Armis®, the agentless device security platform, and Viakoo®, a pioneer in automated IoT cyber hygiene, announce a partnership that brings together IoT device discovery and remediation. The number of connected Enterprise IoT devices used in workplaces across all industries is exploding.
Experts say that by 2025, one should expect more than 40 billion of these devices interwoven into our everyday lives. And although these devices help improve efficiency and reliability, they lack the management and security needed to keep them safe from cyberattacks.
Traditional asset management
Most enterprise IoT, operational technology (OT), and biomedical devices have limited on-board security controls. Traditional asset management and security products can't see unmanaged and IoT devices that can't host software agents. Active network scanners can cause sensitive OT equipment or critical patient-connected devices to malfunction. And misconfigured or unpatched devices can expose vulnerabilities that create a massive attack surface and considerable risk.
When an out-of-compliance device is found, the best outcome is to remediate potential risks and to return the device to service. Armis detects such out-of-compliance devices, and Viakoo can trigger certain actions on them, like firmware updates, configuration modifications, certificate refresh, and password changes, which can remediate risk.
Achieving greater value
Viakoo solves a difficult and necessary task by automating cyber vulnerability remediation"
Devices that can’t be remediated would continue to be monitored by Armis for suspicious or malicious behaviour and quarantine. Both the Armis and Viakoo platforms are agentless, do not require the installation of any hardware in the environment, and install in as little as minutes, using the infrastructure one already has, with no network changes.
Armis integrates with Viakoo and other IT security and management systems just as easily, from the firewall to the NAC to the SIEM, letting the user achieve greater value and more automated response. “Viakoo solves a difficult and necessary task by automating cyber vulnerability remediation,” said Peter Doggart, VP Business Development, and Global Channel at Armis.
Eliminating cyber vulnerabilities
“Our integration provides a best-in-class solution for organisations to quickly eliminate cyber vulnerabilities and be in control of their IoT infrastructure. Together, Armis and Viakoo provide a unified cybersecurity vulnerability management solution for unmanaged, medical, OT, and IoT devices - critical for any IT or security team.”
“Unmanaged IoT devices represent the largest attack surface within an organisation,” said Bud Broomhead, CEO of Viakoo. “Armis has the most comprehensive solution to discover these devices; now, combined with Viakoo, customers can quickly and cost-effectively make these devices secure, visible, and capable of delivering their full value.”
Genetec Inc., a renowned technology provider of unified security, public safety, operations and business intelligence solutions, announced the launch of its brand new Virtual Experience Centre. The platform enables channel partners and end-users to easily and efficiently collaborate with Genetec employees to discuss projects, view demos and access materials, in one virtual environment from anywhere in the world.
The online platform recreates the same personalised interaction of visiting the existing Genetec Experience Centers in Montreal, Paris, London, Dubai and Singapore. By invitation, individuals and groups can efficiently dive deep into the world of security, operations and intelligence from wherever they are based. All without having to factor in travel costs or journey times.
IP security systems
Those who visit the Virtual Experience Centre, are able to get the right information and tools to thrive in the modern era"
The virtual centre easily accommodates meetings, events and high-level demonstrations of the Genetec unified security platform, which helps simplify operations by seamlessly blending IP security systems within a single intuitive interface. From access control, video surveillance, and automatic licence plate recognition to communications, intrusion detection, and analytics, Genetec empowers organisations through enhanced situational awareness, unified command and control, and connectivity to the cloud.
"By engaging in an online environment, those who visit the Virtual Experience Center, are able to get the right information and tools to thrive in the modern era, where physical and cyber threats are evolving faster than ever. As security continues to top the news agenda, our experts are on hand to discuss and present how a unified approach can protect increasingly networked and high-risk environments," said Cyrille Becker, General Manager for Europe at Genetec.
With the Virtual Experience Center, Genetec demonstrates its commitment to investing in innovation that improves the end-to-end customer experience. The virtual centre, adds to its roster of innovation labs around the world, offering greater flexibility and reach.
DICE Corporation (The New DICE Corporation) is empowering security integration companies with Matrix Integrator, a cloud-based video event monitoring, surveillance, and alarm notification suite for any video system, anywhere, and at any time.
Interactive video monitoring
For the first time, security integrators can directly provide end-users with automatic and managed interactive video monitoring services, while also controlling their business operations at the same time. “In the past, DICE Corporation has been perceived solely as an automation software company for monitoring stations,” explained Avi Lupo, DICE Corporation Co-President.
Avi Lupo adds, “However, the security industry has evolved from just a basic alarm panel and a central station providing simple alarm services. With the New DICE’s Matrix Integrator and our new technologies, we are offering integration companies, and the industry as a whole, a new way of doing business.”
Matrix Integrator is a complete platform with managed services, such as video verification and remote guarding
Matrix Integrator is a complete platform with managed services, such as video verification, remote guarding, virtual guard tours, business management and virtual doorman, all using advanced video analytics, Artificial Intelligence (AI), and cloud recording of events.
Other services provided via Matrix Integrator include object detection and human behaviour analysis with real-time notification. Flexible, scalable, and easy to implement and use, Matrix Integrator not only offers a new way of selling CCTV, but also at the same time, provides recurring additional revenue (RMR) every month.
Integrated with DICE’s exclusive hybrid technology
Using DICE Corporation’s exclusive hybrid technology, integrators can bridge to a professional central monitoring station of their choice at any given moment and any time.
Many event applications can go directly to an end user’s cell phone and/or to cloud video recording. Integration companies can also choose to bridge to a professional monitoring station of their choice to monitor accounts at night, weekends, or 24/7.
SaaS, PaaS and IaaS technology in the Cloud
“Central stations are not required but it is an option. Some services are managed and require operators to handle them, while others are automatic and can be provided without staff,” said Avi Lupo, adding “So central stations are providing managed services for the integrator, but the technology and control is in the hands of the integration company.”
All Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) technology, including receivers, reside in the Cloud at DICE’s secure UL/ULC data centre.
Unified platform to control PTZ and IP cameras
New technologies allow DICE Corporation to move the ‘smart’ from the camera to the cloud
New technologies allow DICE Corporation to move the ‘smart’ from the camera to the cloud. Any camera or Network Video Recorder (regardless of the manufacturer) can provide video analytics without the need to invest in expensive new technology.
The unified platform also provides controls for all IP cameras, PTZ cameras, and field devices, as well as one-click camera views. Plus, because the platform is on the Cloud, there are automatic version updates.
Remote modification and interactive services
The bottom line is that there is a minimal upfront cost for both integrators and end-users in installing a new system. Furthermore, in most cases, the integrator has no need to return to the site to upgrade the system and provide these new interactive services.
“The world is changing and so is the industry,” stated Avi Lupo, Dice Corporation’s Co-President, adding “Matrix Integrator is a new, innovative way of selling CCTV with many advantages. This is an opportunity for integrators to benefit from a competitive edge and change before they have to.”
Anomali, the globally renowned company in intelligence-driven cyber security solutions, has announced that Anomali Match is now integrated with Microsoft Azure Sentinel.
By bridging the gap between these two major security solutions, Anomali and Microsoft have created an automated solution that significantly enhances and speeds joint customers’ threat detection, alerting and response capabilities.
Azure Sentinel and Anomali Match integration
Azure Sentinel is a cloud-native security information and event manager (SIEM) platform that uses built-in AI (Artificial Intelligence) to help analyse large volumes of data across an enterprise fast. Azure Sentinel aggregates data from all sources, including users, applications, servers, and devices running on-premises or in any cloud, giving users access over millions of records in a few seconds.
Anomali Match is a high-performance threat detection and response solution. It continuously correlates all collected security event and log data against millions of globally observed indicators of compromise (IOCs) to expose previously unknown adversaries that have already penetrated networks. Match retrospective analysis capabilities stretch back as far as five years.
Bi-directional data flow
With this integration, Microsoft and Anomali have created a bi-directional data flow
With this integration, Microsoft and Anomali have created a bi-directional data flow that allows users to easily export Azure Sentinel logs into match for correlation with Anomali global intelligence.
Combining IOC matching at a massive scale together with other innovative techniques provides the precision detection needed to investigate and prioritise matched threats for ingestion back into Azure Sentinel, where Security Operation Centre (SOC) analyst teams can then triage.
Enhancing cyber and data security
“Most enterprises have dozens of cybersecurity tools deployed and access to mass volumes of related information. Despite this, many continue to fall victim to attackers who have figured out how to slip through holes that disparate systems and siloed data leave open,” said Mark Alba, Anomali Chief Product Officer.
Mark adds, “Azure Sentinel and Anomali have bridged a gap that allows our joint customers to consolidate essential security technologies, providing them with the information and capabilities needed to identify and mitigate threats that are impacting their networks.”
Cloud adoption and threat intelligence
“To remain protected, organisations need visibility over what’s going on across their infrastructures, which are expanding rapidly due to things like cloud adoption, growing remote workforces and increasing levels of mobile connections,” said Jason Wescott, Principal PM Manager, Azure Sentinel.
Jason adds, “With match enabled, enterprises will gain access to threat intelligence that will allow them to know more about what they are up against and then take smarter steps to further reduce risk.”
While the application of facial recognition within both public and private spheres continues to draw criticism from those who see it as a threat to civil rights, this technology has become extremely commonplace in the lives of iPhone users. It is so prevalent, in fact, that by 2024 it is predicted that 90% of smartphones will use biometric facial recognition hardware.
CCTV surveillance cameras
Similarly, CCTV is a well-established security measure that many of us are familiar with, whether through spotting images displayed on screens in shops, hotels and offices, or noticing cameras on the side of buildings. It is therefore necessary we ask the question of why, when facial recognition is integrated with security surveillance technology, does it become such a source of contention?
It is not uncommon for concerns to be voiced against innovation. History has taught us that it is human nature to fear the unknown, especially if it seems that it may change life as we know it. Yet technology is an ever-changing, progressive part of the 21st century and it is important we start to shift the narrative away from privacy threats, to the force for good that LFR (Live Facial Recognition) represents.
Live Facial Recognition (LFR)
We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition
Across recent weeks, we have seen pleas from UK organisations to allow better police access to facial recognition technology in order to fight crime. In the US, there are reports that LAPD is the latest police force to be properly regulating its use of facial recognition to aid criminal investigations, which is certainly a step in the right direction. While it is understandable that society fears technology that they do not yet understand, this lack of knowledge is exactly why the narrative needs to shift.
We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition, we respect these anxieties. However, it is time to level the playing field of the facial recognition debate and communicate the plethora of benefits it offers society.
Facial recognition technology - A force for good
Facial recognition technology has already reached such a level of maturity and sophistication that there are huge opportunities for it to be leveraged as a force for good in real-world scenarios. As well as making society safer and more secure, I would go as far to say that LFR is able to save lives.
One usage that could have a dramatic effect on reducing stress in people with mental conditions is the ability for facial recognition to identify those with Alzheimer’s. If an older individual is seemingly confused, lost or distressed, cameras could alert local medical centres or police stations of their identity, condition and where they need to go (a home address or a next of kin contact).
Granted, this usage would be one that does incorporate a fair bit of personal data, although this information would only be gathered with consent from each individual. Vulnerable people could volunteer their personal data to local watchlists in order to ensure their safety when out in society, as well as to allow quicker resolutions of typically stressful situations.
Tracking and finding missing persons
Another possibility for real world positives to be drawn from facial recognition is to leverage the technology to help track or find missing persons, a lost child for instance. The most advanced forms of LFR in the market are now able to recognise individuals even if up to 50% of their face is covered and from challenging or oblique angles.
Therefore, there is a significant opportunity not only to return people home safely, more quickly, but also reduce police hours spent on analysing CCTV footage.
Rapid scanning of images
Facial recognition technology can rapidly scan images for a potential match
Facial recognition technology can rapidly scan images for a potential match, as a more reliable and less time-consuming option than the human alternative. Freed-up officers could also then work more proactively on the ground, patrolling their local areas and increasing community safety and security twofold.
It is important to understand that these facial recognition solutions should not be applied to every criminal case, and the technology must be used responsibly. However, these opportunities to use LFR as force for good are undeniable.
Debunking the myths
One of the central concerns around LFR is the breach of privacy that is associated with ‘watchlists’. There is a common misconception, however, that the data of every individual that passes a camera is processed and then stored. The reality is that watch lists are compiled with focus on known criminals, while the general public can continue life as normal.
The very best facial recognition will effectively view a stream of blurred faces, until it detects one that it has been programmed to recognise. For example, an individual that has previously shoplifted from a local supermarket may have their biometric data stored, so when they return to that location the employees are alerted to a risk of further crimes being committed.
Considering that the cost of crime prevention to retailers in recent years has been around £1 billion, which therefore impacts consumer prices and employee wages, security measures to tackle this issue are very much in the public interest. Most importantly, the average citizen has no need to fear being ‘followed’ by LFR cameras. If data is stored, it is for a maximum of 0.6 seconds before being deleted.
Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story
Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story. It is essential we spend more time and effort communicating exactly why watchlists are made, who they are made for and how they are being used, if we want to de-bunk myths and change the narrative.
As science and technology professionals, heading up this exciting innovation, we must put transparency and accountability at the centre of what we do. Tony Porter, former Surveillance Camera Commissioner and current CPO at Corsight AI, has previously worked on developing processes that audit and review watch lists. Such restrictions are imperative in order for AI and LFR to be used legally, as well as ethically and responsibly.
Biometrics, mask detection and contactless payments
Nevertheless, the risks do not outweigh the benefits. Facial recognition should and can be used for good in so many more ways than listed above, including biometric, contactless payments, detecting whether an individual is wearing a facemask and is therefore, safe to enter a building, identifying a domestic abuse perpetrator returning to the scene of a crime and alerting police.
There are even opportunities for good that we have not thought of yet. It is therefore not only a waste not to use this technology where we can, prioritising making society a safer place, it is immoral to stand by and let crimes continue while we have effective, reliable mitigation solutions.
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge.
However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials are increasingly enabling smart cities to improve the experience and safety of the people who reside there.
Rising scope of 5G, AI, IoT and the Cloud
The main foundations that underpin smart cities are 5G, Artificial Intelligence (AI), and the Internet of Things (IoT) and the Cloud. Each is equally important, and together, these technologies enable city officials to gather and analyse more detailed insights than ever before. For public safety in particular, having IoT and cloud systems in place will be one of the biggest factors to improving the quality of life for citizens.
Smart cities have come a long way in the last few decades, but to truly make a smart city safe, real-time situational awareness and cross-agency collaboration are key areas which must be developed as a priority.
Innovative surveillance cameras with integrated IoT
Public places need to be safe, whether that is an open park, shopping centre, or the main roads through towns
Public places need to be safe, whether that is an open park, shopping centre, or the main roads through towns. From dangerous drivers to terrorist attacks, petty crime on the streets to high profile bank robberies, innovative surveillance cameras with integrated IoT and cloud technologies can go some way to helping respond quickly to, and in some cases even prevent, the most serious incidents.
Many existing safety systems in cities rely on aging and in some places legacy technology, such as video surveillance cameras. Many of these also use on-premises systems rather than utilising the benefits of the cloud.
Smart programming to deliver greater insights
These issues, though not creating a major problem today, do make it more challenging for governments and councils to update their security. Changing every camera in a city is a huge undertaking, but in turn, doing so would enable all cameras to be connected to the cloud, and provide more detailed information which can be analysed by smart programming to deliver greater insights.
The physical technologies that are currently present in most urban areas lack the intelligent connectivity, interoperability and integration interfaces that smart cities need. Adopting digital technologies isn’t a luxury, but a necessity.
Smart surveillance systems
It enables teams to gather data from multiple sources throughout the city in real-time, and be alerted to incidents as soon as they occur. Increased connectivity and collaboration ensures that all teams that need to be aware of a situation are informed instantly.
For example, a smart surveillance system can identify when a road accident has occurred. It can not only alert the nearest ambulance to attend the scene, but also the local police force to dispatch officers. An advanced system that can implement road diversions could also close roads around the incident immediately and divert traffic to other routes, keeping everyone moving and avoiding a build-up of vehicles.
This is just one example: without digital systems, analysing patterns of vehicle movements to address congestion issues could be compromised, as would the ability to build real-time crime maps and deploy data analytics which make predictive policing and more effective crowd management possible.
Cloud-based technologies provide the interoperability, scalability and automation
Cloud-based technologies provide the interoperability, scalability and automation that is needed to overcome the limitations of traditional security systems. Using these, smart cities can develop a fully open systems architecture that delivers interoperation with both local and other remote open systems.
The intelligence of cloud systems can not only continue to allow for greater insights as technology develops over time, but it can do so with minimal additional infrastructure investment.
Smart surveillance in the real world
Mexico City has a population of almost 9 million people, but if you include the whole metropolitan area, this number rises sharply to over 21 million in total, making it one of the largest cities on the planet. Seven years ago, the city first introduced its Safe City initiative, and ever since has been developing newer and smarter ways to keep its citizens safe. In particular, its cloud-based security initiative is making a huge impact.
Over the past three years, Mexico City has installed 58,000 new video surveillance cameras throughout the city, in public spaces and on transport, all of which are connected to the City’s C5 (Command, Control, Computers, Communications and Citizen Contact) facility.
Smart Cities operations
The solution enables officers as well as the general public to upload videos via a mobile app to share information quickly, fixed, body-worn and vehicle cameras can also be integrated to provide exceptional insight into the city’s operations.
The cloud-based platform can easily be upgraded to include the latest technology innovations such as licence plate reading, behavioural analysis software, video analytics and facial recognition software, which will all continue to bring down crime rates and boost response times to incidents.
The right cloud approach
Making the shift to cloud-based systems enables smart cities to eliminate dependence on fibre-optic connectivity and take advantage of a variety of Internet and wireless connectivity options that can significantly reduce application and communication infrastructure costs.
Smart cities need to be effective in years to come, not just in the present day, or else officials have missed one of the key aspects of a truly smart city. System designers must build technology foundations now that can be easily adapted in the future to support new infrastructure as it becomes available.
Open system architecture
An open system architecture will also be vital for smart cities to enhance their operations
For example, this could include opting for a true cloud application that can support cloud-managed local devices and automate their management. An open system architecture will also be vital for smart cities to enhance their operations and deliver additional value-add services to citizens as greater capabilities become possible in the years to come.
The advances today in cloud and IoT technologies are rapid, and city officials and authorities have more options now to develop their smart cities than ever before and crucially, to use these innovations to improve public safety.
New safety features
Though implementing these cloud-based systems now requires investment, as new safety features are designed, there will be lower costs and challenges associated with introducing these because the basic infrastructure will already exist.
Whether that’s gunshot detection or enabling the sharing of video infrastructure and data across multiple agencies in real time, smart video surveillance on cloud-based systems can bring a wealth of the new opportunities.
Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people.
Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide services without clients visiting the office. Besides, biometric technology ensures security and optimises passenger traffic at transport facilities and collects data about customers, and investigates theft and other incidents in retail stores.
Widespread use of biometrics
Business, which suddenly boosted the development of biometrics, is an active user of biometric technology
Business, which suddenly boosted the development of biometrics, is another active user of biometric technology. Industries choose biometric systems, as these systems are impossible to trick in terms of security, access control, and data protection. Being in demand in business, these three tasks are also relevant for the industry. However, the use of biometrics at industrial sites is discussed unfairly seldom.
Therefore, it is the face identification that is the most convenient there, as workers often use gloves, or their hands may be contaminated, and the palm pattern is distorted by heavy labour. All these features make it difficult to recognise people by fingerprints or veins and significantly reduce identification reliability. Therefore, industries seek facial recognition solutions. Thus, let us demonstrate the application of face recognition technology at different enterprises, regardless of the area.
Facial recognition use in incident management
Facial biometric products are known to automate and improve the efficiency of security services by enriching any VMS system. These systems provide an opportunity of instantly informing the operator about recognised or unrecognised people, and their list membership, as well as save all the detected images for further security incident investigation.
Furthermore, some sophisticated facial biometric systems even provide an opportunity to build a map of the movements of specific people around a site. Besides, it is relevant not only for conducting investigations but also in countering the spread of the COVID-19 virus.
Identifying and tracking COVID-19 positive cases
Therefore, if an employee or visitor with a positive COVID-19 test enters a facility, the system will help to track his/her movement and identify his/her specific location. It will also help to take the necessary measures for spot sanitary processing.
Thus, the introduction of biometric facial recognition at the industrial enterprise can improve and speed up the incidents’ response and investigations without spending hours watching the video archive.
Access control system to secure physical assets
The right access control system can help industries secure physical and informational assets
The right access control system can help industries secure physical and informational assets, cut personnel costs, and keep employees safe. Facial recognition systems may enrich access control systems of any company by providing more security. As biometric characteristics, by which the system assesses the compliance of a person with the available profiles in the database, cannot be faked or passed.
The human factor is also reduced to zero, due to the fact that while identity documents can be changed, the inspector can make a mistake or treat his/her task carelessly, be in collusion with an intruder, the biometric system simply compares a person in front of the camera with the biometric profiles database.
Biometric facial identification software
For example, RecFaces product Id-Gate, a specialised software product for reliable access control to the site, checks the access rights by using biometric facial identification alone or in conjunction with traditional IDs (electronic passes, access keys, etc.), which means that there is almost a zero probability of passing to the site by someone else's ID.
The access control system’s functionality allows one to strictly account the number and time of all the facility’s visitors and also track their movement. When unauthorised access is attempted or a person from the stop list is detected, Id-Gate sends an automatic notification to the access control system and operator.
Enhanced data and information security
Even despite the division of access to different industrial enterprise areas, the security service needs to provide independent information system security. Employees with the same facility access rights may have different access rights to data.
However, in that case, a personal password is not enough, as an employee may forget it, write it down and leave it as a reminder, tell a colleague to do something for him/her during the vacation, or just enter it at another person’s presence.
Password-free biometric authentication systems make the procedure user-friendly and secure
Password-free biometric authentication
Password-free biometric authentication systems make the procedure user-friendly and secure. Such systems usually provide an option of two-step verification when successful password entry is additionally confirmed by biometric recognition. Hence, it is particularly relevant due to the current lockdown in many countries.
To sum up, the application of biometric technologies solves several issues of the industry, such as:
Optimises and partially automates the work of the security service, as it provides reliable identification and verification of visitors/employees, reduces the amount of time spent on finding a person on video and making a map of his/her movements, without spending hours on watching video archive in case of investigation.
Provides a high level of reliability and protection from unauthorised access to the enterprise and the information system.
Provides a two-step verification of the user/visitor (including password and biometric data) and almost eliminates the risk of substitution of user data/ID.
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement.
Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward.
Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies.
“This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.”
Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardised across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organisation.”
Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centres (CTCs) helps expand clientele, and the Convergint Development Centre (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate.
Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities.
“While obviously, acquisitions fuel our growth, the addition of these organisations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies.
Meeting customers demand
“Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers.
An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes.
Enhancing and expanding services
Convergint identifies how to leverage the expertise to further enhance and expand current service options “Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team, and provides purpose in the company's mission and vision for the future.”
“Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes.
Demand for integrator services
“We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.”
This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
An impact of the COVID-19 pandemic has been to accelerate change. In 2020, the security industry was among many others that sought to adapt to shifting norms. In the process, we grabbed onto new opportunities for change and, in many cases, re-evaluated how we have done business for decades.
If necessity is the mother of invention, perhaps crisis is the mother of acceleration. This article will reflect on how these themes impacted the physical security industry in 2020, based on content we published throughout the year, and with links back to the original articles.
Sensitive data leakage
Since the lockdown came into effect, organisations globally have undergone years' worth of transformations in a matter of months. Whether it has been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the ‘next normal’ there remains a great deal of uncertainty around what the next 12 months holds and how organisations can navigate turbulence in the face of a possible recession.
One of the most notable and widely reported trends has been the switch to remote methods of work, or home working. With so many employees logging on from residential networks, through personal devices that may be more easily compromised, the overall attack surface has greatly increased, raising the risk of potential corporate and sensitive data leakage in their new home office settings. Security and data protection are larger issues than ever.
Good cybersecurity hygiene
Criminals will use the crisis to scam people for money, account information and more"
With a majority of the world working from home, businesses had to respond to this changing landscape. While it used to be that in-person networking events and sales pitches secured new projects or opportunities, the current landscape pushes businesses to be more creative in how they reach their customers. For example, with ISC West being postponed, many companies have turned to online resources to share new product demonstrations and other company news. Others are hosting webinars as a way to discuss the current climate and what it means for the industry.
Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.”
In a typical office with an on-premise data centre, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications.
There are many benefits of working remotely with productivity right up the top of the list
There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and travelling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working.
Video conferencing platforms
Trade shows have always been a basic element of how the security industry does business - until the year 2020, that is. This year has seen the total collapse of the trade show model as a means of bringing buyers and sellers face to face. The COVID-19 pandemic has effectively made the idea of a large trade show out of the question.
The good news is that the industry has adapted well without the shows. A series of ‘on-line shows’ has emerged, driven by the business world’s increasing dependence on Zoom and other video conferencing platforms. The fact is, 2020 has provided plenty of opportunities for sellers to connect with buyers. Some of these sessions have been incredibly informative – and conveniently accessible from the comfort of a home office.
Online training courses
Online training has grown in popularity this year, and the change may become permanent
Online training has grown in popularity this year, and the change may become permanent. “We have seen unprecedented international demand for our portfolio of online training courses ranging from small installation companies to the largest organisations, across a wide range of sectors,” says Jerry Alfandari, Group Marketing Manager of Linx International Group, a UK training firm.
“More than ever, businesses are looking to ensure they have the skills in-house to coordinate their response to the changing situation. Individuals are also taking this time to upskill themselves for when we return to ‘normal’ by bringing something with them they didn’t have before. Perhaps unsurprisingly, people are still seeking to better themselves for what will be, eventually, a competitive market.”
Virtual trade show
‘Crisis and the Everyday’ was part of Genetec’s Connect’DX virtual trade show last spring. The virtual conversation – emphasising both in form and content the topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry.
In the middle of this pandemic, there is an opportunity to help security reinvent itself
“In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security.”
As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected.
“We moved quickly to establish work-from-home protocols to protect our employees and minimise impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilising webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts.
Consolidation continued in the physical security marketplace in the turbulent year 2020. There were several mega-deals in addition to shuffling among small and medium-sized companies.
Here is a sampling of M&A from this year, compiled from our archive of company news. With the changing economic climate, how much more is ahead in 2021? Stay tuned.
Wesco merges with Anixter
WESCO International, Inc., a provider of business-to-business (B2B) distribution, logistics services and supply chain solutions, announced it completed its merger with Anixter International Inc., creating a premier, global B2B distribution and supply chain solutions company. Anixter becomes a wholly owned subsidiary of WESCO International.
ACRE acquires Razberi
ACRE acquired Razberi Technologies, Farmers Branch, Texas, and the product line of intelligent video appliances, automated security software and health monitoring software will be added to and sold under the ComNet brand and portfolio of products. ComNet will now be selling Razberi products through its established channels.
Motorola acquires IndigoVision
Among the benefits is enhanced geographical reach across a wider customer base
Motorola Solutions says the IndigoVision range of products, global presence and customer base are ‘highly complementary’ to Motorola Solutions' existing presence in video security. Among the benefits is enhanced geographical reach across a wider customer base.
Motorola acquires Pelco
“Pelco’s track record of innovation, internationally recognised brand, global channel and customer installed base enable us to further expand our global footprint with enterprise and public safety customers,” said Greg Brown, Motorola Solutions’ Chairman and CEO, about the iconic brand.
Johnson Controls swallows Qolsys
Qolsys Inc., residential and commercial security and smart-home manufacturer, enhances Johnson Controls global innovation platform, delivering next generation security and smart building solutions. JCI had already owned a majority stake in the company since 2014.
ADT and Google Home partnership
The partnership will combine Nest’s award-winning hardware and services, powered by Google’s machine learning technology, with ADT’s installation, service and professional monitoring network to create a more helpful smart home and integrated experience for customers across the United States. Upon the closing of Google’s equity investment in ADT, Google will own 6.6% of ADT’s outstanding aggregate common equity.
Securitas acquires STANLEY in Five Countries
The acquisition is aligned with Securitas’ ambition to double the size of its security solutions
Securitas acquired STANLEY Security’s electronic security businesses in Germany, Portugal, Switzerland, Singapore and India. The acquisition is aligned with Securitas’ ambition to double the size of its security solutions and electronic security business and expands Securitas’ electronic security footprint and capabilities.
Allied Universal to Buy G4S
Ending the year on a high note, the boards of directors managing Allied Universal and G4S reached an agreement on the terms of a recommended cash offer. The deal brings to a close a six-month bidding war for G4S. The combined business is expected to generate approximately $18 billion in annual revenues with a global workforce of more than 750,000 people in 85 countries.
Quantum acquires Western Digital business line
Quantum Corporation entered into an agreement with Western Digital Technologies, Inc., a subsidiary of Western Digital Corp., to acquire its ActiveScale object storage business. The acquisition demonstrates Quantum’s commitment to innovation and growth, extending the company’s leadership role in storing and managing video and unstructured data using a software-defined approach.
Ava, a unified security company, announced the completion of the merger between Jazz Networks, renowned cyber security insider threat detection and response firm; and Vaion, an end-to-end video security solutions provider. Ava is now positioned to deliver unified cyber and physical security solutions to organisations worldwide.
Rohde & Schwarz has installed Ireland’s first Quick Personnel Security (QPS) scanner at Kerry Airport, Farranfore, Ireland, delivering state-of-the-art technology that enables a high throughput, enhanced security, and increased safety for airport customers and staff.
The airport has chosen the latest model, the latest generation R&S QPS201 launched earlier in 2020, becoming the first Rohde & Schwarz security scanner installation in Ireland.
R&S QPS201 security scanner
The R&S QPS201 security scanner by Rohde & Schwarz features enhanced second-generation algorithms that increase sensitivity to further boost threat detection while minimising false alarms and reducing processing time. In addition to strengthening security, these performance gains reduce post-alarm manual checks and so help avoid physical contact to ensure social distancing.
Moreover, a more efficient scanning time with R&S QPS201 balances the effects of incoming new X-ray inspection systems, which scan items inside baggage that previously had to be removed, such as laptops. The security scanner restores parity to baggage- and personnel-scanning times, helping security staff manage throughput at checkpoints and avoid excessive queueing.
Rohde & Schwarz QPS scanners
The Rohde & Schwarz QPS scanners are highly regarded by the air travel industry worldwide"
“The Rohde & Schwarz QPS scanners are highly regarded by the air travel industry worldwide and the latest technology takes performance to an even higher level,” said Gary Walker of Rohde & Schwarz, adding “I am confident that Kerry Airport and its customers will appreciate the enhancements to service, security, and safety, and that others in Ireland will follow their lead.”
Tom O’Driscoll, Chief Security Officer of Kerry Airport, commented “Now is the right time for this investment in the future of Kerry Airport, to meet the heightened expectations for safety and security within our industry. Having recently installed explosives detection systems for cabin baggage (EDS CB), we are proud to now also adopt this state-of-the-art technology in Ireland, which will set new standards for service and well-being.”
R&S QPS201 was installed and setup at Kerry Airport with minimal disruption to daily activities. The system is designed to be easy to use, with intuitive graphical displays that require minimal training and let operators quickly achieve full proficiency.
Integrated with millimeter-wave technology
Leveraging Rohde & Schwarz expertise in millimeter-wave technology and utilising machine-trained software algorithms, R&S QPS201 detects all types of potentially dangerous objects whether metal, ceramic, plastic, or liquid.
The harmless low-energy millimeter-waves enable personal privacy to be maintained while capturing high-resolution data that enhances threat detection. The system allows an easy, hands-down posture for scanning, which is comfortable while at the same time ensuring effective screening for safety and security.
Located in the heart of west London, Ealing Council serves the residents and businesses of the UK capital's fourth largest borough. With a vast housing portfolio and a commitment to keeping residents as safe and secure as possible, Ealing Council benefits from the use of PAC’s innovative cloud-based access control solution, PAC Residential Cloud.
The London Borough of Ealing comprises seven major towns, Ealing, Acton, Greenford, Hanwell, Northolt, Perivale and Southall. Ealing Council’s task is to provide a diverse range of services to the 350,000 residents residing across the area. It is committed to improving its performance, while ensuring value for money and serving a key part of this is the provision of good quality housing that meets the highest possible standards.
Ensuring safety and security of residents
In addition to carrying out property allocation, repairs, rent collection, homelessness services and estate management, Ealing Council is responsible for ensuring the security and safety of the tenants living in its 300+ housing blocks.
As a longstanding PAC customer, we chose the PAC Residential Cloud as the central hub of our access control system"
Daljit Gill, an Electrical Services Manager at Ealing Council commented, “When it comes to administering our multi-site housing portfolio, Ealing Council recognises the advantages that access control technology brings in terms of our ability to effectively access information, issue and configure key fobs and check occupancy status.”
He adds, “As a longstanding PAC customer, we chose the PAC Residential Cloud as the central hub of our access control system, which currently comprises around 1,100 doors and 500 controllers.”
PAC Residential Cloud
Over the last few years the cloud has proven to be a game changer in the way access control technology is designed, configured and used. The PAC Residential Cloud leads the way in allowing organisations to remotely manage and monitor their access control systems.
Meanwhile, the PAC controllers, which are being used as part of the Ealing Council’s access control system, utilise the general packet radio service (GPRS) platform, which is a faster and cost-effective means of connecting remote sites via a mobile network.
Key fob management and remote diagnostics
Sam Flowers, Regional Sales Manager at PAC GDX, explains “Daljit and his team can address technical issues, deal with key fob management, examine diagnostics, view system status, set and unset a system, and gain access to event logs and reports, all from a remote location.”
Without the cloud, any problems and issues would need to be dealt with by office-based individuals"
Sam adds, “Without the cloud, any problems and issues would need to be dealt with by office-based individuals, which is obviously restrictive and can lead to a delayed response. We provide a full online training programme to help customers get the best out of their systems and also offer full technical support.”
Asked on how the PAC Residential Cloud makes his day to day working life easier, Ealing Council’s Daljit Gill responded by stating, “I can address connection issues, manage the system and troubleshoot from wherever I happen to be, using my PC, tablet or smartphone. Not only is this convenient, it also saves me a huge amount of time, as I don’t have to go into the office to log-in.”
Fully auditable system
He adds, “Two of my colleagues also have permission to use the system remotely, although we could share access with up to 15 administrators if required, with each person only given access to information that relates directly to their role.”
Daljit further said, “One of the main features of the system is that it is fully auditable, meaning that any activity can be monitored in real time and traced directly back to a specific user via their unique password.”
Adherence to GDPR and strong data protection policy
Ealing Council strictly adheres to the General Data Protection Regulation (GDPR) and has implemented a strong data protection policy. PAC Residential Cloud is hosted with The Bunker, a trusted PAC partner, whose UK data centres are located in former nuclear bunkers and certified to the ISO 27001 standard for information security management.
If an alert is activated, measures can then be taken to deactivate a specific key fob"
PAC Residential Cloud also offers Ealing Council some less obvious benefits. Sam Flowers comments, “The data collected by the access control system can be used to issue an alert if a resident’s key fob hasn't been used during a specific period, identify patterns of behaviour that could suggest illegal activity, flag-up if someone is subletting a property or even detect if a tenant is using a cloned key fob.”
Sam adds, “If an alert is activated, measures can then be taken to deactivate a specific key fob. Furthermore, the PAC Residential Cloud has also helped Ealing Council adopt a business as usual approach during the coronavirus pandemic by limiting physical interaction, while still enabling a prompt and effective response.”
Fully IP-based access control system
As well as enjoying the operational advantages of the PAC Residential Cloud, Ealing Council is also planning to advance its transition to a fully internet protocol (IP) based access control system by upgrading to PAC’s 512DCi digital networkable access controllers.
Daljit Gill concludes by stating, “Installing the PAC 512DCi’s will allow us to maximise operational effectiveness through our investment in the PAC Residential Cloud. We will also be able to utilise PAC’s high frequency OPS MIFARE DESFire EV1 readers, which have been tested to meet Advanced Encryption Standard (AES) 128 bit compliance. This will further reduce the risk of key fob cloning and ensure that our tenants benefit from improved levels of security.”
Synectics, a globally renowned company in the design, integration and support of advanced security and surveillance systems, announced that the company has won a new contract with Irish Rail (Iarnród Éireann) to upgrade all InterCity Mark 4 rolling stock on the Dublin to Cork route to an IP-based video surveillance solution, following a competitive bid process.
The IP video security system contract will see Synectics develops and installs an innovative safety-critical IP video surveillance system that enables full connectivity from trains to the control room, there by replacing the existing CCTV approach.
Safety-critical IP video surveillance system installation
Each eight-coach train set, using Synectics’ T2000 platform, will help utilise a suite of IP 360-degree ‘fish-eye’ cameras
Each eight-coach train set, using Synectics’ T2000 platform, will help utilise a suite of IP 360-degree ‘fish-eye’ cameras, in the vestibules and saloon areas, to provide high-quality surveillance information.
Installation is expected to commence in September 2021, to be followed by an additional support contract to provide a five-year in-territory maintenance programme.
IP video security technology
Iain Stringer, Managing Director of Synectics, commented “We are delighted that Irish Rail has chosen our IP video security technology, alongside our design, programme management and installation capabilities, to upgrade surveillance on one of their premier InterCity routes.”
He adds, “This win with Irish Rail represents a further step into on-vehicle heavy rail solutions for our Synectics Security business, building on our deep experience across light-rail markets.”
Smart technology developments
Iain further stated, “Irish Rail is our second public transport win in Ireland over the last few months and reflects our growing reputation for smart technology developments that meet next generation operator requirements. Our approach is opening up new opportunities for all rail operators to transition their video management capability to the cloud and improve operational effectiveness.”
Since the beginning of the Corona pandemic, MOBOTIX thermal cameras have been increasingly used in the healthcare sector, as well as airports, train stations, public authorities, and companies, to detect temperature anomalies in people without contact and thus contain the spread of the virus. However, this aspect is only one area for which MOBOTIX technology is currently providing special services.
The MOBOTIX 7 Platform, with its intelligent and cyber secure camera systems M73 and S74, predestined MOBOTIX video technology even before the pandemic to ensure comprehensive, digital support in healthcare clinics and the care of the elderly and disabled. The reliable, high-quality video systems made in Germany reduce hospital and nursing staff's workload, provide digital care for patients and residents, and optimise care and workflow processes.
Parking lot management
Basic safety and pandemic protection in healthcare
Also, during the pandemic, a special duty of care applies to employees, patients, and residents as a risk or high-risk group. MOBOTIX video technology is used in numerous clinics, retirement, and care facilities worldwide to ensure that patients, residents, and employees have a carefree stay and can work safely. Dangers and sources of risk are detected, and the intelligent systems warn, report, or directly initiate assistance and rescue measures.
With the MOBOTIX 7 platform and the versatile apps, MOBOTIX offers exceptional application possibilities
This allows staff to concentrate on their work, while hospital patients and nursing home residents can recover more quickly and get the rest they need. MOBOTIX video technology is also used for early fire detection and access control, mainly to protect sensitive areas such as sterile rooms, operating theatres, or medication depots. MOBOTIX also offers the right solutions for intrusion and theft protection, securing outdoor spaces, or access monitoring and parking lot management.
With the MOBOTIX 7 platform and the versatile apps, MOBOTIX offers exceptional application possibilities: Temperature-sensitive people are detected as soon as they enter the facility and can be immediately sent for further examination. Crowding is avoided, and social distancing can be supported. MOBOTIX video systems detect when no mask is being worn and trigger an alarm or an information announcement.
Cyber security and data protection
Cyber security and data protection "Made in Germany”
Particularly in the healthcare sector, cyber security and data protection must be given the highest priority. After all, it is a matter of protecting lives. But it is also about sensitive, personal data that must not fall into the wrong hands under any circumstances. MOBOTIX video systems consist of high-quality components.
Developed, produced, and comprehensively tested at the company's German headquarters in Langmeil/Rhineland-Palatinate, the company creates products and solutions that are impressive not only because of their outstanding image quality - even in the most challenging lighting conditions. One hundred percent DSGV-compliant, the decentralised MOBOTIX systems stand for the highest possible cyber security and comprehensive data protection. Unauthorised persons cannot read the stored data.
Intelligent video technology
Relieving the workload of hospital and nursing staff with "digital care”
Using intelligent video technology from MOBOTIX can significantly reduce the hospital and nursing staff's workload
Hospital and nursing staff often work at the breaking point. Using intelligent video technology from MOBOTIX can significantly reduce the hospital and nursing staff's workload. For example, adequate video support can be used to carry out control rounds digitally. On the one hand, this creates free space that can be used for personal care and nursing, while on the other hand, emergencies are reported directly at the time they occur - and thus, the staff does not lose critical time.
Effective signaling and calling systems targeted alarm differentiation, and the avoidance of false alarms keep staff motivation high and reduce alarm fatigue.
Incorporating audio systems
Digital and discreet care for patients and those in need of care
MOBOTIX provides discreet video support for round-the-clock security without anyone feeling they are being watched. The video surveillance systems in healthcare facilities are discreetly and unobtrusively installed; they also detect and alert only when defined events occur to keep recordings to a minimum. At the same time, patients and residents can be sure that help will arrive quickly in an emergency.
Even at night, helpless individuals are detected immediately, ensuring their safety and preserving their independence. By incorporating audio systems, MOBOTIX video solutions for healthcare also enable patients to be addressed and communicated directly with.
Licence plate recognition
Optimise hospital and care processes
Smooth organisation of routines helps hospitals and retirement and care facilities be efficient and profitable
Smooth organisation of important routines helps hospitals and retirement and care facilities be efficient and profitable. Numerous processes can be automated and optimised with MOBOTIX video technology, from the facility's journey to check-out. For example, professional parking management with licence plate recognition can ensure that only authorised vehicles can access specified areas.
In this way, ambulance access routes can be kept free, or parking fees can be billed in a straightforward, fast, and accurate manner. Queues in registration or examination areas can be avoided, and smooth administration and medical and care areas can be enabled. University hospitals or teaching institutions can use high-resolution camera systems, e.g., in operating theaters, to fulfill their teaching and training mission without disruptions.
Customers can develop further apps that enable completely individual solutions themselves or have them created by MOBOTIX and its technology partners and certified concerning cyber security.
Advanced video technology
Comprehensive solutions with the best return on investment
Healthcare is a market that is extremely important to MOBOTIX. The high level of solution expertise digitises processes and work steps in everyday hospital and home life, using intelligent and future-proof video technology. Thus, simplifying work and making it safer also relieves the healthcare budgets' pressure and increases profitability (ROI).
We are several weeks into 2021, and it is already shaping up to be an eventful year. The happenings and trends from 2020 will likely carry over into the new year, but in a fast-moving industry such as ours, there will also be additional trends to watch. Looking toward the year ahead, we asked this week’s Expert Panel Roundtable: What will be the biggest security trends in 2021?
As an industry, we often speak in buzzwords. In addition to being catchy and easy to remember, these new and trendy industry terms can also reflect the state of the security market’s technology. In short, the latest buzzwords provide a kind of shorthand description of where the industry is - and where it’s going. We asked this week’s Expert Panel Roundtable: What new buzzword(s) rose to prominence in the security industry in 2020? (And how do they reflect industry trends?)
Internet-based training has long provided a less-expensive alternative to in-person classroom time. There are even universities that provide most or all of their instruction online. However, the COVID-19 pandemic has expanded acceptance even more and increased usage of internet-based meeting and learning tools. We asked this week’s Expert Panel Roundtable: How can remote or internet-based training benefit the physical security market?