With the Government directives brought into action earlier this week, Security Systems and Alarms Inspection Board (SSAIB) has had to change certain aspects of their working practices, while also ensuring that it doesn’t impact negatively on the registered firms and the level of service that the company provides to customers. UKAS accreditation SSAIB is fully aware of the uncertainty and worry that our firms will be facing at this difficult time" Security Systems and Alarms Inspection B...
IDIS has further enhanced its IDIS Center VMS, adding new features and functions targeted at small to mid-sized enterprises and multi-site customers. Organisations can build powerful centralised monitoring solutions, quickly and easily, when implementing IDIS Center together with the wide selection of IDIS DirectIP cameras and powerful NVRs. These deliver customer lifecycle savings of 50% or more compared with server-based solutions, thanks to reduced installation time, no upfront or ongoing li...
SureCloud, the provider of cloud-based, integrated risk management solutions, has announced its collaboration with cyber security ratings company BitSight. The new partnership will provide organisations with a one stop shop for end-to-end vendor onboarding and simplifying the entire vendor risk management process. BitSight provides independently validated information to rate the security posture of suppliers. These cyber security ratings, according to Gartner, will become just as important as c...
Interface Security Systems, globally renowned managed services provider delivering managed network, interactive alarm monitoring, video surveillance and business intelligence solutions to distributed enterprises, has announced a new strategic partnership with OpenEye, international provider of cloud-managed solutions for video security, business intelligence, and loss prevention. Strategic partnership The strategic partnership will combine the proven solutions of both companies — Interfa...
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data centre, the IT department has complete control over network acce...
Hanwha Techwin America, global supplier of IP and analog video surveillance solutions, has announced that Hanwha’s Wisenet L series cameras are now compatible with the Genetec Stratocast cloud-based video surveillance-as-a-service (VSaaS). Through this technology partnership, customers across a broad range of industries will now be able to reap the benefits of an easy to install true-cloud solution whether they want to support hybrid-cloud deployments, add new cameras in remote locations,...
PerpetuityARC Training, part of Linx International Group - the world’s renowned provider of accredited security systems training courses, is responding to a surge in demand, for its portfolio of online training courses. The company is experiencing unprecedented international demand from organisations of all sizes, operating across a wide range of sectors, as they look to ensure they have the skills in-house to coordinate their response to the rapidly changing coronavirus (COVID-19) situation. Demand for online training course Director of Sales and Marketing at the Linx International Group, Sarah Hayward-Turton stated, “Even the very well-prepared organisations with extensive contingency plans, based on thorough risk assessments, have been stunned by the scale and speed of the situation we currently face.” Effective risk, crisis & disaster management begins with preparation for the worst case scenario" She adds, “Key personnel off sick or isolated, travel restrictions, offices and stores shutdown, supply-chain issues affected by manufacturing shortfalls, import delays, and panic-buying. These are just some of the issues impacting organisations right now. The scale is unprecedented, but effective risk, crisis and disaster management begins with preparation for the worst case scenario.” Latest methodologies and best practices Hayward-Turton further said, “We are helping small businesses with no continuity strategy, through to large multi-national organisations who want to train more employees on the latest methodologies and best practice, to ensure that expertise resides in-house, to help manage their response to this crisis, as well as being as ready as possible for what the future may bring.” Crucially, the accredited training courses provided by PerpetuityARC Training are available online and all offer CPD points. Courses range from bite-size introductions, through to formal accredited security risk management programmes. PerpetuityARC Training online training courses available now include: Security Risk Management – Learn how to identify threats, risks and vulnerabilities, and create a comprehensive plan that will enable practical measures to be applied to mitigate the impact. Crisis Management & Business Continuity - Learn about risk assessments, how to identify threats, and how to build a crisis management team. Risk, Crisis and Disaster Management – BTEC Level 4 qualification of immediate benefit to those working as security managers, intended to introduce and develop security and risk management to the highest level. The syllabus includes: risk communications, business impact analysis, continuity planning and crisis management, forming and operating a crisis management team, command and control structure and liaison with the emergency services. Managing Security Risk in the Oil and Gas Sector – IQ Level 4 qualification addressing some of the more complex risks associated with the oil and gas industry in a range of environments and examines the risks in upstream and downstream operations. Topics covered include: security risk analysis, corporate social responsibility, human rights, and community management, managing activism risk, managing acts of militancy and terrorism against the oil and gas sector, oilfield and pipeline security, refinery security, maritime and offshore security and downstream (retail security). Hayward-Turton concludes, “Whilst there is no precedent in modern times for the global situation we are facing, there are tried and tested tools, techniques and methodologies that every organisation can put in place today that will help.”
Quantum Corp. announced new product lines and capabilities which significantly expand its video surveillance and physical security product portfolio. The offerings include a new line of network video recording servers, and a new line of servers for building management systems and GPU-based video analytics. In addition, Quantum added new capabilities for the VS-HCI Series which the company launched in 2019 to provide hyperconverged infrastructure (HCI) for surveillance recording, video management, and building operations. These expanded product offerings add to Quantum’s existing solutions for shared archive storage for surveillance, based on its StorNext file system and the recently-announced acquisition of the ActiveScale object storage solutions. The result is one of the broadest security infrastructure solution portfolios available from any single vendor. Quantum VST mini-tower NVRs Quantum’s VST mini-tower NVRs are designed to support the surveillance of retail stores Quantum’s new line of Network Video Recording (NVR) servers complement the company’s VS-HCI Series are offered in both mini-tower and rack-mounted form factors to provide customers with a range of affordable, reliable, and high-performance options for surveillance recording and video management. Quantum’s VST mini-tower NVRs are designed to support the surveillance of retail stores, gas stations, small buildings and campuses, and other small implementations, while Quantum’s VS4160 NVR is one of the most dense and highest capacity NVRs available for environments with large retention requirements. VS2108-A analytics server To support the extreme graphics processing and parallel workload demands of video analytics, Quantum has introduced the VS2108-A analytics server. The VS2108-A can be configured with up to six GPUs in a compact 2U chassis, and will accelerate results with video analytics software platforms. For access control and building management applications that require a highly-available architecture, Quantum is introducing a new highly-available application server, the VS1110-A. Quantum’s new VS1110-A Enterprise application server utilises the same virtual machine (VM) failover capability found in Quantum’s VS-HCI series. Like the VS-HCI series, the VS1110-A server can be monitored remotely via a secure web-based portal, enabling facilities managers, integrators and Quantum support to proactively monitor this system anytime, anywhere. Cloud-connected VS-HCI Series The Quantum VS-HCI series provides hyperconverged infrastructure for surveillance recording Quantum has enhanced the capabilities of the VS-HCI series with secure, remote monitoring via a web-based portal. The Quantum VS-HCI series provides hyperconverged infrastructure for surveillance recording, video management, and building operations. The highly-available architecture scales out as video camera counts increase, and makes it easy to manage operations by running multiple physical security workloads on a single platform. Quantum recently announced that it had completed the acquisition of the ActiveScale object storage business from Western Digital. Object storage can be used as a tier for multi-petabyte surveillance infrastructure. Video is typically captured and recorded on higher-performance servers, then archived on object storage-based systems. The combination of Quantum’s StorNext file system and ActiveScale object storage can be a valuable solution for shared archive storage in many surveillance environments. Comprehensive surveillance storage portfolio We’ve applied our years of expertise to build a comprehensive surveillance storage portfolio" “Video surveillance cameras are now the leading data generator on the planet, and like other video use cases, high-speed capture and processing are critically important,” said Jamie Lerner, President and CEO Quantum. “We’ve applied our years of expertise to build a comprehensive storage portfolio for surveillance, we are responding quickly to the needs of this market, and we continue to bring new product offerings to market at a rapid pace.” “Anixter’s customers are on the front line of change in the surveillance industry, and as video surveillance technology has evolved it has placed unprecedented strain on storage,” said Anixter. “Customers who adopt intelligent, scalable storage as the foundation of their new surveillance and security system leave more budget for cameras, analytics, and other tools dedicated to protecting people and property.”
Hanwha Techwin has introduced Wisenet Retail Insight 2.0, a business intelligence application which enables retailers to gain a greater understanding of customer behaviour and buying patterns. Wisenet Retail Insight 2.0 utilises people counting, heat mapping and queue management applications running on board selected Wisenet Q and Wisenet X fixed lens and fisheye cameras to display statistical analytics on a centralised dashboard, along with other practical information such as weather reports. Cloud-based business intelligence Accessed from anywhere on the network, Wisenet Retail Insight 2.0 is a web-based application which consolidates the data captured by the three analytics applications running on up to 500 Wisenet Q or X series cameras and presents it on a customisable dashboard. With profitability under threat, retailers are looking at ways to improve productivity Retailers are able to take advantage of the captured data to measure the impact of advertising, online promotions and other marketing activities on the number of people who enter their stores, as well as making the best use of human resources in order to manage the peaks and troughs of customer flow at checkouts. Customisable dashboards “With revenues and profitability under threat, retailers are understandably looking at ways to improve productivity,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “In terms of the business intelligence which could be made available to operations, marketing, merchandising and store management, the metadata traditionally extracted from Electronic Point of Sale (EPOS) systems is unlikely to be sufficient for retailers to identify opportunities to increase productivity or improve the customer experience.” Wisenet Retail Insight 2.0 generates reports in a variety of formats including PDF, Excel, CSV or HTML, whilst with the help of five customisable tabbed screens, users are able to view real-time updates on a wide range of activity, including the number of store visitors for any particular time of day or accumulatively over a specified period of time, as well as data on queue congestion times and heat mapping information showing the busiest areas of a store.
Focused on Revenue, Knowledge and Branding, whether its profitable new cloud services, specialist ‘how to’ training or simply making a company stand out from the competition, GAP has what a business needs for success. Pyronix has launched their ‘GAP’ initiative, in an effort to help installers and their businesses grow, by working smarter and building their brand. Key areas Providing free tools to make an installer’s business grow faster, GAP focuses on taking a smarter approach to business performance, identifying three key areas: Revenue - ‘Not all clouds are grey’ With an emphasis on providing superior tools for installers, in order to develop and grow their business, with offerings including PyronixCloud, an evolving product range, and additional value-added services; there’s something that all installers can benefit from with GAP. Built with businesses in mind, Pyronix can help installers grow and excel. Knowledge - ‘Knowledge is Power’ Pyronix believes knowledge within the industry is key to being a leader, which is why they devised a knowledge-focused branch of GAP. Focusing on installation and product knowledge, and how installers can gain and use this to their advantage. Enabling them to accelerate ahead of the competition and be the best. Brand - ‘Make Yourself Famous’ GAP guides installers by providing brand focused tools and tricks, to make their brand stand out. Encouraging installers to look at customised products and sales tools, GAP will soon also introduce the new Pyronix Personal Print Portal. Providing a one-stop solution for designing and ordering promotional materials, Pyronix is set to demonstrate the importance of an installer’s brand and presence within the market. Helping installers grow business Laurence Kenny, Pyronix Marketing Manager commented, “This new initiative highlights the additional commitment Pyronix wants to make to installers. We want to help them grow their business and thrive within the industry.” We feel that this is a really positive step towards helping installers of Pyronix intruder systems" “This initiative is flexible and built with several interchangeable drivers, all designed to suit an installer’s business needs, whether they’re an experienced installer or just starting out.” Brand marketing tools He continued, “We feel that this is a really positive step towards helping installers of Pyronix intruder systems, guiding them through multiple aspects for business success, including recurring revenue business models, branding and training elements within their business. This initiative will provide practical tools installers need, to help them go that little bit further and realise their potential.” “We’re very excited to see the uptake in GAP and showcase our revenue, knowledge and brand marketing tools, providing the best platform to both new and existing installer businesses within the industry.” For any installers who would like to develop their brand and business, GAP has the needed tools.
Arcules, innovators in integrated video and access control cloud services, announces the appointment of Bruce Nisbet as Senior Director of Sales. In this role, Nisbet will help guide the regional sales teams and develop strategic initiatives for expanding the reach of the company’s cloud-based services in key markets. With more than 30 years of security, video surveillance, sales and management experience, Nisbet has executed successful sales strategies and business development initiatives for solutions and services across the IP video surveillance, Internet of Things (IoT) and video management markets. Security and business optimisation Bruce brings significant experience that will help expand the company’s channel program" Nisbet joins Arcules from Hanwha Techwin America, where he was instrumental in driving sales planning and management. His proven ability to manage diverse sales teams at 3VR, Schneider Electric and Pelco will be a valuable asset as Arcules expands the reach of cloud-based services across the industry. “Bruce brings significant experience that will help expand the company’s channel program and go-to-market strategy while leading our sales teams to create new opportunities for revenue,” said Nigel Waterton, Chief Revenue Officer, Arcules. “Arcules continues to focus efforts on the next phase of the company’s growth, and identifying the talent and vision needed for this endeavor is crucial to that goal. We look forward to the impact Bruce will have on Arcules’ ability to address evolving customer needs for security and business optimisation.” Growing list of customers With significant growth in customer deployments around the world, such as the recent announcement of its work with WeWork, Arcules has also made several additions to its regional sales and product management teams, designed to expand engineering, sales and service capabilities to its growing list of customers and integrator partners. Before joining Arcules, Prakash held the roles of Vice President of Product and Director Morgan Prakash has been named Director of Product Management and is responsible for overseeing the company’s product development and coordinating the activities of the marketing, sales and customer support teams for product launches and updates. Before joining Arcules, Prakash held the roles of Vice President of Product and Director of Product Strategy for Raintree Systems and was Senior Product Manager for Kareo. Addition of strategic product management Arcules also boosted its sales team with the addition of four regional sales managers who have extensive experience in security and IT markets: Julie McGregor, Northwest; Tom Buettgen, Midwest; Emmett Rooney, Southeast; Breanne Menees, Southwest; and Nick Gega, New York City/Northeast. Additionally, Aaron Newman was promoted from sales engineer to regional sales manager, East. “As Arcules works to educate the market on the benefits that the cloud provides to enterprises and provide an alternative to costly on-premise-only solutions, the addition of strategic product management and sales team members helps us to achieve this goal,” said Andreas Pettersson, CEO, Arcules. “We are eager to have the opportunity to leverage the years of experience that our sales team brings to the organisation as we look toward providing our cloud services to more global companies. Building a smarter, more secure world through the delivery of cloud services is our primary goal.”
Digital Monitoring Products, Inc. has announced extending their partnership with Digital Watchdog with the integration between Digital Watchdog’s flagship DW Spectrum Video Management Software and Digital Monitoring Products’ (DMP) Virtual Keypad. DW Spectrum VMS – Virtual Keypad Customers can now use DW Spectrum VMS software through their Virtual Keypad app or VirtualKeypad.com. Whenever they receive a notification from their DMP panel, customers will be able to view all of their connected cameras and video playback, all with one interface. Having just one interface to view all of their connected cameras and manage their security systems is a great convenience to the customers. To enable this new feature, customers will need to select Digital Watchdog from the list of video options in Dealer Admin or the Tech APP. Depending on how the customers prefer using DW Spectrum VMS solution; they can set it up to either use the DW Spectrum server or the DW Cloud. IP VMS solution with on-board video analytics Whether the customers prefer the Cloud- or server-managed platform, this integration delivers an easy-to-use and fully featured IP video management software solution with on-board video analytics that users are sure to find very useful. DW Spectrum is a powerful software solution, opening up more new installation opportunities for dealers. “Digital Watchdog is a respected leader in the industry, and we’re pleased to expand our partnership,” says Mark Hillenburg, Vice President of Marketing for Digital Monitoring Products, Inc. (DMP). Mark further adds, “With the DW Spectrum integration, we’re able to give our mutual customers a greater level of convenience than they’ve had before.” Virtual Keypad app and Tech APP updates are available for download, free of charge, from the Google Play Store and the App Store.
Morphean’s CEO, Rodrigue Zbinden, explores the benefits of hosted video surveillance and access control, and what the growing interest from the IT community might mean for the physical security sector. Digital transformation continues to have an impact on every industry. In the physical security sphere, traditional CCTV and access control systems that once sat outside the connected world, are being replaced by their intelligent, cloud-enabled equivalents. The tired stand-alone legacy solutions of the past are increasingly being overhauled in favour of the smarter, customisable and scalable digital versions of these technologies. The question then is this: does this represent a new horizon for the physical security industry, or is it an existential threat in the form of a land-grab from the IT sector? Digital transformation continues to have an impact on every industry As the tectonic plates, as represented by the physical security and IT industries, continue to converge, it is clear that the underlying responsibility for physical security systems will be questioned. Conscious of the rapidly growing adoption of IoT devices, such as a surveillance camera, and their connection to IT networks and hosted data centres, Morphean commissioned an independent survey into the attitudes and behaviours of 1000 IT decision makers across the UK and Europe. We wanted to gain a better understanding of purchasing intent for evolving security provision in the 2020s. Landscape Report: Hosted Security adoption in Europe Our results revealed that as many as 84% of IT managers are currently using, or considering using, cloud-based video surveillance (VSaaS) or access control (ACaaS) systems. This points to an appreciation of the convergence of the physical and cyber security realms, and a willingness to embrace the merging of physical devices, connected through the IoT, with existing IT and cloud infrastructure. Of those considering such solutions, nearly 8 in 10 respondents said that integration with existing platforms or emerging technologies would also accelerate VSaaS and ACaaS adoption. The growing confidence in cloud seems to translate into more positive purchasing intentions around hosted security solutions with 77% of IT managers reporting that physical security is not currently optimised and one in five identifying it as a priority for 2020. Of those considering hosted security solutions, 4 in 5 (79%) anticipate introducing them to their business within a year. Our survey also revealed that 36% of IT managers identified operational performance as a priority for improvement within the next year. When we consider the many aspects of operational performance, productivity will always be a key measure, and cloud facilitates leaner decision-making, being more adaptable to the changing business landscape as required. Business application: unlocking intelligence Cloud-enabled physical security has much potential beyond security Cloud-enabled physical security has much potential beyond security. The data collected by network cameras and other physical security devices, combined with other sources of intelligence, can be used for a multitude of different purposes. For example, real-time analysis of visitor numbers, gender and age demographic in a retail store could be cross-referenced with promotional campaigns to gauge effectiveness, or used to identify insights into customer behaviour patterns, such as hot and cold zones. The same platform might ‘learn’ to predict the behaviours that cause queue build-ups, and trigger alerts more readily to advise management that more till staff are needed. In the transportation industry, intelligent analytics can be used to improve operations across a small fleet of vehicles or an entire transport hub. Cameras and sensors can be integrated on board buses and trains to provide instant images and video footage to control centre personnel, while proactive intruder and loitering alarms employed at busy stations and depots, can deter suspected troublemakers before an incident occurs. People counting technology provides insights which can be used to increase or decrease security provision according to the amount of footfall, or to predict when additional turnstiles should be opened to more effectively manage queuing customers. The existential threat For the IT security professional already working with cloud systems and services, the growth in connected digital devices through the IoT is resulting in a growing appetite for physical security, such as network cameras, to enhance existing IT systems and assist business intelligence gathering. And, it is perhaps because of its digital DNA that the IT department is increasingly responsible for physical security purchasing decisions, a relationship historically managed by the fire and security professional who has been slow to adopt digital transformation practices and cloud-based business models. But we know there is an opportunity for the physical security provider because the IT manager who is well versed in computing protocols may have scant knowledge around maximising the full potential of physical security systems. The challenge is that IT will already have an existing relationship with their own IT solution providers, to whom they may naturally turn to help them with their physical security requirements. It is imperative, therefore, that the physical security provider of today becomes well versed in not only cybersecurity principles but is also able to speak the language of IT in order to successfully compete. The challenge is that IT will already have an existing relationship with their own IT solution providers Establishing partnerships One approach, given the nature of the shifting security landscape, is for IT and physical security vendors to unite in the delivery of a mutually beneficial and overarching solution. This would enable them to pull together their combined expertise to not only offer comprehensive protection of software and systems from a cybersecurity standpoint, but also take care of access control, perimeter protection, surveillance and all aspects of physical security too. For the IT manager, confident about the security of their cloud provision and committed to optimising physical security within their business, the bringing together of physical and cybersecurity solutions, provided by IT and physical security providers who speak the same language, can only be beneficial, enabling them to meet all of their security requirements. As the threat, both cyber and physical, continues to evolve, vendor partnerships and a joined up strategic approach could well prove to be the best line of defense for today’s businesses.
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change programme, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programmes continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with access As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessto valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasise the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programmes. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programmes.
How can security system integrators not just survive but thrive in today’s IT-led market? The key seems to be in training. As increasingly more clients look to integrate access control with IT environments, they want integrators with the specialist skills to achieve this. For integrators that don’t invest in training, the risk is being left behind. Because many security system integrators aren’t providing specialist IT support, manufacturers are now offering services to make implementations and integrations easier. This isn’t a scalable or desirable option for many manufacturers though, they don’t want to become integrators. The result? Manufacturers will be pushed into developing products that can be integrated with IT networks off the shelf. And this isn’t necessarily the best option for end user, manufacturer or integrator. With a growing number of cloud-based security solutions, integrators also face the threat of clients opting for installation-only services. How security system integrators can survive and thrive today It’s not all doom and gloom for security system integrators though. To avoid becoming redundant, or being downgraded to simple access control installers, there’s lots you can do to strengthen your position. Listen carefully Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experienceOne of the first ways you can distinguish yourself from your competitors is by really listening to what your clients want and need. You can then translate this into a security or access control application tailored carefully to them. Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience and product knowledge. It’s far superior to carrying out a standard implementation, which can leave clients feeling they’ve not been listened to or given good value. Up your IT knowledge TCP/IP has become the standard for communication between devices and central server applications in access control and security in general. So every technician now needs to know how to connect IP devices to networks and configure them in the central application. This is only the tip of the iceberg though, there’s so much more that integrators now need to be proficient in when it comes to IT. From understanding a client’s WAN, LAN and VPN networks to back-up systems, encryption technologies, key management and transparent communication. It’s also important to know how to integrate applications at server level, whether you’re integrating two or more security systems or a HR database. Most integrators have begun to invest in one or two IT experts, but this usually isn’t enough to meet clients’ needs. To really stay ahead, it’s crucial to invest more heavily in IT training and expertise. Choose your portfolio carefully When considering your portfolio, ensure you check the background of each product’s manufacturer Ideally, your portfolio should be small but rich, which is more difficult than it sounds. Choosing products that will scale easily is complex, and you need to consider the potential for increased functionality or connectivity as well as scalability. When considering your portfolio, make sure you check the background and outlook of each product’s manufacturer. You don’t want to select items that are likely to be discontinued in the near future, which can often happen after a manufacturer is acquired, for example. Get in the cloud In the security market, the mid and low segments are already shifting to cloud-based solutions that need neither integration nor IT skills. This leaves you with opportunities for just installation and maintenance services, where profit opportunities are reduced. An alternative is to begin selling cloud-based security services yourself to help you attract and retain clients for the long-term. Give clients added commercial value As competition increases and budgets shrink, offering added value, to new and existing clients, is a vital way to differentiate your business. This will help you to not just defend against competitors but to grow your business and increase your profitability. Configuring access control reports for clients is just one example. It’s relatively straightforward to do but provides really valuable insight into visitor flow. This can then enable them to, for example, staff reception adequately and provide sufficient catering, which all improves the experience for visitors and employees. Providing this kind of consultative service, instantly pushes you up the value chain. Stay agile and well informed To survive and grow as a security system integrator today, the upshot is that it’s crucial to keep pace with the market’s ever-changing trends, technology and client needs. And, to make sure you’re ready to adapt and give clients the services they want, it’s vital to give your people the in-depth training they need.
Even though ISC West 2020 was cancelled, many of the product introductions planned for the trade show still happened. For example, physical security and secure identification company Identiv introduced the Hirsch Velocity Cirrus and MobilisID. Hirsch Velocity Cirrus is a cloud-based Access Control as a Service (ACaaS) solution. It is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. Smart mobile physical access control solution Identiv’s MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. We caught up with Jason Spielfogel, Identiv’s Director of Product Management, to discuss the new products and other topics. Q: How is Identiv positioned in the market as a whole? What philosophy drives your product offerings? What vertical markets do you target? Every customer needs every one of these components Spielfogel: Identiv provides a total solution. Our platforms provide access control hardware and software, video surveillance and analytics, door access readers, and ID credentials, both cards and mobile, for a variety of vertical markets: Federal government, state, local and education government agencies (SLED), healthcare, schools, banks/financial services, retail, airports and transportation, and infrastructure. Every customer needs every one of these components in every physical security deployment, and we ensure that all parts are working together at all times, even as technology continues to evolve. With that said, our philosophy is very customer-centric, and we position ourselves as a trusted partner. Our products and technology platform always strive to reflect and anticipate the environment our customers are facing, both in terms of technical requirements and functional capabilities. Q: How does the MobilisID system eliminate "friction?" Spielfogel: Identiv’s MobilisID eliminates the “friction” of access control by forgiving the user from presenting a physical credential to the reader. A simple wave of their hand over the MobilisID reader establishes a connection, and the reader reads their mobile device’s credential from the MobilisID app. No badge or access card to read, and no contact with the reader, makes this a frictionless access control experience. Administrative friction is also eliminated because there is no physical credential to issue or withdraw; it’s all done via the MobilisID Manager. Q: Discuss the advantages of Bluetooth over competing technologies. Bluetooth offers a blend of reliability and specificity Spielfogel: There are two primary competing technologies: WiFi and Near Field Communication (NFC). The problem with WiFi is that it’s not location-specific. In other words, the WiFi router can’t tell which door the user is near. NFC has the opposite problem in that it’s impossible to get credential reads unless the phone is presented within an inch or two of the reader. Bluetooth offers a blend of reliability and specificity to create frictionless access. Q: "Touchless" has always been a big selling point. Doesn't the coronavirus improve the outlook for these systems even more? Spielfogel: The coronavirus certainly highlights the value of frictionless access. But the vast majority of access systems today use proximity which was already touchless. But for systems using touchpads or contact-based credentialing, certainly frictionless is offering some alternatives that would help keep employees and visitors safer in the current climate. Q: How else might the current pandemic change the security market forever (i.e., more teleworking?) Spielfogel: Permanent changes are not likely, but it does force security directors to rethink how their employees interact physically with systems for both physical and logical access. As a result, we might see accelerated adoption of some emerging technologies, such as greater use of mobile logical access solutions, as well as frictionless physical access control. We’ve already seen an uptick in our smart card reader and token line and our Thursby enterprise and personal mobility offering during the coronavirus pandemic. Q: There are a lot of cloud systems in the access control space. How is your Cirrus cloud product different? Velocity already has all those features Spielfogel: Cirrus is different from many others in that it’s built on one of the most mature, feature-rich, secure physical access solutions available today – Hirsch hardware and Velocity Software. While many competitors are scrambling to add features to their relatively new ACaaS platforms, Velocity already has all those features. While they are building up their encryption capabilities and cybersecurity testing, we’ve already been doing that for two decades. We certainly have some more development ahead of us for Cirrus, but most of it is just surfacing features we already have into the Cirrus interface. Q: How do you guide customers as their needs change? Spielfogel: Whether users want solutions that are on-prem, in the cloud, or anything in between, Identiv’s full architecture ensures that customers can adopt and migrate to new solutions as they see fit. No two customers are alike, so providing the flexibility to gradually update or change systems is a real differentiator. Our competitors either want customers to jump all at once to the cloud or push to keep everything on-prem/legacy. CSOs and CISOs live in a different world: they've got it all to deal with. We're there with them across all of it, because that's the true reality.
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighbourhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighbourhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customised central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organisations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organisation’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetise the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organisation. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organisations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organisations, not technology. If we truly understand the risks to the organisation, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organisations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organisations.
Link11, renowned European firm in the field of cyber-resilience and cyber security, is offering its DDoS protection solutions free of charge to public sector health, government and public education organisations during the highly contagious phase of COVID-19. Public sector organisations are particularly vulnerable to cyber-attacks, and the availability of critical public infrastructures is more important than ever as people look for genuine sources of information related to the virus outbreak. Remote working policies Governments all over the world have taken necessary actions to lower COVID-19’s spreading curve, including implementing remote working policies, resulting in significant growth in internet traffic, leading to an increased risk of social engineering, business email compromise, ransomware and DDoS attacks. According to Link11’s research, during the three-week period Monday 17 February to Monday 9 March, Link11’s Security Operation Center (LSOC) defended 20,349 minutes of attacks (over 2,860 hours), which is more than 30% up compared to the 15,612 minutes of attacks mitigated during the same period in 2019. Link11 Cloud Protection Platform Marc Wilczek, Chief Operations Officer (COO) of Link11 said, “It takes only a small effort these days to overload servers and online services, and organisations need to protect their infrastructures. To help them deal with the evolving threat landscape, Link11 is offering government, public health and education organisations a solution that proactively identifies, blocks, and mitigates DDoS attacks within the Link11 Cloud Protection Platform, free of charge until September 2020.” Link11’s integrated Cloud Security Platform ensures cyber-resilience of the entire IT infrastructureOn Sunday 15 March, the U.S. Department of Health and Human Services (HHS) suffered a cyber-attack, designed to slow the agency’s services amid the government’s rollout of a response to coronavirus, with the aim of overloading HHS servers. Officials assume a hostile foreign actor was behind this campaign. Cloud-based DDoS protection Traditional on-premise DDoS defenses, which are still widely used, and load-balancing products, are not able to protect individual websites, APIs or cloud applications against Layer-7 attacks, as these malicious data tsunamis can create big damage with little total bandwidth, bringing everything to a standstill instantly. Cloud-based DDoS protection, such as Link11’s integrated Cloud Security Platform, uses artificial intelligence, machine learning, strict automation and real-time analytics to ensure cyber-resilience of the entire IT infrastructure and application landscape supporting hybrid as well as cloud-native deployments.
Doncaster Culture and Leisure Trust (DCLT) is a registered charity delivering premier leisure provision venues across Doncaster. DCLT offers a diverse range of health, fitness, leisure, and entertainment activities to customers to help to achieve a healthier community across Doncaster. DCLT’s premier venue, The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Alongside interfacing the onsite gym membership system to enable a single source of data to populate the access control and automate the process, the Trust was also in a transition period of moving members from barcode to RFID badges. Advanced fast-acting swing speed gates Moreover, the entrance to The Fitness Village gym was also under renovation. The access control system would also need to feature advanced fast-acting swing speed gates and slim lanes. Advanced user obstacle protection also had to be kept in consideration to keep members safe during peak times when there would be a high level of footfall from visitors. Solutions Provided: Oliver Law Security (OLS) did not hesitate to recommend the Vanderbilt ACT365 system. ACT365 is not only a fully cloud-based product; it offers a flexible solution for installation and management that OLS identified as a key ingredient to meet DCLT’s project brief. In addition to DCLT’s security requirement, OLS also realised ACT365 as an ideal solution for this task, given the product’s very focused API integration. Thanks to the ACT365 interface, OLS was able to integrate DCLT’s gym management system to enable single-source data to be used to populate the access control system, keep records up-to-date, and enhance customer experience. For instance, previously, the older system had taken up to 3-5 seconds to validate members and open the entry turnstiles. Once the API interface had been achieved, this validation is now done instantly through ACT365 and allows members with active memberships through the entry points without any minimal delay. The scope of this project, although not significant in the number of doors, was a very technical project with integration into SQL server and a third-party membership system with the potential for thousands of would-be users. Key Highlights: According to OLS, using ACT365 and its API interface is a game-changer for this type of project. With multiple updates per day, the access control system is always fully populated with the correct, validated members ensuring DCLT’s premier venue, The Dome, is protected against memberships that have lapsed. The system is very user-friendly and can grow with DCLT’s plan for the future, and adding further developed integration for other areas within the near future. The system is entirely cloud-based offers an off-premise solution with no additional new servers required or PC’s running software. Through the ACT365 app, DCLT’s site administrators can manage the system for staff. The solution that OLS has implemented has removed the need for old, antiquated technologies and moved DCLT’s security system forward to the cloud and future-proof solutions. The beauty of the interface is once the schedule runs, all information is autonomously sent to the ACT365 database, meaning adding new memberships, updating memberships, or revoking access is seamless, not tying up staff verifying and administering the membership/access control systems respectively.
The Government of Jersey has appointed SureCloud to manage its government-wide cyber security transformation programme, which aims to maintain the reputation of Jersey as a safe place to work and live. The new two-year deal forms part of the government’s Cyber Security Strategy, announced in 2017, to enhance its cyber resilience during its period of modernisation. Cyber Security Strategy The Government of Jersey provides key operational services to more than 106,000 citizens and 7,000 businesses in Jersey. All of its services, including tax, healthcare, waste management, social services and education, depend on the security and availability of IT and Operational Technology (OT) systems. The financial services and tourism industries also heavily rely on the availability and security of the government’s services. Cyber Security Programme Management Service SureCloud to deliver a Cyber Security Programme Management Service, includes establishing governance SureCloud will deliver a Cyber Security Programme Management Service which includes establishing governance and reporting processes for all elements of the government’s cyber security programme. This will involve providing risk and issue management, programme governance, information security processes as well as financial, quality and information management. It will also coordinate, lead and communicate business change across cyber security projects. This will be led by a dedicated Programme Director who will proactively manage the day-to-day management of the government’s cyber security programme and proactively monitor overall progress, as well as resolving any risks and issues that may arise. Cyber Security solutions “The Government of Jersey wants the island to remain a stable and attractive place to live and do business, in both the physical and digital world,” comments Ben Jepson, Vice President of Risk Advisory at SureCloud. “Cyber security is a prerequisite for this, which is why the government is investing in this cyber security programme. With our experience, knowledge and hands-on team, we are confident we can help them enhance their cyber security and move their transformation programme forwards.” The Cyber Security Programme Management Service, which launches on 3rd March, will be delivered in two 12-month tranches. The first is split into six distinct projects: Programme Management, Managed Security Service Provider (MSSP), Governance Improvement, Identity and Access Management, Asset Management and People Security. The second includes preparing for, and developing, procurement documentation for tranche two projects. Cyber Security expert Stuart Powell, CISO at Government of Jersey, concludes, “As we embark on a period of extensive change and modernisation, cyber security is a critical enabler for delivering government services to the citizens and businesses of Jersey. We were impressed with SureCloud’s offering for improving our cyber security capability in quality and scale as well as their Programme Director who we are looking forward to working with.”
Openpath, a provider of modern mobile access control, is announcing a partnership with Lincoln Property Company (LPC), one of the diversified real estate service firms in the United States. Openpath has been selected as LPC’s technology partner to standardise and bring best-in-class technology solutions across its current portfolio and planned developments of commercial spaces. Openpath’s platform focuses on integrated technology to provide frictionless mobile access and scalable cloud-based solutions that can also integrate with legacy systems. This collaboration future-proofs LPC’s security offerings for modern commercial development. The partnership marks a shift in the commercial real estate market, as operators and tenants demand technology-capable properties that provide ease, efficiency and advancement to address high-risk security challenges. Already deployed in a number of LPC’s Los Angeles properties, Openpath will continue to outfit buildings across the country, providing state-of-the-art, personalised security plans and solutions for individually customised building needs. Integrated security solution LPC is one of the ten largest commercial property developers in the nation, managing or leasing over 403 million square feet and $76 billion in assets. As the first developer to choose an access control and technology partner, LPC is now leading the charge for tenant experience and innovation. With the built world becoming more technology-reliant, an integrated security solution is critical to making an environment attractive for LPC’s tenants and employees. This partnership provides a future-proofed solution for LPC properties, as Openpath’s cloud access control technology provides a standardised solution that can be integrated across LPC’s current and future technology needs. In addition to mobile access control, Openpath offers LPC buildings a broad range of first-to-market services including Lockdown and Tailgating Prevention to address current workplace security concerns. While required integrations will continue to evolve, Openpath and LPC’s strategic relationship enhances and ensures the property's attractiveness years down the line. Customisation capabilities “This partnership provides an opportunity for us to continue to develop and personalise our solutions tailored towards Lincoln Property Company’s unique portfolio of commercial spaces,” said James Segil, co-founder and President of Openpath. LPC is focusing on the future of how we integrate better solutions" “Our mobile platform provides necessary customisation capabilities while giving LPC’s tenants the freedom of control in their daily security. LPC is focusing on the future of how we integrate better solutions and we’re excited to see this next stage of development as we continue to design products that meet evolving property needs.” “Our goal is to ensure that every building provides the highest quality experience for our tenants,” said Eric Roseman, VP of Innovation & Technology Ventures, Lincoln Property Company. “We are excited to be the first major real estate firm to partner with Openpath to bring this technology to a nationwide commercial portfolio, and to spearhead the movement of tenant experience by providing our buildings with state-of-the-art security and mobile access control.”
SALTO Systems has been selected to provide a smart access control solution for Venture X, a modern workspace community located in Chiswick Park, West London. This business hub, with great transport links into Central London and Heathrow Airport is home to some of the best companies working in the oil and gas, media, entertainment, technology, food and drink, and health and beauty markets. It comprises 1.8 million sq. ft of award winning accommodation, arranged as a necklace of 12 office buildings. Each building faces the Park's 'inner garden' with a featured two-tier lake, waterfall, decked boardwalk, pathways, events space and landscaping. Chiswick Park also houses over 45,000 sq. ft of retail including the on-site Virgin Active gym, restaurants, convenience stores and an ever-changing array of pop-up traders and street-food vendors. Cutting edge sustainable building development Hot desks offer 24/7 access to common working areas (hubs) including phone booths and high speed Wi-Fi Part of the globally renowned, Venture X United Franchise Group, Venture X provides a brand new inspiring, diverse, and collaborative working environment that is so much more than just shared office space. Housed in a cutting edge sustainable building development, which includes solar fins, it offers a place where individuals and businesses can lease hot desks, private desks or private offices. Hot desks offer 24/7 access to common working areas (hubs) including phone booths and high speed Wi-Fi. Private desks add a Cat 6 Ethernet port, meeting and board room access, a business address with incoming mail handling, lockable office space and a private locker. Private offices top the package by proving all the previous offerings but in a fully furnished office space including SALTO access control. Modern locking solution With some 30 internal office and meeting room doors to secure, Venture X was looking for a technologically modern locking solution that would satisfy the needs of both the business and its customers. Key requirements were the ability to grant access rights instantly for new customers and revoke them in real-time for former customers. No hassle, costs or security issues with mechanical keys were wanted. They needed an audit-trail overview of who accessed which door at which time. Flexibility allocating office space, meeting rooms etc on a day to day basis as required. Easy meeting and conference room access, and finally, easy, wire-free installation without software installation and IT configuration. SALTO KS Keys as a Service cloud locking To meet these needs, SALTO’s KS ‘Keys as a Service’ cloud based locking solution was recommended. This provides a flexible access control management system that requires no software installation or the added expense of a fully-wired electronic product. All that is needed is an online device with an Internet connection. Providing end users with cloud-based SALTO KS Keys as a Service reduces cost and almost eliminates the need for maintenance. Highly secure, thanks to its 2-factor-authentication and 128 bit AES encryption; it provides flexibility, scalability, reliability, and the ability to manage access control from any Internet platform. Remote door locking solution One of the key need was a product that offered both a card and mobile app solution to remotely open doors" Venture X Director Andrew Ross comments “When you’re providing a working and meeting environment for entrepreneurs, and business people and large corporates, many of whom will be involved with technology businesses, security, efficiency and design were all essential aspects of the brief when we selected our preferred access control solution”. He adds, “One of their key requirements was a product that offered both a card and mobile app solution that would enable the members to remotely open doors, i.e. for customers, tradespersons or postal deliveries to gain access for example without the need for a staff member to be physically present in the building." Electronic access control Ross added, “Another feature wanted was office mode, so instead of having to present an access card or smart phone app to a door every time someone used it, the door would function just like a normal door during pre-set times but auto lock when required." Andrew further said, “The SALTO KS now installed meets those requirements and gives comprehensive 24/7 access control that covers our entire property. They are looking forward to utilising SALTO KS across the new Venture X locations that are in development for 2020 and 2021.”
C-TEC’s powerful new Quantec Surveyor2 Cloud-based data management software has been installed at Croft House Care Home in Yorkshire. With its capacity to generate reports on busiest shifts, call response times, most frequently visited rooms and more, the owners and managers of the facility, Victoria and Giles Bateman say that Surveyor2 has revolutionised operations at their family-run residential care home, recently rated outstanding in care by the Care Quality Commission (CQC). Covering different time periods Said Victoria Bateman: “Providing outstanding care is fundamental to our core values and we are constantly asking for feedback from our residents. One area we identified as being vital to our residents feeling safe in their environment is their use of our Quantec addressable call system. The ability to make a call to a carer for help and be responded to in a timely fashion is very important to them and therefore very important to us too.” We’ve been able to monitor and analyse the use of our call system on a daily, weekly and monthly basis" “Since Surveyor2 was installed, we’ve been able to monitor and analyse the use of our call system on a daily, weekly and monthly basis. We can print a variety of reports, covering different time periods, so we can see which of our 29 residents are calling, at what times of the day and, most importantly, our response times to those calls. We can also see, via the user dashboard, all live call system activity so we are aware of any potential issues before they become a problem.” Secure cloud-based system “Minimum and maximum response times have been set for each type of call, via the KPI (Key Performance Indicator) settings facility, to allow us to pinpoint where we need extra staff at busy times or identify areas where further training is required. We can also see which residents require more time, again allowing us to plan and allocate staff in the most effective way.” “Reports highlighting how often individual residents call has helped us identify times when they feel more anxious and we have been able to address those concerns.” A secure Cloud-based system, Surveyor2 also allows email notifications to be sent to Croft House’s management team so they can monitor response times when not on site. Recognising areas of improvement As the system has remote access capabilities and displays ‘real-time’, call, reset and room occupancy information, the senior member of staff on shift can view the status of all current calls and respond accordingly if a call is taking too long to be answered. Our staff are all aware that we monitor response times and that they are accountable for their actions" Says Giles Bateman: “Our staff are all aware that we monitor response times and that they are accountable for their actions. Teams and different shifts are rewarded for excellent response times and areas of improvement recognised. Overall the system allows us to feel confident that our residents are receiving timely help when they ask for it.” Easy-to-use addressable call system Says Kelly Flaherty, Deputy Manager at the home: “Surveyor2 has proved invaluable to us in reassuring patients, their relatives and regulatory authorities that we are delivering the highest standards of care and, during future inspections, will provide vital evidence that we are responsive, effective and caring, that all our residents are safe and that our facility is extremely well led and organised.” Surveyor2 is designed to work with Quantec, C-TEC’s powerful yet easy-to-use addressable call system. With its flexible call routing, multiple call levels and laptop programmable systems controller, the system can be tailored to suit the exact operational needs of any building.
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
The new year comes with new opportunities for the security industry, but what technologies will dominate our discussions in 2020? Topics such as artificial intelligence (AI) and HCI (hyperconverged infrastructure) became familiar in conversations during 2019, and they are likely to dominate our thoughts again in the new year. But other buzzwords are also gaining steam, such as “blockchain” and “frictionless access control.” Connectivity and the cloud will also be timely technology topics as the industry evolves. We asked this week’s Expert Panel Roundtable: What technology buzz will dominate the security industry in 2020?
RFID and smartphone readers in physical access controlDownload
Access control & intelligent vehicle screeningDownload
How plate reader technology increases your perimeter securityDownload
Genetec to host its first virtual tradeshow Connect’DX 2020 to connect with physical security professionals