – improving the safety of customers and employees. When systems are used to deliver data for purposes beyond security, other departments may be willing to contribute toward the cost Metadata generated by the cameras can also be used to gather information that when processed with sophisticated algorithms in the cloud can show trajectories of the paths that shoppers take as they travel throughout a store as well as heat maps indicating where they walk, stop and dwell – all while protecting the privacy of individual shoppers. This information can be used by merchandisers to evaluate the success of displays and store layouts, which directly impacts customer engagement and sales. When systems are used for and deliver data for purposes beyond security, other departments may be willing to contribute toward the cost of the system. This provides an added benefit by relieving some of the cost burden from security or other operational budgets. Product selection Integration is becoming easier using standards and expanding industry partnerships. However, in some cases, choosing systems from a single vendor that are designed to work together can help to speed and simplify installation, while also reducing system costs for both the integrator and the user. Regardless of the products chosen, it will be important for a retailer with many locations to have consistency in the type of equipment installed at each site. This makes support easier and enables a more uniform response to incidents that happen at various stores. As many retailers already understand, there is no silver bullet to reducing loss. However, a combination of the right technologies working together to prevent shrink and improve investigative capabilities can result in smarter and more effective loss prevention.
Eagle Eye Networks, the global provider of cloud-based video surveillance solutions, announced a partnership with Arlo Technologies, the pioneer in wire-free surveillance cameras, to combine the Arlo FlexPower Camera System with the Eagle Eye Cloud VMS. This new combined offering provides up to 4 wire-free cameras per Arlo FlexPower Base Station; with as many FlexPower Base Stations as desired connected to Eagle Eye Networks’ commercial grade Bridges or Cloud-Managed Video Recorders (CMVRs). Eagle Eye Cloud VMS is a provider of in cost effective, flexible, and cyber-secure, video surveillance. When installing an Eagle Eye Cloud VMS, a certified technician installs wired or wire-free cameras behind Eagle Eye Networks’ secure ‘CamLan’ network, protected by Eagle Eye Networks’ Bridge or CMVR. This best practice for video surveillance system installation insures maximum protection from predator bots attacking available and unprotected devices on the customer’s primary network. Reliable performance in SME environments Eagle Eye Networks’ global support organisation has experienced and assisted in hundreds of cases where certified resellers and customers have suffered through efforts to operate wireless cameras and off-the-shelf access points in commercial applications. “It is for this reason we are so very pleased to be working with the Arlo team,” stated Dean Drako, CEO of Eagle Eye Networks. “Arlo has a considerable pedigree in understanding the commercial wireless environment and designing solutions which perform reliably in the small or medium business environment.” The Arlo Flexpower Camera System easily integrates the cameras into their Eagle Eye Cloud VMSIn many retail surveillance applications, video customers experience ‘blind spots’ resulting from the inability or cost of getting wires in desired locations. The Arlo Flexpower Camera System enables customers to cost effectively locate high quality, battery powered cameras in blind spot areas and easily integrate the cameras into their Eagle Eye Cloud VMS. Most secure cloud video surveillance Global customers using Eagle Eye Cloud VMS enjoy the benefits of fully managed, regionally stored, redundant surveillance video without concern for cyberattacks and ‘lost video’. The Eagle Eye Cloud VMS user experience is rich with features designed specifically with multi-site, centrally managed users in mind. “We are very excited to partner with Eagle Eye Networks and expand the reach of the Arlo Flexpower product line,” stated Tom Babula, Senior Vice President of World Wide Sales at Arlo Technologies. “As the leader in commercial cloud surveillance, Eagle Eye Networks offers the most secure and extendable cloud video in the industry. With our wire-free system, our two brands can deliver an elegant solution that makes things simple for the customer and dealer.”
Ping Identity, global provider of identity defined security, has announced that it has been honored with the API World 2018 Award in the “Best in API Security” category. Its AI-driven cybersecurity solution, PingIntelligence for APIs, brings an increased level of security and intelligence into how APIs are accessed and used. PingIntelligence for APIs The 2018 API Awards celebrate technical innovation, adoption and reception in the API and microservices industry. To support judging process, the program leverages an advisory board made up of seven industry veterans. Out of hundreds of nominations, these expert judges selected PingIntelligence for APIs based on three criteria: reputation among the developer and engineering community, recent visibility and awareness, and product innovation. “APIs are increasingly used by hackers to breach organisations and steal data. API infrastructures need strong cyber protection now,” said Bernard Harguindeguy, SVP, Identity Intelligence, Ping Identity. “With our PingIntelligence for APIs solution, organisations of all sizes have the ability to track the use of their APIs and automatically block identified API threats.” Artificial Intelligence and Cybersecurity PingIntelligence for APIs uses artificial intelligence to deliver a high level of visibility and cyber protectionPingIntelligence for APIs uses artificial intelligence to deliver a high level of visibility and cyber protection to any API infrastructure. This applies to internal- and external-facing APIs and for environments with or without API gateways. The solution helps: Autodiscover all active APIs and associated URLs so that none are forgotten or overlooked. Deliver deep visibility into all API activity at scale for forensic or compliance reporting, all actions on APIs are captured and consolidated for easy access. Identify and automatically blocks cyber-attacks that use APIs to compromise data or gain control, with no predefined rules or attack signatures, unlike today’s analytical tools with no API awareness. Prevent hackers from reconnecting after termination when attackers are identified, enforcement nodes automatically block access across all sites and clouds. "Developers and engineers are becoming key influencers in their companies, because the technologies they use continue to matter more to their operations. Ping Identity is empowering developers to have a greater impact on security of products and IT,” said Geoff Domoracki, founder of DevNetwork, producer of API World and the 2018 API Awards.
Seagate Technology, provider of data storage solutions, launched a wide range of advanced 14TB hard drives, enhancing the company’s enterprise and specialty drive portfolio. Consisting of IronWolf and IronWolf Pro for network attached storage (NAS) applications, the BarraCuda Pro desktop drive, surveillance-optimised SkyHawk, and Exos X14 for hyperscale data centres, this purpose-built portfolio empowers customers to consume, manage and utilise digital data more effectively and efficiently while establishing new benchmarks in speed and capacity. Data protection and management archiving With this offering, Seagate continues in driving data storage technology toward a lower cost per terabyte through hard drive optimisation, versatility of application, and unmatched capacity. Whether for personal use, creative and design computing, online gaming, or large-scale surveillance systems and hyperscale environments, Seagate drives are opening up new data management opportunities across a wide range of markets. From the largest data centre to the personal user, our goal is to ensure every customer can access, store and transfer data quickly and reliably" “Data protection, management and archiving are no longer strictly the realm of IT departments, but are now essential responsibilities for business owners, creative professionals, online gamers and PC users alike,” said Matt Rutledge, senior vice president of devices at Seagate. “We understand the critical nature of data in unlocking opportunities to efficiency. From the largest data centre to the personal user, our goal is to ensure every customer can access, store and transfer data quickly and reliably, whenever they need it and wherever they are.” Optimised for NAS applications IronWolf and IronWolf Pro drives have continued to push boundaries for NAS applications, providing best-in-class reliability and performance for always-on environments. Trusted by NAS vendors across the globe, IronWolf drives are built with multi-user environments in mind, which allows a workload rating up to 300TB/year allowing users to do more with their data and their NAS. The drives are optimised with AgileArray firmware for NAS servers to provide the customer with a host of benefits including: RAID performance, dual-plane balance, rotational vibration (RV) sensors, advanced power management and error recovery control. Additionally, customers get peace of mind with Seagate IronWolf Health Management and 2-year Seagate Rescue Data Recovery Services. Health Management embedded analysis and recovery software works seamlessly with key NAS partner systems, providing comprehensive status updates and drive health analysis, allowing customers to be preventative, not just reactive. IronWolf and IronWolf Pro drives feature a 3-year and 5-year limited warranty respectively. “For many companies, data storage has become one of the fastest-growing parts of their IT infrastructure. Synology users will be excited by the new Seagate 14TB IronWolf drives,” said Vincent Tsai, product marketing manager at Synology Inc. “By collaborating seamlessly, Seagate and Synology deliver a reliable storage and backup solution for businesses to safeguard their valuable data.” Versatile desktop performance The BarraCuda Pro 3.5-inch HDD offers professionals an ideal storage solution for desktop workstations or direct attached storage systems As a result of the exponential rise of online interactions across a host of industries, and the constant demand for higher productivity, the BarraCuda Pro 3.5-inch HDD continues to offer professionals an ideal storage solution for desktop workstations or direct attached storage (DAS) systems. Creative professionals, small businesses and IT staff all have a need for large amounts of data to be delivered efficiently and protected properly. The BarraCuda Pro delivers 7200 RPM spin speed, along with 250mb/s data transfer rates and up to 256MB of cache, the highest available today, powered by Seagate’s Multi-Tier Caching Technology (MTC), delivering effortless performance in a massive 14TB of storage. Whether it be data-intensive editing of 8K videos or the transfer of large files to an attached backup, the BarraCuda Pro gives customers speed, versatility and durability at an affordable cost, as well as the support of a 5-year limited warranty. Fine-tuned for 24/7 workloads The surveillance industry is rapidly evolving and the demand for higher video resolution, analytics, and longer retention requires much greater storage capacities. Seagate SkyHawk drives provide the optimum combination of performance, high capacity and reliability, the three most important needs for surveillance customers and integrators. With the ability to store over 9000 hours of HD video and up to 64 HD cameras, the SkyHawk 14TB is optimised for DVRs and NVRs, tuned for 24/7 workloads, and equipped with ImagePerfect firmware to minimise dropped frames and downtime. Supported by a 3-year limited warranty, customers can also benefit from unique SkyHawk Health Management technology that actively monitors and analyses drive health, empowering users to prevent, intervene and recover from potential anomalies. Enhanced hyperscale and cloud storage Exos X14 drives offer enhanced areal density to deliver higher storage capabilities in a compact 3.5-inch form factor Built for the efficiency, reliability and security demands of the world’s most advanced hyperscale data centres, Exos X14 drives offer enhanced areal density to deliver higher storage capabilities in a compact 3.5-inch form factor. Combined with the industry’s lowest power consumption and best performance in its class, the Exos X14 enables data centres to maximise storage capabilities while reducing complexity and operational costs. As the need for hyperscale and cloud storage increases exponentially, Seagate’s new Exos X14 drives deliver 40% more petabytes per rack compared to Exos 10TB drives, while maintaining the same small footprint. The helium-based Exos X14 also provides a 10% reduction in weight versus air nearline drives, and flexible formatting for wider integration options and support for a greater number of workloads. Exos X14 also ships in a modular enterprise system (Exos E 4U106) for easy scaling up to an unprecedented 1.4PB density. Anticipating global security demands, Exos X14 drives feature “always-on” Seagate Secure protection, effectively encrypting all data without performance degradation. Exos X14 drives offer a 5-year limited warranty and are designed to meet US Government Federal Information Processing Standard (FIPS) 140-2, Level 2 Security certification, as well as the Common Criteria for Information Technology Security Evaluation (CC) ISO/EIC 15408 compliance standard.
Communication makes the world much, much smaller - but it also becomes critical to everyone. Once life-enriching communication technologies are embraced, not only do we like and enjoy the benefits, but we also become hooked on it day and night. "There is no doubt that the transportation industry is benefiting from always available communications, making sure drivers, mechanics, dispatchers are always connected and can exchange information when necessary," says Sagi Subocki, Vice President of Products and Marketing for MCC technology leader Softil. "However, for the most part until now, the transportation industry has had to rely on the traditional radio or simply standard mobile phones to perform all communications tasks. That's about to change with the advent of Mission Critical Communications over LTE and 5G as defined in the 3GPP Release 13-15 standard," adds Subocki. Mission critical communication over LTE MCC over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications Mission critical communication (MCC) over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications. Think about a driver who can push a button and instantly talk to all drivers within a 50-mile radius, for example, to inform them of road conditions, accidents, road works and other incidents. In the event of a breakdown, the truck driver can quickly obtain help from experts using video chat, which makes a driver's life a lot easier. Using the same MCC over LTE capabilities, the driver can see the location of all other drivers using the same radios, can engage in chat sessions with nearby garages and much, much more. And let's not forget that MCC over LTE communications can be prioritised over regular public mobile voice and data traffic, which can help in the case of accidents and natural disasters. Advanced communication solutions in Mining While different from the transportation industry, mining's reliance on advanced communication technologies might be even greater than the needs of the transportation market. Subocki explains: "Mission critical push to talk and push to video with guaranteed, prioritised delivery might well make the difference for mining workers. The ability to ask for urgent assistance simply at the push of a button is crucial in the day-to-day operations of an oil rig and a diamond mine." But the benefits of MCC over LTE don't stop there. As MCC over LTE communication is delivered over modern, very capable, rugged smartphones, these devices can be used to interface and collect data from all available sensors - air quality, temperature, radiation, presence of dangerous gases - all this information can be obtained automatically via MCC over LTE integration with IoT and can be used to increase safety. Drones in MCC over LTE In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary - and the 3GPP MCPTT Release 16 standard will extend mission critical communication to include robots, which might be priceless. "Think about the implications of sending an MCC enabled robot to investigate a mine explosion and you'll see the future of MCC over LTE and 5G communications in the mining industry," adds Subocki. Market Value and Outlook A report from ABI Research found the total mission-critical communications market for base stations, repeaters, handsets and infrastructure in 2022 will be US$10 billion. The North American market continues to account for more than half of this world market with the rapidly growing Asia-Pacific region in second place with a 20 percent market share. Public-safety radio was the ancestor of critical communications providing mission-critical voice services and continues to represent over half of this market, followed by the industrial, transportation and utility segments. However, the need for mobile broadband data has also entered the equation driving critical communications systems to evolve to digital radio for data handling and spectrum efficiency. As a result, critical communications systems are slowly evolving from the current TETRA, Digital Mobile Radio (DMR) and Project 25 (P25) to coexist and interoperate with Long Term Evolution (LTE)-based systems. Softil's MCC over LTE Leadership Softil is a leader in Mission Critical Communication over LTE solutions for developers. Historically, Softil always focused on the full embrace of open communication standards - starting from close participation in the work of the appropriate SDOs, then developing best-of-breed APIs and implementation of the relevant standards, and most importantly, paying utmost attention to the interoperability of the offered solution by active participation and leading all relevant industry-wide interoperability testing events. Softil actively participates in development of the MCC over LTE standards in 3GPP, as well as interoperability testing at the ETSI Plugtest Events. Most importantly, Softil 3GPP Release 13-15 compliant client SDK implementation had been already commercially deployed on the market - in Korea, Softil powers latest and greatest implementation of the MCC over LTE-R communication devices installed on the newest high-speed train line, such as one connecting Incheon airport to PyongChang during the Olympic games.
Sonitrol, the provider of verified electronic security, announces the successful implementation of a Sonitrol TotalGuard system for 4EverReady Home Care, located in Cincinnati and Dayton, Ohio. TotalGuard, innovated by 3xLOGIC, has alarm verification capabilities that detected an incident outside the premises, which led to a successful resolution of a potential false alarm situation. 4EverReady Home Care is a privately-owned home care agency based in Dayton, Ohio. The organisation is committed to providing clients with the highest quality care possible, while allowing them to maintain both freedom and independence in the comfort of their homes. Incident triggered alarm 4EverReady has two locations, in Cincinnati and Dayton. Late on a recent evening, surveillance video from inside the Cincinnati location showed a person standing outside the office when suddenly a car drove by the intersection. The person in the video made a hasty retreat from the building and crossed the street. What had happened? “We recognised the man in the video, he’s often in the neighbourhood and because our offices are all glass looking out to the street, we can observe him and others walking up and down the nearby sidewalks,” recounted Lisa Roberts-Rosser, Executive Consultant for 4EverReady. “Because this incident triggered an alarm from our system, Sonitrol of SW Ohio brought the video to my attention, I was the first person called. I knew the man in the video, and I’d never seen him move that fast.”Sonitrol operator was able to quickly determine that the offices were not in danger of a break-in, therefore, this was not an active alarm Area under protection The Sonitrol operator was able to play the video with the related audio to figure out that the passing car had actually fired (turned out later) a paintball gun at the man in front of 4EverReady’s offices, causing him to flee. More importantly, the Sonitrol operator was able to quickly determine that the offices were not in danger of a break-in. This incident occurred outside the area under protection; therefore, this was not an active alarm so no further action was necessary. “We installed the Sonitrol TotalGuard system back in April and our system’s two cameras give us all the visibility we need. Our office is essentially one big room and the cameras give views in the office and through the windows into the immediate neighbourhood,” Roberts-Rosser explained. Motion detection technologies In addition to video surveillance with video and audio alarm verification, the TotalGuard system includes glass break detection and motion detection technologies. 4EverReady has also installed a Sonitrol Cloud Access, which provides key fob entry through the office main entrance. Roberts-Rosser and any other staff with privileges can remotely arm and disarm the TotalGuard system with a smartphone through the available Sonitrol mobile app. “TotalGuard provides us complete alarm verification capability, and the mobile app definitely works well for us,” she explained. “If there is a time that someone has forgotten to arm the system upon exiting at the end of the day, I can arm the system from home or wherever I am.” Legitimate alarm situation 4EverReady has a consultant that uses the office space for meetings after hours, to prevent any interruption of the normal daily work flow. Roberts-Rosser can program the TotalGuard system from anywhere, at anytime, to grant the consultant access when it is needed. The sensitivity of our system is impressive, when it was first installed it was alarming because of loud music outside, cars backfiring, and other loud noises In addition to TotalGuard picking up an incident outside the area of protection, Roberts-Rosser said there has been a process to calibrate the system to be as effective as possible. “The sensitivity of our system is impressive, when it was first installed it was alarming because of loud music outside, cars backfiring, and other loud noises. Once a neighbourhood child pulled on the door while horseplaying around and that definitely caused an alarm. Working with Sonitrol, we’re able to verify all of these incidents to make sure we are only contacting the police when it’s a legitimate alarm situation.” Highly-effective system As is becoming abundantly clear in recent years, police forces are not unlimited resources. Sonitrol TotalGuard has proven to be a highly-effective system in cutting costly, even dangerous, false alarms. “TotalGuard is a technology package no other company is offering security customers, it is a genuine game changer, and this incident proves the technology goes above and beyond in protecting customer’s property, even if the action is well outside the area under surveillance,” said Alison Shiver, Marketing Manager, Sonitrol of SW Ohio.
One of Fortaleza's largest hotels, the Gran Marquise Hotel, which hosts thousands of people each year and holds hundreds of events, has reinvented itself and converted analog technology to IP surveillance. Upon project completion, it is expected that the Gran Marquise will have 250 VIVOTEK network cameras installed, integrated and linked with all other hotel devices under Genetec’s cloud-based video-surveillance-as-a-service (VSaaS) solution, Stratocast. About Gran Marquise The Gran Marquise is a five-star hotel of 18 thousand square meters located on the seafront of Fortaleza (Ceará). With a 23 year history, the hotel has a large infrastructure of 230 apartments ranging in size from 29 to 131 square meters, two presidential suites and 21 floors in total, of which 14 are dedicated to guest rooms 7 are retained for events, recreation and administration. The Gran Marquise realised that its security system needed to be renewed It is one of the most in-demand destinations among national and international authorities, artists and athletes, such as Bill Clinton, former president of the United States, Vladimir Putin, current president of Russia, singer Paul McCartney, rapper Snoop Dogg, as well as the fighters of the Ultimate Fighting Championship. In addition, the Gran Marquise was the first hotel in Brazil to achieve the ISO 22000, certificate that ensures adherence to extremely high standards of food quality and safety. Unified security and operations The Gran Marquise realised that its security system needed to be renewed. The hotel had 500 analog cameras and 22 digital video recorders installed – an extensive system, but one which only provided low-quality images and demanded heavy workload when it was necessary to locate and retrieve footage of a recorded event. "We looked at the hotel and realised that we had good internet, excellent rooms, perfect service, but if a customer asked for footage from security cameras, the only thing we could offer were noisy images," said Jussieudo Gomes, Security and Information Technology Division chief of the Hotel Grand Marquise Fortaleza. To solve this dilemma and improve the management and security of the hotel, a plan was formulated to develop a pilot project with VIVOTEK – a global provider of network cameras, PoE switches, and network video recorders, and Genetec, a global provider of IP surveillance software, access control and license plate recognition solutions. Installing VIVOTEK network cameras Divided into four stages, the goal of the project was to enable the total unification of management, security, marketing and commercial operations Divided into four stages, the goal of the project was to enable the total unification of management, security, marketing and commercial operations. In the first phase, 250 analogue cameras were replaced by a mere 48 VIVOTEK network cameras. Also installed was the Genetec Stratocast software, a cloud-based video recorder tool that eliminates the need for any local server, making it possible to monitor and share images with fully encrypted data. Two models of network cameras were installed throughout the hotel: one is the IB8369A, a 2-megapixel camera capable of capturing high quality video, with IR illuminators effective up to 30 meters for superior image quality throughout the day and night. The camera also features Smart Stream II technology, which optimises image quality for the most important regions in any scene; in doing so it can reduce network bandwidth consumption and storage requirements by up to 50%. The other camera installed was the small-scale, but big-featured FD8166, an ultra-mini fixed dome network camera with a tiny diameter of only 90mm. Genetec Security Center solution "Because of the ‘L’ shaped layout of the hotel, we previously had five analog cameras installed on each floor: two in the corridor, because the distance from one side to the other was too long to be monitored by a single analog camera; one in front of the elevator; another covering the 'L' and one more covering the maid’s service area. "Now, each floor has only three cameras: one camera that serves the 'L' and the elevator; another that serves the corridor and one more observing the service area. At the reception area, the same thing happens, we put a different camera on the ceiling, and with just that solution we managed to cover the lobby, the bar, a part of the reception and the stairs of the restaurant, "explained Gomes. The Genetec Security Center solution was implemented for the internal parts of the hotel In the second phase, the Genetec Security Center solution was implemented for the internal parts of the hotel. With this platform, Gran Marquise can unify operations by combining all IP surveillance systems into one interface. Now all access control and video surveillance are connected to, and accessible through, the cloud. Unified access control and fire security The third and fourth stages are still in progress. The goal is to install 250 network cameras in total and unify the security system with access controls and the fire alarm system. In addition, the KiwiVision analytical software was also installed, a system which counts people automatically through cameras and 3D sensors and detects objects added or removed from a scene. This way it is possible to automatically detect if a dangerous object has left behind or if something has been stolen from a particular area. "The new security system has come to improve the image quality of surveillance, the layout of the hotel and the promptness of response to the customer. In the past, if we needed an image we had to expend great effort in searching whole files and spend hours watching videos to be able to select and retrieve the relevant event - not to mention the impact power failures, and malfunctions issues in power supplies, recorders and hard disk drives. ", said Gomes. Video security integration The new IP surveillance infrastructure has already proven effective during a wedding held at the hotel The new IP surveillance infrastructure has already proven effective during a wedding held at the hotel. The bride had been in the spa area enjoying the luxurious Day of the Bride service. However, when she went to dress up for the ceremony, she did not find the jewelry she had prepared for the wedding. Security staffs were triggered to investigate the occurrence. “Through descriptions of the bag that carried the jewelry and the time when the bride last saw it, we were able to locate the footage though the synergy of VIVOTEK’s camera and the Genetec system, and then proceed to point of precise relevance in the video. We noticed that the bride carried the purse into the car, but on exiting the car she was no longer carrying it. When we showed her the pictures, she went to the car and the purse was there. If it wasn’t for the new IP surveillance solution, we would not have been able to ascertain what had happened, the bride would remember and find the jewelry only after the ceremony, and her day would have been ruined. This entire investigation process, finding the images and resolve the case, took only 15 minutes, but saved a very important day" said the security chief. Genetec public-private partnership The Hotel Gran Marquise’s new security system is part of Genetec's private-public sharing initiative The Hotel Gran Marquise’s new security system is part of Genetec's private-public sharing initiative, which enables the sharing of certain cloud-recorded images with police forces. The Military Police, the Ceará State Government and the ABIH (Brazilian Hotels Industry Association in Ceará) are partners in this project along with the hotel. The purpose of this private-public partnership is that, with the monitoring carried out by private companies, the public sector can achieve a more effective action, speedily curbing the action of criminals in monitored places. The private-public partnership is founded on the belief that such sharing of private company surveillance with the public sector will enable a more expedient and effective curbing of criminal activity in such monitored areas. In this way, it is possible to expand monitored areas and reduce crime without direct public sector investment. Recorded images are transmitted in real time to the police, and a two-way relationship benefits both sectors. "The goal of projects with public-private partnerships is prevention. It is possible to increase public safety with little investment from the private sector," explained Country Manager of Genetec Brazil, Denis André Côté. With such initiatives, we are beginning to see the benefits of advances in total surveillance systems expand beyond those companies who take the initiative to invest in them and begin to serve the broader public.
HID Global, a worldwide provider in trusted identity solutions, announced that 85-year-old fire protection provider RAEL Automatic Sprinkler Company and integrator Automated Decision have deployed HID Trusted Tag Services at one of Manhattan’s most iconic skyscrapers. The combined solutions help secure, digitise, automate and streamline inspection and maintenance of the building’s massive fire and safety sprinkler system. "HID Trusted Tag Services are a real competitive differentiator for us when we bid for projects now," said David Israel, President, RAEL Automatic Sprinkler Company. "We plan to deploy it in other noteworthy buildings and we’re exploring using it for other mission-critical equipment we inspect and repair as well." The RAEL solution incorporates HID Trusted Tag Services into Automated Decisions’ work order management system and mobile inspection app HID Trusted Tag Services HID Trusted Tag Services empower robust Internet of Things (IoT) applications by attaching unique and trusted identities to virtually any object that can be read by mobile devices. Smartphones and other devices can then be used for innovative use cases, without compromising the privacy of end users. The RAEL solution incorporates HID Trusted Tag Services into Automated Decisions’ work order management system and mobile inspection app. The deployment includes HID’s trusted and tamper-evident NFC tag using dual NFC and QR code technology; unique cryptographic authentication and a unique QR code placed on every component of the RAEL sprinklers. After authenticating to HID’s cloud authentication service, RAEL technicians move through the building, tapping each applied tag with their mobile devices to authenticate upon completion of their component inspection or repair. Proof of presence Each individual tap generates a unique encrypted code appended to a URL to provide proof of presence. This process confirms the technician was physically at the site and conducted the required sprinkler inspections and repairs. "Proof of presence was critical for us,” said Israel, “as property managers are now expected to deliver a much higher level of compliance reporting." The solution also logs the user, tap time and date into the Automated Decisions work order management platform. Mobile online access provides inspectors with service request maintenance records, sprinkler part specifications, diagrams and photographs. Combined HID and Automated Decisions solution has enabled faster, more efficient inspections and repairs Combined tag services and mobile devices "That RAEL and Automated Decisions are leveraging our offering for fire and safety at an immense, iconic skyscraper reinforces the breadth of IoT use cases that our identification and sensing portfolio addresses," said Mark Robinton, Director of Business Development & Strategic Innovation, Identification Technologies with HID Global. "Facility managers are also increasingly seeking to combine the use of HID Trusted Tag Services and mobile devices to automate other safety and security functions, including guard tour and key management, as buildings become more intelligent and connected." In addition to providing peace of mind to RAEL and their property management clients, RAEL also reported the combined HID and Automated Decisions solution has enabled faster, more efficient inspections and repairs, improved first-time fix rates and fewer repeat visits.
Blue Cross/ Blue Shield of Rhode Island (BCBSRI) has played a significant role in both the health and economy of the state of Rhode Island since 1939. More than one out of two Rhode Islanders have chosen BCBSRI. The organisation’s mission is to provide its members with peace of mind and improved health by representing them in their pursuit of affordable, high-quality healthcare. Secure and efficient security system BCBSRI needed to upgrade its workplace to a more efficient, secure, effective and sustainable environment. An in-depth analysis compared the feasibility of renovating several older buildings to constructing a new building. A benefit for the new building was the opportunity to install a completely new state-of-the-art system to dramatically increase security. Having a secure work environment is a major issue for a health insurance company in meeting HIPAA requirements, and can involve access control, visitor management and video surveillance. Barium Ferrite technology BCBSRI used Barium Ferrite technology for security in its old buildings BCBSRI used Barium Ferrite technology for security in its old buildings. This older technology is based on sandwiching a flexible magnetised material between two PVC layers and encoding spots on a polarised magnetic field, which is then electrically injected into the barium ferrite. These magnetically encoded areas activate sensors when a card is inserted into the reader. While Barium Ferrite is cost effective, the technology is highly susceptible to duplication and the cards themselves have a short shelf life. Therefore, this security technology was not a consideration for BCBSRI’s access control system in the new headquarters. Security integration in new access system To meet both HIPAA requirements and to create a streamlined work environment, the company was looking for a multi-function, high-security and user-friendly solution. Erecting an entirely new structure made for a seamless upgrade to state-of-the-art security technology that integrated easily with other cutting-edge systems in the new building. Another goal in this transition was to create an environmentally friendly and sustainable workplace. One aspect of this was to install multi-function printers (MFPs), something BCBSRI had been considering for some time. It was critical to have a security system that enabled the move to MFPs. Single card access control In addition, BCBSRI wanted an elevated level of security in restricted areas, so a system enabling biometrics was also desirable The company also wanted a one-card solution that allowed them to do more than open the door. They wanted the same card to be enabled for use with services such as cashless vending in the cafeteria, as well as for access control in the company gym and parking structures. In addition, BCBSRI wanted an elevated level of security in restricted areas, so a system enabling biometrics was also desirable. The security systems integrator, Team AVS, had been working with BCBSRI for 10 years, so it was a natural decision for them to install the new building’s security system and make recommendations for complementary technology. Eric Caruso, business development manager, and his team presented a HID Global portfolio as the core of the access-control solution. “We’ve been a HID Global partner for more than 15 years, so we know we can count on them,” said Eric Caruso. “Not only are the products reliable and come with a lifetime warranty, we also know that the local support our clients get reflects well on us.” iCLASS R40 readers and iCLASS smart cards Team AVS recommended Genuine HID products – iCLASS R40 readers and iCLASS smart cards – for their customisation and flexibility that enables them to work with the multiple applications required by BCBSRI. With Genuine HID, customers also get the most-trusted, fully interoperable, secure identity solutions on the market, the industry’s first lifetime warranty, and the strongest delivery and response platform available. This ensures optimisation of the company’s security investment for years to come. HID Identity on Demand (IoD) services Team AVS also recommended using HID Identity on Demand (IoD) services to produce the new badges Team AVS also recommended using HID Identity on Demand (IoD) services to produce the new badges, thus simplifying the re-badging project and reducing the strain on company resources during the move. In moving to the new building, BCBSRI downsized from 600 units for printing, faxing and copying to 100 MFPs. In doing so, they saved paper and ink, reduced their carbon production by using fewer devices, and increased document security utilising “secure print.” HID secure-access cards In the past, BCBSRI managed document security by having locally dedicated desktop printers, accessible only by staff near to the printer. Since the new MFPs were centrally located among groups of employees, multi-function, secure-access cards provided the security, and at a much higher level. Now, when an employee sends a job to print, it sits in the cloud until they arrive at the printer, scan their HID multipurpose smart card, and request their specific job to output. “If we didn’t have the HID cards, we couldn’t have had the multifunction devices,” said Tom Bovis, assistant vice president, Corporate Real Estate/ Administrative Services. “The easy integration of iCLASS made the company greener.” BCBSRI completed full analysis of potential vendors and selected Konica/ Minolta Business Solutions to provide the MFPs. Since Konica/Minolta is an official HID Connect partner and an integrator of Genuine HID Technology, Team AVS could be ensured that everything would work together seamlessly. One-Card Solution Freedom Pay is a HID Connect Premier Partner and integrates Genuine HID Technology In the old buildings, BCBSRI employees had a separate card for the cashless vending system – Freedom Pay. The company was pleased with their service and preferred to keep them. Freedom Pay is a HID Connect Premier Partner and integrates Genuine HID Technology. This made the transition simple and successful. Now employees carry only one card for secure access and cashless vending. That same card also works for parking, gym membership and, as mentioned above, printing, copying and faxing using the MFPs. Biometrics and card swipe access solutions As required by HIPAA, the cards also display the employee’s photo. For those needing access to restricted areas, including the data center and cash processing, their cards also contain biometrics. Following the card swipe these employees also enter a PIN to gain access to the most secure areas. “People are happy with the system,” says Bovis. “They’re impressed with how easy it is to use while still providing state-of-the-art security.” Simple Integration/Transition Migrating employees to the new smart cards was easily accomplished in the move process since BCBSRI used HID Identity on Demand services (IoD). Although BCBSRI had its own badge printer that would work with iCLASS, to print a large quantity of cards all at once would be a strain on staff and equipment. Instead, a dedicated IoD project-management team gathered the necessary information and handled card production, leaving BCBSRI security staff free to focus on other issues. iCLASS smart cards IoD was able to use the photos and information in BCBSRI’s existing database for the new cards, saving significant time and resources for the company IoD was able to use the photos and information in BCBSRI’s existing database for the new cards, saving significant time and resources for the company. IoD’s graphics team created custom card designs for various populations, such as employees and contractors. All 1,200 multi-function, photo-ID, iCLASS smart cards were printed and delivered in the time frame requested, in advance of the move. Every other weekend, 250 employees moved from the old buildings to the new. The department head simply picked up their employees’ badges and handed them out prior to moving day. When the cards first arrived, Bovis and a colleague, Jim Keay, tested the cards with all the applications. “The iCLASS cards worked great,” said Bovis. “We didn’t experience any bugs or glitches.” Enhanced security Enhanced security was just one component in the decision to build a new headquarters for BCBSRI. However, in a regulated industry that deals constantly in confidential, personal information, it was an important one. By choosing Genuine HID, BCBSRI has a trusted, reliable system that meets their needs today and is scalable for future growth and technology advancement. “The decision to go with HID was easy,” says Bovis. The result is a more secure physical environment, safer document handling, a one-card solution for all access and cashless vending needs, and a more environmentally friendly workplace with an 80 percent reduction in output devices. By rebuilding rather than renovating, the company will also save $25 million over the next 23 years. The new BCBSRI headquarters will also be the first Gold LEED-certified commercial building in Providence.
Established by the French Government’s Ministry of Finance and Economics, the ACCORD project was commissioned to design and implement financial system modernisation. The charter of the ACCORD initiative team, composed of representatives from multiple government ministries, is to architect solutions that enable the French government to manage the finances of the country with the same level of accountability as private sector enterprises. The technology-based infrastructure selected was a smart card solution to confirm and authenticate users across 40 departments. HID Global’s Identity Assurance software The systems operated in parallel but could not leverage the benefits of a unified system AIFE – Agence pour l’Informatique Financière de l’Etat – chose HID Global’s Identity Assurance software coupled with smart cards for the solution. Ensuring users are ‘who they say they are’ over the course of several decades, individual French government departments had developed separate and distinct applications to manage activities such as budgeting, processing purchase orders, and other accounting activities. The systems operated in parallel but could not leverage the benefits of a unified system. Enterprise Resource Planning system With the inception of the ACCORD project, the government committed to streamlining finance management by moving to one system for centralised control of the country’s budgeting and finance operations – with a goal that by 2004, all government central entities will be using the standard Enterprise Resource Planning (ERP) system. The transition to an online application that consolidates financial reporting and transactions requires an organisation to determine how it will identify users with certainty prior to granting them access to the system and to valuable data. The solution must be easy to use to ensure departmental acceptance of the new application and authentication process. It must also minimise the IT staff time required for day-to-day administration and helpdesk activities for a large population over 7,000 dispersed users. These multiple challenges presented an opportunity to leverage proven digital identification solutions from HID Global. Smart card-based PKI identification solution HID Global’s Security Client software solution and smart card readers are key elements for securing the finance system at all user points of entrySmart card-based solution using digital certificates with PKI, The French government-wide implementation securely links multiple departments, such as the Ministries of Education, Justice, Transportation and Housing, and Foreign Affairs, to the unified ERP application, enabling the exchange and ultimate consolidation of digital information. In 2000, the Ministry of Finance began deploying HID Global’s smart card-based PKI solution. HID Global’s Security Client software solution and smart card readers are key elements for securing the finance system at all user points of entry – any of which could become a source of fraudulent or malicious activity in the absence of strong authentication and confirmation of digital identity. Today, employees regularly use the card with a microchip that holds their unique credentials in the form of an Entrust digital certificate. HID Global’s Gold Entrust-Ready certification ensures a smooth deployment to large numbers of users, and the combined solution with Entrust TruePass delivers the following benefits: Enhanced Security: HID Global’s multi-factor authentication reinforces the fundamental security and intent of a PKI by requiring something the user has (a smart card) and something the user knows (a PIN code) in order to use the private keys stored on the card. To further enhance security, the key pair is generated on the cryptographic smart card itself, so that the private key is never exposed to the insecure PC environment. The tight integration of HID Global’s client software with Entrust ensures certificate key updates are transparently and automatically made on the card. Non-Repudiation: To support non-repudiation, it is essential that ERP system users provide undeniable proof that they are who they say they are. Keys used for that authentication can never be stored on the potentially vulnerable user workstation. Those sensitive keys must remain under the sole control of the user, and HID Global’s client software ensures private keys are generated on the card and remain in the rightful owner’s possession at all times. User Simplicity: HID Gobal’s Security Client software provides a familiar ATM-like user interface that makes complex digital identity and PKI technologies transparent, so employees can focus on their work responsibilities and financial application activities to easily access the system. HID Global’s commitment to openness and industry standards ensures that the French Government’s initial investment in digital identity products and smart card client software infrastructure is capable of supporting multiple PKI vendors and other forms of identity credentials in the future.