Dahua Technology, the globally renowned video-centric smart IoT solutions and services provider, announced that the company successfully held the online Dahua Technology Partner Day 2020 event on December 1, 2020 with 26 technology partners. IoT and security solutions Dahua showcased its ecosystem in the EMEA region, while the partners brought solutions in the field of security and IoT, taking interoperability to the next level. Openness and cooperation is always Dahua's core values. Together...
Gigaclear, the renowned rural broadband services provider, has officially launched its Community Hub Scheme, which aims to provide free broadband to critical community services. 137 of Gigaclear’s Community Hubs are already connected to its ultrafast network, but all areas in which Gigaclear is building are encouraged to apply for the initiative. Ultrafast, full-fibre network The company, which has continued to expand its ultrafast, full-fibre network to reach more people across rural Br...
Interphone has published a security system and building technology whitepaper to help developers, contractors, installers and managing agents better understand their responsibilities regarding the General Data Protection Regulation (GDPR). The in-depth report, titled A guide to GDPR compliance for the commercial residential marketplace, has been produced jointly with legal training specialist Woolven and Brown to provide an industry-specific look at the data protection and privacy law. GDPR an...
The time needed to plan, design and accurately evaluate the efficiency of a video surveillance system has been significantly reduced with the news that JVSG’s highly acclaimed IP Video System Design Tool now supports all Wisenet IP Network cameras from Hanwha Techwin. Visualisation of security system System designers and system integrators simply need to import 2D or 3D models of the end user’s building or site, and then enter in some parameters specific to the project, such as the...
To say that the security industry draws people in and demonstrates its value in terms of relationship building with the caliber of people who comprise the industry is an understatement, as Bart Williams, President of Security Solutions and Communications, Inc. (Security Solutions) found out. Founder of Security Solutions Williams chose to become an engineer as his profession, but he began dabbling in the security industry part time, soon to discover it would lead him on the path to becoming St...
3xLOGIC, the foremost provider of server and cloud-based technology, is launching its VIGIL suite of video solutions across the UK, Europe, the Middle East and Africa (EMEA). The ecosystem, comprising software and hardware such as cameras, recorders, thermal imagers, people counters and accessories, is designed to provide a scalable security solution that’s tailored to every business need. Analysing data Business leaders have increasing amounts of data available to analyse, with the tot...
Suprema, a globally renowned company in access control, biometrics and time & attendance solutions, has announced that its intelligent biometric access controller, CoreStation has acquired UL 294 compliance. UL 294 compliance UL 294 is a certification designed especially to ensure the safety and reliability of access control products. The certification has significance to larger customers, like government institutions, corporations, and medical and banking verticals that value reliability of access control system, more than smaller organisations. “We are glad to announce that Suprema CoreStation has been recognised by an internationally renowned label for its safety and reliability. This means that CoreStation meets the industry’s highest standards and customers looking for top-notch access control solution can be assured to choose Suprema,” said Young S. Moon, the Chief Executive Officer (CEO) of Suprema Inc. CoreStation, intelligent biometric access controller Suprema CoreStation is an intelligent door controller that provides advantages of biometric-enabled security over centralised access control systems. CoreStation is capable of offering comprehensive access control functionalities for up to 132 access points, handling up to 500,000 users. The device also provides centralised biometric template management and interfaces with complete set of reader technologies including RS-485(OSDP) and Wiegand.
ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of fibre optic transmission and networking equipment and an ACRE brand, announced that ACRE has acquired Razberi Technologies and the product line will be added to and sold under the ComNet brand and portfolio of products. ComNet will now be selling Razberi products through its established channels. Intelligent video appliances The Razberi product line of intelligent video appliances, automated security software, and health monitoring software is designed to protect and monitor IP-based surveillance systems and complements the ComNet line of innovative network communication solutions. The Razberi appliance allows cameras, access control points, and other devices to add layers of protection while lowering the threat of cyber security risks to businesses. According to Tom Galvin, Razberi founder and Chief Product Officer, “We’re excited to join with ComNet and add more value to their deep network product line. ComNet can now offer a more comprehensive infrastructure for video transmission, storage, management, and cyber security.” Open video surveillance platform Bringing Razberi Technologies into the ComNet product portfolio made sense on many levels" Razberi’s open video surveillance platform includes intelligent appliances combined with automated cyber security and health monitoring software. In combination with a wide range of top third-party video management software (VMS) applications and IP cameras, enterprises can flexibly deploy a best of breed solution that reduces their total cost of ownership and reduces the likelihood of a costly cyber breach. “Bringing Razberi Technologies into the ComNet product portfolio made sense on many levels,” said Andrew Acquarulo Jr., ComNet’s Chief Executive Officer and President, adding “ComNet has strongly considered adding an enhanced surveillance product line that would make a significant impact on the market and bring a measurable improvement to any application. We believe Razberi is that product.” Enhancing cyber security and securing business networks ComNet believes the Razberi product line is a cost-effective solution and its cyber security products can complement ComNet’s emphasis on securing business networks. “With the intense focus on cyber security, the unique Razberi products directed to cyber threats, CameraDefense and ApplianceDefense now combined with ComNet Port Guardian, present a formidable defence against unauthorised network access,” said Skip Haight, ComNet Vice President of Marketing, adding “Our position is that if you are concerned about the long-term success of your application, choosing ComNet ensures it will be.”
Briefcam, the industry’s renowned provider of Video Content Analytics and Video Synopsis solutions, has announced that its advanced video analytics software platform will serve as the analytics engine for Verizon’s Intelligent Video solution. Intelligent Video solution The comprehensive monitoring service from Verizon helps law enforcement and security teams keep public and private facilities secure with near real-time, actionable data from video content. The combined solution enhances the ability for these organisations to protect lives and property in remote locations and in the city centres - equally. This includes critical infrastructure from dams and power plants to oil refineries and transportation systems. Advanced video analytics The full solution leveraging BriefCam provides advanced video analytics, including near real-time and forensic video analysis, and trends in data through dashboard visualisation, enabling rapid acceleration of video investigations. “Leveraging its renowned network, Verizon is creating a best-in-class solution to enable the protection of all facilities in a community whether in the city center or on the edge of town,” said Gili Rom, Vice President of Strategic Initiatives, BriefCam. Gili adds, “Bringing together Verizon’s wireless infrastructure with our advanced video analytics and other industry leading technologies allows security professionals to remotely optimise situational awareness while reducing time and resource investments.” Leveraging robust analytics software The solution was built to provide advanced analytics and benefits for an improved experience Verizon Intelligent Video leveraging BriefCam’s robust analytics software offers a comprehensive, bundled video management solution for cloud or wireless access that includes software licencing, installation, administration, training, and support. The solution was built to provide advanced analytics and benefits for an improved experience. BriefCam delivers the ability to monitor and analyse multiple sites remotely from a single interface and the insights needed to fully prevent or investigate and resolve issues. Automated video analysis Verizon Intelligent Video automates video analysis with an easy-to-use interface so that users can quickly drill down, and filtre objects based on a wide range of object classifications, attributes, and behaviours. This accelerates investigations and helps users attain situational awareness sooner, to derive operational intelligence from video. The powerful solution makes it possible to do more with fewer monitoring, intelligence, and investigative resources.
ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of fibre optic transmission and networking equipment and an ACRE brand, announced that ACRE has acquired Razberi Technologies and the product line will be added to and sold under the ComNet brand and portfolio of products. ComNet will now be selling Razberi products through its established channels. Razberi product line The Razberi product line of Intelligent video appliances, automated security software, and health monitoring software is designed to protect and monitor IP-Based surveillance systems and complements the ComNet line of innovative network communication solutions. The Razberi appliance allows cameras, access control points, and other devices to add layers of protection while lowering the threat of cybersecurity risks to businesses. Offering comprehensive infrastructure According to Tom Galvin, Razberi founder and Chief Product Officer, “We’re excited to join with ComNet and add more value to their deep network product line.” “ComNet can now offer a more comprehensive infrastructure for video transmission, storage, management and cybersecurity.” Deploying flexible solutions Enterprises deploy solutions that reduce the total cost of ownership and the likelihood of a costly cyber breachRazberi’s open video surveillance platform includes intelligent appliances combined with automated cybersecurity and health monitoring software. In combination with a wide range of top third-party Video Management Software (VMS) applications and IP cameras, enterprises can flexibly deploy solutions that reduce the total cost of ownership and reduces the likelihood of a costly cyber breach. Significant impact on the market “Bringing Razberi Technologies into the ComNet product portfolio made sense on many levels,” said Andrew Acquarulo Jr., ComNet CEO and President. “ComNet has strongly considered adding an enhanced surveillance product line that would make a significant impact on the market and bring a measurable improvement to any application. We believe Razberi is that product,” Acquarulo concluded. Cost-effective solution ComNet believes the Razberi product line is a cost-effective solution and its cybersecurity products can complement ComNet’s emphasis on securing business networks. “With the intense focus on cybersecurity, the unique Razberi products directed to cyber threats, CameraDefense™ and ApplianceDefense™ now combined with ComNet Port Guardian™, present a formidable defense against unauthorized network access,” said Skip Haight, ComNet VP of Marketing. “Our position is that if you are concerned about the long-term success of your application, choosing ComNet ensures it will be,” added Haight.
Interface Security Systems, a managed service provider delivering business security, managed network, UCaaS (Unified Communications as a Service) and business intelligence solutions to distributed enterprises, announces a new offering that enables its restaurant, retail and hospitality customers to communicate with their patrons via SMS and MMS text messages. Using their regular published business telephone number, businesses can have real-time two-way text conversations with their guests, inform them when their orders are ready to be picked up, or when their room is ready. Patrons can place orders, ask questions, and inform restaurants when they are waiting outside the store or restaurant for their order. Android mobile devices Available as a component of the Interface UCaaS (Unified Communications as a Service) offerings, the new text messaging app does not require businesses to equip their employees with new mobile devices or give out private numbers in order to communicate with customers. Multiple employees can access message threads across multiple devices Using the ‘Persistent Message’ feature, all messages are securely maintained in the cloud and can be accessed by any iOS or Android mobile device, tablet or computer. Multiple employees can access message threads across multiple devices. This prevents loss of message history and important information with the ability to maintain access on new devices should one of the devices crash or even run out of battery. Text messaging application Designated employees can login to the business text messaging application using single sign-on credentials, turn alerts on or off, search messages, manage settings, and more. “We are excited to work with our partners at Star2Star to expand our UCaaS suite of services with a new Business Text Messaging app.” “Our integrated mobile and desktop text messaging solutions will enable our customers to provide seamless service to their customers by using their existing business phone numbers. The cloud-based design provides flexibility in deploying this service and the persistent message feature offers ease of use across multiple devices,” said Tom Hesterman, SVP of Product Development at Interface Security Systems.
Invixium, a globally renowned manufacturer of innovative touchless biometric solutions, is opening its new Middle East headquarters in Dubai, United Arab Emirates that will serve the Middle East, Turkey, North Africa and Pakistan regions. The new MENA headquarters has been established to best respond to the growing interest in Invixium's health-focused, temperature-based workforce management and access control biometric solutions that are in high demand as businesses reopen during COVID-19 pandemic spread. MENA headquarters Invixium's new office is centrally located in Dubai Internet City, which is regarded as the innovation and technology hub of the region and where Microsoft, HP, IBM, Vodafone, 3M and other tech-centric companies maintain a presence. To launch this expansion, Invixium also announces the hiring of Wisam Yaghmour as the Senior Director of Sales, MENA. Yaghmour joins Invixium after five years at HID Global, where he oversaw operations at the MEA corporate office and served as the lead for all sales activities in the region. He brings a solid track record in developing new markets, partnering with key strategic customers and expanding product distribution bases. New appointment to help meet security challenges "As Invixium continues to develop solutions that resolve continually emerging security challenges, we're focused on ensuring we have the best position to support our growing customer base," said Shiraz Kapadia, Chief Executive Officer (CEO) and President of Invixium. Shiraz adds, "Our new MENA headquarters in the technology epicentre of the region and the addition of a highly experienced sales expert who understands the nuances of this market allow us to continue our trajectory of innovation." Biometrics and access control solutions expert I was drawn to join Invixium because of their impressive advancements in biometrics" "I was drawn to join Invixium because of their impressive advancements in biometrics that deliver the perfect blend of access control, visitor screening and workforce management," said Wisam Yaghmour. Wisam adds, "I am excited to expand Invixium's presence in MENA, where new and existing customers can greatly benefit from the high level of confidence and security that these innovative solutions provide." IXM TITAN with Enhancement Kit Expansion into MENA supports Invixium's recent product launches and updates. IXM TITAN with Enhancement Kit continues to be well-received worldwide as businesses strategise healthy reopening plans. The solution now pairs with the licenced software feature, IXM Health, to report on staff and visitor health through temperature screening measured at the medial canthus (tear duct). Further, IXM TITAN now allows for mask detection and face recognition while wearing a mask to enable businesses to safely reopen and follow government mandates for masks or face coverings to be worn in public spaces.
A recent survey compared how employees, tenants, property owners and managers, and developers feel about returning to the workplace, and what would make them feel safer. Among the responses from employees and tenants, 63% don’t feel comfortable returning to work, and cited their own health and safety, as well as the safety of their loved ones, as the main cause for concern. However, 73% of business owners said they plan on reopening as soon as possible, within 2-4 weeks. How can we fix the disconnect, and ensure that property owners are creating safer, healthier workspaces for returning tenants? With the right tools and strategies in place, businesses can return to work with confidence. As it turns out, decision makers are prepared to budget for safety precautions as well; whether it’s providing PPE for employees, or upgrading building systems, 51% of owners are increasing their security and safety spend in response to the pandemic. Innovative technology is helping businesses find ways to accommodate new health guidelines, as well as give tenants peace of mind as they return to the workplace. Tenant and employee concerns 79% of people saying they’d be more willing to return to work with reduced occupancy In addressing top tenant and employee concerns, many businesses are pivoting to staggered work schedules. This is a good starting point for accommodating the CDC workplace guidelines for social distancing, as it helps minimise the number of people in the building. In fact, social distancing was the top-requested safety update requested by employees and tenants, with 79% of people saying they’d be more willing to return to work with reduced occupancy. However, with 80% of businesses maintaining or decreasing their current building size, minimising the number of people at work can be challenging, especially if you’re managing your facility remotely. Occupancy management tools, such as density counters, people sensors, and presence reporting data, can help administrators track who is at the building and when. Plus, with more data at your disposal, you can make informed decisions about space utilisation throughout the building, whether to reopen amenities like gyms and cafeterias, and adjust work schedules to accommodate capacity thresholds. To further streamline the process, you can enforce capacity thresholds by connecting occupancy tools to your access control system. Associating work schedules with access credentials ensures that only those scheduled for the day will be able to enter the space. Accessing the workplace Which brings us to the next piece of the return-to-work puzzle: how people are accessing the workplace. “The reality is that people don’t want to touch things anymore; it’s just too stressful,” says Openpath President James Segil, “Removing the communal touch points is key to making people feel safer, which is why you’ll see so many tech companies pivoting to touchless capabilities.” And yet, only 25% of decision makers have implemented touchless solutions. Mobile credentials were already growing in popularity for their convenience and ease of use prior to the pandemic. In fact, 62% of survey respondents would prefer to use their phone to enter the workplace. Now, touchless access control options can also eliminate the need to touch a common reader or door handle. Plus, with a cloud-based access control solution, all those mobile credentials are managed remotely, which helps accommodate a remote workforce and eliminates the need to meet in person to issue a badge. When even opening the front door induces anxiety, touchless access makes it one less thing to worry about. Healthcare questionnaires In addition to limiting who has access to the building, many businesses are now requiring employees and visitors to complete health questionnaires prior to coming into the workplace. Take the burden off your administrative staff by using tenant and visitor platforms like Envoy Protect, which offer digital access requests, check-in, and amenity reservations. Using a mobile platform to create, distribute, and manage health questionnaires is a smart way to streamline your operations, plus it gives you more visibility into who is in your building and when. 45% of commercial landlords and business owners admit security is one of the biggest challenges During the pandemic, 45% of commercial landlords and business owners admit security is one of the biggest challenges they’re facing. Approach technology updates with a smart strategy to maximise the safety and security benefits: start with the most impactful areas first, such as the front door. A mobile access control solution like Openpath that offers built-in occupancy tracking capabilities can help automate and enforce social distancing measures while still ensuring the security of your space. As a best practice, open systems allow for seamless integrations to strengthen your security. For example, integrating Cisco Meraki’s video surveillance platform with access control enables remote security management by associating real-time footage with access events. Prioritising safety and security is key to addressing the concerns of returning tenants and employees as workplaces reopen. Because business owners are faced with tough decisions on which updates will prove to be sound investments, it’s important to consider technology that does more than solve immediate problems. Future-proof systems enable safer reopening now, and are also primed to meet the challenges of tomorrow. Integrated proptech tools are allowing businesses to make smarter decisions and create safer, healthier workspaces for the post-pandemic world.
In today’s fraught times, business continuity and success hinges on how you manage the visitors to your company. By prioritising safety and security, and coupling them with top-notch attention and customer service, you win loyalty and gain a reputation that will serve you in years to come. An excellent way to accomplish this is by identifying and implementing the best visitor management system for your company. And visitor management systems go beyond ensuring the safety of your visitors and staff safety from your visitors. A feature-rich VMS will track your guests' activities, so you can better understand their preferences for future visits. That way, you can manage visitor experience and tailor amenities and preferences. Both customer loyalty and brand reputation benefit. Visitor management systems: who uses it, and why is it used? Visitor management refers to all the processes put together by an organisation to welcome, process, and keep track Visitor management refers to all the processes put together by an organisation to welcome, process, and keep track of all the guests daily. A visitor management system (VMS) is the technology used to manage guests for their convenience, safety, and security. Several features are typical in today’s applications. They include preregistration tools, video intercoms, self-check-in stations, and health screening. In visitor management, the term "visitor" doesn't only refer to guests but also anyone without an authorized access credential. For instance, an employee without their access credential logs in as a visitor. The same applies to a delivery man or a technician carrying out routine maintenance. A VMS helps to account for everyone within the organisation at any given time. Who uses visitor management systems? You need a visitor management system to manage a school or hospital, an office, or even a residential building. Here's why: Visitor management system for schools: schools are among society’s most vulnerable facilities. A VMS is almost mandatory in this setting. It helps to identify visitors, detect intruders, and alert security of any unauthorised access. Visitor management system for offices: A VMS accounts for guests at all times. They include clients, maintenance contractors, delivery men, employees without credentials, friends, and family, Visitor management system for hospitals: access control is essential in hospitals, and managing visitors plays a major role. Hospitals offer access to pharmaceuticals, medical records, newborns, and expensive equipment. It is crucial to monitor restricted hallways and sections with video intercoms and track unauthorised persons' movements. Residential visitor management system: tracking people's movement is a key VMS component. In case of a crime, knowing who had access to the building within a specific time frame can help in the investigation. Plus, tracking the activities of visitors can deter future crime. Why is the visitor management system important? A video intercom makes it much more difficult for a visitor to impersonate a known guest. VMS accounts for everyone within the organisation in cases of emergency. VMSs can prevent intruders and alert the security department of a breach. A VMS creates a positive visitor experience, which shapes perception of the organisation. With a trusted VMS in place, employees can focus on being productive. Health screening gives staff peace of mind. It increases employees' willingness to return to work in the midst of the COVID 19 pandemic. How does a good VMS address occupant and visitor safety? The necessary technology to ensure building safety The best visitor management systems contain the necessary technology to ensure building safety. To maximise occupant and visitor safety, a VMS should have the following features: Job one of a VMS is visitor identification. It also helps deter potential criminals. Some VMSs go beyond identification by running a quick check on the visitor's ID and alerting security of any discrepancies. By identifying and proving a visitor's identity, the VMS ensures the safety of employees and other visitors. VMS helps with compliance A good visitor management system helps the organisation follow regulations, such as for occupancy. In the COVID era, some states may require health screening for guests. Health screening helps protect the building's occupants from exposure to health hazards. Information security VMSs also aid in information protection. It takes mere seconds for a rogue visitor to download files into a jump drive, photograph exposed blueprints, or copy customer lists. Visitor management systems restrict visitor access to parts of the building and track the whereabouts of guests. Visitor privacy With pen and paper systems, walking up to the receptionist often gives visitors full view of the visitors list. Visitor management systems seal that vulnerability. Visitors can check in without fear that anyone nearby can see their information. Emergency evacuation With a good VMS, the exact number of people within the building is always known. In the case of an emergency, first responders can use VMS data to identify everyone on site. This is a safety net for both the occupants and visitors to the organisation. How to manage building visitors System features depend on the purpose and setting of the VMS. Yet certain features and processes are essential. Preauthorisation and health screening The first step is knowing the visitors upfront. Preauthorisation allows everyone to know who is coming and when. Guests specify the time and purpose of their visits. You get to welcome and accommodate your visitors accordingly. Some systems may also be able to upload documents of interest, such as proposals, contracts, presentations, or agendas. Health screening is critical today. It signals that the organisation cares about its guests. A visitor is more likely to visit an organisation that prioritises health and safety. Health screening is a way to protect your staff and send the right message. Video intercom Along with health screening, video intercom is a key element of VMSs. It enables secure video identification with remote, touchless, and COVID-safe access into buildings. Intercoms are a safe and secure way to communicate with audio and video without physical contact. Video allows you to visually verify the visitor. The audio component enables spoken communication. Some systems even use facial recognition technology and mobile app unlock. When integrated with access control, visitor arrival is seamless. Upgrade to touchless access Touchless access is the safest and most secure VMS option Touchless access is the safest and most secure VMS option. It is more sophisticated because it receives visitors without them having to lift a finger. It's also convenient and effective. In this time of the novel coronavirus, the demand for hands-free systems is surging. VMS has pivoted to met this demand. Many organisations are finding how touchless systems increase safety in the workplace. Visitor logging is essential for managing guests to your building. Besides being a source for verification and data tracing, it also helps in real-time to know who signed into the building and who hasn't signed out yet. Tracking the movement of visitors within the facility makes it clear where they are at all times. This way, there can be an effective emergency action plan for visitors and other occupants. This feature has use in contact tracing, health investigations, and other investigations, such as for theft.
The security industry knows the value of recurring revenue, as it’s the foundation of the residential security monitoring market. Commercial systems integrators have traditionally taken a different approach, focused on one-time commodity-based sales that lack the financial benefits provided through long-term serviced-based agreements. Cash flow is one of the biggest challenges faced by security systems integrators. And the truth is, during economic uncertainty, businesses will find that companies that have adopted and implemented a sales model that incorporates a monthly-based service program will be more financially secure. Technology solutions TAMCO was founded in 1994 by Jack Thompson who had a unique background that included technology integration, finance, and sales. With this knowledge, he set out to build a company that would introduce a finance offering and business model that addressed the pitfalls within cash and traditional lease procurement methods. The design of this finance offering was under the premise that most technology solutions are non-revenue generating assets. Most technology solutions are non-revenue generating assets The goal was to give the end-user customer a better way to pay with more control and flexibility as they entered in and out of technology lifecycles. At the same time, this new offering would give integrators easier ways to sell services with those technologies while shortening the selling cycle. With changes in telecommunication solutions several years ago, we noticed typical voice integrator partners attempting to diversify their technology solution offerings. We explored providing payment options for these additional technologies and found several areas with significant interest in our approach. About two years ago we saw increasing interest from within the security industry and this is now one of our top growth sectors today. Being in control Historically integrators have done a great job of getting customers accustomed to cash purchase transactions. While owning technology solutions may have felt like a way to be in control, customers have begun to realize that ownership is really not a necessity. It is the use of the technology and what they can do with the use of the technology that is truly meaningful. Now add to that the fact that technology continues to change more quickly than ever and I think it makes sense that customers are looking for better ways to pay for and manage their technology needs. Integrators have begun to express an overwhelming interest in creating recurring revenue At the same time, integrators have begun to express an overwhelming interest in creating recurring revenue. They are looking for ways to complement their one-time project-based revenue business or shift to a model that is focused on a regular stream of revenue. However, many integrators are not sure how to implement this new approach. As-a-service is just another way of saying a subscription service. At the consumer level, we are all very familiar with subscription services, such as Netflix or Birchbox. Small to medium-size businesses and enterprise-level commercial customers are also familiar with equivalent type technology services from their hosted phone service subscriptions or software-as-a-service (SaaS) solutions. As-a-service security If an integrator can package their technology solution in the form of an as-a-service solution, they will have a much better chance of developing recurring revenue. A majority of as-a-service models involve the customer paying for hardware equipment upfront and then having a monthly payment only for monitoring or support services. Or, to avoid a large upfront capital outlay, the integrator may arrange for a traditional lease payment that gives the illusion of as-a-service but still results in the customer owning dated equipment at the end of the term. TAMCO takes a different approach because we help integrators create a very comprehensive and logical solution under a single, use-based monthly payment. The integrator still designs, configures, and recommends the technology solution appropriate for the customer. But TAMCO will take the cash sale price of hardware, software, installation, manufacturer warranty, multi-year maintenance and support, and convert all of that to a single all-inclusive monthly payment which the integrator can present to their customer. In addition, this as-a-service monthly payment also provides the customer with exclusive protection against technology obsolescence. Integrators have really been excited to learn of this approach and to convert to selling this way. Integrators can remove themselves from being a commodity sale and thereby maintain margins Integrators can remove themselves from being a commodity sale and thereby maintain margins. They become much more successful at selling multi-year maintenance and support agreements, thereby building recurring revenue which is valuable to help weather slow periods of sales activities and economic downturns. And following the market currents of subscription-based solutions helps create long term customer relationships. Whether an organisation works with TAMCO or not, there are certain foundational elements they need to embrace in order to build and adopt a successful as-a-service sales model. Some form of payment alternative like we discussed is certainly one of those elements, but it is not necessarily the most important. The technical expertise to deliver on support has to be there for the customer. While sales training, mindset shift, and supporting marketing materials are all critical as well.
John Wiegand died in 1986, but the communications protocol that bears his name is still alive and well, connecting access control readers to controllers using two wires – one to transmit “zeros” and the other to transmit “ones.” The Wiegand protocol persists despite its limitations, including one-way communication, lack of encryption, and inability to manage the readers in a system centrally. In a Wiegand system, a controller provides no acknowledgement that data has been received. Systems that still use the Wiegand protocol are performing below accepted industry standards and are vulnerable to over-the-counter exploits. A session at ISC West’s Virtual Event highlighted a replacement technology that solves those problems and expands the security, flexibility and functionality of systems. The technology is called OSDP (Open Supervised Device Protocol), which is now a standard managed by the Security Industry Association (SIA) and designated as an international standard by the International Electrotechnical Commission (IEC 60839-11-5). Aligning three components OSDP requires alignment of three critical components – the access control system, readers and controllers. The access control system, readers and controllers OSDP is an RS-485 protocol used to pass card format data from the reader to the controller. Like the Wiegand protocol, it uses two wires, but in this case one wire transmits data and the other receives data. Installation is simplified because no system needs more than four wires – two for OSDP communication and two more for power. In contrast, using Wiegand, additional wires are needed to add other capabilities – up to 8 or more wires in all. OSDP cable runs can extend up to 4,000 ft (compared to 500 feet for Wiegand). Resolving problems Therefore, unlike Wiegand, OSDP sends information in both directions and provides “supervision” of the readers. If there is a problem with a reader, such as a reader communication error or disconnect, that notification is sent back to the access control management system. OSDP also supports encryption for greater security, in effect enabling end-to-end encryption for a host system, controller, I/O modules, readers and credentials. That notification is sent back to the access control management system OSDP also provides additional capabilities, such as control of a reader’s LED and buzzer as well as sending text notifications and messages to compatible displays. Integrators and/or end users can also push configuration and firmware updates to readers all at once. Because OSDP is “open,” there are more third-party integrations and standardizations. OSDP is particularly valuable for U.S. government applications because it meets federal access control requirements such as PKI for FICAM. Wiring requirements Best practice dictates rewiring a project using RS-485 cabling. Specific wiring requirements are needed for OSDP, including 24 gauge (AWG) stranded cables that are a shielded twisted pair with 120 Ohm impedance and overall lower capacitance. However, especially for shorter cable runs, existing wire from Wiegand installations can sometimes suffice, say if it is a cable run of less than 100 ft. Installers should prove their competency before being deployed to an outside installation “Installation of OSDP is not hard, just different than field technicians are used to deploying,” said Tony Diodato of Cypress Integration Solutions, one of the ISC West presenters. Therefore, training of technicians is paramount, and installers should prove their competency before being deployed to an outside installation in order to avoid problems. Integrators or installing teams should have a “lab” setup to thoroughly familiarise themselves with installation to ensure successful deployments. Various in-line devices are available to help transition existing Wiegand applications to OSDP, even if one component or other does not support OSDP. For example, data converters enable installation of an OSDP reader with a legacy Wiegand control panel. Replacing existing devices in legacy Wiegand systems with OSDP devices and using data converters can provide some benefits of OSDP without requiring a full “rip-and-replace” installation.
Historically, concerns about inclusion and diversity have not been widely discussed in the security market. In the last couple of years, however, the Security Industry Association (SIA) and other groups have worked to raise awareness around issues of diversity and inclusion. Specifically, SIA’s Women in Security Forum has focused on the growing role of women in all aspects of security, and SIA’s RISE community has focused on “rising stars” in an industry previously dominated by Baby Boomers. The next generation of security leaders There is a business case to be made for diversity and inclusion, says a report by McKinsey & Company. According to the management consulting company, gender-diverse companies are 24% more likely to outperform less diverse companies, and ethnically diverse companies are 33% more likely to outperform their less diverse counterparts. Furthermore, the “next generation of security leaders” – employees under 30 – are particularly focused on diversity and inclusion. Diversity refers to the traits and characteristics that make people unique A panel discussion at ISC West’s Virtual Event highlighted aspects of inclusion and diversity, starting with a definition of each. Diversity refers to the traits and characteristics that make people unique. On the other hand, inclusion refers to the behaviour and social norms that ensure people feel welcome. “We are all on a journey, and our journey takes different paths,” said Willem Ryan of AlertEnterprise, one of the SIA panelists. “There are opportunities to improve over time. We can all change and increase our ability to have a positive impact.” Industry responsibility The industry has a responsibility to the next generation of industry leaders to address issues of inclusion and diversity. Forbes magazine says that millennials are more engaged at work when they believe their company fosters an inclusive culture. So the question becomes: How do we unify and create opportunities to work with and champion tomorrow’s leaders? SIA is driving change in our industry to achieve that goal. More women are active in SIA than ever before. The SIA Women in Security Forum now has 520 members, said Maureen Carlo of BCD International, the SIA Women in Security Forum Chair and another panelist. Also, more women than ever are chairing SIA committees and serving on the SIA Board of Directors. More women than ever are chairing SIA committees Overcoming unconscious bias Former SIA Chairman Scott Shafer of SMS Advisors, another of the panelists, noted that SIA awarded the Chairman’s Award to the Women in Security Forum in 2019, and to the RISE community steering committee in 2020. “There are lots of ways we are seeing the elevation of women and ethnic groups in the security industry,” said Shafer. One topic of interest is the problem of “unconscious bias,” which can be overcome by looking at something through some else’s lens. Ryan suggested use of the acronym SELF – Slow Down, Empathise, Learn, and Find commonalities. Ryan recalled the value of being mentored and having someone shepherd him around the industry. “Now I want to give back,” he said. “We need to look at the things we can change in ourselves, in our company, in our communities, and in our industry. Change comes from the bottom and the top.” Increasing representation “It takes all of us to increase representation everywhere,” said Kasia Hanson of Intel Corp., another panelist. “We have in common that we are all human beings. Let’s make sure the next generation all have opportunities.” Diverse companies can attract better talent Moving forward, the panelists urged the industry to get involved and create opportunities because inclusion drives diversity. Diverse companies can attract better talent and attain a competitive advantage. Awareness of unconscious bias, and working to eliminate it, is an important element of change. Despite the progress the security industry is making, change continues to be incremental. As Ruth Bader Ginsburg has said, “Real change, enduring change, happens one step at a time.”
Can a smart card be used securely for multiple applications (and among multiple manufacturers )? End users are demanding such interoperability, and they also want openness to switching out components of their access control systems in the future without being “locked in” to one vendor. Those are the goals of the LEAF Identity consortium, a collection of companies that share and support end user-owned encryption keys stored securely in smart cards with MIFARE DESFire EV2 chips and are used to authenticate access control credentials and read the data required to access multiple applications secured by multiple vendor devices. Smart card systems - more secure Almost everyone in the industry now knows that low-frequency (125 kHz) “prox” cards are not secure; in fact, low-cost cloning equipment is readily and inexpensively available. As the industry transitions to encrypted cards, challenges of interoperability persist. Keeping smart card systems more secure are AES 128 encryption keys encoded onto the card chips. Information is exchanged via radio frequency (RF) in a challenge-response interaction when a card is presented to a reader. The most recent LEAF EV2/EV3 cards allow up to 16 devices to be individually accessed using 16 unique keys, respectively that are stored in the smart cards (and among a variety of manufacturers). LEAF Identity Consortium enables interoperability with encrypted Smart Cards LEAF Memory Model specifies a standard EV2 (EV1 backward compatible) smart card data format and application access protocols that ensure each manufacturer’s devices can interface with a card chip in the same way. Specifically, each card has a “common data structure” based on the LEAF Memory Model, which means that the location of information is arranged on a card chip in a predictable and consistent manner. Each end-user application (for door readers, secure printing, vending, etc.) stored in the card is secured with their own cryptographic key. Member companies adhere to that structure in order to be interoperable with a single credential. There are no license fees or intellectual property rights involved. Keysets The approach involves a LEAF Custom Cryptographic Keyset (LEAF Cc Keysets) owned by the end-user. “When we present these concepts to integrators, they realize that, first, they need to get their clients to pay attention to the risks around proximity cards and to migrate to encrypted card technology,” says Laurie Aaron, Executive Vice President, WaveLynx Technologies Corp. “Then we explain the benefits of customer-owned keys and of the LEAF data structure. Then integrators can differentiate themselves by selling the value of the end-user staying in control and having unlimited interoperability.” WaveLynx Access control manufacturer WaveLynx is implementing the LEAF concept, which is the brainchild of CEO Hugo Wendling, who saw the advantages of leveraging the ability of an EV2 chip card to authenticate access to multiple applications by multiple manufacturer’s devices. WaveLynx set up the specification, maintains the website, and is involved when a manufacturer wants to become LEAF Enabled. They provide a key management service (for life) to end-users based on LEAF capabilities. End-users “own” the keys and can submit a request to WaveLynx to have us securely share them with any other manufacturer. Sharing a key involves two key custodians from WaveLynx Technologies and the Vendor who is receiving the customer’s keys, each of whom only has access to half of the encrypted key in order to keep it secure. Keys are shared via a “key ceremony”. Combining capabilities The LEAF consortium provides a way for manufacturers to work together to provide an ecosystem of devices that are compatible with a single encrypted smart card without the need to embed proprietary reader modules in their devices or license another manufacturer’s technology, thereby making it possible for them to increase their market share. Working together, independent manufacturers can assemble a group of devices to compete more effectively with larger manufacturers. In effect, they combine their capabilities in order to offer the end-user viable options and to compete. LEAF Consortium partners include Allegion, ASSA ABLOY, Brivo, Eline by DIRAK, Linxens, RFIDeas, and Telaeris. Biometric partners include Idemia and IrisID. Biometric devices may either store their biometric on the card or on a central database and access it through the badge number. The LEAF standard continues to evolve. Although the standard does not currently offer mobile credentials, a common mobile credential standard is currently being discussed and designed by the Consortium.
Hanwha Techwin America, a global supplier of IP and analogue video surveillance solutions, has announced that Olymbec, globally renowned privately owned industrial real estate holder on the US East Coast and Canada, has chosen Hanwha cameras to help secure its properties and improve rentability. Managing upwards of 300 properties in Quebec, Canada and 15 different states in the US, Olymbec owns more than 30 million square feet of property. Managing this much real estate means that Olymbec has to balance a variety of concerns, including providing positive tenant experiences, generating revenue, and protecting assets. Countering growing cases of theft and vandalism Olymbec’s existing analog-based camera systems were not meeting the company’s needs When it comes to security, the company is faced with everything from accidental damage and theft to vandalism and refuse dumping both inside and outside their buildings. However, Olymbec’s existing analog-based camera systems were not meeting the company’s needs. After looking at a number of different options, the company chose Hanwha Techwin because of the range of products, the modularity of the solutions the excellent training and customer support, and the cost, which allows Olymbec to add components easily. Hanwha Techwin cameras deployed Olymbec has deployed over 700 operational cameras and carries stock for both replacement purposes and new systems. The deployed cameras are connected to either a Wisenet WAVE VMS system in their larger installations or to NVRs in their smaller installations. Through their VPN, everyone at Olymbec, from the Chief Technology Officer (CTO) to security personnel and property managers, can access video footage from every security camera remotely from their smartphones and tablets. Remote video footage access This allows security administrators to view footage from anywhere, at any time and gives them the flexibility to react quickly and appropriately, when an incident occurs. Hanwha cameras have the capability to trigger alerts and alert security personnel, based on a variety of rules such as detecting motion after hours. Olymbec has spent approximately three-fourth of a million dollars on equipment from Hanwha Techwin to deploy its new security infrastructure. The result is a robust, homogenous environment that makes it easy to manage and add new camera systems to the company’s various properties. Multi-sensor, multi-directional cameras installed Hanwha Techwin cameras are used as deterrent or after-the-fact security devices for investigative purposes The Hanwha Techwin cameras are used as deterrent or after-the-fact security devices for investigative purposes. This means that Olymbec relies heavily on the quality of the video feed. To capture the best possible video, Olymbec decided to go with multi-sensor, multi-directional cameras, which are deployed across the company’s properties allowing them to cover a very wide area with just a single device. The multi-sensor cameras also work very well when the time comes to pull the video footage for investigation. This is especially helpful because Olymbec’s security department receives video requests from law enforcement at least 4-5 times a month. Reliable and flexible video security system “Using our new security system, we are able to ensure the integrity of our video evidence. This is important when local law enforcement asks us for footage to help with an investigation,” said Jack Ross, Chief Technology Officer (CTO) at Olymbec USA & Canada. The company, Olymbec has stated that they remain enthusiastic about their decision to install more number of Hanwha Techwin cameras across their various properties in the US and Canada. “It was important for us to choose a platform that is both complex enough to meet our needs and reliable enough to set up and simply let run. When it comes to reliability, as well as flexibility and ease-of-use, I think Hanwha Techwin really shines,” concludes Jack Ross.
Malwarebytes, a provider of advanced endpoint protection and remediation solutions, announced that it was selected by NatWest Group to deliver premium cybersecurity security solutions to the bank’s consumer and business banking customers worldwide. NatWest Group customers will now be able get a free license to install Malwarebytes Premium to protect their digital experiences from within their Online Banking portal. “Keeping our customers safe and secure is of paramount importance to us,” said Alasdair MacFarlane, Head of Fraud Prevention NatWest. “We are the only UK bank to offer premium virus protection to our customers for free and are working with Malwarebytes to deliver this.” Increase awareness among customers New customer offering is experiencing positive adoption rates, quickly reaching the initial target of NatWest Group The new customer offering is experiencing positive adoption rates, quickly reaching the initial target of NatWest Group. The program has over 100,000 customer downloads to date and further efforts are planned to increase awareness amongst their customer base. “Providing digital protection, productivity, and peace of mind to customers is increasingly critical for companies and consumers as the threat landscape continues to rapidly evolve,” said Marcin Kleczynski, CEO of Malwarebytes. “Malwarebytes has been a champion of security since our inception and we’re thrilled to be able to partner with innovative, socially responsible organisations like NatWest Group who are going above and beyond to ensure the safety of their customers.” Malwarebytes for NatWest Group is available for personal customers on up to ten devices and for business customers on up to thirty devices. Users can download Malwarebytes from their online banking portal after logging in. This offering is available for customers of NatWest, Royal Bank of Scotland, Isle of Man Bank, NatWest International and Ulster Bank.
When Swinkels Family Brewers wanted to unify its access control internationally, it chose Nedap Security Management’s AEOS access control system, which enabled this producer of world-famous Bavaria beer to design a system around the people using it. AEOS access control system The facts & figures - 6 breweries 27 brands 130 countries 1,800+ employees Increase security, yet maintain openness Swinkels Family Brewers wanted a system that would match its people-first approach Swinkels Family Brewers had grown quickly and needed to review its security and apply more stringent measures. It was using two access control systems and wanted to unite everything on one platform. Most importantly, Swinkels Family Brewers wanted a system that would match its people-first approach, and provide the flexibility to adapt and scale in the future. First people, then technology Initially, Swinkels Family Brewers established a cross-department project group, which developed a new security policy. With that in place, the project group identified AEOS as the system to meet its long and growing list of requirements. During the planning stages, they consulted department managers on their needs. And before AEOS was implemented they ensured their people knew what to expect and why the change was happening. Key benefits: The system is designed around the people using it. Security is stronger but there’s a welcoming sense of warmth and openness. One unified system fulfils all access control needs. Several systems are linked to AEOS and updates transfer automatically. Flexibility to easily add new functionality, such as video monitoring, or scale the system. Scalable, robust access control solution Stefan Fehlhaber, Facility Manager at Swinkels stated, “We’re very impressed with the scalability, stability and robustness of AEOS. It’s very practical to use in daily life and is easy for our security people to operate. It’s also very convenient for our employees to be able to use one badge at different locations.”
Co-op, a large consumer co-operative in the UK and one of the largest retailers in the country, is rolling out an integrated body-worn video solution from Motorola Solutions to front-line colleagues, with a focus on further increasing safety in-store against a background of rising retail crime in the industry. The Co-op has seen in-store crime increase by more than 140% year-on-year, despite communities recognising the critical role played by retail workers in society - true frontline workers in the days of a global pandemic. The number of violent incidents also hit record levels with 1,350 attacks having been experienced by Co-op shop workers in the first six months of 2020. Keeping colleagues safe The retailer warns of a crime and violence epidemic and its targeted deployment of a body-worn video solution forms part of an ongoing commitment to invest a further £70M over the next three years in innovative technology to keep colleagues safe. Co-op will equip front-line staff with more than 1,000 Motorola Solutions VT100 body-worn cameras in around 250 stores initially, with the ability to stream video in real-time to the Security Operations Centre of Co-op security partner, Mitie. The footage is used to identify criminals and provide evidence to secure prosecution. The VT100 body-worn camera from Motorola Solutions can be worn in standby mode for up to six months, preserving battery for instances when Co-op store colleagues feel threatened by aggressive or violent behaviour. The cameras are operated by a simple one-push activation, instantly recording footage to the camera itself, and streaming live video to the security operations centre, allowing for a quick response from security personnel or police. Cloud-based software The cameras are supported by cloud-hosted VideoManager software The cameras are supported by cloud-hosted VideoManager software, which enables secure and efficient camera allocation, user administration and incident management. With security features such as comprehensive audit-trails, encryption, configurable retention policies and RFID camera allocation, this integrated solution ensures footage and incidents are dealt with efficiently and securely. As part of its Safer Colleagues, Safer Communities campaign, Co-op is also building awareness and support for MP Alex Norris’ “Assault on Shop Workers Bill” which has now seen its second reading in Parliament postponed until September. The Bill states that because shop workers have responsibilities to uphold the law on age-restricted products they should be afforded greater protection in carrying out those public duties. Retail crime A knife was the most commonly used weapon (43%) with axes, hammers and syringes also used to attack In its 2020 Crime Report, the Association of Convenience Stores (ACS) found that a quarter of violent incidents resulted in injury, with a weapon used in almost 20% of occurrences. A knife was the most commonly used weapon (43%) with axes, hammers and syringes also used to attack or threaten shop workers. In 2019, Co-op funded research into retail crime, with the hard-hitting findings reporting that shop workers were showing signs of Post-Traumatic Stress Disorder (PTSD). Co-op has committed a further £70M over the next three years in innovative technology to keep colleagues safer, it has introduced SmartWater Fog Cannons, the latest remote monitored iCCTV, body cameras and, communication headsets for all frontline colleagues. Protection for shop workers Cheryl Houghton, Co-op Retail Security Manager, said, “Shop workers play an essential role serving communities, yet they have to contend with unprecedented levels of violence and abuse on a daily basis. As a community retailer we see the impact of social issues in our stores. I have never seen such high levels of violence and abuse, it’s a societal issue that all retailers are concerned about and it’s having lasting effects on the lives of shop workers - both mentally and physically. It is not part of the job to be verbally abused, threatened or attacked and we’re determined to make sure it isn’t. Calling for greater protection for shop workers carrying out public duties and for the root causes of crime in communities to be addressed.” Body-worn videos in commercial organisations Richie McBride, Director of Business Operations, Video & Analytics at Motorola Solutions UK, said, “Body-worn video is becoming a critical element in commercial organisations’ strategy to keep their employees safe. As a company focused on mission-critical solutions, we provide our commercial customers with the right tools to help them enhance their operational efficiency, responsiveness and safety. We are proud to partner with one of the UK’s largest retailers in its work to further improve the shopping experience and enhance safety for both shoppers and staff.”
Family-owned and run company, Bijou Wedding Venues, that offers exclusive wedding venues coupled with exceptional food and service, is improving its safety in response to the COVID-19 pandemic by implementing a state-of-the-art body temperature monitoring solution from ANT Telecom to reduce the risk of virus transmission. With restrictions lifting to enable larger groups of people to meet, weddings can begin to take place with greater numbers of guests. Bijou therefore wanted a solution that could enable special days to go ahead with confidence and reached out to ANT Telecom to implement its thermal imaging cameras at wedding venue entrances to ensure a significant reduction in risk to guests. Temperature monitoring cameras With Bijou operating across a range of venues, the cameras will be used to scan guests discreetly as they enter the venues to ensure minimum disruption to the day, and allow full focus to be on the couple’s celebration with families and friends. It comes as part of a range of other initiatives the company is implementing, such as changes to seating arrangements to ensure ample distancing; provision of outdoor ceremonies where possible; new methods of serving food and drink; as well as many other adaptations to minimise risk. ANT Telecom’s temperature monitoring cameras can be set up very quickly and are easy to use. The camera can detect multiple people at the same time, so is perfectly suited to scan wedding guests entering the venue. Protect guests and staff Our cameras support fast temperature measurement with discreet notifications to ensure minimal disruption" Sam Cutmore-Scott, Managing Director, Bijou Wedding Venues, comments: “We’ve made a range of changes in light of the pandemic to ensure that weddings can continue as planned and we’re pleased to offer couples this extra layer of safety alongside other measures. The temperature monitoring cameras allow us to protect all of our guests and staff right from the entrance of the venue. This is one of our key initiatives, and on top of this our exclusive venue model means venues can be completely sanitised between events and essentially acts as a private home for the couple, unlike hotel venues which have other people and staff entering and leaving the site.” Discreet notifications Upon camera detection of a temperature above the guidelines, that guest can be discreetly notified by a nominated person on behalf of the couple and alternative arrangements made, for instance inviting them to watch live streamed footage of the ceremony. Klaus Allion, Managing Director, ANT Telecom, states: “We’re delighted to support Bijou in enabling couples’ memorable days to continue and take place as close to as expected as possible. Our cameras support fast temperature measurement with discreet notifications to ensure minimal disruption and peace of mind for both the couple and guests at the venue, as well as staff. It’s an essential component of hospitality and event management and will help many types of gatherings similar to this take place safely as the fallout from the pandemic continues.”
With more than 2,200 locations and 41,000 associates, Panda Express is America’s family-owned and operated Asian dining concept. Challenged with losses at the point of sale (POS) and growing false alarm penalties, the company turned to Interface Security Systems, a managed services provider delivering managed network, interactive alarm monitoring, video surveillance and business intelligence solutions to help them dramatically decrease shrink and resolve security inadequacies. False alarms and fines Panda store managers faced continuous distractions from false alarms, receiving calls from the legacy alarm company at all hours of the night and incurring fines from local law enforcement for needless police dispatches. Interface monitoring centre instantly verify any alarm from a Panda store “When an alarm went off overnight, our managers would always err on the side of caution, send police in, or go in themselves. That was dangerous in itself if there was actually a burglary happening inside the store,” says Lyle Forcum, Executive Director of Asset Protection at Panda Restaurant Group, parent company of Panda Express. “Additionally, we were losing significant amounts of money on false alarm charges.” Suspicious transaction notification To address the false alarm challenge, Interface installed a next-generation IP Interactive Monitoring system with live video and two-way audio, which offers a virtual, guard-like level of protection in every Panda location. Operators in the Interface monitoring centre instantly verify any alarm from a Panda store with live streaming video, eliminating false alarms. Forcum reports that Panda is saving over $100K per year in false alarm fees Panda had also implemented a customised, exception-based POS reporting system, which notifies Panda management whenever a suspicious transaction takes place at the register. Interface took the tool a step further by integrating it with the video surveillance and alarm systems at each of the Panda locations, allowing management to immediately connect to the video of any problematic transaction. Identify anomalies and prevent shrink The solution enables loss prevention professionals to quickly identify anomalies and prevent shrink. Top offenders from thousands of employees doing millions of transactions can easily be bubbled up to the top. The combination of business intelligence and video surveillance resulted in a massive reduction in shrink and cash shortage at the register. The business intelligence provided allows for focused tracking and improved store operations With Interface, Panda has experienced vast improvements in security for its associates, customers and assets. Forcum reports that Panda is saving over $100K per year in false alarm fees and thousands of dollars per month per store in reduced shrink at the POS. Monitoring intrusion data The business intelligence provided allows for focused tracking and improved store operations, including people development, store performance data comparison, optimised store efficiencies, monitored intrusion data, and cash tracking. Panda and Interface have successfully partnered to create a potent security and loss prevention tool in the Quick Service Restaurant space. “Interface is a partner that's been collaborating with us on our needs from day one,” says Forcum. “The company understands what we need, and then it develops solutions towards that end. It doesn’t just come up with an off-the-shelf product and expect us to purchase it. Interface has shown a real commitment to our business. We meet with them regularly to collaborate on new initiatives and on emerging issues that Panda faces. The company has truly become part of that solution voluntarily and eagerly. Other business partners do not do that. Interface is, in fact, a true part of the Panda team.” A more detailed case study and video testimonial on Panda Express can be found on the Interface website.
Round table discussion
For several decades, Baby Boomers represented the largest sector of employees in the physical security market. However, these security professionals born between 1946 and 1964 are now nearing retirement – or have already retired. How will the security market change as the next generations step up to make their contributions? We asked this week’s Expert Panel Roundtable: As Baby Boomers approach retirement age, what are the positives and negatives in the physical security market?
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
Delivering on customer expectations is a basic tenet of success in the physical security market. However, meeting expectations may be an elusive goal, whether because customer needs are not communicated effectively or because equipment doesn’t perform as promised. We asked this week’s Expert Panel Roundtable: what if a customer expects more than a security system can deliver?