Commercial security system
Bates Security, LLC, a commercial and residential security company based in Kentucky with a branch in Jacksonville, is happy to announce the recent acquisition of Absolute Protection Team from Roger and Karen Marcil of Vero Beach, Florida. Bates Security will be maintaining that location as its second in the state and fourth company branch overall. With the acquisition, Bates will be adding over 2,000 customers to its customer base. "Roger and Karen built a nice and successful company and we are...
Allegion UK, a pioneer in safety and security, has added the 286DL locking handle to its established range of Brio dual point locks for exterior folding applications. It is ideal for both residential and commercial facilities, joining other Brio accessories for the 286 dual point lock used on Weatherfold 4s and 5c. Designed to ‘suite’ with Brio 288 lever furniture, the 286DL locking handle has been specifically design engineered to secure timber and aluminium folding panels. The sing...
Fire and security specialist Amthal, has welcomed the third generation of the Allam family, to join the business under the company’s successful apprenticeship scheme. Luke Allam, son of founder and Operations Director John Allam, has started as an Apprentice Engineer, working closely with the team to progress seamlessly into the company strategy. Course in fire emergency, and security systems Says Luke: “Amthal has always been part of my life, and when the opportunity of work expe...
National Security Inspectorate (NSI), the UK’s third party certification body for the security and fire safety sectors, was a proud sponsor of the 2019 Women in Security Awards which took place on 12 September, recognising the significant contribution and achievements of women within the wider world of security. Organised by Professional Security Magazine and Patron, Una Riley, almost 250 security professionals gathered aboard the Dixie Queen riverboat on the River Thames to celebrate and...
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that it will unveil new headquarters in the City of London, in the autumn of 2019. The announcement follows a period of accelerated growth for Genetec in the United Kingdom, with a significant and sustained increase in EMEA revenues over the last five years. Some of the company’s flagship customers in the UK include the Royal Borough of Windsor and Maidenhead,...
Join the growing Viking Electronics community on YouTube, Facebook, Instagram, LinkedIn and Twitter to connect with other Viking Electronics fans and get the edge on all things Viking. “We recently held a contest for free Viking Electronics T-shirts that led up to the unveiling of our new mascot, Vin the Viking. It has been fun seeing the response and watching the community grow.” – John Hepokoski, Purchasing and Social Media. Viking Electronics engineers and manufactures over...
Pyronix is delighted to provide even more value and capabilities to installers and users alike, with the addition of video verification to ProControl+. Now, using our Enforcer V10 control panel, Wi-Fi cameras and security and life safety peripherals, the system can be tailored to detect, notify and verify any activity. “We’re really pleased to add this latest feature to our ProControl+ app,” said Pyronix Marketing Manager, Laurence Kenny. "Video verification delivers fantastic upsell opportunities to video monitoring for our installers, while providing greater functions for the user; showing them exactly what activity has triggered an event or alarm.” The addition of video verification enables the linkage of Pyronix Full-HD Wi-Fi cameras to inputs on the system via the PyronixCloud. This simple setup process adds greater scope to security; providing a 25 second video clip directly to the user via ProControl+ when an event or alarm activation occurs. The clip, which can be downloaded and stored as an MP4 file, shows 15 seconds pre-alarm and 10 seconds post-alarm; allowing the user to truly verify the activation, before taking appropriate action. Voice push notification Whether it’s an existing system or maintainance, service can be offered to provide greater selling options for installers" For example, should an intruder be detected by an XDL12TT-WE outdoor detector, a push or voice push notification will be received by the user through their ProControl+ app, via the Enforcer V10 and PyronixCloud infrastructure. If this detector has been linked to an outdoor Mini Dome camera surveying the area, the user will also be provided with the 25 second video from the linked camera to verify the alarm. “By adding this new feature, we’re giving installers new services to offer their customers; expanding the security offering by providing real tangible benefits across both residential and commercial applications to users,” Laurence commented. "So, whether it’s an existing system, a maintenance visit or a brand-new installation, this added-value service can be offered to provide greater selling options for the installer and greater functions for the user. Simple to setup and deliver via the PyronixCloud, we want to make sure we continue to proactively provide more features, functions and capabilities via ProControl+.” Video verification for applications With video verification already added to ProControl+, more developments are in the pipeline “Now, the system not only alerts the user via voice push notification, but also shows exactly what activity has taken place on the system, so that appropriate action can be taken. Our objective is to continue to extend the potential of every installation and the level of function and value it adds to installers and users alike and we intend to do this as seamlessly and easily as possible.” Linking cameras with inputs can be set up to deliver video verification for various applications across the entire security system, from setting and unsetting, indoor detection, shock sensors and outdoor detectors, to life safety sensors, door and window contacts and even panic, hold-up and medical alerts; providing additional product upsell opportunities. With video, voice push notifications and now video verification already added to ProControl+ and many more developments in the pipeline, now’s the time to make the switch.
ABP Technology, a value-add specialty distributor for IP technology solutions, has obtained the exclusive rights to distribute AlarmReady™ in the United States. AlarmReady is the first universal alarm system video verification solution designed to frictionlessly attach to any IP video surveillance system. “AlarmReady is an exciting opportunity for system integrators to deliver a video verification solution – for any alarm system users may have – that enables higher situational awareness, faster emergency response, and fewer false alarms,” said ABPTech CEO Robert Messer. AlarmReady is a cloud-based solution designed for commercial buildings or higher-end homes. Its first delivery will be for MOBOTIX camera systems as a FREE beta feature included with MxLINQ™ – the mobile universal viewer, alert, and control tool for MOBOTIX surveillance system end users. Immediate video access ActivitySensor technology helps eliminate false alarms and AlarmReady can quickly discern which cameras to show As soon as an alarm is activated at any monitored location the solution provides immediate video verification to users and owners or, if configured, to a compatible monitoring center. AlarmReady sends users alerts directly via phone, tablet, or computer and can send a text message to subscribed users to make sure the alarm is not missed. Users will see the location of the alarm as well as have immediate video access to the cameras on site that shows activity at that time. “AlarmReady together with decentralised intelligent MOBOTIX cameras and MxLINQ Cloud Access provides the highest situational awareness in the market,” said Messer. MOBOTIX-patented ActivitySensor technology helps eliminate false alarms and AlarmReady can quickly discern which cameras to show. MxLINQ, a cloud access solution for MOBOTIX, enables the user to immediately view and forward video footage to law enforcement – including a live-link by SMS or email – to the affected location. Powerful cloud-based platform AlarmReady is a flexible and powerful cloud-based platform that can be integrated with professional monitoring systems “People are nervous in alarm situations and AlarmReady simplifies this process and guides end users directly to the cameras they need to see,” said Messer. “AlarmReady provides additional situational awareness, user-friendliness, and overall simplicity of the system. Primary design factors give the end user as seamless an experience as possible.” AlarmReady can help prevent further harm or damage by enabling users to take a variety of actions via the MOBOTIX system. For example, users can play dissuasive Audio Messages. If set-up by a system integrator, users may also have access to turning on lights, locking doors, closing gates, or any other features on their IoT/surveillance system right then and there. This makes AlarmReady a flexible and powerful cloud-based platform that can be integrated with professional monitoring systems, offering end users and businesses a unique hybrid solution. Take a closer look at this exciting feature at the upcoming MOBOTIX Global Partner Conference in October in Mainz, Germany and Americas Partner Summit in January 2020.
A study from Exabeam, the Smarter SIEM™ company, revealed that more than one-third of security professionals' defensive blue teams fail to catch offensive red teams. The survey, conducted at Black Hat USA 2019, also showed that 68% find red team exercises more effective than blue team testing, and more companies are practising red over blue team testing. As cyberattacks become increasingly sophisticated and hack techniques become more highly targeted, organisations must learn how digital adversaries think to help identify gaps in their security programs. Organisations practicing red and blue exercises speak volumes about their dedication to fortifying their security posture Red teams consist of internal or hired external security professionals that emulate cybercriminals' behaviours and tactics and gauge the effectiveness of the company's current security technologies. Blue teams consist of the organisation's internal security personnel, tasked with stopping the simulated attacks. In these test scenarios, the blue team must react without preparation, to give the company the most realistic picture of its defensive capabilities. The study showed that 72% of respondent organisations conduct red team exercises, with 23% performing them monthly, 17% quarterly, 17% annually, and 15% bi-annually. Sixty-per cent conduct blue team exercises, with 24% performing them monthly, 12% quarterly, 13% annually, and 11% bi-annually. The fact that so many organisations practice these exercises monthly speaks volumes about their maturity and dedication to fortifying their security posture. Constantly evaluate security investments Not only do more organisations practice red team testing, but 35% of respondents claim that the blue team never or rarely catches the red team, while 62% say they are caught occasionally or often. Only 2% say they always stop the red team, emphasising that organisations must constantly evaluate and adjust their security investments to keep up with today's adversaries. Adversaries' offensive tactics evolve more rapidly than the majority of security technologies on the market today." Promisingly, the study found that 74% of IT security professionals have seen their companies increase security infrastructure investment as a result of red and blue team testing, with 18% calling the budget changes significant. Only 25% claimed that their company has never upped its security budget after performing these tests. The survey also identified communication and teamwork (27%) as the top skill blue teams need to work on, followed by knowledge of the attacks and tactics (23%), threat detection (20%), the incident response time (17%) and persistence (8%). Technical knowledge a foundation "Adversaries' offensive tactics evolve more rapidly than the majority of security technologies on the market today. It's abundantly clear that regular and relevant red/blue team testing helps companies develop their security capabilities," said Stephen Moore, chief security strategist, Exabeam. "The study also demonstrates that while having technical knowledge is a necessary foundation for all security professionals, interpersonal skills are highly sought after to promote more cohesive teams and better cooperation, especially during an incident or intrusion. We encourage companies to employ these types of testing exercises to find and fill security gaps, which, over time, become methods to evaluate the strengths and weaknesses of their cybersecurity defenders."
The Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, announces the launch of SmartCode 955. Functioning as a commercial grade electronic lever, SmartCode 955 provides advanced security, strength and durability. It is the first commercial grade electronic lever from Kwikset - U.S. door hardware manufacturer - designed to serve the security needs of facility managers, residential and commercial property owners, and small business owners. SmartCode 955 electronic lever Kwikset has been making homeowners feel safe since 1946 and now, with the introduction of SmartCode 955, Kwikset brings that same commitment to commercial and residential property owners, facility managers and small business owners. SmartCode 955 is a robust, secure access control solution that provides ultimate convenience and peace of mind. The versatile electronic lever holds up to 30 unique user codes for seamless access control and is intended for use on a wide variety of doors, including office doors, utility rooms, storage closets, vacation properties and more. The versatile electronic lever holds up to 30 unique user codes for seamless access control “SmartCode 955 is a standout commercial grade lever,” says Ali Atash, Senior Product Marketing Manager, Kwikset, Spectrum Brands Inc. – Hardware & Home Improvement Division. “Not only is it easy to use, install and manage, but it goes above and beyond to provide best-in-class security so people can trust their property is safe.” Kwikset patented SmartKey Security Featuring Kwikset patented SmartKey Security, SmartCode 955 protects against common and forced entry break-in methods like lock picking, lock bumping and torque attacks. Additionally, because of SmartKey Security, property owners and facility managers can reset their security by re-keying the locks quickly and easily; rendering lost, loaned or unreturned keys useless. SmartCode 955 is now available for purchase from select retailers. The commercial grade lever will be available in four finishes: Satin Nickel, Satin Chrome, Venetian Bronze and Iron Black.
DITEK, the quality standard in commercial surge protection, announces the launch of the DTK-HDMI family of compact HDMI surge protectors designed for professional use. These rugged single- and dual-channel units combine state-of-the-art circuit technology with tough powder-coated aluminium housings to provide robust surge protection that is ideal for commercial multi-screen installations. The units are compatible with the latest high-definition formats, including HDMI 2.0a, HDCP 2.2, and 4K UHD. Supports latest video protocols “Multi-screen installations such as those found in hotels, sports venues, restaurants, and bars depend on their AV systems to attract and entertain their customers,” said Jason Klein, National Sales Manager, DITEK. “These professional installations deserve professional-grade protection. Our new HDMI protectors support the latest video protocols, are housed in a rugged protective housing, and are backed by a limited 10-year warranty.” Two versions are available: DTK-HDMI1 is a single-channel surge protector, and DTK-HDMI2 is a 2-channel surge protector. Both versions use the same advanced design to provide protection while supporting the latest high definition video formats. Both versions include a convenient, versatile mounting bracket and are made in the USA.
The Security Industry Association (SIA) has released the American National Standards Institute (ANSI)-approved ANSI/SIA CP-01-2019, a security systems standard for false alarm reduction features. The standard leverages technology, industry experience and common knowledge to pinpoint the causes of and decrease the frequency of false alarm dispatches, detailing recommended design features applicable to both residential and commercial properties protected by electronic security systems. The 2019 standard is a revision of ANSI/SIA CP-01 2014 and builds on the 2014 version in meaningful ways, including new guidance for handling informative signals and definitions for remote devices to reduce the frequency of false alarm dispatches and updated language throughout that minimises the dependence on the term ‘control panel’, ensuring increased applicability to innovative security system approaches. Significant reduction in false alarms CP-01-2019 is intended for use or reference by all security industry professionals“When CP-01 was first released, we saw a significant reduction in false alarms, but as technology advances, so must the standards and processes that help reduce false alarms,” said Joe Gittens, director of standards at SIA. “There is still a great deal of work to do industry-wide, but this release is a step forward, and we are excited to continue furthering the mission of eliminating false dispatches.” The effort to update this keystone standard was led by SIA’s Intrusion Subcommittee with valuable input from The Monitoring Association and the Electronic Security Association. Addressing both user- and equipment-caused false alarms, CP-01-2019 is intended for use or reference by all security industry professionals. Areas covered by ANSI/SIA CP-01-2019 include event recognition, information handling sequences and provisions for system layout testing, installer programming options and recommended test procedures to help determine compliance to the standard.
Users of security systems have long been willing to sacrifice certain aspects of security in favour of convenience and ease of use. The tide seems to be turning, however, with the industry at large showing significant concerns over cyber security. End user sentiments also seem to be following that trend, becoming more cautious when it comes to having their security systems connected to the internet. While it has become the norm for security systems to be accessible online, still it presents security threats that unconnected systems would not face. In 2018, we saw a notable shift from the convenience of a connected system to the less convenient, but more secure, standalone system. Consumers are willingly making the choice to trade convenience for security, and companies are responding. While cyber security concerns will continue to be a big topic of discussion, connected platforms will probably be the trend of 2019This in turn is driving an increase in more IoT-like deployments. Rather than the traditional client that is connected to a device to retrieve information, more often we are seeing more active devices, capable of reporting their presence and transmitting information on a scheduled basis, without the need for a client. Preventing security systems from outside threats This changes the dynamic of the network and alleviates many threats associated with traditional systems because there is no opportunity for outside threats to access your system since the device is transmitting information out vs requiring a connection to the outside world. With IoT deployments, when the device is active and sending messages out of the network segment, it is not vulnerable in the same way that the traditional systems are. While cyber security concerns will continue to be a big topic of discussion, connected platforms will probably be the trend of 2019. In 2018, we saw an increased acceptance in the residential market for smart home applications. While this has been an area of discussion for the past ten years, it is now gaining real traction. With artificial intelligent capabilities in tow, smart home deployments are more common than ever and the video analytics that accompany them are quite impressive. Cloud security for the commercial sector If consumers are trusting their home security systems with this, it only makes sense that they will begin trusting Google to provide security for their offices as wellIn addition to the residential market, connected platforms will likely start to impact the commercial space as well. The border between consumer and commercial user will become a little more blurred. Companies such as Google that cater primarily to home services have cloud capabilities beyond the means of many competitors, in turn giving them a favourable advantage to provide security for the cloud. If consumers are trusting their home security systems with this, it only makes sense that they will begin trusting Google to provide security for their offices as well. As far as ONVIF is concerned, we are excited to see how the market will adopt the newly released Profile T for advanced video streaming in the coming year. We are also excited to explore our relationship with the International Electrotechnical Commission (IEC), by continuing our work on giving devices the ability to communicate upwards and proactively. It is clear that the market is open to adopting models in the quest for more efficiency without sacrificing security.
2018 was a good year for integrators and manufacturers across the board. The economy has been strong which manifested itself in many ways but in particular construction was booming. This was very good for the security industry, especially those integrators and manufacturers who provide services and products in the commercial space. Two of the most unexpected things that impacted the market, and will continue to impact it into 2019, are the trade war and the rapid rise of interest rates. I have been monitoring both very closely and didn’t expect the trade ‘skirmish’ to escalate into the trade war it has become. Similarly, interest rates have started to rise which was a bit of a surprise and one that will definitely impact the nation’s economy and by extension our market. Upcoming cloud-based trends Cyber has definitely taken a strong foothold in the industry and with the continued expansion of cloud-based services I see three main trends coming in 2019. The first is the rise of cloud-based products and service offerings that security integrators will have access to. While we have had a few key players already offering cloud-based solutions for a couple of years on the video side in particular, I see this really picking up steam across all other security and life safety solutions. This really leads into the second trend which is integrators adjusting their business models to leverage these cloud-based solutions into recurring revenue models as managed security service providers (MSSP). The ability for integrators to develop their own managed service portfolio will be key; PSA is already working with several partners to help bring a portfolio offering to our membership which is really exciting. I anticipate that we will see about 10% of security integrators take hold of this new model in 2019 and then expect that number to increase by around 10% each year until the majority of the security business is cloud-based and integrators accept the new model of being an MSSP. Finally, of course is cybersecurity. Cyber has definitely taken a strong foothold in the industry and with the continued expansion of these cloud-based services, it will be more important than ever to integrators, manufacturers and end users alike. MSSP portfolio offering The more progressive security professionals will see cyber as an opportunity, a part of the MSSP portfolio offering, rather than just a threat that we have been talking about for going on five years. The winners in this market will be the integrators and manufacturers who can adapt to all these changes, leverage new technologies we are seeing with AI and cloud-based solutions, and those who stick to commodity-based solutions will be left behind. There are some remarkable things happening with AI technology, analytics, biometrics PSA’s growth has been remarkable. We have exceeded our own growth plans year over year and have also exceed the market projected growth marks as well. We continue to add more offerings to our membership to help them stay ahead of the curve, which in turn helps us to do the same. Right now, we are investing in programs that provide data to our integrators to help inform their business decisions. Data is key for any business and PSA has spent a lot of time working with developers and our integrators to understand what the most meaningful data is they need and how we can best deliver that to them by way of dashboards and reporting tools. Future technology advancements The biggest challenge we face is really tied to the higher interest rates that we have seen so far this year and what lies ahead. We help future fund projects for our integrators so when we see higher interest rates, we must closely monitor that and make business adjustments along the way as well to flex along with those rate hikes. I have been in this industry a long time so clearly my enthusiasm for what the industry is doing doesn’t fade. But what makes it really exciting right now is really related to technology advances. There are some remarkable things happening with AI technology, analytics, biometrics – you name it. It is a very tech heavy industry that people can feel good about being a part of and is an industry that will continue to grow so the opportunities are endless.
Edward Snowden’s name entered the cultural lexicon in 2013, after he leaked thousands of classified National Security Agency documents to journalists. He’s been variously called a traitor, a patriot, a revolutionary, a dissident and a whistleblower, but however you personally feel about him, there’s one way to categorise him that no one can dispute: He’s a thief. There’s no doubt about it: Snowden’s information didn’t belong to him, and the scary truth is that he is neither the first nor the last employee to attempt to smuggle secrets out of a building – and we need to learn from his success to try to prevent it from happening again. Since the dawn of the digital age, we’ve fought cyber pirates with tools like firewalls, encryption, strong passwords, antivirus software and white-hat hackers. But with so much attention on protecting against cyber risks, we sometimes forget about the other side of the coin: the risk that data will be physically removed from the building. Douglas Miorandi, director of federal programs, counter-terrorism and physical data security for Metrasens, recently discussed the major risks to physical data security with SourceSecurity.com. Q: What do you believe are the main physical threats to data? The biggest threats I have seen in the physical data security space have varied over the years, but there are four specific risks that remain the same across the board for any organisation, which are: Every organisation is at risk of having data walk out the building with that employee The Insider Threat The Outsider Threat The Seemingly Innocent Personal Item Poor or Nonexistent Screening To beginning with, every company or government agency has at least one disgruntled employee working for them, whether they know it or not, and that means every organisation is at risk of having data walk out the building with that employee. That is what security experts call the insider threat. Q: What do you think influences employees to steal data from their own organisation? People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially – meaning they don’t even need to be disgruntled; they might just want a quick way to make a buck. Financial data, too, is attractive, both for insider trading and selling to the competition. People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially This can happen to both private companies as well as government agencies. Take Natalie Mayflower Sours Edwards for example, a Treasury Department employee who was caught in the act just last month, when she disclosed sensitive government information about figures connected to the Russia investigation to a reporter. She didn’t hack the system, she simply used a flash drive. And let’s not forget that Snowden was a contractor working for the NSA. Q: Many of us think of security threats coming from an outsider, do companies still face these type of threats? Yes. Unfortunately, organisations do not only need to worry about their own employees – companies and government agencies need to be wary of threats from outsiders. COTS devices include SD cards, external hard drives, audio recorders and even smart phones They can come in the form of the corporate spy – someone specifically hired to pose as a legitimate employee or private contractor in order to extract information – or the opportunistic thief – a contractor hired to work on a server or in sensitive areas who sees an opening and seizes it. Either one is equally damaging to sensitive data because of the physical access they have. Q: Whether it be an insider threat or an outsider threat, what are ways these individuals can steal sensitive data? There are two types of personal items that can be used to steal data: the commercially available off-the-shelf (COTS) variety, and the intentionally disguised variety. This is considered risk number three – the seemingly innocent personal item. COTS devices include SD cards, external hard drives, audio recorders and even smart phones, any of which can be used to transport audio, video and computer data in and out of a building. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom Q: What is the difference between COTS and disguised devices? The difference between COTS and disguised devices is that if someone gets caught with a COTS device, security will know what it is and can confiscate it. The disguised device looks like a security-approved item anyone could be carrying into the workplace, making it especially devious. Sometimes these devices don’t just function to bring information out of a building; they are used to damage a server or hard drive once it’s plugged in to a computer or the network. Some are both – a recording device that extracts data and then destroys the hard drive. Companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening peopleQ: With these types of discrete items, can security personnel still catch individuals in the act? For example, through security screenings? Poor or nonexistent screening is the most substantial security threat to any organisation when it comes to sensitive data. Whether it’s an employee, an outside contractor or a device, the physical security risks are real, and everyone and everything entering and leaving a building needs to be screened. Unfortunately, screening often isn’t occurring at all, or is ineffective or inconsistent when it does occur. Even companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening people and stopping them from stealing data through recording devices. Q: It’s surprising that so many organisations would neglect physical security when protecting their data. It’s a huge mistake, and the consequences can be dire. They range from loss of customer trust, exorbitant lawsuits and tanking stock prices in the private sector; and risks to national security in the public sector. Costs and resource allocation increase as well during efforts to reactively fix or mitigate the effects of physically stolen data. For both the private and public sectors, the risk for data to be physically removed from a building has never been greater. Years ago, it was much harder for the average Joe to figure out where they could sell stolen data. Now, with the Deep Web, anyone with Tor can access forums requesting specific information from competing spy agencies, with instructions on how to deliver it, greatly reducing the risk of getting caught – and increasing the likelihood people will try it. Although it’s getting easier to sell data, the good news is that all of these threats are avoidable with the right measures. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack Q: So how can an organisation protect against these risks? There are a number of ways – and the first one requires a change of mindset. Not long ago, the building/physical security department and the IT/cybersecurity department were considered two different entities within an organisation, with little overlap or communication. Organisations now are realising that, because of the level of risk they face from both internal and external threats, they must take a holistic approach to data security. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack. Q: How can companies and government agencies combine both physical data security and cybersecurity initiatives? Physical security managers can advise cybersecurity managers on ways to reinforce their protocols – perhaps by implementing the newest surveillance cameras in sensitive areas, or removing ports on servers so that external drives cannot be used. Organisations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try In turn, the cybersecurity team can let the physical security team know that they have outside contractors coming in to work on the server, and the physical security team can escort the contractors in and stand guard as they work. Constant communication and a symbiotic relationship between the two departments are crucial to creating an effective holistic security protocol and, once you’ve got the momentum going, don’t let it slow down. Sometimes efforts start off strong and then peter out if priorities change. When guards are down, it’s an excellent time for a malicious actor to strike. Organisations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try. It’s not just about the mentality, though. Using the right technology is just as important. Q: What type of technology can you use to protect physical data? Many problems can be avoided by simply using the right technology to detect devices that bring threats in and carry proprietary information out. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them. Using a ferromagnetic detection system (FMDS) as people enter and exit a building or restricted area means that anything down to a small microSD card triggers an alert, allowing confiscation or further action as needed. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them Q: How does FMDS work? In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects the magnetic signature, down to a millionth of the earth’s magnetic field. FMDS is the most reliable method of finding small electronics items and should be part of the “trust, but verify” model Although it is a passive technology, it is more effective and reliable than using hand wands or the walk-through metal detectors typically seen in an airport, which cannot detect very small ferrous metal objects. FMDS can see through body tissue and liquids, so items cannot be concealed anywhere on a person or with their belongings. Whether or not the items are turned on doesn’t matter; FMDS doesn’t work by detecting a signal, but rather by spotting the magnetic signature that electronics contain. This is ideal, because most recording devices do not emit any signal whatsoever. In my experience, FMDS is the most reliable method of finding small electronics items (as well as other ferrous metal objects, like weapons), and should be part of the “trust, but verify” model, in which companies assume the best of their employees and anyone else entering the building, but still take necessary precautions. Q: What are the key takeaways for organisations looking to enhance data security? The toughest challenge in the security sector – whether it’s cyber or physical – is remembering that the bad guys are constantly looking for ways to slip in through the cracks, and security departments need to stay one step ahead to ward off both internal and external threats. Recognising the existing threats, putting together a holistic security strategy, and using the right technology to detect illicit devices comprises an effective three-pronged approach to protecting an organisation’s data. Organisations cannot afford to be passive about security and assume employees won’t steal data and spies won’t sneak in. Strong countermeasures are necessary because data loss can come from both inside and outside, in both private and public sectors, from places not everyone thinks of – and with technology like FMDS acting as a backup to the human element, organisations can lock down their data and keep the wolves in sheep’s clothing from getting through the door.
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security agencies and personnel to protect assets and the public. Radio-wave signals Radar works as a deterrent by sending out a radio-wave signal using a transmitter antenna, and a small portion of that signal reflects off objects in its path and returns to a receiver antenna. The highest performing radars use an antenna technology called Active Electronically Scanning Array (AESA), which enables all-electronic reconfiguration of the antennas. When an AESA radar detects an object, it can ‘focus’ its antennas to track the object, in much the same way as the zoom on a camera does. Multiple objects can be tracked while continuing to scan. Kirkland, Washington-based Echodyne offers a radar product that brings these ESA capabilities to non-military security applications at commercial price points. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array Echodyne’s ESA radar Echodyne says they are reinventing radar price-performance for security applications in the ground (people, vehicles) or air (counter-UAS) domains. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array (ESA) radar that is affordable for commercial, law enforcement, and governmental customers. The company is backed by high profile investors, including Bill Gates, Madrona Venture Group, Vulcan Capital, NEA, and Lux Capital. “Radar is a sensor,” says Leo McCloskey, Echodyne VP Marketing. “It is most applicable when security professionals can both understand its capabilities and define risk assessment and deployment requirements that call for those capabilities. Our customers are primarily security system integrators and consultancies, which integrate the performance of radar into a sensor array that meets mission requirements.” Radar technology for border surveillance Echodyne was selected by the Science and Technology Directorate of the Department of Homeland Security (DHS) for its Silicon Valley Innovation Program (SVIP) to demonstrate the performance of its radar technology for border surveillance applications. The radar was deployed both in fixed remote surveillance towers and as a lightweight rapid deployment kit for field agents. Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities. “We set out to build the world’s best compact, solid-state ESA radar sensor, and we are demonstrating that we’ve reached that objective,” says McCloskey. “We’re excited to introduce these capabilities for other security applications.” Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities MESA technology Echodyne’s proprietary technology provides a small true electronically scanning array (ESA) radar. Unlike expensive Active ESA (AESA) phased array radars, MESA requires no physical phase shifters, thus reducing the cost, size, weight, and power by several orders of magnitude while maintaining all the benefits of fast ESA radar. Echodyne combines its MESA technology with an intelligent software suite, Acuity, to produce a configurable, software-defined radar for commercial, law enforcement, and governmental security applications. The capability is also useful for temporary events such as rallies and marathons, and many other market applications “Technology seems to make everything more available to more people over time,” says McCloskey. “What is a retail product today will be a purchased self-assembly kit tomorrow and an improvised self-made drone the following day. The Federal Aviation Administration (FAA) is diligently at work on creating rules for safe UAV operation, though any final rules remain some distance off. As drone volumes increase, delineating friend from foe in the airspace requires clear legal and regulatory frameworks, which are nascent but would help distinguish the threat of nuisance flyers from illegal overflight.” Radar sensor for security applications “Detecting and tracking airspace objects of interest is imperative for airports, chemical plants, oil and gas installations, refineries, water and energy utilities, stadiums and other public spaces”, says McCloskey. The capability is also useful for temporary events such as rallies and marathons, and many other market applications. “As with any product, our applicability will depend on variables like location, terrain, risk assessment, and existing security technologies,” says McCloskey. “Our mission is to deliver the very best radar sensor for security applications.”
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm biometrics integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative security technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro intrusion portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping to cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalise on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight hosted managed service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarise system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 security technologies for security and public safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems and Video Surveillance as a Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video and Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimise operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realise other operational and performance efficiencies. Topic: Robotics and Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organisations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place in Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics in Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realise a more secure future. Topic: Voice Control in the Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
AASA, The School Superintendents Association, has formed a new partnership with Armor At Hand™, a company that manufacturers Smart Shields™ connected to the internet and are capable of protecting users from handguns and high-powered rifles. The Shields serve as a first layer of protection in the event of an intrusion and serve as an alarm to alert those connected to the system a potential threat is occurring. Armor At Hand manufactures the world’s first lightweight, mobile Smart Shields with internet connectivity and U.S. National Institute of Justice (NIJ) level 3 equivalent test rating, giving it the ability to stop high-powered rifle rounds. Schools, workplaces, places of worship and other venues now have access to the Smart Shield. AASA members can receive a special offer to receive a Smart Shield from Armor At Hand. Immediate protection at first encounter "Armor At Hand’s partnership with AASA speaks to both organisations’ commitment to providing resources to assist school districts before, during and after a crisis,” said Chad Ahrens, founder and CEO, Armor At Hand. “With access to more than 12,000 school districts, the AASA partnership enables us to reach the people that the Smart Shields are designed to protect.” The Shields hide discreetly in plain sight, yet, provide immediate protection at first encounter. Once one of the shields is moved, all the shields in the area are alerted and will light up and buzz while autonomously sending an alert to authorities of a potential threat. Armor At Hand Smart Shield uses ArcGIS by Esri to map real-time danger areas and safe zones while simultaneously offering route guidance to safety for those in harm’s way. Activation movement amount and timeframes are setup at installation to meet the needs of each site. Emerging technology in security “AASA is proud to be partnering with Armor At Hand,” said Daniel A. Domenech, executive director, AASA. “Threats of violence at our schools has continued to be an issue that must be addressed. AASA is committed to keeping students, teachers and schools around the country safe. Launching this partnership with Armor At Hand is indicative of our commitment to doing that by using emerging technology in security.” AASA is the premiere membership organisation representing public school district superintendents across the country and the world. The primary goal of AASA is to advocate for highest quality public education for all students, as well as to develop and support school system leaders.
Airbus provided secure communications technology to French security forces (police, gendarmerie, and fire brigades) during the long-awaited socio-economic and political summit which took place in the Southwestern coastal town of Biarritz between the 24th and 26th August.With the high-security measures promised by Christophe Castaner, French Minister of the Interior, 13 200 police officers and gendarmes, as well as over 400 firefighters, were involved in safeguarding the high-profile event. The high security and resilience of the dedicated networks and terminals provided by Airbus to the teams in charge of securing the G7 summit was an essential aspect to protecting both the government officials from over the world taking part in the summit, the venue and its perimeter, and the people working on-site. Full interoperability between forces Airbus is also a long-term provider of INPT, the nationwide radio communications network for the French police On top of providing the necessary equipment and secure mission-critical communications technology through a dedicated network overlay deployed for this major event, Airbus is also a long-term provider of INPT, the nationwide radio communications network for the French police, fire brigades, emergency healthcare services, customs, national defense forces, mobile gendarmerie, prefectural authorities and penitentiary administration for prisoner transfers. This network allows full interoperability between forces. Furthermore, Airbus has been a reliable provider of the French gendarmerie’s secure communications network RUBIS, as well as portable material, and other essential communication equipment for their vehicles, for over 30 years.“With various kinds of threats that weigh in on political gatherings of this kind, optimal security conditions are an absolute priority. Through its state-of-the-art technology and highly reliable networks implemented to support secure communications operations, Airbus was able to ensure the smooth running of the communication between each member entrusted to protect and secure the G7 summit”, declared Olivier Koczan, Head of Secure Land Communications of Airbus.
ASSA ABLOY Project Specification Group, a unit of ASSA ABLOY Opening Solutions UK & Ireland, has partnered with ColladoCollins Architects to leverage the benefits of its Openings Studio BIM software to make significant time and cost savings on the former Shredded Wheat factory project. The project, a thriving new commercial and residential development based in Welwyn Garden City in Hertfordshire, will consist of over 643 units and more than 7,100 doorsets. Encompassing a sensitive refurbishment of former Shredded Wheat factory buildings, the project is part of a huge development that includes over 1,200 units in total. Opening Studio BIM software Openings Studio is a BIM software tool that was developed to significantly improve the process of door scheduling Using ASSA ABLOY’s Openings Studio software, ColladoCollins has been able to save weeks of time and manpower when specifying and managing ironmongery schedules for the project. Openings Studio is a BIM software tool that was developed to significantly improve the process of door scheduling, visualisation and more. Users are able to focus on the design, installation and management of door openings – all within an information-rich environment. Easy door installation and management Specifying as many as 7,100 doorsets can be an extremely time-intensive task. Using traditional methods, information would be provided in countless separate schedules and documents, which would require a Revit operator to manually create and update, with someone else to then check for errors. Then, as the project develops, information may become out of date and therefore require individual doors to be flagged up and re-sent for advice. The time and manpower that goes into this process is not only inefficient, but also ineffective, with the prospect of human error still a prominent possibility. Software integration For these reasons, ColladoCollins began to work closely with ASSA ABLOY Project Specification Group to integrate Openings Studio with their own Revit model, allowing the firm to be able find all the relevant information and ironmongery schedules in a single place, delivered in one document. Martin Russell, Project Leader at ColladoCollins, comments: “Moving to BIM was a natural progression for us, and as market leaders, ASSA ABLOY was the obvious choice to assist us.” Integration of door hardware ASSA ABLOY's inputs have vastly improved the integration of door hardware within the former Shredded Wheat Factory project"“Utilising the advice from Eric Spooner, BIM Manager at ASSA ABLOY, as well as the Openings Studio software itself, we have managed to free up our team from tirelessly working through door hardware schedules. This means we can focus on architecture and aesthetics, knowing the specification and integration of the ironmongery is in hand and will seamlessly feedback into the project within the allotted timescales. “The information and advice provided by ASSA ABLOY has vastly improved the integration of door hardware within the former Shredded Wheat Factory project. With a project of this size, sharing information can be quite a task – from large file sizes to sourcing relevant information. The prompts from Openings Studio make transforming information clear, concise and generally easy to follow. BIM software tools “At ColladoCollins, we pride ourselves on designing and delivering high quality buildings with a sensitive, sustainable approach, utilising a strong design ethos with a strong technical background whilst understanding the commercial challenges facing our clients. Openings Studio enhances our ability to provide this service and we would seize the opportunity to work with ASSA ABLOY on similar projects in the future.” Eric Spooner, BIM Manager at ASSA ABLOY, adds: “As Openings Studio flags up any queries and automatically updates in live time, it is easy to see any discrepancies and changes within the schedules. By re-sharing the model information, it then also allows us at ASSA ABLOY to view the changes and feedback to architects – allowing us to work in close collaboration at every stage of a project.”
CaleyLock Edinburgh was established in 1973 and is one of the longest established locksmiths in Edinburgh – the current owners took it over in 2011 and moved into their brand-new purpose-built premises in December 2017. CaleyLock installs and commissions as well as builds cylinders and padlocks in-house and their main customers belong to utilities, commercial, high-end residential, banking, local authorities and leisure sectors. When preparing to move to their new premises, they needed a security solution which would not only secure their premises, but also enable them to create a Showroom for customers – this is where CLIQ from Abloy came in. CaleyLock worked together with Abloy UK to install CLIQ throughout their premises to secure a number of external and internal doors. A key benefit that CaleyLock have gained from the installation of CLIQ is the ability to change access rights for employees CLIQ monitoring & access solutions A key benefit that CaleyLock have gained from the installation of CLIQ is the ability to change access rights for people including employees, and monitor the access to restricted areas. The owners also now have peace of mind that nobody can access unauthorised areas outside of work hours and lost or stolen keys can easily be deleted from the system. CaleyLock are also delighted to now have a CLIQ Showroom to be able to demonstrate PROTEC2 CLIQ from Abloy to customers and end-users in a real-life working environment, which has proven to be efficient in displaying the benefits that CLIQ can bring to any organisation, big or small. Ross McKay, Director of CaleyLock Edinburgh said of the installation “We find CLIQ is working really well for us, as our new premises are purpose built – there were no locks installed initially so this has been a great upgrade to the security. As part of the system, we also have a low energy Bluetooth key which is ideal for people working in remote areas as we can see from the audit trail who has accessed specific sites, and when.”
Opengear, a provider of solutions that deliver secure, resilient network access and automation to critical IT infrastructure, today announced CSC – IT Center for Science Ltd, a Finnish center of expertise in Information and Communications Technology, has deployed Opengear Smart out-of-band appliances to streamline a major upgrade project and improve day-to-day remote management. CSC, a non-profit organisation with 70% ownership by the state of Finland and 30% controlled by Finnish higher education institutions provides services for research, education, culture, public administration and enterprises, to help them thrive and benefit society at large. CSC's primary customers are the Ministry of Education and Culture and organisations within its field of operations, higher education and research institutes and public administration sector. Planned network upgrade As Antti Ristimaki, Senior Network Specialist for CSC explains, "Getting from our data centres to some of the sites we look after might take many hours and so having remote out-of-band access is vital for us." CSC has used a legacy out-of-band (OOB) console server solution for several years, but with a major network upgrade planned for 2018-2020 it was decided that more flexibility was needed to help the small networking team support clients at around 40 sites spread across the country. "What we liked most about Opengear was its small footprint and high-quality software along with the 4G mobile connectivity option which provides us with the option to deploy the OOB console server at site before we have any working in-band access," says Ristimaki. Setting up the devices took very little time and we are now remotely managing the process" Remotely configure networking equipment CSC has already deployed Opengear ACM7004-5-LMR - Resilience Gateway appliances at around 10 locations across the country, which were initially used to help remotely configure networking equipment at sites connecting to its newly upgraded backbone network. Having a remote access server at distant locations makes it easier to reliably commission and configure new network equipment from its main offices at Espoo and Kajaani. At the final stage, there will be around 40 Opengear Resilience Gateway appliances across the country. "Setting up the devices took very little time and we are now remotely managing the process - which has proved surprisingly simple using 4G LTE and even 3G connections," Ristimaki adds. Built-in CLI tools The built-in CLI tools provided by the Opengear software have proven to be useful especially when commissioning the console server itself. Through this accessibility, CSC has integrated the management of its Opengear Smart OOB devices into its own internally developed network management and orchestration platform based on Ansible. CSC is also using Opengear to help record, and in the event of any problems, rollback critical firmware upgrades and configuration changes for core networking elements at remote sites.
Security has become one of the priorities to be focused on for the operation of commercial buildings because many people come in and out of the buildings every day. IP surveillance solutions are particularly essential for those commercial applications generally used in a wider and more open areas, owing to the requirement of system scalability. Surveon commercial solutions, including high-reliability cameras with wide monitoring area, feature-rich CMS with multiple access as well as RAID NVR with flexible storage expansion. These enterprise solutions help commercial buildings to prevent the incidents such as thefts or other illegalities, effectively safeguarding the property and profits in time. Enhanced storage and data security When designing a suitable surveillance system, commercial buildings might encounter some major challenges such as open field and wide monitoring area. Under such circumstances, Surveon’s 3-megapixel camera will be the best solution. Surveon’s RAID NVR allows users to scale up the storage capacity through iSCSI (SAN/NAS) and JBOD It provides 1.5-time larger monitoring range at 30 FPS, offering a cost-effective option for monitoring wide areas. Besides, Surveon cameras are with industrial-grade components and 3-year warranty to ensure long-term operations. Its quality can be proved by the extremely low RMA rate, and reliability can be assured. The data protection of recorded videos and the flexible expansion of storage capacity for future scale up are of great importance to the planning of commercial surveillance. Surveon’s RAID NVR allows users to scale up the storage capacity through iSCSI (SAN/NAS) and JBOD, bringing commercial buildings a convenient and budget-saving option that they can expand storage capacity by demand or yearly budget instead of buying entire system at the beginning. Efficient management with reduced risk Surveon’s enterprise Central Management Software provides superior features including interactive video walls, matrix screen displays, centralised alarm management, and high scalability for thousands of cameras and multiple clients, allowing the management level and the security guards to keep every detail under control and review both live and stored videos through browsers or mobile applications anytime, anywhere. Surveon was chosen as the supplier of a comprehensive networked security solution for KL Tower, the highest building in Malaysia. The security project manager for the KL Tower said, “Surveon’s full end-to-end integration, including enterprise VMS and storage that supports up to 300TB, helps us manage the project in the most efficient way and brings the lowest risk.” Surveon's commercial solutions have also been deployed at Historic Buildings in Poland, ISP server rooms in Taiwan, and the building of airline catering service provider in Hong Kong.
Round table discussion
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
High-quality products are the building blocks of successful physical security systems. How they are packaged may sometimes be seen as an unimportant detail or an afterthought. But should it be? Effective packaging can serve many functions, from creating a favorable customer impression to ensuring the product isn’t damaged in transit. Packaging can also contribute to ease of installation. On the negative side, excess packaging can be an environmental concern, especially for customers who are sensitive to green factors or to minimising waste. We asked this week’s Expert Panel Roundtable: Is packaging of products important in the commercial security market? Why or why not?
Higher pixel count is better. It’s a basic tenet of the video surveillance market, or at least it is the implication as manufacturers continue to tout their latest products offering ever-higher pixel counts. But the reality is more nuanced, as our Expert Panel Roundtable panelists explain this week. Pixel count shouldn’t be seen as an end unto itself, but rather as a factor in determining what camera is applicable to which application. Pixel count is just one factor of several to consider, and the needs of the application must rule all decisions. We asked this week’s panel: How many megapixels are enough? At what point does additional resolution not matter, or not make economic sense?