Commercial security system
The Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, announces the launch of SmartCode 955. Functioning as a commercial grade electronic lever, SmartCode 955 provides advanced security, strength and durability. It is the first commercial grade electronic lever from Kwikset - U.S. door hardware manufacturer - designed to serve the security needs of facility managers, residential and commercial property owners, and small business owners. SmartCode 955 elect...
DITEK, the quality standard in commercial surge protection, announces the launch of the DTK-HDMI family of compact HDMI surge protectors designed for professional use. These rugged single- and dual-channel units combine state-of-the-art circuit technology with tough powder-coated aluminium housings to provide robust surge protection that is ideal for commercial multi-screen installations. The units are compatible with the latest high-definition formats, including HDMI 2.0a, HDCP 2.2, and 4K UHD...
The Security Industry Association (SIA) has released the American National Standards Institute (ANSI)-approved ANSI/SIA CP-01-2019, a security systems standard for false alarm reduction features. The standard leverages technology, industry experience and common knowledge to pinpoint the causes of and decrease the frequency of false alarm dispatches, detailing recommended design features applicable to both residential and commercial properties protected by electronic security systems. The 2019...
Security 101, one of the nation’s fastest-growing security integrators, has opened a new office in San Antonio. Jeff Ye is the owner and general manager of the office. Over the last decade, Jeff has held various positions in several industries beginning in B2B sales for oil & gas technology and most recently as the director of sales for a T-Mobile partner company, leading a market team of 700 people. Ideal location for security integrator firm “I’m really excited to brin...
After a busy three days of business exchanges in Mumbai, the 2019 edition of Secutech India was hailed as a success, with many participants commending the new smart home zone as a welcome addition to the show. A consensus was also reached on the effectiveness of the fair’s fringe events, which updated the market on smart city infrastructure and security technology. Travelling from the subcontinent and beyond, more than 20,000 security industry professionals visited the fair from 25 –...
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security ag...
Johnson Controls will soon announce the availability of the LUX KONOzw Smart Hub thermostat through its DSC channel. This is the first KONO thermostat featuring Z-Wave technology. KONOzw allows users to seamlessly connect DSC security systems, including PowerSeries Neo, iotega and PowerSeries Pro, when combined with SecureNet or Alarm.com interactive services to the smart thermostat through the Z-Wave smart hub. Universal compatibility KONOzw offers all the traditional modes of a smart thermostat, including heat & cool and works with forced air, gas, oil and electrical furnaces, giving end users the flexibility they need when choosing a thermostat. It also features universal compatibility with heat pump systems with or without Aux/Emergency heat and hydronic zone valves. KONOzw also provides flexible installation with battery (4 AA batteries included) or C-wire powering options. Its patent-pending interchangeable décor-snap covers enable users to personalise the device – adding individual flair to the thermostat. “The integration of KONOzw with Johnson Controls’ security systems illustrates the power of the smart home and our broad footprint for bringing innovative solutions to the market,” said Rob Munin, general manager of thermostats at Johnson Controls. Leveraging smart systems capabilities “The Z-Wave technology opens doors for organisations who want to integrate more functionality into a smart hub to further leverage the capabilities of their smart systems. We believe the KONOzw is an attractive solution for commercial and residential markets.” The use of Z-Wave technology allows the thermostat to connect to other parts of a smart home through Alarm.com or SecureNet, while using minimal resources, in turn increasing battery life and reducing overall operating costs. With complete customisability available, users can reap all the benefits of a sleek, easy-to-use smart thermostat, while personalising it to their home decor.
Johnson Controls introduces the Tyco 360° Radar Detection, a low-cost, early threat detection family of radar sensors that can be easily integrated into existing video management systems for a more complete surveillance solution. Tyco Radar 360° Detection solution An ideal answer for advanced perimeter security needs, Tyco Radar 360° Detection offers long-range protection, which means quicker detection of breaches for areas seeking upgraded perimeter safety, such as power plants, transportation hubs, critical infrastructure and other governmental, industrial and commercial sites. “The addition of radar for detection will help those with perimeter protection concerns take their situational awareness to the next level,” said Peter Ainsworth, product general manager, Video, Global, Building Technologies & Solutions, Johnson Controls. “And knowing it can be easily and cost-effectively integrated into an existing VMS for an end-to-end solution just enhances and simplifies the process.” Perimeter protection With a high level of power efficiency, onboard signaling and processing, and superior performance in all weather and lighting conditions, Tyco 360° Radar Detection ensures 24/7, 360-degree coverage for sites of all sizes. The radars will be available in 250, 500, and 1,000-meter range sensors, with accessories and management software also available for purchase. Using its slew-to-cue capabilities, the radar can point pan /tilt /zoom (PTZ) cameras to a targeted location for improved surveillance. It will also have the added benefit of quick installation involving less hardware, easy maintenance and a low false alarm rate.
Interlogix, a global provider of security and life-safety solutions, introduces TruProtect – a flexible, intelligent, commercial security solution that unifies intrusion monitoring, access control and video surveillance into a robust, single platform. This new platform enables users to scale the solution from a few doors to large, multi-site operations that require customised integrations. Interlogix is a part of Carrier, a global provider of innovative heating, ventilating and air conditioning (HVAC), refrigeration, fire, security and building automation technologies. Supports TruVision cameras and NVRs The TruProtect system supports a wide range of Interlogix TruVision cameras and network video recordersThe solution’s modular ‘add-as-you-go’ design enables users to cost effectively add capacity and functionality as required. Users can scale a system from a standalone intrusion panel to a fully networked security system spanning hundreds of locations. The TruProtect system supports a wide range of Interlogix TruVision cameras and network video recorders and optional third-party solutions for video surveillance, access control, building management, building automation, biometrics, HVAC and lighting. “The TruProtect C4 management software is what unifies several of the commercial security domains into a single interface. Users can see who is in the building, respond to alarm events, utilise video verification and manage user and visitor access, all from a single application,” said Marc Tanguay, commercial solutions product leader, North America, Interlogix. “The system is highly scalable, supporting many zone input devices, alarm areas, access users, doors and elevators.” Quick and efficient respond to events The TruProtect system is a great option for business applications including banking, education, retail, commercial propertyThe system’s flexible architecture and powerful integration of intrusion monitoring, access control and video surveillance enables reliable operations and provides actionable information that empowers users to quickly and efficiently respond to events. The TruProtect system is a great option for business applications including banking, education, retail, commercial property and much more. Preview the product by stopping by the Interlogix booth 18019 at the 2019 International Security Conference & Exposition (ISC West) from April 10-12 in Las Vegas. The TruProtect system will be available from certified Interlogix dealers throughout North America.
Middle Atlantic Products, a brand of Legrand | AV, announced the company's C3 Series Credenza — previewed at CEDIA 2018 and ISE 2019 — is now shipping. This award-winning solution combines a 10-inch-deep space-saving profile with modern design that meets the compliance standards of the Americans with Disabilities Act (ADA). The true innovation, using Middle Atlantic's unique Frame to Furniture design approach, is a flexible, configurable rack frame that allows integrators field-mounting flexibility for traditional rackmounts and small devices. This provides them with a solid foundation that can scale as AV components need to be added or replaced without sacrificing the system reliability. Lowest profile AV furniture solution We engineered our lowest profile AV furniture solution ever that fits even the most space-limited applications and can complement any décor""Not every installation has the space available for a traditional rack system. When faced with these kinds of constraints, integrators need a solution that can support complex installs while being housed in plain sight," said Paul Dolynchuck, director of product management at Middle Atlantic. "Working from integrator feedback, we engineered our lowest profile AV furniture solution ever that fits even the most space-limited applications and can complement any décor. With the C3 Series, integrators can quickly install and interchange mounting options for both small and large AV components on the job and as technology evolves." Installing variety of localised AV equipment Within a 10-inch-deep footprint, the new C3 Series Credenza features a frame that allows for a modular systems approach to equipment mounting, providing integrators the flexibility they need to install a wide variety of localised AV equipment, including the increasing number of small AV devices for residential and commercial applications. The frame contains vertical notches in each bay, offering the integrator the benefit of nearly endless storage and rackmount configurations. As with other signature Frame to Furniture solutions, the C3 Series Credenza offers design flexibility to meet clients' aesthetic needs Static or slide-out rackmount Tech Kits include a thermostatically controlled fan, which mounts seamlessly in the base of the unit, and a seven-outlet, surge-protected power strip. Utilising the company's patented Lever Lock tool-free mounting system, small-device mounting and cable management has never been easier. These features let integrators make final configuration decisions in the field confidently, knowing that the C3 can scale and grow as the system expands. Completely customised furniture solution As with other signature Frame to Furniture solutions, the C3 Series Credenza offers design flexibility to meet clients' aesthetic needs. Customers can choose among a selection of styles and finishes that draws on the most popular design trends for a completely customised furniture solution — including new sleek metallic finishes. The wood kit is installed separately from the frame, protecting it during installation while providing integrators the access and visibility they need. The unique features, design, and installation of the C3 Series Credenza have already caught the attention of the industry, winning a Commercial Integrator Top New Technology Award at ISE 2019 and being named as a finalist for the Essential Install Smart Building Awards.
Global access control and perimeter security solutions provider, Gallagher Security is recruiting new channel partners to distribute and install its product range – and is using a major new exhibition to step up the hunt. Signing new channel partners Gallagher Security (Europe) will devote its stand (SE163) at The Security Event from 9-11 April 2019 at The NEC Birmingham to sign up new channel partners with a compelling pitch. New general manager, Richard Huison believes Gallagher offers the security industry at least 10% more value with an enterprise-level solution that is future-proofed ahead of the business curve. Importance of Cybersecurity Gallagher is in the top five UK manufacturers of access control solutions and cites industry standards such as Open Supervised Device Protocol" He says, “For the end user, from small business to multinational, we offer resilience and the confidence that what they are putting on their network will combat the ever-growing cyber threat. For our channel partners, this translates to annual management contracts and retaining clients for longer if they lead with Gallagher.” Richard adds, “Gallagher is in the top five UK manufacturers of access control solutions and cites industry standards such as Open Supervised Device Protocol, on which Gallagher is ‘miles ahead’.” Critical national infrastructure security Countering the cyber threat has been a key plank of Huison’s strategy since stepping up to the helm at Gallagher, which is a long term CPNI-approved supplier to the Home Office and critical national infrastructure clients such as the National Grid. Gallagher Security’s focus is on keeping client businesses and their people safe and offering business continuity and efficiency to ensure core operations run smoothly. The Security Event is a free-to-attend exhibition for the commercial and residential security market with 100 of the world’s leading security brands, a programme of 40 seminars and workshops for its more than 6,000 visitors.
DICE Corporation is pleased to announce and welcome Carl Galsterer as the company’s new chief network architect. Galsterer will be responsible for overseeing all aspects of the company’s information technology infrastructure, including the design and implementation of customer networks and process standardisation. More about Carl With over 16 years of experience in network engineering as a senior engineer, Galsterer was pivotal in building the Charter Spectrum network throughout Michigan and the Midwest. In his new position at DICE Corporation, Galsterer will work in combination with our telecom partner IPtelX to develop innovative and exciting opportunities for the security industry, including advanced proprietary telecom networks designed specifically for alarm companies. DICE Corporation is positioning alarm companies with the resources to be able to compete with cable providers As the security industry continues to experience new challenges with changing technology and consumer habits, Galsterer’s extensive knowledge will help make DICE Corporation an integral partner for alarm companies looking to diversify their offerings. This year, the company will start supplying a triple play of security software, phone, and internet services for residential and commercial subscribers. By offering this new approach, DICE Corporation is positioning alarm companies with the resources to be able to compete with cable providers, adding more ways to increase value for their customers and boosting recurring monthly revenue. Triple play services “We are very excited to have Carl join the DICE team,” said DICE Corporation president and CEO, Cliff Dice. “The new triple play of services we are making available for our customers is going to be essential for alarm companies moving forward. We already have a few customers testing this concept and they have doubled and sometimes even tripled their recurring revenue per customer. I am confident Carl’s contributions will help us continue to provide the unmatched service and value our customers have relied on for over 25 years.” Dice said.
Users of security systems have long been willing to sacrifice certain aspects of security in favour of convenience and ease of use. The tide seems to be turning, however, with the industry at large showing significant concerns over cyber security. End user sentiments also seem to be following that trend, becoming more cautious when it comes to having their security systems connected to the internet. While it has become the norm for security systems to be accessible online, still it presents security threats that unconnected systems would not face. In 2018, we saw a notable shift from the convenience of a connected system to the less convenient, but more secure, standalone system. Consumers are willingly making the choice to trade convenience for security, and companies are responding. While cyber security concerns will continue to be a big topic of discussion, connected platforms will probably be the trend of 2019This in turn is driving an increase in more IoT-like deployments. Rather than the traditional client that is connected to a device to retrieve information, more often we are seeing more active devices, capable of reporting their presence and transmitting information on a scheduled basis, without the need for a client. Preventing security systems from outside threats This changes the dynamic of the network and alleviates many threats associated with traditional systems because there is no opportunity for outside threats to access your system since the device is transmitting information out vs requiring a connection to the outside world. With IoT deployments, when the device is active and sending messages out of the network segment, it is not vulnerable in the same way that the traditional systems are. While cyber security concerns will continue to be a big topic of discussion, connected platforms will probably be the trend of 2019. In 2018, we saw an increased acceptance in the residential market for smart home applications. While this has been an area of discussion for the past ten years, it is now gaining real traction. With artificial intelligent capabilities in tow, smart home deployments are more common than ever and the video analytics that accompany them are quite impressive. Cloud security for the commercial sector If consumers are trusting their home security systems with this, it only makes sense that they will begin trusting Google to provide security for their offices as wellIn addition to the residential market, connected platforms will likely start to impact the commercial space as well. The border between consumer and commercial user will become a little more blurred. Companies such as Google that cater primarily to home services have cloud capabilities beyond the means of many competitors, in turn giving them a favourable advantage to provide security for the cloud. If consumers are trusting their home security systems with this, it only makes sense that they will begin trusting Google to provide security for their offices as well. As far as ONVIF is concerned, we are excited to see how the market will adopt the newly released Profile T for advanced video streaming in the coming year. We are also excited to explore our relationship with the International Electrotechnical Commission (IEC), by continuing our work on giving devices the ability to communicate upwards and proactively. It is clear that the market is open to adopting models in the quest for more efficiency without sacrificing security.
2018 was a good year for integrators and manufacturers across the board. The economy has been strong which manifested itself in many ways but in particular construction was booming. This was very good for the security industry, especially those integrators and manufacturers who provide services and products in the commercial space. Two of the most unexpected things that impacted the market, and will continue to impact it into 2019, are the trade war and the rapid rise of interest rates. I have been monitoring both very closely and didn’t expect the trade ‘skirmish’ to escalate into the trade war it has become. Similarly, interest rates have started to rise which was a bit of a surprise and one that will definitely impact the nation’s economy and by extension our market. Upcoming cloud-based trends Cyber has definitely taken a strong foothold in the industry and with the continued expansion of cloud-based services I see three main trends coming in 2019. The first is the rise of cloud-based products and service offerings that security integrators will have access to. While we have had a few key players already offering cloud-based solutions for a couple of years on the video side in particular, I see this really picking up steam across all other security and life safety solutions. This really leads into the second trend which is integrators adjusting their business models to leverage these cloud-based solutions into recurring revenue models as managed security service providers (MSSP). The ability for integrators to develop their own managed service portfolio will be key; PSA is already working with several partners to help bring a portfolio offering to our membership which is really exciting. I anticipate that we will see about 10% of security integrators take hold of this new model in 2019 and then expect that number to increase by around 10% each year until the majority of the security business is cloud-based and integrators accept the new model of being an MSSP. Finally, of course is cybersecurity. Cyber has definitely taken a strong foothold in the industry and with the continued expansion of these cloud-based services, it will be more important than ever to integrators, manufacturers and end users alike. MSSP portfolio offering The more progressive security professionals will see cyber as an opportunity, a part of the MSSP portfolio offering, rather than just a threat that we have been talking about for going on five years. The winners in this market will be the integrators and manufacturers who can adapt to all these changes, leverage new technologies we are seeing with AI and cloud-based solutions, and those who stick to commodity-based solutions will be left behind. There are some remarkable things happening with AI technology, analytics, biometrics PSA’s growth has been remarkable. We have exceeded our own growth plans year over year and have also exceed the market projected growth marks as well. We continue to add more offerings to our membership to help them stay ahead of the curve, which in turn helps us to do the same. Right now, we are investing in programs that provide data to our integrators to help inform their business decisions. Data is key for any business and PSA has spent a lot of time working with developers and our integrators to understand what the most meaningful data is they need and how we can best deliver that to them by way of dashboards and reporting tools. Future technology advancements The biggest challenge we face is really tied to the higher interest rates that we have seen so far this year and what lies ahead. We help future fund projects for our integrators so when we see higher interest rates, we must closely monitor that and make business adjustments along the way as well to flex along with those rate hikes. I have been in this industry a long time so clearly my enthusiasm for what the industry is doing doesn’t fade. But what makes it really exciting right now is really related to technology advances. There are some remarkable things happening with AI technology, analytics, biometrics – you name it. It is a very tech heavy industry that people can feel good about being a part of and is an industry that will continue to grow so the opportunities are endless.
Edward Snowden’s name entered the cultural lexicon in 2013, after he leaked thousands of classified National Security Agency documents to journalists. He’s been variously called a traitor, a patriot, a revolutionary, a dissident and a whistleblower, but however you personally feel about him, there’s one way to categorise him that no one can dispute: He’s a thief. There’s no doubt about it: Snowden’s information didn’t belong to him, and the scary truth is that he is neither the first nor the last employee to attempt to smuggle secrets out of a building – and we need to learn from his success to try to prevent it from happening again. Since the dawn of the digital age, we’ve fought cyber pirates with tools like firewalls, encryption, strong passwords, antivirus software and white-hat hackers. But with so much attention on protecting against cyber risks, we sometimes forget about the other side of the coin: the risk that data will be physically removed from the building. Douglas Miorandi, director of federal programs, counter-terrorism and physical data security for Metrasens, recently discussed the major risks to physical data security with SourceSecurity.com. Q: What do you believe are the main physical threats to data? The biggest threats I have seen in the physical data security space have varied over the years, but there are four specific risks that remain the same across the board for any organisation, which are: Every organisation is at risk of having data walk out the building with that employee The Insider Threat The Outsider Threat The Seemingly Innocent Personal Item Poor or Nonexistent Screening To beginning with, every company or government agency has at least one disgruntled employee working for them, whether they know it or not, and that means every organisation is at risk of having data walk out the building with that employee. That is what security experts call the insider threat. Q: What do you think influences employees to steal data from their own organisation? People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially – meaning they don’t even need to be disgruntled; they might just want a quick way to make a buck. Financial data, too, is attractive, both for insider trading and selling to the competition. People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially This can happen to both private companies as well as government agencies. Take Natalie Mayflower Sours Edwards for example, a Treasury Department employee who was caught in the act just last month, when she disclosed sensitive government information about figures connected to the Russia investigation to a reporter. She didn’t hack the system, she simply used a flash drive. And let’s not forget that Snowden was a contractor working for the NSA. Q: Many of us think of security threats coming from an outsider, do companies still face these type of threats? Yes. Unfortunately, organisations do not only need to worry about their own employees – companies and government agencies need to be wary of threats from outsiders. COTS devices include SD cards, external hard drives, audio recorders and even smart phones They can come in the form of the corporate spy – someone specifically hired to pose as a legitimate employee or private contractor in order to extract information – or the opportunistic thief – a contractor hired to work on a server or in sensitive areas who sees an opening and seizes it. Either one is equally damaging to sensitive data because of the physical access they have. Q: Whether it be an insider threat or an outsider threat, what are ways these individuals can steal sensitive data? There are two types of personal items that can be used to steal data: the commercially available off-the-shelf (COTS) variety, and the intentionally disguised variety. This is considered risk number three – the seemingly innocent personal item. COTS devices include SD cards, external hard drives, audio recorders and even smart phones, any of which can be used to transport audio, video and computer data in and out of a building. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom Q: What is the difference between COTS and disguised devices? The difference between COTS and disguised devices is that if someone gets caught with a COTS device, security will know what it is and can confiscate it. The disguised device looks like a security-approved item anyone could be carrying into the workplace, making it especially devious. Sometimes these devices don’t just function to bring information out of a building; they are used to damage a server or hard drive once it’s plugged in to a computer or the network. Some are both – a recording device that extracts data and then destroys the hard drive. Companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening peopleQ: With these types of discrete items, can security personnel still catch individuals in the act? For example, through security screenings? Poor or nonexistent screening is the most substantial security threat to any organisation when it comes to sensitive data. Whether it’s an employee, an outside contractor or a device, the physical security risks are real, and everyone and everything entering and leaving a building needs to be screened. Unfortunately, screening often isn’t occurring at all, or is ineffective or inconsistent when it does occur. Even companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening people and stopping them from stealing data through recording devices. Q: It’s surprising that so many organisations would neglect physical security when protecting their data. It’s a huge mistake, and the consequences can be dire. They range from loss of customer trust, exorbitant lawsuits and tanking stock prices in the private sector; and risks to national security in the public sector. Costs and resource allocation increase as well during efforts to reactively fix or mitigate the effects of physically stolen data. For both the private and public sectors, the risk for data to be physically removed from a building has never been greater. Years ago, it was much harder for the average Joe to figure out where they could sell stolen data. Now, with the Deep Web, anyone with Tor can access forums requesting specific information from competing spy agencies, with instructions on how to deliver it, greatly reducing the risk of getting caught – and increasing the likelihood people will try it. Although it’s getting easier to sell data, the good news is that all of these threats are avoidable with the right measures. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack Q: So how can an organisation protect against these risks? There are a number of ways – and the first one requires a change of mindset. Not long ago, the building/physical security department and the IT/cybersecurity department were considered two different entities within an organisation, with little overlap or communication. Organisations now are realising that, because of the level of risk they face from both internal and external threats, they must take a holistic approach to data security. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack. Q: How can companies and government agencies combine both physical data security and cybersecurity initiatives? Physical security managers can advise cybersecurity managers on ways to reinforce their protocols – perhaps by implementing the newest surveillance cameras in sensitive areas, or removing ports on servers so that external drives cannot be used. Organisations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try In turn, the cybersecurity team can let the physical security team know that they have outside contractors coming in to work on the server, and the physical security team can escort the contractors in and stand guard as they work. Constant communication and a symbiotic relationship between the two departments are crucial to creating an effective holistic security protocol and, once you’ve got the momentum going, don’t let it slow down. Sometimes efforts start off strong and then peter out if priorities change. When guards are down, it’s an excellent time for a malicious actor to strike. Organisations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try. It’s not just about the mentality, though. Using the right technology is just as important. Q: What type of technology can you use to protect physical data? Many problems can be avoided by simply using the right technology to detect devices that bring threats in and carry proprietary information out. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them. Using a ferromagnetic detection system (FMDS) as people enter and exit a building or restricted area means that anything down to a small microSD card triggers an alert, allowing confiscation or further action as needed. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them Q: How does FMDS work? In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects the magnetic signature, down to a millionth of the earth’s magnetic field. FMDS is the most reliable method of finding small electronics items and should be part of the “trust, but verify” model Although it is a passive technology, it is more effective and reliable than using hand wands or the walk-through metal detectors typically seen in an airport, which cannot detect very small ferrous metal objects. FMDS can see through body tissue and liquids, so items cannot be concealed anywhere on a person or with their belongings. Whether or not the items are turned on doesn’t matter; FMDS doesn’t work by detecting a signal, but rather by spotting the magnetic signature that electronics contain. This is ideal, because most recording devices do not emit any signal whatsoever. In my experience, FMDS is the most reliable method of finding small electronics items (as well as other ferrous metal objects, like weapons), and should be part of the “trust, but verify” model, in which companies assume the best of their employees and anyone else entering the building, but still take necessary precautions. Q: What are the key takeaways for organisations looking to enhance data security? The toughest challenge in the security sector – whether it’s cyber or physical – is remembering that the bad guys are constantly looking for ways to slip in through the cracks, and security departments need to stay one step ahead to ward off both internal and external threats. Recognising the existing threats, putting together a holistic security strategy, and using the right technology to detect illicit devices comprises an effective three-pronged approach to protecting an organisation’s data. Organisations cannot afford to be passive about security and assume employees won’t steal data and spies won’t sneak in. Strong countermeasures are necessary because data loss can come from both inside and outside, in both private and public sectors, from places not everyone thinks of – and with technology like FMDS acting as a backup to the human element, organisations can lock down their data and keep the wolves in sheep’s clothing from getting through the door.
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm biometrics integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative security technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro intrusion portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping to cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalise on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight hosted managed service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarise system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 security technologies for security and public safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems and Video Surveillance as a Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video and Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimise operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realise other operational and performance efficiencies. Topic: Robotics and Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organisations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place in Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics in Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realise a more secure future. Topic: Voice Control in the Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
ISC West in Las Vegas is the first of several major security trade shows planned for 2019 as part of the Reed Exhibitions ISC Security Events portfolio. Next up will be Expo Seguridad México in May in Mexico City, followed in June by ISC Brasil in Sao Paolo, and ISC East this fall in New York. Expo Seguridad México, May 7-9, will serve the important Mexican market for security goods and services. In Mexico City alone, a large population translates into plenty of buildings and facilities that need protection; security is a big concern and a large market. Concerns about information security, cybersecurity and convergence are also dominant topics. Benefitting from a revised trade agreement with the United States, Mexico offers a favourable business climate and low costs. In addition to video and other hardware products familiar at the U.S. show, Expo Seguridad also includes a large public safety/police component, a workplace, environmental and industrial safety sector, and fire products, offering a broad range of additional product categories. Developing knowledge of attendees The FISSE (Innovation and Solutions of Security) conference room will have cybersecurity and electronic security speakersOn the exhibition floor will be the VIII International Conference for the Administration of Security and Law Enforcement, which will bring together renowned specialists in the security and public safety sector. Free conference track rooms will be provided on the exhibition floor to develop knowledge of attendees in various business areas. The FISSE (Innovation and Solutions of Security) conference room will have cybersecurity and electronic security speakers. Manufacturers, distributors, integrators, and national and international end users have come together at Expo Seguridad since 2002 to interact and exchange knowledge during the three days dedicated to the security industry. Expo Securidad México provides access to more than 350 exhibitors and the opportunity to interact, connect and develop face-to-face relationships with more than 16,300 security and public safety decision-makers. This year, Daniel Linskey, former Boston police chief, will provide a welcome speech at the opening ceremony and will share his experience and thoughts about the 2013 Boston Marathon bombing. Exhibition of public safety equipment The exhibit encompasses a selection of public safety equipment and vehicles, body armour, and counter-terrorism solutionsISC Brasil, June 25-27, offers a combination of physical security and emerging information and cybersecurity elements. An Infosecurity pavilion on the show floor and related conference track sessions highlight growing concerns in the marketplace. A large meeting of Brasil’s law enforcement commanders is collocated with ISC Brasil, and the exhibit encompasses a selection of public safety equipment and vehicles, body armour, and counter-terrorism solutions. A strong VIP attendee program ensures attendance by high-level decision-makers with money to spend. The ISC Brasil Congress is an educational program for continuing professional education and technical training for corporate end users, police commanders, distributors, integrators, law enforcement officials, security consultants, IT and public safety managers. Of the expected 18,000 attendees, some 53% come from corporate end users in several vertical industries. Some 21% of attendees are commercial system integrators, with 9% central monitoring systems and 5% law enforcement and public authorities’ safety. Security for oil and gas companies Brasil’s economy has been improving steadily after a rough patch, and the ISC Brasil show has seen an uptick for the last two yearsBrasil’s economy has been improving steadily after a rough patch, and the ISC Brasil show has seen an uptick for the last two years. Brasil’s huge economy includes big industries that need lots of security – oil and gas companies, and automotive production are among the contributors to economic growth. Attendee and exhibitor satisfaction is strong for ISC Brasil, and the show is on a new growth path as the economic situation in Brasil continues to improve under a new president. Large exhibitors at ISC Brasil include Bosch, Genetec, Hikvision, Dahua, HID Global, Honda, Yamaha, and Microsoft. Large Reed Exhibition offices in Mexico City and São Paulo manage the Latin American events and work with local partners, marketing organisations and clients. Emerging Technology Zone ISC East in New York, Nov. 20-21, continues to build momentum in 2019 after a successful 2018 show that saw double-digit growth both in exhibition space and attendance. Reed Exhibitions’ Infosecurity/ISACA North America Expo and Conference will again be collocated with ISC East, expanding information security and cybersecurity horizons for attendees. (ISACA is an international professional association focussed on IT governance.) New at ISC East in 2019 will be an Emerging Technology Zone, providing a high profile for emerging technology companies at the show New at ISC East in 2019 will be an Emerging Technology Zone comparable to the one at ISC West, providing a high profile for emerging technology companies at the show. The Unmanned Security Expo, a big success last year, will be even bigger in 2019 with more exhibits than ever. There are good signs on the horizon for greater use of drones and robotics. Protection for enterprises ISC East has traditionally focussed on the ‘tri-state’ area around New York City – New York, New Jersey and Connecticut – an area rich in end user companies, especially in financial services, retail, entertainment and the media. In New York City alone, there are almost endless numbers of big enterprises that need protection, so a localised show is a natural, and doesn’t require the large pool of potential customers to travel away from their businesses. New York also has a large and active law enforcement community, and there are many large systems integrators that operate in and around the New York area. ISC East is a growing show that serves a large, unique audience. Growth of ISC East also suggests it is becoming more of a ‘super-regional’ event, drawing good attendance from the Southeast and Midwest in addition to the tri-state area.
ASSA ABLOY Project Specification Group, a unit of ASSA ABLOY Opening Solutions UK & Ireland, has partnered with ColladoCollins Architects to leverage the benefits of its Openings Studio BIM software to make significant time and cost savings on the former Shredded Wheat factory project. The project, a thriving new commercial and residential development based in Welwyn Garden City in Hertfordshire, will consist of over 643 units and more than 7,100 doorsets. Encompassing a sensitive refurbishment of former Shredded Wheat factory buildings, the project is part of a huge development that includes over 1,200 units in total. Opening Studio BIM software Openings Studio is a BIM software tool that was developed to significantly improve the process of door scheduling Using ASSA ABLOY’s Openings Studio software, ColladoCollins has been able to save weeks of time and manpower when specifying and managing ironmongery schedules for the project. Openings Studio is a BIM software tool that was developed to significantly improve the process of door scheduling, visualisation and more. Users are able to focus on the design, installation and management of door openings – all within an information-rich environment. Easy door installation and management Specifying as many as 7,100 doorsets can be an extremely time-intensive task. Using traditional methods, information would be provided in countless separate schedules and documents, which would require a Revit operator to manually create and update, with someone else to then check for errors. Then, as the project develops, information may become out of date and therefore require individual doors to be flagged up and re-sent for advice. The time and manpower that goes into this process is not only inefficient, but also ineffective, with the prospect of human error still a prominent possibility. Software integration For these reasons, ColladoCollins began to work closely with ASSA ABLOY Project Specification Group to integrate Openings Studio with their own Revit model, allowing the firm to be able find all the relevant information and ironmongery schedules in a single place, delivered in one document. Martin Russell, Project Leader at ColladoCollins, comments: “Moving to BIM was a natural progression for us, and as market leaders, ASSA ABLOY was the obvious choice to assist us.” Integration of door hardware ASSA ABLOY's inputs have vastly improved the integration of door hardware within the former Shredded Wheat Factory project"“Utilising the advice from Eric Spooner, BIM Manager at ASSA ABLOY, as well as the Openings Studio software itself, we have managed to free up our team from tirelessly working through door hardware schedules. This means we can focus on architecture and aesthetics, knowing the specification and integration of the ironmongery is in hand and will seamlessly feedback into the project within the allotted timescales. “The information and advice provided by ASSA ABLOY has vastly improved the integration of door hardware within the former Shredded Wheat Factory project. With a project of this size, sharing information can be quite a task – from large file sizes to sourcing relevant information. The prompts from Openings Studio make transforming information clear, concise and generally easy to follow. BIM software tools “At ColladoCollins, we pride ourselves on designing and delivering high quality buildings with a sensitive, sustainable approach, utilising a strong design ethos with a strong technical background whilst understanding the commercial challenges facing our clients. Openings Studio enhances our ability to provide this service and we would seize the opportunity to work with ASSA ABLOY on similar projects in the future.” Eric Spooner, BIM Manager at ASSA ABLOY, adds: “As Openings Studio flags up any queries and automatically updates in live time, it is easy to see any discrepancies and changes within the schedules. By re-sharing the model information, it then also allows us at ASSA ABLOY to view the changes and feedback to architects – allowing us to work in close collaboration at every stage of a project.”
CaleyLock Edinburgh was established in 1973 and is one of the longest established locksmiths in Edinburgh – the current owners took it over in 2011 and moved into their brand-new purpose-built premises in December 2017. CaleyLock installs and commissions as well as builds cylinders and padlocks in-house and their main customers belong to utilities, commercial, high-end residential, banking, local authorities and leisure sectors. When preparing to move to their new premises, they needed a security solution which would not only secure their premises, but also enable them to create a Showroom for customers – this is where CLIQ from Abloy came in. CaleyLock worked together with Abloy UK to install CLIQ throughout their premises to secure a number of external and internal doors. A key benefit that CaleyLock have gained from the installation of CLIQ is the ability to change access rights for employees CLIQ monitoring & access solutions A key benefit that CaleyLock have gained from the installation of CLIQ is the ability to change access rights for people including employees, and monitor the access to restricted areas. The owners also now have peace of mind that nobody can access unauthorised areas outside of work hours and lost or stolen keys can easily be deleted from the system. CaleyLock are also delighted to now have a CLIQ Showroom to be able to demonstrate PROTEC2 CLIQ from Abloy to customers and end-users in a real-life working environment, which has proven to be efficient in displaying the benefits that CLIQ can bring to any organisation, big or small. Ross McKay, Director of CaleyLock Edinburgh said of the installation “We find CLIQ is working really well for us, as our new premises are purpose built – there were no locks installed initially so this has been a great upgrade to the security. As part of the system, we also have a low energy Bluetooth key which is ideal for people working in remote areas as we can see from the audit trail who has accessed specific sites, and when.”
Opengear, a provider of solutions that deliver secure, resilient network access and automation to critical IT infrastructure, today announced CSC – IT Center for Science Ltd, a Finnish center of expertise in Information and Communications Technology, has deployed Opengear Smart out-of-band appliances to streamline a major upgrade project and improve day-to-day remote management. CSC, a non-profit organisation with 70% ownership by the state of Finland and 30% controlled by Finnish higher education institutions provides services for research, education, culture, public administration and enterprises, to help them thrive and benefit society at large. CSC's primary customers are the Ministry of Education and Culture and organisations within its field of operations, higher education and research institutes and public administration sector. Planned network upgrade As Antti Ristimaki, Senior Network Specialist for CSC explains, "Getting from our data centres to some of the sites we look after might take many hours and so having remote out-of-band access is vital for us." CSC has used a legacy out-of-band (OOB) console server solution for several years, but with a major network upgrade planned for 2018-2020 it was decided that more flexibility was needed to help the small networking team support clients at around 40 sites spread across the country. "What we liked most about Opengear was its small footprint and high-quality software along with the 4G mobile connectivity option which provides us with the option to deploy the OOB console server at site before we have any working in-band access," says Ristimaki. Setting up the devices took very little time and we are now remotely managing the process" Remotely configure networking equipment CSC has already deployed Opengear ACM7004-5-LMR - Resilience Gateway appliances at around 10 locations across the country, which were initially used to help remotely configure networking equipment at sites connecting to its newly upgraded backbone network. Having a remote access server at distant locations makes it easier to reliably commission and configure new network equipment from its main offices at Espoo and Kajaani. At the final stage, there will be around 40 Opengear Resilience Gateway appliances across the country. "Setting up the devices took very little time and we are now remotely managing the process - which has proved surprisingly simple using 4G LTE and even 3G connections," Ristimaki adds. Built-in CLI tools The built-in CLI tools provided by the Opengear software have proven to be useful especially when commissioning the console server itself. Through this accessibility, CSC has integrated the management of its Opengear Smart OOB devices into its own internally developed network management and orchestration platform based on Ansible. CSC is also using Opengear to help record, and in the event of any problems, rollback critical firmware upgrades and configuration changes for core networking elements at remote sites.
Security has become one of the priorities to be focused on for the operation of commercial buildings because many people come in and out of the buildings every day. IP surveillance solutions are particularly essential for those commercial applications generally used in a wider and more open areas, owing to the requirement of system scalability. Surveon commercial solutions, including high-reliability cameras with wide monitoring area, feature-rich CMS with multiple access as well as RAID NVR with flexible storage expansion. These enterprise solutions help commercial buildings to prevent the incidents such as thefts or other illegalities, effectively safeguarding the property and profits in time. Enhanced storage and data security When designing a suitable surveillance system, commercial buildings might encounter some major challenges such as open field and wide monitoring area. Under such circumstances, Surveon’s 3-megapixel camera will be the best solution. Surveon’s RAID NVR allows users to scale up the storage capacity through iSCSI (SAN/NAS) and JBOD It provides 1.5-time larger monitoring range at 30 FPS, offering a cost-effective option for monitoring wide areas. Besides, Surveon cameras are with industrial-grade components and 3-year warranty to ensure long-term operations. Its quality can be proved by the extremely low RMA rate, and reliability can be assured. The data protection of recorded videos and the flexible expansion of storage capacity for future scale up are of great importance to the planning of commercial surveillance. Surveon’s RAID NVR allows users to scale up the storage capacity through iSCSI (SAN/NAS) and JBOD, bringing commercial buildings a convenient and budget-saving option that they can expand storage capacity by demand or yearly budget instead of buying entire system at the beginning. Efficient management with reduced risk Surveon’s enterprise Central Management Software provides superior features including interactive video walls, matrix screen displays, centralised alarm management, and high scalability for thousands of cameras and multiple clients, allowing the management level and the security guards to keep every detail under control and review both live and stored videos through browsers or mobile applications anytime, anywhere. Surveon was chosen as the supplier of a comprehensive networked security solution for KL Tower, the highest building in Malaysia. The security project manager for the KL Tower said, “Surveon’s full end-to-end integration, including enterprise VMS and storage that supports up to 300TB, helps us manage the project in the most efficient way and brings the lowest risk.” Surveon's commercial solutions have also been deployed at Historic Buildings in Poland, ISP server rooms in Taiwan, and the building of airline catering service provider in Hong Kong.
A major redevelopment and construction project is designed to completely modernise New York’s LaGuardia Airport into a world-class transportation hub that will better serve the tens of millions of passengers that use the airport each year. Siemens Building Technologies is working with Skanska Walsh Joint Venture, the design-build contractor for the redevelopment of Central Terminal B, to deploy an intelligent infrastructure solution that includes an integrated building automation and fire/life safety system for the new central terminal complex.The vision for the new terminal includes an enriched passenger experience by reducing delays at the gate Integrated facility security The new Terminal B will be far more efficient and safer than its predecessor built in 1964. Siemens’ Desigo CC integrated building management platform will monitor the building automation, allowing for dynamic control of the facility’s systems in order to respond to the changing needs of the terminal’s operations. The Desigo Fire XLS-V fire alarm panel with voice capability will be at the heart of the fire alarm system, operating both in Terminal B and the central plant. “The vision for the new terminal includes an enriched passenger experience by reducing delays at the gate and moving all passengers more safely and efficiently throughout the airport,” says Ted Jadermark, Airport System Manager with Skanska Walsh Joint Venture. “Integrating Siemens building automation and fire safety systems as we construct the new facility gives us the ability to manage and monitor its dynamic daily operations with the increased confidence necessary to protect the comfort and safety of LaGuardia’s passengers.” Efficient and safe travel The new terminal complex will be located closer to the existing Grand Central Parkway, freeing up valuable airport apron space for planes. It will also utilise an island-gate system, which will create nearly two miles of additional taxiways and lead to fewer gate delays and less carbon emissions from idling planes. “We’re extremely proud to play such a key role in modernising LaGuardia Airport, and in helping create the perfect place to travel efficiently and safely,” says Dave Hopping, President of Siemens Building Technologies North America. Siemens has an extensive footprint as a leading technology partner and financial ally for the New York City metropolitan region, helping shape the city’s infrastructure.
GardaWorld’s cash handling business is North America’s largest, with its ubiquitous red and white trucks easily spotted throughout Canada and the United States. With hundreds of facilities and handling centers, GardaWorld processes currency for an entire continent, monitored by complex video surveillance technologies, working together to ensure the integrity of their processes and operations. Headquartered in Montreal, Canada, GardaWorld provides business solutions and security services. With over 62,000 staff globally, GardaWorld is one of the largest privately-owned security companies in the world, protecting people, assets, and reputations on a daily basis, performing critical tasks to protect and secure in an increasingly chaotic world. Efficient central monitoring When the time came to upgrade existing video surveillance operations for the company’s cash handling business as well as installations for the company’s newest sites, the task was complex with unique requirements and on a massive scale spanning two countries. IDIS technology, known for its power, flexibility, modularity, and low total cost of ownership, stood ready to meet the company’s needs.DirectCX TVRs were installed at legacy sites to ensure zero downtime for GardaWorld’s video surveillance capabilities Upgrading the legacy GardaWorld video surveillance solution across their 250+ sites required the installation of over 700 IDIS cameras and the establishment of two major central monitoring facilities. The inter-compatibility inherent in the IDIS Total Solution allowed the powerful and intuitive video management software (VMS) solutions, IDIS DirectCX and IDIS Solution Suite, to harmonise at GardaWorld central monitoring facilities. DirectCX TVRs were installed at legacy sites to ensure zero downtime for GardaWorld’s video surveillance capabilities, and IDIS DirectIP network video recorders (NVRs) were incorporated rapidly thanks to their ease and speed of installation and configuration. Reduced ownership cost The IDIS solution for GardaWorld was not only rapidly deployed thanks to the simplicity of DirectIP and IDIS VMS; the modernised monitoring system also comes with a low total cost of ownership due to a reduction of cabling cost thanks to IDIS DirectCX TVRs, the lack of any annual service management agreement or licensing fees for IDIS VMS, and less training time required from the single remote application used for managing each device on the system.IDIS solutions have proven flexible, scalable, and customisable to deliver the appropriate technology "IDIS meets our high standards and more with a surveillance offering that is as committed to our security requirements as we are. IDIS technology delivers powerful features and capabilities in a variety of ways that meet needs as diverse as our differing locations and custom requirements." "Whether analogue or IP networked solutions, new installations or upgrades, or at urban or remote sites, IDIS solutions have proven flexible, scalable, and customisable to deliver the appropriate technology in the ideal way for each requirement." "We are pleased with the partnership we have created with IDIS over the past year and look forward to the continued benefit we’ll receive from current and planned installations of IDIS technology," Guy Côté, Vice President and Chief Security Officer, GardaWorld. Integrating analogue and digital surveillance GardaWorld’s exceptional footprint and storied legacy in North America meant there was a highly varied set of conditions and requirements for optimising video surveillance operations. With a mix of existing analogue and digital surveillance in existing facilities and requirements for initial installations in newer facilities, GardaWorld articulated complex security needs for more than 250 individual sites throughout Canada and the United States, each requiring high quality video surveillance and networking with a mix of analogue and digital technology.The rollout of IDIS technology required training for operators and monitors of surveillance equipment Within individual facilities, existing video surveillance reflected a substantial level of upgrade complexity. The number of cameras at each site varied, with additional variances in age and operations for prior installations. Due to the nature of GardaWorld’s operations, it was imperative that no interruption of security monitoring would occur during the transition to IDIS technology. Further, the rollout of IDIS technology required training for operators and monitors of surveillance equipment at various locations, a potential challenge given the scale of the rollout and upgrades. Customisable security solution The ability of the powerfully modular and customisable IDIS Total Solution were an ideal fit for GardaWorld’s security needs, delivering benefits from the start, and are still ongoing, of the installation. GardaWorld benefitted from worry free integration of existing technologies and the installation of a flexible, customised solution that blended analogue HD-TVI technology with next-generation IP networked surveillance, as appropriate to each site, linked and managed by the powerful and highly customisable IDIS Solution Suite VMS. The installation met GardaWorld’s requirements for seamless upgrade and technology handover, minimising downtime and supporting the critical nature of GardaWorld’s operations.The seamless integration under IDIS’s powerful connectivity and simplified installation and use has reduced training time for GardaWorld staff Seamless security integration GardaWorld facilities now benefit from modernised, functionally rich cameras and recording devices that deliver clearer and smoother surveillance, and hasten an operator‘s ability to identify and mitigate potential incidents and fully review and respond to questions about operational security. The seamless integration under IDIS’s powerful connectivity and simplified installation and use has reduced training time for GardaWorld staff and eliminated the most common headaches associated with mass upgrades and new installations of security technology. Better surveillance and security operations for GardaWorld pass through to a more secure position for GardaWorld staff and customer assets around the world, further confirming GardaWorld’s place as a market and innovation leader in the security space.
Round table discussion
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
High-quality products are the building blocks of successful physical security systems. How they are packaged may sometimes be seen as an unimportant detail or an afterthought. But should it be? Effective packaging can serve many functions, from creating a favorable customer impression to ensuring the product isn’t damaged in transit. Packaging can also contribute to ease of installation. On the negative side, excess packaging can be an environmental concern, especially for customers who are sensitive to green factors or to minimising waste. We asked this week’s Expert Panel Roundtable: Is packaging of products important in the commercial security market? Why or why not?
Higher pixel count is better. It’s a basic tenet of the video surveillance market, or at least it is the implication as manufacturers continue to tout their latest products offering ever-higher pixel counts. But the reality is more nuanced, as our Expert Panel Roundtable panelists explain this week. Pixel count shouldn’t be seen as an end unto itself, but rather as a factor in determining what camera is applicable to which application. Pixel count is just one factor of several to consider, and the needs of the application must rule all decisions. We asked this week’s panel: How many megapixels are enough? At what point does additional resolution not matter, or not make economic sense?