Centrify, globally renowned Privileged Access Management (PAM) and Identity-as-a-Service (IDaaS) solutions provider, announced it is spinning out its IDaaS business as a standalone company named Idaptive. Centrify is sharpening its strategic focus on redefining the legacy approach to Privileged Access Management with cloud-architected Zero Trust Privilege to stop the leading cause of breaches — privileged access abuse. Idaptive will deliver Next-Gen Access to protect employees, partners and customers with their market-leading IDaaS solution.
Identity & access management Tim Steinkopf, Chief Financial Officer, has been named CEO of Centrify effective January 1, 2019
Tim Steinkopf, Chief Financial Officer, has been named CEO of Centrify effective January 1, 2019. During his seven years as CFO at Centrify, the company has evolved to become a leading global supplier of Zero Trust Security solutions for Identity & Access Management, and he was named the 2016 CFO of the Year by Silicon Valley Business Journal. Danny Kibel, who currently leads development of Centrify’s IDaaS solutions as Vice President of Engineering and Operations, will assume the CEO role at Idaptive effective January 1, 2019. The executive leadership teams for both companies will be comprised of existing Centrify executives to take each business forward with consistency and ensure a seamless transition for customers.
“The more we looked at our business, the clearer it became that a huge opportunity existed to create two organisations that can each better focus on innovation, accelerate their respective roadmaps, and ensure customer success,” said Steinkopf. “Our new relationship with PE firm Thoma Bravo gives us the flexibility to execute this strategy and positions both companies for organic and inorganic growth to strengthen their market positions and offer even better PAM and IDaaS solutions, respectively, to secure the enterprise.”
Enterprise Mobility Management (EMM)
Tom Kemp, who is transitioning out of the role of CEO as part of this evolution, co-founded Centrify 14 years ago and has led the company through a number of industry milestones, such as combining Enterprise Mobility Management (EMM) and Identity-as-a-Service (IDaaS) as a unified service and pioneering Privilege-as-a-Service. Kemp will transition to an active strategic advisory role.
“We saw a tremendous opportunity for both Centrify and Idaptive to drive core product focus in each of their respective markets, while continuing to fulfill the mission of Zero Trust and Next-Gen Access,” said A.J. Rohde, a partner at Thoma Bravo. “Customers will become the major beneficiaries by having two companies with distinct and already well-known leadership, capital for rapid expansion, and accelerated investments in product and support. We share the companies’ collective vision for this, and we are very excited to be a part of it.”
Centrify Zero Trust Privilege
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-architected Zero Trust Privilege
Centrify is redefining the legacy approach to Privileged Access Management by delivering cloud-architected Zero Trust Privilege to secure access to infrastructure, DevOps, cloud, containers, Big Data and other modern enterprise use cases. Organisations may consider approaching Privileged Access Management by solely implementing password vaults, but this is simply not enough for today’s modern threatscape. Centrify Zero Trust Privilege goes beyond password vaulting to help customers grant least privilege through Zero Trust Privilege, verifying who is requesting access, understanding the context of the request, and assessing the risk of the access environment. This approach minimises the attack surface, improves audit and compliance visibility, and reduces risk, complexity and costs for the modern, hybrid enterprise.
“As traditional network perimeters dissolve, organisations must discard the old model of ‘trust but verify’ that relied on well-defined boundaries,” said Steinkopf. “Zero Trust mandates a ‘never trust, always verify, enforce least privilege’ approach to privileged access, from inside or outside the network. This model, which we call Zero Trust Privilege, will be Centrify’s singular focus, leveraging years of innovation and leadership to secure the ‘keys to the kingdom’ for our customers.”
Idaptive Next-Gen Access Idaptive delivers Next-Gen Access, protecting organisations from data breaches through a Zero Trust approach
Idaptive delivers Next-Gen Access, protecting organisations from data breaches through a Zero Trust approach. Organisations may consider approaching Zero Trust by implementing Single Sign-On (SSO), Multi-Factor Authentication (MFA), Enterprise Mobility Management (EMM), and User Behaviour Analytics (UBA) from separate vendors, but disparate solutions leave security and performance gaps, and are difficult to integrate and maintain.
Idaptive is better equipped to enable a Zero Trust approach to security, with advanced capabilities that intelligently determine the authenticity of a digital user and their device, govern access across an organisation’s resources, and react when risky behaviour is detected. With Idaptive, an organisation’s security posture is not only bolstered, but end user experiences are improved making everyone more productive — all without sacrificing best-of-breed features.
“Companies require intelligent access platforms that not only verify users and validate devices, but constantly learn to make smarter, faster decisions about granting user access. Without intelligent access, companies risk poor security postures, data breaches and frustrated customers,” said Kibel. “At Idaptive, we’re building this platform we call “Next-Gen Access,” ushering in a new generation of access technology that not only protects companies, but also leads to improved customer satisfaction. We have built a talented team with proven technology and are looking forward to revealing more on our roadmap, use cases and success stories in the months to come.”
“With C•CURE 9000 at the heart of so many high security solutions, it is not surprising that end-users want to be kept informed on any emerging cyber threats and how we are dealing with them,” said Gordon Morrison, GB Sales Director for the Tyco access control and video brands. “In this respect the well-established Tyco Cyber Protection Program, which we see as part of our long-term' holistic approach to supplying customers with quality solutions, is helping us maintain a leadership position on cyber security.”
Tyco Cyber Protection Program
“We were able to reassure delegates that our solutions are specifically designed to be cyber resilient and that before they are introduced, they are extensively tested so that we can discover and address any critical vulnerabilities. We also arrange for independent testing to be conducted on our products and software to ensure that any new firmware or software updates do not open a ‘back door’.”
The end-users from across the UK who attended the daylong event were able to see demonstrations of how they can take advantage of the latest technical advances from C•CURE 9000, the access control and event management platform from Tyco, the security products division of Johnson Controls. These included a Business Intelligent Reporting System (BIRS) module which provides real-time ‘easy on the eye’ graphical reports on access control activity.
C•CURE Go mobile access control app The C•CURE Go mobile access control app is supported by iPhone, iPad, iPad Air, iPad Mini, Android phones and tablets
The C•CURE Go mobile access control app, which is supported by iPhone, iPad, iPad Air, iPad Mini, and Android phones and tablets, attracted a lot of interest. Delegates were impressed with the app’s extensive range of features including offering the ability to remotely lock/unlock doors with a touch of a button, as well as quickly search, create or update personnel records and add/remove clearances and deactivate cards on the go.
Some new hardware was also showcased such as the recently introduced Innometriks readers which provide strong identity authentication for mission critical environments using smart card, PIN and biometrics, and delegates were informed that a second generation PoE edge based iSTAR 4 door controller was under development.
Web-based access management portal
A recent updated version of C•CURE 9000, v2.7, has seen the introduction of a wide new range of features and functions designed to enhance the user experience. Included is a web-based Access Management portal which further adds to C•CURE 9000’s ability to claim that it is the most flexible and easy to use access control platform available, as well as adding to its reporting capabilities.
A cardholder’s request to be given access to a restricted area can now be directed to the person best placed to make the decision, replacing potential long email chains and slow response times common for access approvals. A new Access Management module offers an efficient method of managing cardholder access requests without requiring direct involvement from the security team.
C•CURE 9000 Access management
C•CURE 9000 Access Management allows cardholders to make access requests through an intuitive, web-based portalC•CURE 9000 Access Management allows cardholders to make access requests through an intuitive, web-based portal. The self-service capabilities increase the agility of clearance owners' responses to cardholder access requests for temporary and contract staff, as well as employees who have with drop-in work schedules or are part of project-based self-organising teams.
There was also a presentation on the latest features and functionalities of the victor unified video management system and how it integrates seamlessly with C•CURE 9000 to streamline real-time security command and management over widespread and demanding environments.
The victor Video Management System (VMS) seamlessly synchronises video with data from access control, fire, intrusion and other systems. Future-proof and scalable, it has been designed to provide a high-performance solution which provides operators with superior situational awareness, as well as an easy way to investigate incidents and generate activity reports.
Intelligently delivers the right video and other critical information such as event notifications, maps and health monitoring, to the right person at the right time and with the flexibility to display the video and other information on single or multiple screens, as well as video walls.
System integrators are able to meet the customers’ operational requirements by selecting the right Tyco NVR for their needs together with a camera compatibility list spanning over 60 manufacturers and 3,300 cameras.
Provides a centralised view of fire, security and life safety operations.
Offers powerful tools to help simplify and enhance your command and control operations.
Victor VMS - C•CURE 9000 integration Victor’s integration with C•CURE 9000 enables operators to monitor and prioritise events from both systems
Victor’s integration with C•CURE 9000 enables operators to monitor and prioritise events from both systems and to colour code them for rapid identification in order to facilitate quick response times. Combine these with other innovative C•CURE 9000 features and you have a formidable integrated security solution which can provide security or operational personnel with all the information they need to make quick decisions and take appropriate command actions if an incident or emergency occurs.
The event, which was supported by a number of C•CURE 9000 Enterprise Partners as well as a number of third-party manufacturers who have integrated their solutions with the platform, was by all accounts a great success, with many of the delegates contributing to the session dedicated to discussing the new features and innovations which could be introduced in future updates of the C•CURE 9000 platform.
Intelligent communications solutions
Russell Baker, Southern Area Business Development Manager for Zenitel, the UK’s leading specialist provider of intelligent communications solutions, said “We were very pleased to be able to participate in the end user event. We were able to take the opportunity to demonstrate how the deep level of integration which can be achieved between the C•CURE platform and Zenitel’s intercom and public address systems, enables our mutual end-user clients to take their security to the next level.”
“For high security and mission critical applications, the interaction that takes place between the two solutions will ensure security personnel are able to strictly control who has access to restricted areas and react quickly to any incidents.”
Traka - C•CURE 9000 integration
Traka showcased how its intelligent key and equipment management systems have been integrated with C•CURE 9000Traka, a division of Assa Abloy, showcased how its intelligent key and equipment management systems have been integrated with C•CURE 9000. “Our ability to support C•CURE 9000 means there is so much more we can do together to provide end-users with greater value from their electronic security system,” said Steve Bumphrey, UK Sales Director for Traka ASSA ABLOY. “The level of integration achieved means end-users can use the C•CURE interface to enrol authorised personnel into the Traka database and then control access to our key cabinets and intelligent lockers, as well as manage the removal of physical assets. Traka generated real-time alarms can be seamlessly managed via the C•CURE 9000 platform and improved efficiency comes from only needing a single credential for both systems.”
Other successful integrations with C•CURE 9000 which were highlighted at the event included:
FireClass, a revolutionary new class of commercial fire detection products which are packaged as an easy to install, out-of-the-box, digital open-protocol solution. Designed and engineered in Europe, FireClass technology is part of Tyco’s family of solutions.
3D Fingerprint MorphoWave from Idemia, the market leader in augmented identity. Immune to environmental factors such as dust and lighting, MorphoWave acquisition of finger prints is dynamic, high speed and because it is touchless it offers the additional benefit of being hygienic.
Established by the German Design Council, the 2018 Iconic Awards: Innovative Architecture honour visionary architecture, innovative products and sustainable design. The respected design award recognises the importance ASSA ABLOY, the global door opening solutions and access control systems firm, places on the design of its products.
ASSA ABLOY door closer portfolio
An influential factor when buying a new door closer, the appearance of ASSA ABLOY’s door closer portfolio now features a distinctive and contemporary design, with unobtrusive lines, chamfered edges and lightly contrasting colours. The design is finished with the classic ASSA ABLOY horizontal groove.
For installers, the redesigned products remain as versatile as ever, with well-designed installation features and fitting options. Flexible height adjustment and non-handed features enable quick and easy installation, while reducing stock requirements. The new designs have minimal impact on the overall footprint and there are no changes to the fixing positions.
Cam-Motion technology The award-winning door controls provide innovative solutions for all door opening applications
The award-winning door controls provide innovative solutions for all door opening applications. Featuring Cam-Motion technology to help ensure doors open smoothly and securely, the range delivers a quiet and safe door opening experience.
Products from the ASSA ABLOY door closer range meet the requirements of the recently updated BS 8300 standard for low opening forces, CE Marked and comply with relevant fire regulations. Popular models used in trade and commercial environments are also Certifire approved, for further reassurance of performance.
Door closer range
David Hindle, Head of Door Closer Sales at ASSA ABLOY, said: “Winning this award is recognition of our industrial design vision. We wanted to create a door closer range that is not only functional, but also sleek, stylish and modern. The range will complement or enhance almost any environment, while maintaining the outstanding performance capabilities that ASSA ABLOY products are known for.”
By leveraging each other‘s technologies as companies sharing the dormakaba banner, LEGIC and Farpointe Data are at the forefront of the new expanding market for secure mobile credentials. LEGIC‘s 6000 series reader ICs and the mobile service LEGIC Connect are at the heart of Farpointe‘s new, award-winning Conekt mobile smartphone access control solution.
Farpointe’s first Conekt products are the K-BLE mobile access credentials and K-SMART3 electronic access readers with Wiegand output that support both mobile and traditional physical credentials. Electronic access control mobile smartphone-based credentials are an evolution of traditional RFID cards and tags, joining proximity and smartcard credentials to identify a user as he moves about a secured facility.
Mobile access credential
Mobile credentials Gartner suggests that by 2020, 20 percent of organisations will use mobile credentials for physical access
Mobile credentials make it possible for smartphones, such as the Apple iPhone and the range of Google Android devices, to be used as an electronic access control credential. Mobile credentials Gartner suggests that by 2020, 20 percent of organisations will use mobile credentials for physical access.
Security professionals creating electronic access control systems need to be aware that over 95 percent of all adults between the age of 18 and 44 own smartphones. Plus, 69 percent of the entire population already uses smartphones. And, the average smartphone user touches their device 2617 times a day (Dscout Research). Thus, practically anyone using an access system already carries a smartphone. Another way to look at it is that every smartphone user, or almost everybody, could now easily download a mobile access credential.
Sensitive confidential information
High security Conekt recognises the latest cybersecurity responsibilities expected of access control system providers. Original solutions often compelled end users to disclose sensitive confidential information about themselves and their installation.
Classic access control is only the beginning of the uses of mobile credentials. More opportunities are on the way"
The new Conekt solution provides an easy way to distribute credentials with features that allow the user to register only once, needing just the smartphone’s number, and requiring no other portal accounts or activation features. “Classic access control is only the beginning of the uses of mobile credentials. More opportunities are on the way.” Scott Lindley, General Manager, Farpointe Data, Inc.
Classic access control
Classic access control is only the beginning of the uses of mobile credentials. More opportunities are on the way. How about using a smartphone as an intelligent key for a car? Want to know where a child or loved one is driving, how fast, if he/she added gas or oil or if anyone else is in the car? How about using it to access the gym, automatically sync to a piece of equipment, immediately gain expert advice or analyse the effectiveness of the workout?
Use a smartphone for everything, forget all those other tags and cards. a smartphone will become the passport to all aspects of life, from work to home to avocations. And at a fraction of the investment in traditional credentials, secure mobile Conekt credentials are all anyone will need.
iLOQ has signed an agreement with leading residental developer Bonava Finland Oy. Under the agreement, the majority of new buildings developed by Bonava will be equipped with iLOQ’s unique digital locking and access control solutions. The agreement is initially valid until the end of 2020.
iLOQ will supply unique self-powered locking and access management solutions to buildings developed by Bonava“We are happy about the upcoming collaboration. The new agreement with Bonava shows that digital access control has made its way into new construction. Digital access management will replace mechanical locking in the future, and this is a change where iLOQ is at the very forefront. The agreement is also a strong indication of us reaching a point in our growth where we are more strongly present in the production of new buildings,” says Heikki Hiltunen, President & CEO of iLOQ.
iLOQ will supply unique self-powered locking and access management solutions to buildings developed by Bonava. The agreement aims to increase collaboration between iLOQ and Bonava and makes iLOQ’s self-powered locking and access management solutions available to an increasing number of tenants.
Digital locking system for tenants’ security
With iLOQ’s locking system, the tenant can move around the neighbourhood using a single key with access rights that can be modified"“This is a fine step for Bonava and provides a good starting point for future living solutions. Bonava wants tenants to be able to move around in their neighbourhood easily and safely, which is possible with a digital locking system. With iLOQ’s locking system, the tenant can, for example, move around the neighbourhood using a single key with access rights that can be modified. New lock series are not necessary if the key is lost and using the key also leaves a mark that makes it easy to track possible misuses,” says Kaisu Nousiainen, Head of Design and R&D at Bonava.
“Digital locking and access management are strongly linked with the living of the future, and we are a pioneer in the digitalisation of the locking industry. People are interested in smart home technology. Digital development makes the everyday lives of tenants and other users significantly easier. Due to the collaboration, an increasing number of tenants are able to enjoy the security digital access management brings,” states Toni Päivinen, Head of Sales Finland at iLOQ.
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8,8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state.
Detecting and deterring power thefts
Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometers distribution network and 4,386 kilometers of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables.
Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters.
Bosch video security and intrusion detection systems For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS)
As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS).
For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. All systems and cameras are monitored by security personnel at the company’s control center in Recife.
IP cameras with built-in video analytics
For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites.
Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
AxxonSoft technology speaks to product simplicity, ease-of-use and advanced functionality during the FIFA World Cup in Russia.
Within the framework of preparation for the 2018 FIFA World Cup in Russia, AxxonSoft's tech support customised settings on more than 1,350 video channels at 3 stadiums and at a central monitoring station to meet the Ministry of Internal Affairs' needs through a centralised monitoring system. AxxonSoft, in collaboration with this global high calibre event, launched this state-of-the-art technology system within just 1 month, utilising team members to rollout.
Videos were streamed from stadiums and surrounding territories, fan zones, and other locations deemed critical from the point of security
Situational video analytics
AxxonSoft's Intellect software managed a total of 960 video surveillance channels at Samara Arena, Mordovia Arena, and RZD Arena — the latter of which was used as a training base for referees. 250 of those channels employed AxxonSoft's situational video analytics to monitor the stadiums, 41 license plate recognition channels to monitor vehicle traffic, and 9 facial recognition channels to monitor for individuals prohibited from accessing the stadiums. Video monitoring was also integrated with access control, fire and security alarm systems.
The Ministry of Internal Affairs' central monitoring station, powered by AxxonSoft's Intellect PSIM platform, pooled over 390 video channels from all 11 World Cup host cities with video feeds displayed on an interactive map. Videos were streamed from stadiums and surrounding territories, fan zones, and other locations deemed critical from the point of security for participants and guests of the World Cup.
Integrated access control software
The World Cup stadium security project included requests to integrate access control software, as well as develop a screen manager to adaptably manage camera layout and the video wall. These functions were successfully implemented at the World Cup stadiums and will be incorporated in Intellect 4.11.0.
Over 9,000 Intellect-powered video surveillance cameras were used to monitor the security of over 2 million spectators
The Intellect PSIM platform was employed in various areas of 10 out of the 12 stadiums where 49 World Cup matches were played. Over 9,000 Intellect-powered video surveillance cameras were used to monitor the security of over 2 million spectators who attended the games. AxxonSoft software was also widely used at training camps, fan zones, transportation infrastructure, and other sites where teams and fans arrived and moved around the country.
Advanced stadium security technology
“The team at AxxonSoft were really excited to be part of a project of this calibre. We were able to demonstrate product simplicity, ease-of-use and advanced functionality through our stadium security technology. The FIFA World Cup was a great success in Russia and just proves how we can work together with top agencies and companies to provide a safe environment for all,” says Global Marketing Director for AxxonSoft, Colleen Glaeser.
FIFA president Gianni Infantino called the 2018 World Cup the best in its history. In addition to commenting on match attendance and television viewership numbers, Infantino gave high praise to the quality of infrastructure and security.
The University of Nottingham is renowned for its research innovations. Its system to control access and to secure the facilities no longer reflected its commitment to excellence in the advancement of technology. Over the years, the University acquired several systems for access control, each with their own card technology.
Additionally, it had various platforms for its daily operations. Not only was maintaining all these different systems and technologies time-consuming, expensive and complex, it also limited a possible system expansion. Most of all, there was no clear overview of who was authorised to enter the premises and who was not. Time for change!
Single card access control system
AEOS can operate different locations from one central point and the system’s open architecture allows the use of both existing and new technologies
The University decided that it needed to do two things: switch to one single access control platform, upgrade the card system and revert to using one single card in the whole University. The reason to go for Nedap’s security system AEOS was that it provides all the functionalities that the University was looking for. It can operate different locations from one central point and the system’s open architecture allows the use of both existing and new technologies.
The existing cabling, for instance, could be utilised. After due consideration, all the access control systems were replaced by Nedap’s security platform AEOS. With 400 access points and 108 processing units (AEpus) attached to the existing IT infrastructure, the University was able to go back to one single security system to control the access and exit of its staff and students in the University’s buildings or parts thereof.
Unified card for different services
The replacement of 40,000 cards was logistically a challenge, but with the cooperation of the University this was also achieved. All students and staff now use a unified card for an array of services, i.e. proximity access, sports centre membership, photocopier authorisation, bus payment card and cashless catering. The decision to keep barcode and magnetic strip technologies was to maintain legacy systems, until such point as it is possible to move them to proximity technology.
The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?
We are living in the age of Big Data, and businesses are inundated with large volumes of data every day. Success depends on capturing, analysing and ultimately transforming that data into information and intelligence that can be used to improve the business. So, it is with today's physical access control and video systems, too, which also generate unprecedented levels of data. But how can we make the data useful to end users and how can they realise its full value? We asked this week's Expert Panel Roundtable: Relating to physical security systems, what is the value of data and how can that value be measured?
The reviews are in, and ISC West was another hit. Brisk attendance and a comprehensive lineup of the industry’s top companies and products contributed to another successful show for Reed Exhibitions. Our Expert Panel Roundtable, who have attended many such events, added their own reflections to the industry’s post-ISC glow. We asked this week’s Expert Panel Roundtable: How successful was ISC West 2018 for security industry exhibitors and visitors?