StoneLock, a global provider in the design and manufacture of enterprise-level facial recognition identity management solutions, announced at Global Security Exchange (GSX), the introduction of the StoneLock GO edge reader, the latest innovation in StoneLock facial recognition for enterprise physical access, and the next generation of the StoneLock True Frictionless Solution. StoneLock GO is a revolutionary biometric edge reader designed from the ground up to address the toughest authentication...
DigiCert Inc., the global provider of scalable PKI solutions for identity and encryption, Gemalto, a global provider in digital security, and ISARA Corp., the provider of quantum-safe security solutions, announced a partnership to develop advanced quantum-safe digital certificates and secure key management for connected devices commonly referred to as the Internet of Things (IoT). “DigiCert, Gemalto and ISARA are collaborating today to solve tomorrow’s problem of defending connected...
Ping Identity, the provider of Identity Defined Security, announced the general availability of PingIntelligence for APIs, following its acquisition of Elastic Beam. The AI-powered solution is part of the Ping identity platform and brings an increased level of intelligence into how APIs are accessed and used to protect API infrastructures from cyberattacks, while also delivering deep insight into API activities. “APIs are proliferating throughout all organisations faster than security tea...
Philip Halpin, Senior Vice President & Head of Global Security for Brown Brothers Harriman, and James A. Gagliano, Retired FBI Supervisory Special Agent, CNN Law Enforcement Analyst, and Adjunct Assistant Professor, headline ISC East’s Keynote Series. ISC East, sponsored by the Security Industry Association (SIA), is proud to announce not one, but two new keynote speakers for this year’s inaugural Keynote Series. The ISC East Keynote Series features veterans of the security indu...
Business doesn’t stand still, but security feels static. Whether mechanical keys or wired door locks, access control doesn’t always have the flexibility a changing environment needs. When is the right time to expand an access control system? And what’s the best way to do it? Extending coverage for traditional access control is expensive and intrusive, but there is an alternative. If one wants to forget about keys and the hassles of key management, wireless locks are the fast a...
Ava Group, a market provider in the provision of risk management services and technologies, announces the launch of the Global Cybersecurity Centre of Excellence (CCoE). This new programme demonstrates Ava Group’s strong commitment to data security of customers, by providing expert guidance and assurance that the products deployed on their data network infrastructure exceed stringent globally-recognised cybersecurity standards. NIST Cybersecurity Framework The CCoE takes full advantage o...
National Business Crime Solution (NBCS), a not for profit initiative that enables the sharing of data between law enforcement agencies and the business community in order to reduce crime, is celebrating a successful first year for its Associate Membership scheme. NBCS recently welcomed Milestone Systems, Axis Communications, GMS Group, SmartWater and SWL Security as Associate Members, and these organisations join Mitie, CSL Group, Hikvision and Athelney Group as part of this pioneering initiative. The Associate Membership scheme bridges the gap between technology providers and end users, giving vendors access to senior decision makers at some of the nation’s most prestigious organisations. Through a range of initiatives, such as one-day seminars, they get a unique opportunity to demonstrate their risk management, security, fraud and loss prevention solutions. NBCS has also introduced a monthly series of Crime Call events, where NBCS Members and Associate Members take part in a conference call to discuss specific issues and examine how technology can help address them by creating safer environments. Security deployment & risk management NBCS actively seeks to open new avenues for Associate Members across a range of vertical sectors and government bodies Furthermore, NBCS actively seeks to open new avenues for Associate Members across a range of vertical sectors and government bodies by encouraging participation across its initiatives such as Operation Bird and the Community Guarding scheme. It also helps position NBCS as a critical friend of business, the police service and all business reduction partnerships, through furthering the use of technology by all those affected by business crime. NBCS Associate Membership is available in a number of different packages and costs between £4,000-£15,000 a year. The basic package features advertising and promotion to existing members, while the premium package includes consultancy from senior NBCS personnel, who are able to advise on subjects such as fraud risk, risk management, enterprise risk management and security deployment. Associate Membership status “Having Milestone Systems, Axis Communications, GMS Group, SmartWater and SWL Security join us is the icing on the cake of what’s been a very busy but exciting year for the Associate Membership scheme,” concluded Daniel Hardy, managing director at NBCS. “Having so many prestigious security solutions providers on board has proven mutually beneficial both for them and NBCS Members and allowed us to encourage these two interdependent groups to engage in constructive dialogue. We are currently talking to a number of other companies and will soon be in a position to announce their Associate Membership status.”
Cost of a server is one of the major concerns while considering a Multilocation Video Surveillance solution. Moreover, there is complexity of operating the server from a central location while monitoring different locations. Matrix Video Surveillance solution has a special feature called Cascading, which eliminates the need of a server for centralised management and monitoring. Cascading is a feature of adding multiple devices on a single network in a User Interface (UI) so that all devices can be accessed from one location. This can be done by configuring one of the SATATYA devices as a master device and the rest as slave devices. Cascading can be configured in the monitor connected locally with the device as well as in Matrix SATATYA Device Client when the devices are connected on the same network. NVRs can cascade up to 20 devices Network Video Recorders can cascade up to 20 devices and can receive their camera streams without the need of a server Network Video Recorders can cascade up to 20 devices and can receive their camera streams without the need of a server. The master NVR at the central location can receive streams from all the cameras installed at various locations. It follows the architecture of multiple masters and multiple slaves. Hence, one organisation can make several master NVRs, sharing their respective camera streams among themselves. For example, a company having two CEOs at different locations can have access to all camera streams of their branches using their local NVR. Cameras are categorised into three different types in accordance to their configuration in Matrix Network Video Recorders: Branded Cameras The brand and model names of these devices are available in SATATAYA NVR database. ONVIF Supported cameras Open Network Video Interface Forum defines a common protocol for exchange of information like Automatic device discovery, video streaming and intelligent metadata between network video devices. Generic cameras These cameras stream the video on specific HTTP or RTSP URL. Benefits of Cascading Cascading eliminates the cost of a server for centralised management and monitoring. There is no need to enter credentials and other settings every time you restart. It simplifies monitoring by grouping important cameras from different locations on a single screen as well. If the number of cameras is higher, it also allows sequencing of cameras. Applications Monitoring building with multi-floors Monitoring multiple buildings with multiple floors Monitoring multiple buildings at a single location Monitoring multiple buildings at multiple locations Monitoring multiple buildings with multiple central locations Monitoring multiple buildings with a single central location
Pulse Secure, a provider of Secure Access solutions, announced that EMA, an analyst firm specialising in IT and data management technologies, has honored Pulse Secure as the industry’s leading hybrid IT secure access platform vendor. Pulse Secure was selected by EMA as a “Top Three” vendor in three related product categories and was the only vendor, among more than 60 assessed, to achieve the highest ratings across these Hybrid IT categories. Driven by digital business transformation, the world of securing access to enterprise applications, data and other IT services continues to evolve at a rapid pace. Emerging requirements for workforce mobility, distributed data center, virtual and cloud-based IT environments, and data protection have yielded significant access control complexities. Identifying access security issues The published report identified ten priorities for enabling secure access to enterprise IT servicesEMA conducted research to identify the access security issues facing organisations, including a survey of leaders from over 200 enterprises and an analysis of hundreds of vendor product briefings, case studies and demonstrations. The published report identified ten priorities for enabling secure access to enterprise IT services and offers insight into key challenges, considerations and technologies. The report also supports IT decision makers’ vendor-selection process as it heralds 30 of the most innovative vendor solutions addressing the greatest array of requirements for secure access enablement, highlighting Pulse Secure’s leadership ranking across three categories: Unifying access control across hybrid IT ecosystems Enabling secure remote access to business networks Network Access Control with IoT enablement Hybrid IT Secure Access platform “Increased pressure to enable workforce mobility and scale IT services across a variety of data center, public and private cloud environments have challenged organisations to grant secure and reliable access,” said Steve Brasen, research director at Enterprise Management Associates. “Based on the breadth, depth and interoperability of its solutions, Pulse Secure is distinguished in the market as providing the most comprehensive, integrated and flexible Hybrid IT Secure Access platform.” “EMA’s recognition of Pulse Secure as an industry-leading secure access vendor is testament to our focus on customer needs and our drive to ensure superior user experience while delivering simple, highly manageable and integrated solutions,” said Sudhakar Ramakrishna, CEO at Pulse Secure. “Our Secure Access portfolio enables organisations to improve productivity by addressing a wide variety of business, visibility and compliance requirements as they evolve from data center to hybrid IT environments.” Software-driven access solutions Pulse Secure offers a portfolio of software-driven Secure Access solutions Pulse Secure offers a portfolio of software-driven Secure Access solutions that satisfy usability, contextual intelligence and orchestration to support hybrid IT environments. The EMA comparative vendor research resulted in three Pulse Secure products being awarded as top solutions: Pulse Cloud Secure, Pulse Connect Secure and Pulse Policy Secure. In the “Unifying access control across hybrid IT ecosystems” category, key considerations for solution adoption included: console interface breadth of support, endpoint identity management capabilities, hybrid hosting environment support, connectivity governance and IT service integrations. The report highlights Pulse Secure’s hybrid IT access management solution, Pulse Cloud Secure, as offering: Access to on-premises and public cloud-hosted services enabled through Pulse Connect Secure Broad SSO and MFA support with stringent host checking of endpoints Visibility and policy-enforcement for security compliance by validating endpoints and verifying levels of access before connections Integration directly with identity providers, including Ping Identity, Okta and Microsoft ADFS Secure network connections The Pulse One management platform can be used to automate appliance software updatesIn the “Enabling secure remote access to business networks” category, key considerations for solution adoption included: persistence of secure network connections, context awareness, breadth of supported endpoints, onboarding process and third-party integrations. The report highlights Pulse Secure’s data center and cloud VPN platform, Pulse Connect Secure, as offering: Secure VPN connections may be optionally set as always-on (routing all network traffic), on demand (only when needed) or only when utilising specific applications The Pulse One management platform can be used to automate appliance software updates and policy changes while viewing a dashboard of appliance status Unified client that supports a variety of endpoint types, including Windows, macOS, Linux (CentOS, Debian, Fedora, Red Hat, Ubuntu), iOS, Android and Chrome OS When a user transitions from a remote location to an on-premises location, connectivity is dynamically switched without any interruption to the existing network connections Application certifications that include: Common Criteria (NDcPP), FIPS and JITC UC APL IoT device authentication Designed for scale, Pulse Policy Secure can support up to 20 million endpointsIn the “Network Access Control with IoT enablement” category, key consideration for solution adoption included: scalability, IoT device authentication, contextually-aware policy controls, inclusion of a RADIUS server, dashboarding, reporting and alerting, and third-party integrations. The report highlights Pulse Secure’s NAC solution, Pulse Policy Secure, as offering: Profiles network devices with real-time detection, classification and monitoring of managed, unmanaged and IoT devices to deliver an intuitive user experience via a unified client for both NAC and remote VPN access to the data center and cloud Contextual information for endpoint visibility and policy enforcement are referenced from a wide variety of network protocols, data collection tools and multivendor integrations Automates onboarding, sponsored-based guest and device management, and BYOD enablement Integrates with next-generation firewalls for identity-based admission control and sends user identity information to other 3rd party solutions via API, Syslog and the IF-MAP protocol Built-in, high-performance RADIUS server eliminates proxy latency while simplifying network planning and reducing TCO Centrally managed from the cloud or on-premises with the Pulse One administration console and includes dashboards that provide a high-level snapshot of all managed, unmanaged and IoT devices as well as granular reports delivering inventory, access, security and compliance details Designed for scale, Pulse Policy Secure can support up to 20 million endpoints
ExtraHop, global provider of analytics for security, is upending the SOC status quo at the Black Hat USA 2018 Conference. The company will be showcasing its Reveal(x) network traffic analytics (NTA) solution at Booth 1004, demonstrating how real-time analytics and machine learning eliminate the dark space within the enterprise. ExtraHop has received industry recognition from Gartner, EMA, and Ovum as these and other major industry organisations recognise the need for NTA at enterprise scale. Black Hat USA 2018 The ExtraHop booth at Black Hat USA will feature a series of industry thought leadership presentations from Phantom, Ixia, and others speaking on the rapidly emerging role of NTA in the enterprise SOC, the importance of TLS 1.3 decryption for security visibility, and the power of orchestration automation. Special sessions will occur throughout the day at Booth 1004 on August 8 and 9, 2018. "Security teams are drowning in alerts and many are left without the resources they need to stay ahead of attackers," said Bryce Hein, SVP of Marketing at ExtraHop. "Threat hunting in the modern attack landscape is not possible without enterprise-class network traffic analytics, making NTA a must-have for the modern enterprise SOC." Reveal(x) network traffic analytics ExtraHop Reveal(x) significantly reduces dwell time by highlighting late-stage attack activities and shining light on the darkspace in the enterprise ExtraHop Reveal(x) significantly reduces dwell time by highlighting late-stage attack activities and shining light on the darkspace in the enterprise—the hard-to-see areas of the network along the east-west corridor. Through comprehensive analysis of network traffic, Reveal(x) automatically identifies attack behavior, delivering high-fidelity insights into threats to critical assets. By merging insights into investigative workflows, Reveal(x) helps security operations teams shrink detection and response times, disrupt threat activity, and identify ways to reduce the attack surface. Analyst Recognition ExtraHop was listed as a Sample Vendor in the Gartner "Hype Cycle for Threat-Facing Technologies, 2018" report. ExtraHop was named in the Network Traffic Analysis (NTA) category. According to the Gartner report, "NTA solutions are valuable tools that assist network security professionals in the detection of compromised endpoints and targeted attacks that have not been seen in the past. These tools have limited blocking ability, or none at all (because they are implemented outside of the line of traffic), but they are effective in shortening the incident response window and reducing the dwell time of malware." The recent analyst report from EMA titled: Radar Report for Network-Based Security Analytics: Q3 2018 identified ExtraHop Reveal(x) as a ‘Value Leader’ and ‘Vendor to Watch,’ noting that, ‘Reveal(x) exhibited strong functionality due to its impressive feature differentiation, out-of-box reporting, and high-performance sustained data capture and processing.’ Leading European analyst group Ovum touted Reveal(x) in a recent report stated, “It analyzes all network interactions, applying machine learning to detect abnormal behavior, and then automates basic functions to streamline threat investigations. The launch of Reveal(x) takes ExtraHop into the network detection and response (NDR) market.” Customers Choose Reveal(x) Global 2000 customers are already using ExtraHop Network Traffic Analytics to modernise their programs and protect their enterprises Global 2000 customers are already using ExtraHop Network Traffic Analytics to modernise their programs and protect their enterprises. A top provider of life insurance in the United States is using Reveal(x) as the cornerstone of their next-generation SOC, while other ExtraHop customers report improving their security visibility by as much as 75 percent and reducing time to detect threats by as much as 95 percent. Industry Accolades Reveal(x) has also won numerous cybersecurity industry awards in the last six months including the AI Breakthrough Award for Best AI Solution for CyberSecurity, 2018 Fortress Cyber Security, Best of Citrix Synergy 2018, and was named to the 2018 JMP Securities Super 70 List.
Everbridge, Inc., global supplier in critical event management and enterprise safety software applications to help keep people safe and businesses running, has announced that it has achieved a FedRAMP Agency Authorisation for its Everbridge Suite solution. FedRAMP (Federal Risk and Authorisation Management Program) is a government-wide program that provides a standardised approach to security assessment, authorisation and continuous monitoring for cloud products and services. Federal Risk and Authorisation Management Program Authorised by the FedRAMP Program Management Office (PMO), Everbridge is now officially listed on the FedRAMP Marketplace “Our FedRAMP initiative has been a multi-year, strategic project with the goal of expanding our overall addressable market for our broad Critical Event Management suite,” said Jaime Ellertson, chairman and CEO of Everbridge. “Meeting the stringent security and reliability standards for FedRAMP Authorisation not only demonstrates our commitment to the Federal market but will also benefit commercial organisations that require the highest levels of security.” Authorised by the FedRAMP Program Management Office (PMO), Everbridge is now officially listed on the FedRAMP Marketplace – the central, online portal of approved cloud service offerings available for federal government use. Everbridge’s sponsoring agency, the Federal Housing Finance Agency (FHFA), and Third-Party Assessment Organisation (3PAO), Coalfire, have determined that Everbridge has met the standards for the 325 controls in the FedRAMP Moderate baseline. FedRAMP Authorisation certifies that Everbridge has passed the rigorous security and risk management review process required to offer its Everbridge Suite solution to federal agencies, a mandate by OMB for any cloud service provider that serves the federal government. Everbridge’s cloud services Everbridge currently supports the operational resilience needs of more than 40 federal agencies including the Department of Defense, the Department of Justice, the Environmental Protection Agency, and the Social Security Administration. Everbridge’s FedRAMP Authorisation broadens the company’s ability to further proliferate its cloud-based platform for the management of critical events in the federal sector. In addition to joining an elite group of cloud and SaaS providers that have achieved FedRAMP Authorisation, Everbridge helps ensure its customers operate in a secure environment that complies with a wide array of industry standards and regulations including SSAE 18/ISAE-3402 SOC 2 and SOC3, GDPR and Privacy Shield. Everbridge has also been certified and designated as an approved technology by the U.S. Department of Homeland Security under the SAFETY Act (Support Anti-terrorism by Fostering Effective Technology). Critical event management FedRAMP is designed to save time and costs associated with security assessments of cloud service providers among federal government organisations “With this important milestone, we are focused on extending our leadership in critical event management, providing government agencies with the industry’s most scalable and reliable platform to rapidly respond to – and even avoid – sudden, unexpected disruptions, while protecting those who serve our nation each and every day,” continued Ellertson. FedRAMP is designed to save time and costs associated with security assessments of cloud service providers among federal government organisations. Taking a “do once, use many” approach, FedRAMP enables rapid and cost-effective procurement of information systems and services, eliminates duplicate assessment efforts, and ensures consistent application of information security standards across all government organisations.
One factor aggravating concerns about workplace violence in corporate America is the easy availability of firearms. In many states, citizens, including employees, have the right to carry firearms onto a company’s property even though firearms are prohibited in the workplace. In effect, an employee prone to violence may have a firearm as near as their vehicle in the company parking lot. Currently, 23 states in the U.S. have so-called “parking lot storage” laws, which enable employees to store firearms in their vehicle’s trunk or glove box despite any corporate ban on weaponry. The laws have evolved as an expression of the Second Amendment “Right to Bear Arms” in the last decade or so. There is some variance in the laws from state to state, but they generally allow a citizen to carry a gun to and from work and keep it stored out of sight in their vehicle. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show Employee Second Amendment rights “The laws contend that employees should not have to give up their Second Amendment rights between home and the workplace and should be able to have a gun with them for protection from their front door at home to the front door of the workplace,” says Eddie Sorrells, Chief Operating Office/General Council of DSI Security Services. Sorrells will speak about the current state of the laws, how they came about, the nuances of state-to-state differences, and the possible impact on overall corporate security in a session titled “Employees Who Carry: Preventing Workplace Violence” at the upcoming GSX conference in Las Vegas, 23rd - 27th September. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show, attended by more than 22,000 security professionals from 100-plus countries. Sorrells’ session will be Sept. 24 from 10:30 to 11:45 a.m. Restrictions on gun visibility Employees may think the “right to carry” extends to the workplace, but the right only extends to the parking lot. The company still has the right to ban guns inside the premises. However, it is unlawful in some states for companies to search vehicles in parking lots, and companies who do so are violating the law, says Sorrells. Among the various state laws, some exempt public education institutions and other public venues. Depending on how the laws are written, there may be other exemptions, too. In Florida, for example, the law exempts any organisations that have explosives on site. With weapons on a company's property, a high-risk termination could potentially become violent Most laws require weapons to be stored securely out of sight. However, in Alabama, for example, it is legal to store validly permitted guns in full view during hunting season, Sorrells says. A resident of Alabama himself, Sorrells has been in the contract security business for 27 years, working mostly in multi-state operations. He has worked for 500 or so corporate security organisations throughout the country and is a practicing attorney who has studied issues of workplace violence and active shooters. “There is a political element to these laws, which were created with the goal of protecting Second Amendment rights,” says Sorrells, who says he sees arguments on both sides of the issue. However, political opinions aside, “if you’re a business owner, you have to contend with dozens of weapons on a company’s property,” he adds. “That could be an issue if a high-risk termination could potentially become violent. You have to assume there is a weapon in that person’s vehicle.” Sorrells' session will dive into the case law and illuminate some of the legal issues and how courts have addressed them GSX education program After the session, Sorrells hopes attendees will take away a good working knowledge of the state of the laws, how to comply with the laws, and issues such as posting of signs. The session will dive into the case law and illuminate some of the legal issues and how courts have addressed them. The timely session is an example of the valuable information attendees can gain by attending GSX. Sorrells has been attending the yearly ASIS International Conference and Exhibits for more than 20 years, at least since the mid-1990s. As the pre-eminent security organisation around the world, ASIS International provides unrivalled educational and networking opportunities at the yearly conference, he says. “There is a vast amount of networking and educational offerings on a wide variety of topics, including technology, legal issues, risk management, workplace violence, consulting, and anything under the sun,” says Sorrells. The newly branded GSX education program is led by subject matter experts from ASIS International, InfraGard (a public-private partnership between U.S. businesses and the Federal Bureau of Investigation), and ISSA (Information Systems Security Association). Sessions will deliver valuable, actionable takeaways to help attendees shape their security strategies. There will also be an exhibition of 550-plus suppliers and manufacturers highlighting the latest security solutions.
Above the Line Security have improved the safety of their at-risk employees by switching from a manual call-in system to the user-friendly StaySafe lone worker solution. Employees at Above the Line Security are responsible for guarding individuals and high-value equipment on busy film sites. Ensuring employee safety StaySafe allows workers on site to send an alert in an emergency while providing the employee with an accurate location via a real-time map Prone to theft and coming into contact with potentially volatile paparazzi and members of the public, the company required a more reliable way of monitoring the safety of their guards. StaySafe allows workers on site to send an alert in an emergency while providing the employee with an accurate location via a real-time map. Monitors are alerted if an employee triggers an alert or fails to check-in on the app during their shift. StaySafe StaySafe also provides the ability for an alert to be raised even during difficult situations. If engaged in a confrontation, a panic can be sent discreetly, or a duress PIN entered if the app is discovered by the aggressor. Missed check-in alerts will also alert a monitor in cases where the lone worker may be unable to send a panic themselves. “Having used an app for the first time to protect our lone workers, we were incredibly impressed by the ease and agility of set up and usability. Our employees have adapted quickly to using the app whenever they work and as they do not always come to the office, it allows them to set up for the day quickly and independently.” Lone workers’ safety Security Personnel are often targets for verbal and physical abuse due to the nature of the work they carry out" Adele O’ Toole at Above the Line, continues; “Previously, we had to rely on night supervisors based in external locations to take check-in and emergency calls manually. This proved expensive and disconnected, particularly if our lone workers were situated in areas of low signal where making contact to ensure their safety was infrequent and unreliable. With StaySafe, we are able to instantly locate our workers on a map once they have checked-in, even in areas of low signal, saving us a lot of time and human resources.” Don Cameron, CEO at StaySafe adds; “Security Personnel are often targets for verbal and physical abuse due to the nature of the work they carry out. They often protect valuable assets which leads to the potential risk of theft and aggression. StaySafe provides peace of mind for the lone workers and the business by providing an effective and reliable solution for a range of volatile situations. Organisations can see exactly where their staff are in the case of an emergency and can send assistance directly to them – all with the added bonus of being user-friendly and cost-effective, only requiring a mobile phone.”
Aeroturn LLC, a turnstile manufacturer that offers 100% Made in The USA turnstiles, announced that the company was selected by Alliance Security to deliver a state-of-the-art turnstile solution for a high-profile New York based global media giant. Alliance Security is headquartered in New York and deploys a portfolio of security technology installation and managed service offerings. Alliance Security’s parent company, Alliance Building Services is comprised of Alliance Maintenance, Alliance Security, Alliance Restoration, Alliance Electrical and Alliance Painting & Flooring, which services over 60 million square feet of building space in the New York Tri-State region. Alliance Building Services holds an immense portfolio of clients across diverse industries that includes some of the highest profile organisations and real estate properties in the world. Security and technology solutions With an evolution spanning decades, Alliance Security has become an industry expert in security and technology solutions and was in the market for a turnstile manufacturer that demonstrated a trusted record of delivering reliable solutions to high-profile clientele. Aeroturn fit the bill perfectly. “Once Aeroturn U.S.A. validated they could accommodate and deliver technical and operational excellence in engineering and design, the Alliance Security management team was confident in selecting Aeroturn U.S.A. as the best strategic partner to deliver for our client,” states Simon Torres, Alliance Security’s head of Engineering Services. Alliance Security will now turn to Aeroturn U.S.A. in the future when seeking a reliable turnstile manufacture" For this particular project and scope, Aeroturn delivered a unique turnstile solution that complied with operational expectations and standards with products manufactured in the U.S.A. Further commenting on deployment success, Simon Torres from Alliance Security states – “Alliance Security and Aeroturn USA architecture and design needed to account for multi-area ingress and egress considerations with the goal of enhancing the employee and visitor experience – and we are happy to announce that our mission was accomplished seamlessly. Since we can classify this deployment as a tremendous success, Alliance Security will now turn to Aeroturn U.S.A. in the future when seeking a reliable turnstile manufacture that delivers design, operational and technical excellence.” Zero-maintenance turnstiles Aeroturn designs, manufacturers, tests, delivers, and installs the world’s only zero-maintenance standard and customised turnstiles. “We are extremely proud to have been selected by Alliance Security for this prestigious project and look forward to a long and prosperous strategic partnership in the future,” states Michael Stoll, VP of Technical Sales & Marketing at Aeroturn. The company’s customer first philosophy is the driving force behind its success. Customers and strategic partners like Alliance can rely on Aeroturn to deliver the very best in turnstile solutions.
As one of the largest IT companies in Scandinavia, EVRY provides comprehensive computing, IT consulting, and business solutions to Nordic companies, financial institutions, public sector entities, and health authorities. While security at EVRY facilities is paramount, so is maintaining a leadership brand and accommodating a high flow of staff and visitors. Boon Edam security doors Entrances of EVRY facilities must provide a high level of security given the value and sensitivity of the work they do, as well as the presence of clients’ intellectual property and other data. Management was looking for entry designs that would not only provide a secure entry way, but would also display excellence in design, innovation and quality – elevating and supporting the overall perception of the firm for both staff and visitors. The EVRY security team quickly zeroed in on Boon Edam as a premium entrance provider. When they heard that many Boon Edam entrances could be customised to meet aesthetic objectives or to match desired colors and finishes, they were compelled to come and see the samples in person. Bravida system integrator Bravida, the system integrator who installed the Lifeline Speedlane Swing speed gates integrated them with cutting-edge access control technology Bravida, the system integrator who installed the Lifeline Speedlane Swing speed gates integrated them with cutting-edge access control technology that communicated with security personnel. The combination of this physical and technological access control delivered a highly effective solution that met EVRY’s needs for both staff and visitor access control. “The reception area of an IT company like EVRY was an ideal application for the Lifeline Swing speed gates,” explains Daan Van Beusekom, Product Manager Security Access, Royal Boon Edam. “The sleek, high-tech design of the turnstiles support EVRY’s brand positioning, and they provide a high-throughput, secure solution that meet EVRY’s demanding access requirements. The turnstiles also integrate with leading access control systems, making it easy to tie them in with EVRY’s existing security strategies and systems.” Lifeline Speedlane Swing speed gates The Lifeline Speedlane Swing speed gates are available in a wide selection of dimensional and glass choices to support a range of needs, such as higher security levels or disabled access. It features a slim form factor that creates an almost invisible gateway – instantly conveying an impression of sleek design that is reinforced by futuristic light pulses that guide user actions. Available in a range of colors and finishes, it can be customised to blend in or stand out, depending on the need for the installation.
Employees of MEGTEC, global manufacturer of air flotation dryers and oxidation pollution control equipment, often have to work in dangerous situations, some of which require lockout/ tagout controls. In those cases, employees put locks on electrical, gas or air supplies to make sure nothing happens while they’re working. They may also put a lock on a drain to prevent incoming liquid from reaching them. Life Safety “People performing maintenance on a machine often are in danger of being electrocuted, crushed or sprayed with toxic chemicals if someone accidentally tries to operate the machine,” said Christopher Campbell, Environmental Health Safety/Security Manager. In addition, when field service or shop employees travel to customer sites, they often are required to work in confined spaces. This can be any space, room or chamber that is large enough for an employee to enter and work in, but not intended for continuous human occupancy because of limited access and exit. “In other words, it can be dangerous,” said Campbell. “There might be limited air exchange. People die in confined spaces on an all too frequent basis. That’s why the Occupational Safety and Health Administration (OSHA) requires training on how to assess and control hazards in confined spaces and take care of hazards once inside.” MEGTEC oxidisers In the case of MEGTEC products, oxidisers may need to be inspected on the inside once they are up and running In the case of MEGTEC products, oxidisers may need to be inspected on the inside once they are up and running. For the sake of safety, customers want proof the employee has had proper training and recertification, which is needed every two years. “It is vital that we limit the number of people who come in,” he said. “Our equipment designs are proprietary.” MEGTEC began its business in the printing and papermaking industries, which still represent the company’s primary customers. But now MEGTEC provides equipment to any industry that requires its products to be dried on a cushion of air. In addition to these air flotation dryers, MEGTEC builds oxidisers that burn complex air polluting hydrocarbons into less polluting materials. “The technology is very simple,” said Campbell, “but the engineering behind it is very complex.” ID-based card authentication MEGTEC first began using ID cards when an employee from one of its competitors got into MEGTEC’s building and began “nosing around,” said Campbell. It wasn’t long before a fence went up and access control points went in. That was 14 years ago. “Through the years, we have had a number of different ID badge programs for our security,” Campbell said. “We just weren’t satisfied. The printers broke down, it was difficult to change ribbons and clean the machines, and the printers jammed frequently.” About four years ago, Campbell discovered Fargo printers on the Internet and purchased a Fargo DTC510 Direct-to-Card Printer/Encoder. “Since then, we have printed about 1,000 badges,” he said. “All have been good quality. The printer is quick, easy to use and very efficient. It’s an elegant machine, meaning it provides a lot of bang for the buck. There isn’t a lot of wasted motion or effort.” Lockout/tagout locks MEGTEC uses ID cards to protect the safety of its workers and to verify their training and recertification MEGTEC uses ID cards to protect the safety of its workers and to verify their training and recertification. To draw extra attention to the lockout/tagout locks, MEGTEC attaches an ID card with the company logo, a photo of the employee and his or her name, along with a sign that says, “Locked out. Do not remove. My life is on the line.” “All companies have to have something like this,” said Campbell. “Some have a standard tag, some write the information out each time. We made ours very personal. Individuals who see a person’s face and name are less likely to mess around with a lockout. The cost is only $2.00 per card, which is very reasonable, and it takes only a few second to print one out.” HID proximity technology MEGTEC’s ID badges are smart cards, using HID read-only proximity technology. Access levels are encoded onto an induction coil by the company’s software. The cards themselves don’t reveal an employee’s access level. The software used by MEGTEC enables Campbell to program new information into the card whenever necessary. “This flexibility allows us to change access levels as needed,” he said. “For example, some employees may need R&D access only for a while, others may join the first aid team. This technology enables us to change access without having to change the whole card.” Borders around the photos on each badge are color-coded, however, for easy visual identification. Red is for employees, green is for vendors, blue is for security staff and white is used for children on “Take Your Kids to Work” day. “We thought it would be nice to give the children a badge just like their mom’s or dad’s,” said Campbell. “They feel more important that way.” MEGTEC’s optical barcode scanner Each ID card is actually two cards in one. with each containing a barcode with an employee’s time clock number for use with MEGTEC’s optical barcode scanner Each ID card is actually two cards in one. Each contains a barcode with an employee’s time clock number for use with MEGTEC’s optical barcode scanner. “The barcode predates me,” said Campbell. “Someone decided that barcoding was the way to go with 180 hourly shop employees. Today, all office employees have their cards barcoded, as well, in case we ever decide to use the technology for inventory control or other accounting purposes. Someone was thinking ahead. If we want, we can jump right in and use the barcode for additional purposes.” HID Fargo ID cards “The Fargo ID cards are durable enough to last much longer than the required two years,” said Campbell. “We don’t have to worry about someone’s signature smearing.” The card also lists the expiration date with a scanned signature. It meets OSHA requirements, has an employee’s photo, is durable and is easy to produce. Today, the company’s security has become more sophisticated, with 12 access control points and eight access levels: The master level enables employees to go anywhere on the property. It is used for maintenance workers, first aid providers and key managers. An R&D level permits employee to be inside the research and development areas. Employees can receive office access that gives them access to areas except R&D. The shop crew leaders have access that permits them into areas to talk to others about plans and documents. Shop employees have access to the manufacturing area through an employee entrance. There are three vendor access levels: one for suppliers, one for those who restock manufacturing shelves and one to allow visitors into the outside gate only. In addition to general security, MEGTEC uses ID cards without technology to identify employees who have been certified forklift operators. This certification is needed every three years, including operator training and evaluation. “As far as access goes, I think I’m there,” said Campbell, admitting he didn’t have a wish list for future upgrades. “It’s vital that we limit the number of people who come in here, and the Fargo printer has enabled us to do that.”
Pulse Secure, a provider of Secure Access solutions to both enterprises and service providers, has announced that Entegrus has successfully deployed Pulse Policy Secure advanced network access control (NAC), to strengthen overall visibility and access security across their hybrid IT infrastructure. Entegrus, a Canadian energy company, leveraged their existing Pulse Secure virtual private network (VPN) implementation to expedite NAC deployment and fortify their infrastructure in accordance with National Institute of Standards and Technology (NIST) and North American Electric Reliability Corporation (NERC) guidelines. As a result, their security organisation extended visibility for remote and on-premise users and devices, as well as enhanced endpoint compliance and Internet of Things (IoT) risk mitigation. We have increased our security posture, and for the most part, there has been zero impact on our end users" Pulse Secure-Entegrus collaboration Entegrus serves over 58,000 customers throughout Ontario. They bring electricity, renewable energy and water across three large regions, with a workforce spread out over 2,300 square miles. Entegrus’ objective is to provide safe, reliable and cost-effective provision of energy and related billing services, while providing high levels of service to its customers, partners and the communities it serves. IT security plays a critical role in protecting their delivery of energy and data services. “The threat landscape is constantly evolving, forcing us to always consider how we can go one step further. With a widely distributed IT infrastructure, we considered NAC as an effective way to improve our security posture without dramatically altering how we operate,” said Dave Cullen, manager of information systems for Entegrus. “We have a long-standing relationship with Pulse Secure. The level of integration between Pulse Secure secure sockets layer (SSL) and NAC, as well as the extended feature set, made it a straightforward choice for us. Perhaps, the two most important things are that we have increased our security posture, and for the most part, there has been zero impact on our end users.” Active control with seamless network access Ensuring always active control while maintaining flexible, seamless access to network and application resources is an essential requirement for utility providers. Within such highly regulated industries, best practices dictate a constant cycle of security readiness review and improvement to meet an increasingly potent threat posed by cyber threat actors. NAC provides foundational endpoint intelligence, resource access enforcement and IoT defences that support industry and regulatory compliance guidelines. These compliance requisites apply to both regional and large national critical infrastructure providers. For stretched IT departments, Pulse Secure’s Secure Access solutions are designed to streamline deployment and on-going administration using an easy, integrated, policy-driven platform that works with a customer’s existing installed base and network infrastructure. In addition, Pulse Secure’s VPN solution utilises the same endpoint client, policy engine and appliance management as the NAC solution. Entegrus took advantage of this platform capability to rapidly implement NAC. As a result, they gained dynamic intelligence, unified policy management, automated enforcement and threat response through a single management console. We needed to make sure our secure access technologies could adapt to new regulatory requirements and new business needs" Secure access solutions Cullen highlights numerous benefits, including a simplified method of managing complex policies and user access rights, as well as an enforceable method of checking end-point devices to ensure that only properly patched operating systems can connect to the network. Another advantage of Pulse Policy Secure was evident after Entegrus recently merged with London, Ontario-based St. Thomas Energy. “We needed to make sure our secure access technologies could adapt to new regulatory requirements and new business needs, as the recent merger added new, unqualified infrastructure and grew our customer base by around a third, which also led to the hiring of 28 new staff members,” Cullen added.
JK Tyre & Industries Ltd. have its biggest manufacturing setup in Mysore. The premise consists of a manufacturing unit as well as the administrative department. Since the plant runs 24×7 and there are numerous shifts of workers, they found it difficult to manage multiple shifts manually. Managing visitors was also a problem for the company. So, they required a software that would help them keep a record of visitors on time-to-time basis. Creating a visitor’s identity in the form of visitor pass and generating reports of visitors on a monthly basis was a tiresome process. JK Tyres was looking for a vendor who could offer them a complete solution related to Time-Attendance and Visitor Management. Matrix offered a Time-Attendance solution, which centrally handled multiple shifts of workers and employees Matrix Time-Attendance solution Matrix offered a Time-Attendance solution, which centrally handled multiple shifts of workers and employees. Numerous shifts were created to manage Time-Attendance of over 500+ workers. Moreover, we provided Employee Self Service, which helped the employees view day-to-day attendance, apply for leave/tour, etc. JK Tyres further required a record of visitors so we delivered Visitor Management software, which helped them create a visitor pass, fetch visitor records and generate reports of the same. 40% Increase in Productivity of Employees and Workers Results Reduction in Cumbersome HR tasks Automatic Maintenance of Visitor Records on Day-to-Day basis 40% Increase in Productivity of Employees and Workers The Products COSEC VEGA FAX - Fingerprint and Card based Door Controller with Touchscreen, IP65, Wi-Fi and 3G/4G Connectivity Option COSEC PATH RDFM - Fingerprint and Card based Exit Reader with IP65 COSEC CENTRA ME - Application Server Platform with 500 Users and Expandable up to 1,000 Users for Basic Access Control and Raw Event Data COSEC ME TAM - Time-Attendance Software Module for COSEC CENTRA ME Users COSEC ME ESS - Employee Self Service Software Module for COSEC CENTRA ME Users COSEC ME VMM - Visitor Management Software Module for COSEC CENTRA ME Users