Connected Technologies LLC, maker of the award-winning patented Connect ONE integrated cloud-hosted security management platform, has boosted the capacity of its Access Expander to handle up to 100,000 users. Prior to developing this new programming capability the Access Expander handled up to 10,000 system users, depending on the panel manufacturer’s integration. Integrated access control Connect ONE allows security dealers to offer home automation with integrated access control Connec...
Driven by technology developments such as voice recognition, smart devices and the Internet of Things, our homes are getting “smarter” all the time. Increasingly, we expect our residential environments to be responsive to our voice commands, whether we are adjusting a thermostat, turning on a light, or lowering the window shade. Smarter home integration yields new opportunities and challenges for home security, too, which contributes an element of safety and protection to the conveni...
Radiflow, global provider of industrial cybersecurity solutions for industrial automation networks, has announced that the company has been recognised as the Global Customer Value Leader in IT/OT Security for Smart Buildings by the leading analyst firm, Frost & Sullivan. Cybersecurity protection This award from Frost & Sullivan highlights the growing importance that Radiflow is playing in providing cybersecurity protection for smart building operations as dramatically increasing number...
After a period of rapid international expansion, the next step for Ajax Systems is to set deeper roots in each market and become more sustainable. The manufacturer of wireless security equipment will continue to extend the range of Ajax products and capabilities by responding to local requests. Smart home management options and automation scenarios will be a significant focus for the next year. Wireless security equipment The systems are resistant to false alarms, regularly update over the air...
Arecont Vision Costar, the provider of network-based video surveillance solutions, announces the addition of Desjardins Technologies to its Authorised Manufacturer’s Representative Program to increase coverage for customers in Canada. Desjardins Technologies will deliver French and English pre-sales support in much of Eastern Canada, including the National Capital Region and the provinces of Quebec and New Brunswick. “Desjardins Technologies brings a wealth of experience in both the...
ADT continues expanding capabilities and geographic reach via Red Hawk Fire & Security, ADT Commercial with the asset purchase agreement of Security Corporation, a commercial security integrator headquartered in Detroit, Mich., with offices in Novi (Detroit), Mich., and Columbus, Ohio. Family owned and operated since 1974, Security Corporation has earned customer loyalty by providing responsive customer service and innovative security products to businesses, financial institutions, academic...
Radiflow, a provider of industrial cybersecurity solutions for industrial automation networks, and Trusted Cyber Security Solutions (TCSS), a provider of cybersecurity services and solution, jointly announce that TCSS has joined Radiflow’s OT MSSP Partner program in order to expand its service offerings and pursue market opportunities to provide managed OT cybersecurity services to its industrial customers across central and southern Europe. TCSS is a growing cybersecurity systems integration and consulting firm based in Vienna, Austria. The company currently provides a range of IT-related cybersecurity solutions, including consulting, professional and managed services, to its corporate and government customers through the DACH, Balkan and Adriatic regions in Europe. Industrial enterprise segment Most of our industrial enterprise customers are in the process of digitising their operations" Recently, TCSS has experienced significant growth in the industrial enterprise segment with numerous new customers in the manufacturing, automotive, oil & gas and other production-related sectors. As part of an overall effort to expand its service offerings for this customer segment, TCSS has taken the strategic decision to launch OT managed cybersecurity services based on Radiflow’s OT MSSP partner program. “Most of our industrial enterprise customers are in the process of digitising their operations, which has created a valuable market opportunity for our company to provide ongoing OT cybersecurity services in an MSSP offering,” explained Robert Herscovici, CEO at TCSS. “Radiflow’s comprehensive MSSP partner program will provide us with the framework to rapidly define and rollout important new managed OT cybersecurity services to protect our industrial enterprise customers throughout their Industry 4.0 journeys.” Threat detection system Radiflow’s OT MSSP partner program provides tools, procedures and expertise for MSSPs to efficiently rollout new cybersecurity services dedicated to the ICS/SCADA networks of their industrial enterprise and critical infrastructure customers. By hosting Radiflow’s iSID Industrial Threat Detection System in its cloud environment, an MSSP can offer new OT cybersecurity services, including mapping and monitoring the network topology and connected assets, detecting and responding to security breach alerts and more. We have strong expectations to benefit from Radiflow’s well established experience in the OT cybersecurity sector" MSSPs can also offer advanced OT cybersecurity services that leverage iSID’s automated vulnerability mapping and dynamic scoring processes in order to identify the most critical security risks based on the impact to its specific business operations. “We have strong expectations to benefit from Radiflow’s well established experience in the OT cybersecurity sector and the company’s compelling partnership program,” added Herscovici. Digital transformation projects “We are pleased to welcome TCSS as a new OT MSSP partner and are looking forward to working closely with the company to maximise the value it provides to its customers with their new managed OT cybersecurity services,” said Ilan Barda, CEO at Radiflow. “Based on our experience of working with industrial customers, we see strong benefits in teaming up with MSSPs to deliver an effective framework for industrial enterprises to address their emerging OT cyber risks.” Radiflow will be discussing the benefits of its OT MSSP partner program at the upcoming SANS ICS Europe 2019 event in Munich, Germany on June 24 – 29. Industrial enterprises that are looking to improve the way they address their cybersecurity risks in their digital transformation projects are invited to meet Radiflow’s experts at this event.
Visitors to the 2019 edition of Secutech Vietnam will have plenty of opportunities to gather market intelligence, thanks to the introduction of the new ‘Smart Factory Conference’ to the show’s fringe programme. As the region’s leading trade fair for the security, fire safety and smart building sectors, the fair provides a programme of educational events that cover technological trends, government regulations and industry outlook. Smart factory systems “Vietnam’s Smart Factory market is on an upward trajectory,” said Ms Regina Tsai, the Deputy General Manager of Messe Frankfurt New Era Business Media Ltd. “Newly built manufacturing facilities are being integrated with smart factory systems and there is also a need for ageing manufacturing infrastructure to be upgraded with smart solutions. For this reason, there is a growing appetite for information among prospective buyers which we hope the Smart Factory Conference will fulfill. It will be especially useful for investors, owners of industrial parks, consultants, contractors, architects, suppliers and government officials.” Vietnam’s manufacturing base is gradually moving towards industry 4.0, an automation trend of connected devices, IoT and AI Vietnam’s manufacturing base is gradually moving towards industry 4.0, an automation trend of connected devices, the internet of things, artificial intelligence and cloud computing. Against this backdrop, speakers at the Smart Factory Conference will demonstrate how factories that use new technologies to automate processes such as production and energy management can become more efficient and cost effective. Intelligent video solutions Another discussion point will be intelligent video solutions. With a focus on video analytics, access control and production surveillance, conference speakers will explain how both factory security and production efficiency can be improved. In addition, there will be an exploration of government regulations and the most up-to-date fire safety systems, including alarms, detectors, fireproof materials and extinguishing systems. Smart access control systems Besides the Smart Factory Conference, visitors to Secutech Vietnam 2019 will be able to benefit from two other elements of the fringe programme. The Fire and Industrial Safety Seminar will cover best practices and solutions for disaster prevention in buildings and industrial settings The Fire and Industrial Safety Seminar will cover best practices and solutions for disaster prevention in buildings and industrial settings. Meanwhile, the Smart Hotel Seminar will update attendees on solutions that improve hotel management and guest experiences, including energy and building management platforms and smart access control systems. Market intelligence platform The Smart Factory Conference is jointly organised by Houselink JSC, Messe Frankfurt New Era Business Media Ltd and Vietnam Advertisement & Fair Exhibition JSC. Houselink JSC is Vietnam’s first developer of an online e-bidding and market intelligence platform for the construction market. The conference will take place on 15 August at Secutech Vietnam 2019, which runs from 14 – 16 August at the Saigon Exhibition and Convention Center. In 2018, the fair set new records, attracting over 13,800 buyers (2017: 12,097) and 310 exhibitors from 20 countries and regions (2017: 270).
Synectics commences the roll-out of Synergy 3 2019, the latest release of its command and control platform for demanding surveillance and security environments. Introducing enhanced customisable mapping, camera management, and third-party integration capabilities, the feature-rich platform is the most customer-centric iteration of the software to date and aims to make the Synergy 3 experience more user-friendly. The new release will be available across Synectics’ key markets, spanning transportation, infrastructure, oil and gas, high security, public space, and gaming. Automatic camera plotting Speaking about the latest developments, Martyn Rowe, Head of Product Management at Synectics, said: “We wanted this release of Synergy 3 to offer practical innovations that customers will truly benefit from in terms of how they work and their security challenges.” We wanted this release of Synergy 3 to offer practical innovations that customers will truly benefit from" “For example, to complement existing GIS mapping capabilities, we’ve introduced advanced CAD mapping that enables customers to upload and seamlessly navigate their own maps of property and asset layouts. Functionalities such as automatic camera plotting in Synergy 3 ensure that any layout changes (for example, to gaming tables or slot machines) don’t require lengthy re-programming of cameras. This has a positive impact for the customer’s on-premise resources, particularly where sites have hundreds or even thousands of cameras.” Monitoring live footage Camera-related developments in the 2019 release also enable footage to be viewed in more intuitive ways. The de-warping functionality within Synergy 3 has been enhanced to provide an undistorted view of fisheye cameras, offering the ability to monitor live footage from multiple angles of the same camera for wide-area situational awareness. Furthermore, Synergy 3 now supports H.265 compression for all IP cameras compliant with ONVIF Profile S. Martyn continued: “Synectics has a strong reputation for offering end-to-end solutions tailored to specific needs. We can’t make that claim if we don’t give our customers the freedom to choose and use systems and devices that meet their unique requirements. Developments such as H.265 compression, new third-party system integrations, and a Software Development Kit (SDK) to help technology partners write integrations to Synergy 3, reflect this and our commitment to future-proofing our solutions.” Facilitating situational awareness Other capabilities strongly associated with Synergy 3 since it first launched in 2014 are its incident management and response features. Synergy 3 2019 builds on these proven capabilities, with further improvements to facilitate situational awareness and incident management under pressure. Clip mode ensures that any footage viewed is automatically imported to a clip basket Two notable developments in this respect are the introduction of quad view automation and the new clip mode functionality. The former refers to tailorable alerts that, if specific criteria are met, trigger quad layouts ‒ allowing the simultaneous tracking of live action and investigation of recorded footage. Clip mode ensures that any footage viewed is automatically imported to a clip basket, for quick and easy transfer to the incident locker if verified as pertinent. Intelligently automate processes Martyn added: “At Synectics, we place great importance on being able to intelligently automate processes for those in charge of securing and operating facilities in the demanding sectors we serve. Whether it’s to improve conditions for keeping on top of incidents, help users get the most out of the powerful capabilities at their disposal, or simply save busy surveillance teams precious time, we are always looking at how we can better support our customers.” “While these developments in Synergy 3 2019 differ in function, they share a common thread. They have all been undertaken with an understanding of the pressures our customers face – one fostered through close working partnerships and real-world sector experience.”
Many Euralarm members and other interested people gathered on May 13th, 2019 in Madrid for the annual Euralarm Symposium. It was the moment that Euralarm presented its priorities and challenges for the upcoming years. General Director Paul van der Zanden introduced Euralarm’s new strategy document for 2019 to 2024 to the audience by putting it into perspective with the developments within Brussels. Fire safety and security industry There is so much going on in Brussels that is not communicated. Members of Euralarm are European citizens, whose profession in fire safety and security has made them leaders in their business based on knowledge. Their leadership is underlined by trusted and proven partners like Orgalim, CEN, CENELEC and key stakeholders from the EU, such as several Directorates General. The world in which Euralarm operates and especially the part that is involved in standardisation is complex. The world in which Euralarm operates and especially the part that is involved in standardisation is complex And apart from the complexity there are big changes going on in the field of technology and economy that shake up the world of standardisation. Think of cybersecurity or artificial intelligence and it will be clear that associations like Euralarm need to act in a swift and decisive way. Based on its current position and on the strategic objectives of the association a number of priorities and challenges have been defined for Euralarm in the new EU legislative period 2019 to 2024. They are based on Europe-wide cooperation and will enable Euralarm to maintain and further improve its position in Europe. The four priorities and challenges were topic of the opening presentations that were held by Lance Rütimann, Chair of the Fire Section, Peter Massingberd-Mundy, member of the Fire Section and involved in many of the standardisation activities of Euralarm, Jon Koenz, Chair of the Services Section and Dominique Taudin, Chair of the Advocacy Committee. Lance Rütimann’s presentation focused on Innovating through Research Fire safety solutions for life safety Lance Rütimann’s presentation focused on Innovating through Research. He opened his presentation with a philosophical view – the Socratic Paradox - that there's a wealth of knowledge in so many areas, but yet we have still so much to learn. That is what research is all about: helping us to understand things and see behind the curtains for new solutions. What has that to do with the association's priorities? Our industry wants to stay leader in our business. That requires research, collaboration and cooperation. Our industry wants to stay leader in our business, which requires research, collaboration and cooperation We have to stimulate others to bring their support to the table. Together, we can identify the opportunities and understand the risks of emerging technologies. It requires investigating common challenges in the application of fire safety and security solutions to gain new insights on protection of life and assets in buildings. Therefore, we should also examine which qualifications, skills and expertise are needed in our industry and act on the findings. In order to make that happen, Euralarm urges the EU institutions and research bodies to work together. By developing partnerships between industry, testing houses, universities and research institutes priority areas could be identified more easily, and efforts coordinate more seamlessly. It would enable all parties to maximise the potential of EU research programmes under Horizon 2020 and its successor. Fast, flexible products standardisation Peter Massingberd-Mundy took up the gauntlet of talking about fast and flexible standardisation. The title may seem to encompass both a contradiction and an oxymoron, but standards are at the core of everything we do. With a world that becomes more and more connected, standards need to allow for this connectivity as well as being well connected and clearly structured in themselves. Robust standards for products and services are at the heart of our industry’s success but to continue serving the interests of customers, society and the industry, a faster and more flexible standards-setting system is needed. Peter Massingberd-Mundy took up the gauntlet of addressing fast, flexible standardisation A system that is agile and accommodating of technical changes and innovations will help Euralarm members and other parties to respond rapidly to customers’ demands and deliver the highest levels of safety and security to citizens. This would put European companies on the best footing to serve global markets. Such a fast and flexible standards-setting system requires close cooperation between the key players — Euralarm, European Commission, standards organisations, approval bodies and other organisations — who together can write the standards that will deliver the highest quality products and services as efficiently as possible. Furthermore, Euralarm urges the EU institutions to work together to deliver an efficient system that responds to market needs. Among the areas where progress would be required over the next five years are the setting, improving or extending of standards; for interoperability between building systems, between remote services, for the residential market (e.g. combining security and home-assisted systems) and for the competency of personnel and the quality of the services they provide. Cybersecurity, IoT and AI Whether active in fire safety or security, the building and construction industry or process automation: digitalisation is all around us Whether active in fire safety or security, the building and construction industry or process automation: digitalisation is all around us. It has an impact on our industry but also offers opportunities and challenges. How to seize these opportunities of digitalisation was the topic of the presentation that was given by Jon Koenz. Digitalisation is already having a huge impact on our industry and this trend will continue to grow in the future. New technologies such as cybersecurity, the Internet of Things (IoT) and Artificial Intelligence (AI) will drive this trend to become more and more crucial for our sector. All participants in the value chain need to be sensitised to the importance of increasing resilience in the face of cyber-attacks. At the same time, the potential of AI needs to be carefully assessed to maximise opportunities this technology offers. That is only possible when knowledge partners such as Euralarm and EU institutions work closely together. That cooperation will allow them to make rapid progress on a Europe-wide voluntary certification mark (quality label) that shows that all reasonable protection measures against cyber-attacks have been taken. That cooperation is also needed to advance work on standards for cybersecurity, IoT for fire and security systems and Building Information Modelling (BIM). Last but not least, the parties involved should cooperate to promote education as an investment in the future. Dominique Taudin discussed the current landscape for testing and certification of fire products Fragmented certification landscape The fragmented landscape for testing and certification of their products and services was the topic of the presentation of Dominique Taudin. Since Euralarm members are facing this landscape they are charged with higher costs since they have to submit multiple applications in several countries for the same product or service. But there are more than just costs. There is also the risk of having an inconsistent approach to testing and certification across the EU. This situation could be improved by the introduction and use of pan-European testing, auditing and certification processes. Not only would it reduce administrative burdens but also save costs for fire safety and security companies, many of which are small- and medium-sized enterprises. It would also help achieving real EU’s single market for fire safety and security. But there is also another, perhaps more important aspect when it comes to the future of European companies. Euralarm calls on stakeholders to intensify work between leading laboratories on MTRA A European wide process would allow companies to avoid uncertainty and encourage investment if they only had to submit their products and services for testing and certification to a single authority. To turn this fragmented landscape into a uniform and organised environment Euralarm wants to cooperate closely with EU institutions, test laboratories and certification bodies. It should result in achieving consistent, objective and repeatable processes for testing across Europe and, over the longer term, developing a single testing and certification scheme for electronic security equipment. Multilateral Test Result Recognition Agreements In the short term, Euralarm calls on stakeholders to intensify work between leading laboratories on Multilateral Test Result Recognition Agreements (MTRA). Fore services, the transition process from a fragmented to a consistently organised environment will require a better exchange of information about national training and certification schemes for the personnel involved in planning and design, engineering, installation and hand over, maintenance and repair of fire safety and security systems. Keynote speaker during the Euralarm Symposium 2019 was Alberto Garcia-Mogollon, Head of Innovation Policy of BSI. He took the visitors on a 'tour' during his presentation on building confidence and accelerating innovation through standardisation. With a new generation of products and services requiring the integration of complex, digital technologies and new production processes that need to scale up at faster rates the role of standardisation is expanding rapidly. It fulfils the ever-increasing need to demonstrate confidence in performance. Alberto Garcia-Mogollon spoke about a strategic approach to reaping the benefits of standardisation Reaping the benefits of standardisation To maximise the benefits from standardisation, Alberto proposed to have a strategic approach. The type of standards may vary according to the maturity and nature of technology and the industry sector where it applies to. The standards process itself should be agile. With the right value proposition based on outputs and services a fit-for-purpose set of standards can be developed to be used across industries with different characteristics. Alberto proposed a process of fast iterations with faster development times and publication schedules To maximise the value from and creating value for the communities engaged in standards development there should be a collaborative approach toward the content development. And by creating a state-of-the-art environment for standards development, the efficiency, speed and ease of use are ensured. In relation to the needs of innovative industries, Alberto proposed a process of fast iterations with faster development times and publication schedules for each iteration, an output that is designed to elicit feedback and discussion and enhanced feedback from the user community to aid development, improving speed and quality. Self-regulating autonomous standards Important to remember: the future of standards is digital, with self-regulating autonomous standards fed in real-time by data from 'smart' devices, potentially connected to smart contracts, e.g. leading to continuous conformance or regulatory audit. For accelerating innovation through standardisation, it is important that both the technology landscape and industry needs are understood and that coordination across fragmented international knowledge networks is realised. Also, innovators should be educated on the role and value of standards while mechanisms should be developed to encourage participation of end users and SME’s and enabling public participation and oversight.
Control4 Corporation, global provider of smart home solutions, has announced Control4 Smart Home OS 3. Control4 Smart Home OS 3 is designed to unify hundreds of connected devices within the home, control them all from a single platform, delivering the personalisation that homeowners want, and facilitating the professional support that smart home technology needs. Control4 Smart Home OS 3 Control4 Smart Home OS 3 is designed to simplify the use of many connected devices throughout the home, exceeding expectations for how people live with technology. OS 3 offers more than a thousand new features and capabilities including fluid, refined, and intuitive interfaces providing one-touch control for favorite devices and scenes, at-a-glance views for security and lighting, one-touch music and video streaming, and more, all in a singular platform across Control4 and third-party products. Control4 Smart Home OS 3 enriches the real-life connected home experience The industry is at a tipping point; pundits are forecasting by 2020 there will be 13 billion connected devices in today’s homes. The rapid introduction of these products fractures the smart home ecosystem and compounds complexity. Disparate smart devices don’t work together nor meet the promise of easy, convenient or better, and consumers and their families have been left frustrated. “The Control4 Smart Home OS is designed to remove complexity,” said Control4 Senior Vice President of Products and Services Charlie Kindel. “Every home is a mix of products from a variety of companies, a Smart Home OS embraces this reality, providing broad choice rather than creating a collection of tiny walled gardens that limit homeowners.” Smart home infrastructure Boasting a broad and deep ecosystem, Control4 OS 3 brings support for more than 13,500 third-party devices and 7,500 Control4 SDDP-embedded products. Built as smart home infrastructure, OS 3 scales to the needs of the family, whether it’s a single-room entertainment experience or a whole-home automation system in a mansion. Control4 Smart Home OS 3 enriches the real-life connected home experience. By aiming to encompass all of the home’s connected devices, it breaks through many of the barriers of smart home adoption. “There is a delight—almost a sense of magic—when technology comes together and genuinely enhances our lives,” said Charlie. “And right now, only Control4 Smart Home OS 3 can deliver on that promise for the home.” Home automation solution Achieving the elegance and sophistication homeowners want requires the experience of a professional installer. But only a family knows the nuances of their day-to-day lifestyles. Control4 Smart Home OS facilitates professional installation to make sure everything works together, while empowering families to make their smart home experience uniquely their own. Control4 has more than 200 Control4 Certified Showrooms where consumers can walk in and experience OS 3" “For more than 15 years Control4 has held steadfast in the belief that meeting the expectation of a true smart home requires professional installation,” stated Control4 Chairman and CEO Martin Plaehn. “We have relentlessly built a network of trained professionals, and today Control4 has more than 200 Control4 Certified Showrooms where consumers can walk in and experience OS 3. Control4 has nearly 6,000 Authorised Dealers, OS 3 leverages the talent and skill of tens of thousands of smart home pros around the world to install, update, and manage smart home technology for families.” Building on years of operational experience, Control4 Smart Home OS 3 brings new levels of thoughtful design to raise expectations for smart homes. Control4 Smart Home OS 3 key features include: Introducing Favorites, OS 3 gives homeowners the ability to bring virtually everything in the home to the top of the room in the mobile app, touch screen, and TV. Favorites provides one-touch control and, more importantly, homeowners can now see whether the home is secure, or lights are on anywhere in the home without tapping. Favorites provide homeowners the flexibility to prioritise the devices for each room. In a living room, the news station can be at the top of the app, where the over-island lights show up first in the kitchen view. Simply press and hold to Favorite a device, service, scene, or playlist in any room. Drag icons to re-organise or delete them from the screen with a simple tap, interactions any mobile user is familiar with. Assemble whole-home dashboards for at-a-glance views of the most vital devices from any room. In the master bedroom, Favorite the front door lock, garage doors, and security cameras to ensure the home is secure before going to bed. Easily see only the lights that are on, the blinds that are open, and the doors and security zones that are secure, a necessary capability required when you have many connected devices throughout the home. Homeowners can personalise their system and tailor it to their needs as they live and grow with it. Edit or create smart home scenes, set schedules to automate devices, and modify how devices interact. OS 3 has reimagined multi-room entertainment. With OS 3 share your music throughout the home with an elegant look, crisp sound, and the ease of one-touch access to the most popular streaming services. Stream video with the same intuitive approach, just relax and watch. Music and video take a prominent position with Active Media located at the top of the screen, showing music controls, and track details right at the front. Streaming music and video throughout the home is simple with all-new Sessions to easily add or remove rooms, adjust the volume everywhere or within a single room. OS 3 adds native support for streaming high-resolution audio in Control4 systems with the addition of MQA (Master Quality Audio). Now homeowners can stream better-than-CD quality music through TIDAL Masters and listen to their own MQA-encoded music collection. Advanced security system management — With unified lock management, lock users, and PINs are now easily managed through OS 3 for all locks (with no need to create and edit users for each lock). Create a user, assign a PIN and a schedule, and apply the changes to all locks installed in the home. Coordinated shade control — New blind and shade options with more than 350 new icons that represent the wide variety of ways window coverings operate, let users easily see all shades that are open, and with one-button press, close them across the house. Users can set a different wallpaper for every room, choosing from a variety of designer-approved images or their own photos matched to their home and lifestyle. Dealer Tools — Control4 has always led the industry with tools that enable swift, easy, and reliable deployment. With OS 3, dealers will enjoy enhancements that further simplify programming, reduce repetitive tasks, and speed up deployment. Thoughtfully refined and optimised, each interface is designed for the different ways a customer will use a mobile phone, a touch screen mounted on the wall, or a hand-held remote and a TV. The mobile phone is optimised for one-hand control in portrait mode, while the TV interface is focused on the entertainment experience from the couch.
BlackWire Designs, a distributor in the custom installation market, announces the availability of its new module for the integration of Rachio Smart Sprinkler Controllers into URC's Total Control 2.0 whole-house automation system. With this latest module, BlackWire Designs becomes the only distributor to support the integration of Rachio controllers into both the Control4 and URC platforms. Helping to nurture a beautiful yard, Rachio Smart Sprinkler Controllers make it easy to create custom schedules that automatically adjust for changing local weather. They work with current sprinkler systems, up to 16 zones, and provide users with complete control over their sprinklers via their smartphone or tablet using the Rachio Remote app. Utilising mobile devices “We're proud to be the only distributor that offers the Rachio module for both of these automation platforms, and to provide the deepest level of integration available,” said Kevin Luther, owner of BlackWire Designs. “As the latest addition to our extensive driver marketplace, the Rachio integration not only provides a single-app control experience when utilising mobile devices but extends sprinkler control to the other interfaces homeowners use to manage their environments, such as handheld remotes and in-wall touchscreens. Coupled with our superior dealer support and round-the-clock service, there is nothing comparable on the market.” BlackWire Designs' Rachio module allows integrators to provide customers with control over their sprinklers Featuring complete two-way integration, BlackWire Designs' Rachio module allows integrators to provide customers with control over their sprinklers using the URC Total Control 2.0 interface of their choice — whether it's handheld remotes, in-wall and tabletop touchscreens, the Total Control 2.0 mobile app, or via their voice using Amazon Alexa or Google Assistant enabled products. Enhanced automation integration Capabilities include start and stop watering; enable/disable standby mode; pause zones; zone quick run; rain delay; and more. Enhanced automation integration can be added with two-way module commands and device events that trigger on-state changes in real time. BlackWire Designs' Rachio TC2 Module for URC is compatible with any Rachio Sprinkler Controller. The software license is free with the purchase of a controller from BlackWire and can also be purchased separately for customers who already have Rachio controllers in place.
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organisation, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR world. Large cloud environment But modern applications are difficult to secure. SaaS based, web, mobile, or custom made all work on different platforms and frameworks. It’s a headache managing all the APIs needed to automate and sync tools. This introduces risk. The greater the number of apps the broader the attack surface and therefore the greater the chance there will be blind posts. Keeping up to date with updates and new security policies is never easy There are also added hazards. Applications are always changing. Keeping up to date with updates and new security policies is never easy, but especially hard in a large cloud environment. Failure to adopt changes puts the organisation and customers at further risk. But the biggest obstacle is keeping applications and APIs out of harm’s way. It’s a near on impossible task when attack methods and sources are constantly changing. More advanced threats To be specific there are four emerging challenges when it comes to protecting apps. Firstly, managing the good and the bad bots and spotting which is which, secondly securing APIs as IoT adoption intensifies, thirdly the relationship between securing apps and DevOps and ensuring ownership of security, and finally denial of service attacks that use newer tactics such as brute force. Basic security hygiene dictates that security teams refer to the OWASP Top 10. It’s considered the ‘ten commandments’ in security circles, providing a starting point for ensuring the most common threats and vulnerabilities are managed, detected and mitigated. Web Application Firewalls also come into the fray with guidance on testing for the ways hackers exploit vulnerabilities. However, though the basics are good to have in place, there are always more advanced threats to take care of. Bots being a big one. Bot management The more sophisticated bots will go as far as to mimic human behaviourAstonishingly about half of internet traffic is bot generated. Half of it is from bad bots. Discerning the good from the bad isn’t easy though and explains why around 80% of organisations can’t make a clear distinction between the two. Bad bots can do a lot of damage like take over user accounts and payment information, scrape confidential data, or hold up inventory and skew marketing metrics. The more sophisticated bots will go as far as to mimic human behaviour and bypass tools like CAPTCHA and even device fingerprinting based protection ineffective. Securing APIs Then there’s the complications derived from machine-to-machine and internet of things (IoT) communications. The more integrated ‘things’, the more data there is, the more events there are report on, and the more activity there is reliant on APIs to make the ‘things’ useful and agile. That’s what makes them a target and the threats to API vulnerabilities include injections, protocol attacks, parameter manipulations, invalidated redirects and bot attacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks Denial of service (DoS) You might think there’s little to add to the swathes of denial of service warnings. Yet when businesses are still being targeted and feeling the ill effects it’s worth mentioning again that different forms of application-layer DoS attacks are still very effective at bringing application services down. Even the greatest application protection is worthless if the service itself can be knocked down This includes HTTP/S floods, low and slow attacks (famous examples being Slowloris, LOIC, Torshammer), dynamic IP attacks, buffer overflow, Brute Force attacks and more. The IoT botnets are the culprits and have made application-layer attacks so popular that they have become the preferred DDoS attack vector. Even the greatest application protection is worthless if the service itself can be knocked down. Continuous security It may seem easy to say but for modern DevOps, agility is valued at the expense of security. We see time and again examples of where development and roll-out methodologies, such as continuous delivery, mean applications are exposed to threats each time they are modified. There’s no doubt it is extremely difficult to maintain a valid security policy and protect sensitive data in dynamic conditions without creating a high number of false positives. But we now find that this task has gone way beyond the capability of humans. Organisations now need machine-learning based solutions that map application resources, analyse possible threats, and create and optimise security policies in real time. Reaching this level in security planning should be a big wake-up call that security automation is an essential not a nice to have. Running security plans The board needs to know that investment is critical to protect their profits It’s critical that the security solution your company adopts protects applications on all platforms, against all attacks, through all the channels and at all times. The board needs to know that investment is critical to protect their profits. As such there are six things they need to know: Application security solutions must encompass web and mobile apps, as well as APIs. Bot management solutions need to overcome the most sophisticated bot attacks. DDoS mitigation must be an essential and integrated part of application security solutions. A future-proof solution must protect containerised applications, severless functions, and integrate with automation, provisioning and orchestration tools. To keep up with continuous application delivery, security protections must adapt in real time. A fully managed service should be considered to remove complexity and minimise resources. No amount of human power will beat the bots. That last point is the most critical. Skill is essential in designing and running security plans and policies that work. But the plans can’t be executed without automated tools. There are just too many decisions to make in a split second. Combining both is the path to an effective app protection strategy and a stronger brand to boot.
Edge devices (and edge computing) are the future. Although, this does seem a little cliché, it is the truth. The edge computing industry is growing as quickly as technology can support it and it looks like we will need it to. IoT global market The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 according to a recent Forbes article titled, “10 Charts That Will Challenge Your Perspective of IoT’s growth”. IoT devices are not the only edge devices we have to deal with as the total number of connected edge devices includes the likes of devices like security devices, phones, sensors, retail sales devices, and industrial and home automation devices. The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 The sheer number of devices begins to bring thoughts of possible security and bandwidth implications into perspective. The amount of data that will need to be passed and processed with all of these devices will be massive. There needs to be consideration taken by all business owners and automation engineers into how this amount of data and processing will be conducted. Ever-expanding edge devices market As the number of edge devices in the marketplace and their use among consumers and businesses rises, the need to be able to handle the data from all of these devices is no longer going to be suitable for central server architectures. We are talking about hundreds of billions and even trillions of devices. According to IHS Markit researchers’ study, there were 245 million CCTV cameras worldwide. One has to imagine there are at least 25% of that many access control devices (61.25 million devices) based on a $344 million market cap also calculated by IHS Markit’s researchers. If all the other edge devices mentioned earlier are considered then one can see that trying to route them all through servers for processing is going to start to become difficult if it hasn’t already, -which arguably it already has, as is evidenced by the popularity of cloud-based solutions amongst those businesses that already use a lot of edge devices or are processing a lot of information on a constant basis. Cloud computing The question is whether cloud computing the most effective and efficient solution as the IoT industry grows The question is this; is cloud computing the most effective and efficient solution as the IoT industry grows and the amount of edge devices becomes so numerous? My belief is that it is not. Taking the example of a $399 USD device that is just larger than the size of a pack of cards and runs a CPU benchmarked at the same level as a mid-size desktop. This device has 8GB RAM and 64GB EMMC built-in and a GPU that can comfortably support a 4K signal at 60Hz with support for NVMe SSDs for add-on storage. This would have been unbelievable five years ago. As the price of edge computing goes down, which it has done in a dramatic way over the last 10 years (as can be seen with my recent purchase), the price to maintain a central server that can perform the processing required for all of the new devices being introduced to the world (due to the low cost of entry for edge device manufacturers) becomes more expensive. This introduces the guarantee that there will be a point where it will be less expensive for businesses, and consumers alike, to do the bulk of their processing at the edge as opposed to in central server architectures. Cloud computing is now being overtaken by edge computing, the method of processing data at the edge of the network in the devices themselves Edge computing There are a plethora of articles discussing and detailing the opposition between the two sides of the computing technology coin, cloud computing and edge computing. The gist of it is that “cloud computing” was the hot new buzzword three years ago and is now being overtaken by “edge computing.” The truth is that cloud computing is a central server architecture hosted at someone else’s location. Edge computing is going to be a necessary development in the technology industry Edge computing is the method of processing data at the edge of the network (in the devices themselves) and allowing for less resources required at a central location. There is certainly a use case for both, however the shift to edge computing amongst the general public and small to mid-sized businesses will not be a surprise to those players, who have been paying attention. One article titled, “Next Big Thing In Cloud Computing Puts Amazon And Its Peers On The Edge” by Investor’s Business Daily takes the stance that edge computing is going to completely displace centralised cloud computing and even coins the phrase, “Cloud computing, decentralised” to explain edge computing. It speaks for the stance that most experts in technology seem to be taking, including Amazon Web Services’ VP of Technology, Marco Argenti according to the same article. We know that edge computing is going to be a necessary development in the technology industry, and it is happening as I write this, and quickly at that. Cost efficiency of edge processing As time goes on, the intersection between the prices of network bandwidth, edge processing and maintaining super powerful central servers will cause edge processing to be the most efficient and cost-effective way to maintain a scalable network in any environment, including datacenters. Owning a central server or utilising edge computing become the better options As it currently stands, most residential users can only achieve a 1Gbps WAN (internet) connection, and small to medium-sized business can’t get much more but seem to get much less, based on my personal experience. When more than 1Gbps needs to be processed, cloud computing becomes very expensive at which point, owning a central server or utilising edge computing become the better options. Then you look a total cost of ownership and when the cost of edge computing is less expensive than the cost of maintaining central server architectures, edge computing becomes the single best option. So, I’ll say it again, edge devices (and edge computing) are the future.
There’s no question that the popularity of Do-It-Yourself (DIY) security and home automation products is on the rise. The reasons for the growth in DIY sales are numerous, including increased awareness of home automation products, fast set-up, limited (if any) installation costs, and interoperability with other smart security products. In fact, with the parallel rise of smart home hubs like Alexa and Google Home, many people are opting to attempt the set-up of smart home devices without any professional assistance. According to a 2018 Residential Security Market Report prepared by Parks Associates and Security Sales & Integration magazine, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. Let’s look at a few of them. Increase in revenue for dealers With their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchaseThere are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Wireless, connected smart locks For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to wirelessly communicate with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for new security installations And they can do all this from a prime, convenient location – the front door, as well as other points of entry like the side or back doors. Plus, smart lock conversion kits like Kwikset Convert let homeowners easily bring home automation capabilities to their door without altering the aesthetics of the entry. Connected smart locks can allow homeowners to set up their home with custom scenarios, right before they step inside. For example, residents can program their lock so that every time they unlock the door, a foyer light goes on, temperatures begin to rise to a set level – even connected coffee makers can begin to make a cup. Portfolio of home automation products One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatileSmart locks are just one example of the potential of DIY products to spark a homeowner’s interest in a wide range of other home automation devices, many of which would benefit from professional installation. One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatile and offer a complete portfolio of home automation products. The larger the home automation offering, the more devices there are to sell and install, the larger the installation required, the greater the need for professional installation. Many homeowners who feel like they have a certain level of handiness will start by trying to do it themselves with a DIY product. But things don’t always go as planned, especially if they are attempting to set up a robust home automation system. First off, just because a product is DIY doesn’t mean that the old products that are being replaced are going to easily make way for the new. A DIY thermostat or smart lock might require that the old equipment (and possibly wires) get tugged out of the wall. Messy holes might need to be filled. Advantages of professional installation Even after the old system has been removed, homeowners planning on setting up a connected system may soon realise they don’t have the electrical skills or technological know-how to install and connect all devices, get a system programmed correctly, and get everything up and running smoothly. Professional installers have learned from experience; there’s very little that they haven’t seen before. With their years of experience, installers know the best way to automate a home and how to create a custom smart home experience Do-it-yourselfers might be able to solve problems by searching the internet and finding videos. But, then again, they might not. After going the DIY route once, many full-home automation system enthusiasts are beginning to realise that the best way to get things done right the first time is to leave the installation and set-up to a professional. Professional installers can and should bring an extra level of experience and guidance to the process. Their services should go beyond tech installation and also include interface design. With their years of experience, installers know the best way to automate a home – how to create a custom smart home experience that doesn’t make the user feel less than smart. Selling additional home automation products If a problem arises due to installation error, the DIYer does not have any recourse to correct these mistakesResidential security dealers who offer professional installation should be willing to embrace the DIYer who has attempted to do a self-install but has not been able to complete the process successfully. With an open mind to this scenario, they can save the day for the DIYer, as well as create an opportunity to sell additional home automation equipment that the DIYer may not have known to be available. The disparity between DIY and professional installation also brings to light the fact that there are no ‘satisfaction guarantees’ and no ‘installation/labour warranty’ available when a home automation system is installed by a DIYer. If a problem arises with either the equipment connectivity due to installation error, or if a piece of equipment is installed incorrectly, the DIYer does not have any recourse to correct these mistakes. This may not be as critical if a DIYer installs a minor piece of equipment, but with something as critical as securing and protecting their home with a home automation and security system, most people want full peace of mind that everything has been installed correctly. Reduces connection instability According to a 2017 study by the analyst firm, IHS Markit, “The quality of the equipment is usually higher in professionally installed systems, and professional configuration and setup greatly reduces the potential for connection instability…” This is an issue that DIYers may come to realise over time. On the other hand, one issue DIYers may recognise right away, especially if they are attempting to connect multiple devices, is that the connectivity may be inconsistent. Professionally installed devices operating on a wireless protocol might deliver better, consistent, longer-range connectivity IHS Markit explains that, “DIY systems rely on open protocols and Wi-Fi connectivity that can sometimes be unreliable, creating connection issues. Some of the sensors can become unrecognisable to the system, requiring intervention from the user. In contrast, professional wireless systems rely on UL- or EN-certified equipment to operate on the basis of proprietary frequency, enabling them to work with the control panel much more seamlessly.” In other words, professionally installed devices operating on a wireless protocol, even an open-source protocol like Z-Wave, might deliver better, consistent, longer-range connectivity, and fewer headaches. Not everyone is a DIY customer There are customers who want someone to install the devices correctly and help them learn how to use and maintain themThere’s no doubt that there’s a segment of the security and home automation market that loves to spend their free time doing their own home improvement. They are watching videos, reading how-to books and manuals, and enjoying every minute. There’s also a segment of the market whose top goal is to save money up front. For these customers, there’s no getting around the joy of saving money with the lower cost of many DIY products. But there are also a great number of prospective customers out there for whom DIY is of absolutely no interest. These consumers do not want to be their own IT department. They want expert help: they want someone to install the devices correctly and help them learn how to use and maintain them. The IHS Markit study points out what many home automation dealers already know: that the elder and aging-in-place markets are an ideal destination for the security and convenience of home automation products. The study says, “Many senior citizens are not tech savvy enough to install a DIY system by themselves, so they tend to rely on professionally installed systems that are usually maintained by a family member.” Along with the senior citizens market, there are many other market segments out there that still desire worry-free professional installation. Installers should offer a range of products that includes some DIY products, and some leave-it-to-a-pro products Producing complete and custom solutions Perhaps the best way for dealers and installers to stave off that feeling of doom that they might have about DIY is to tackle the problem head on and be creative. Offer a range of products that includes some DIY products, and some leave-it-to-a-pro products – consider the DIY product a great entry point for a more comprehensive system. Play up the peace of mind that comes with professional installations and support that pitch with flexible monitoring contracts and service plans. Share what you do and why; relay your passion for producing complete and custom solutions and communicate how you add value to any and every sale. No one, not even the most tech-savvy consumer, wants to install their own products if the end result is that the product doesn’t work the way it should. That’s where the pros can, should and will always come into play.
When Linus Yale Sr. invented the pin tumbler cylinder lock, it was the start of an iconic security brand that would eventually be known all over the world. What began in a lock shop in Newport, New York, would eventually evolve into the global presence of the brand “Yale” that we know today. The Yale brand was purchased in August 2000 by the Swedish lock manufacturer ASSA ABLOY Group, which expanded Yale’s global presence in the ensuing years and recently has led the way into smart locks and building automation. This year, ASSA ABLOY is marking the 175th anniversary of the Yale brand. Global home security brand “People all over the world trust the brand to protect what they love most in their homes,” says Kate Clark, Managing Director of Yale EMEA at ASSA ABLOY. Although Yale has a successful commercial sector business in the United States, in the rest of the world Yale is a residential brand. The Yale brand is well known in 130 countries from Australia to the Czech Republic to Colombia, and is popular in Africa, too. In the EMEA (Europe, Middle East and Africa) market alone, Yale has around 20,000 products; that’s without counting products sold in the Asia-Pacific and Americas regions. Yale is familiar as a generic term for “lock” in some areas and is one of the largest home security brands in the world. Expansion into digital locks Good old-fashioned cylinder locks still look nice and cost the right amount of money, so they are in demand “I think we stand for safety, quality and reliability, and that hasn’t changed,” says Clark. “It’s as important now as ever. We have tried to pioneer new technology in the industry, new innovations. The rate of acceleration has increased, and there are so many technologies we have to understand and work with.” Growing beyond its heritage in mechanical locking systems, Yale is now expanding into digital locks that can protect homes with a high level of security synonymous with the Yale brand. The current selection of locks includes partnerships with tech brands such as Nest Labs (Google) and Alexa (Amazon). There is a rapid acceleration of growth in the electro-mechanical lock market. But even as the focus expands to smart locks and partnerships with tech companies, Yale continues to dedicate time and resources to the design of their core mechanical products. Good old-fashioned cylinder locks still look nice and cost the right amount of money, so they are in demand. Yale padlocks and bike locks also keep the name top-of-mind. There’s an ongoing education process as home locks expand beyond the use of mechanical devices and even personal identification (PIN) codes. Beyond mechanical locks and PIN codes “It’s important for people to know that we have been around a long time, and we want to celebrate that,” says Clark. “It’s a fantastic story around the brand and what we have achieved. Internally we have a lot of people doing a lot of great things with the brand. We inspire people working with the brand and show them that this is the pedigree, and it should be cherished. We are also raising awareness among younger people, so they know that we are still relevant.” We have an obligation to show people that the new technologies are just as secure as mechanical locks" There’s an ongoing education process as home locks expand beyond the use of mechanical devices and even personal identification (PIN) codes. “We have to take people on a journey,” says Clark. “We have an obligation to show them that the new technologies are just as secure as mechanical locks. If we eliminate PIN codes, we have to do it in a secure and safe way. Then suddenly access to your home can be made available by a company you trust.” Smart home security “We have a responsibility to do our best job with the new technology – it’s wonderful, but it needs to be used correctly,” says Clark. “I personally feel a responsibility to do that in the right way.” For example, in working with Amazon and Alexa to remotely authorise the delivery of a parcel to a home, concerns of security must be weighed carefully along with issues of convenience. “It’s important that we get the balance right,” says Clark. “We need to know the right person is giving the right voice command to lock a lock. We have to be true to our core as ‘security first.’” Will Yale be here another 175 years? Clark says she doesn’t expect to be around to find out but will do her best to preserve and promote the brand until she hands it off to a new caretaker.
As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorised access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a challenge, and the fragmented structure of the video surveillance market contributes to that challenge. A variety of companies are involved in manufacturing, integrating, installing and operating video systems, and cybersecurity threats can enter the picture at any stage. “It’s not always clear who is responsible,” says Yotam Gutman, vice president of marketing for SecuriThings, a cybersecurity company. “However, the only entities who can ensure cybersecurity are the security integrator and the service provider. They will bear the financial pain and are willing to pay for cybersecurity. An extra $1 or $2 per camera per month is not expensive.” SecuriThings’ “lightweight software agent” runs in the background of video cameras, sending information to an analytics system in the cloud IoT device security management At the recent IFSEC trade show in London, SecuriThings unveiled its IoT Device Security Management (IDSM) approach to enable integrators to ensure cybersecurity. Founded in 2015, the company has around 20 employees in Tel Aviv, Israel, and operates a sales office in New York City. SecuriThings’ “lightweight software agent” runs in the background of video cameras, collecting metadata on camera processes and connections and sending information back to an analytics system in the cloud. Drag-and-drop deployment enables a camera to begin generating data within seconds and requiring only two mouse clicks. The cloud system analyses data, pinpoints abnormalities, identifies new users, detects multiple entry attempts and tracks other camera processes to identify any cyberattacks. It monitors all devices, gateways, users and APIs to detect threats in real-time and mitigate the threats based on a pre-determined security policy. Machine learning tools also analyse more subtle activities that can indicate insider abuse. For example, a user support center can identify if cameras are being accessed improperly by employees, thus preventing insider abuse. Certified vendor agnostic software SecuriThings is working with camera manufacturers and video management system (VMS) manufacturers to certify operation of its software agents with various camera models and systems. Working through integrators, such as Johnson Controls, is the fastest route to market, SecuriThings has determined. The system can be added after the fact to existing installations for immediate monitoring and remediation, or it can easily be incorporated into new systems as they are launched. “We have a strong sales team in the United States focusing on bringing the technology to more local and national integrators,” says Gutman. Certification ensures SecuriThings’ software agent can be installed in most modern camera models without negatively impacting operation; the software is vendor agnostic. Another eventual route to market is to work with camera manufacturers to install the SecuriThings software agent in cameras at the factory. In this scenario, the system can easily be “clicked on” when cameras are installed. The SecuriThings cloud system generates a dashboard that tracks system activities to identify any cybersecurity threats IoT Security Operations Center SecuriThings operation is transparent to the VMS, and the company works with VMS manufacturers to ensure the code operates seamlessly with their systems. Cloud analytics generate a dashboard that tracks system activities, and/or a managed service monitors the system and notifies customers if there is a problem. “We monitor it from our IoT Security Operations Center, a fully managed service that ensures the real-time detection and mitigation of IoT cyber-threats,” says Gutman. “We found that end-customers don’t have the manpower to monitor the system, so our experts can guide them.”Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable" A benefit for camera manufacturers is the ability of a system like SecuriThings to “level the playing field” on issues of cybersecurity, says Gutman. The approach provides a higher level of cybersecurity confidence for integrators and users, including those using cameras that have previously had cybersecurity problems such as “back door” access. SecuriThings has certified its software for use with Hikvision cameras and is in the process of certifying with Dahua, says Gutman. “Western manufacturers say their products are more secure, but we can help all camera manufacturers prove that they are just as secure,” says Gutman. “Integrators and users can log into a device and see all the activity.” Securing connected devices from cyber threats Beyond video, SecuriThings’ products target the full range of connected devices in the Internet of Things (IoT). The SecuriThings security solution enables real-time visibility and control of IoT devices deployed in massive numbers in smart cities, physical security, building automation, home entertainment and more. Video surveillance is an early focus because of market need, an opportunity to gain traction, and the critical nature of security applications. But the challenges are much broader than video surveillance. “We are seeing similar risks to other devices,” says Gutman. “Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable. If you can disable the access control system, you can cause a lot of problems.” Other connected devices that could be at risk include building automation and heating and cooling (HVAC) systems.
Has there ever been a better time for a security trade show in Europe? Shifting threats such as terrorism and a volatile political climate serve as reminders every day of the importance of security in our lives, and even the role of technology. IFSEC opened in London on Tuesday at the ExCeL centre, covering every aspect of security, from access control and video surveillance to home automation and perimeter security. Amid sweltering heat, attendees came to find the latest-and-greatest innovations to meet changing security challenges. Substance over style Many of the technology announcements were "repurposed" news previously unveiled in the United States at the spring ISC West show in Las Vegas. Even so, there was plenty to see, although foot traffic seemed a little slow on the first day. Several people commented on how IFSEC is different from ISC West. The US market, exemplified by ISC West, tends to emphasise superlatives and flashy market claims, while the European market is more about substance. That observation comes from Moti Shabtai, CEO and President of Qognify, who said he has a larger share of conversations at IFSEC about how a solution can address specific needs. "Europe isn't one single market," he reminds us. "There are more different kinds of customers and different approaches, while the US market has a more unified way of thinking." Safe and secure cities applications (and "smart cities") are more prominent in Europe. While in the US, utility applications are higher profile, driven by a need to conform to NERC/FERC standards. The European market has more different kinds of customers and different approaches "The competition in Europe is more varied, with more smaller players, depending on which product and market," adds Kim Loy, Director of Marketing for Vanderbilt. "It makes it a more dynamic landscape." One variable Loy points to is how advanced each European market is from a technology perspective. For example, the Nordic countries -- Sweden, Norway, Denmark and Finland -- tend to embrace technology, and Vanderbilt is already seeing success there with its cloud-based products, the ACT365 cloud access control and video system and SBC Connect for cloud-managed intrusion detection. Current events in Europe add an air of urgency to the show. Several recent terrorist attacks have highlighted the need for more and better security. In emergency situations, often the security industry's contributions come after the fact, notes Shabtai. It took police in Brussels, Belgium, five days to find a suspect in the 2016 terrorist attack there. However, technologies such as Qognify's Suspect Search can now sift through databases to find video clips relevant to an investigation within minutes. More analysis of disparate information can in some cases provide predictive capabilities, or at least help direct investigations aimed at preventing such events. Adapting to vertical markets Many exhibits at IFSEC reflect the trend we are seeing of companies expanding their product selection beyond what was previously their core competency. Several video companies, in particular, are displaying an expanding array of products. It's a continuation of the familiar trend of video companies like Genetec, Avigilon, Hikvision and others expanding into access control systems. At IFSEC, Genetec says they are focusing on outcomes rather than technology, highlighting systems designed for specific use cases and vertical markets. Importantly, Genetec's systems provide flexibility to adapt to a variety of issues in various markets, whether a specific vertical or in the United States, Europe, or anywhere in the world. Privacy and cybersecurity are especially relevant in Europe Privacy and cybersecurity are hot-button issues for Genetec, says Jean-Philippe Deby, EMEA Business Development Director. It's especially relevant in Europe, where the European Union has embraced general data protection regulations (GDPR) that require compliance by May 2018 (The UK has committed to compliance despite the Brexit vote.) It's another element in the industry's growing focus on cybersecurity and systems highlighting "privacy by design." But global business trends are eliminating some of the differences in the security industry around the world, says Dr. Peter Kim, Senior Director of IDIS. Globalisation trumps regional phasing "Perhaps the biggest difference at IFSEC this year is the realisation that there is less of a difference than ever before between the US and European markets," he says. "Globalisation increasingly means access in Europe to brands and their product offerings is more equal than ever before—something you see here at this and all of the major security shows around the world. New technologies are increasingly rolled out globally either at the same time or close together, as opposed to regional phasing." Europe and America have different drivers and priorities at different times, including those influenced by geopolitics and recent crises, which can drive demand for technology to meet specific security requirements, Kim notes. One thing both markets have in common right now is geopolitical churn in various forms—including the threat of terror and a number of significant elections—which can lead to increased uncertainty. "This is especially relevant for government contracts, as public projects, which can be quite substantial from a security standpoint, often stall in such environments," Kim notes. Avigilon dominates the signage and video displays as visitors enter the ExCeL Centre Avigilon dominates the show Avigilon is one company that is introducing new products at IFSEC (that were not previously viewed at ISC West). They include the Avigilon Presence Detector (APD), a sensor that combines self-learning analytics with impulse radar technology to accurately detect the presence of a person even if they have stopped moving or are hidden. The sensor is designed for indoor locations such as vestibules within banks, pharmacies, retail stores and health care facilities. Avigilon is also highlighting a new Mini Dome Camera Line, and integration of its Access Control Manager (ACM) system with biometrics, among other products. Avigilon is making a big splash at the show. They dominate the signage and video displays as visitors enter the ExCeL Centre. I'm looking forward to seeing more interesting technologies in the remaining two days of the show.
Over 1,600 Wisenet cameras manufactured by Hanwha Techwin have been installed at Asia’s largest mega hub terminal in order to help operators monitor the movement of parcels and vehicles, as well as keep employees and visitors safe. With its nine decades of endless innovation, Korea’s logistics service provider, CJ Logistics, is leaping forward to become a pioneer by expanding its global networks to over 94 locations and entering the Thailand, Malaysia, China and Philippines markets. Video surveillance solution In June 2018, CJ Logistics opened Asia’s largest mega hub terminal in Gonjiam, Gyeonggi-do, South Korea. The terminal, which comprises two buildings with four floors above ground and two underground, occupies approximately 300,000sq metres, almost the size of 40 football stadiums. The total length of the facility’s conveyer belts is almost 43km, long as a full-course marathon The total length of the facility’s conveyer belts is almost 43km, which is as long as a full-course marathon. The terminal also has a state-of-the-art automation system, the first of its kind in Korea, which has increased the company’s daily handling capacity to 1.72 million parcels, four times higher than its competitors. CJ Logistics looked for a top-notch video surveillance solution which could match the terminal’s grand scale and the technically advanced automated facilities. Providing periphery monitoring After testing cameras from different manufacturers in the market, CJ Logistics chose Hanwha Techwin as its supply partner and have subsequently installed around 1,660 Wisenet cameras throughout the terminal. Wisenet X series IR PTZ cameras have been installed along the building exteriors, providing periphery monitoring 24/7 and auto tracking that enables precise monitoring across long distances, while IR illumination provides visibility even at night. Inside the buildings, around 1,400 Hanwha Techwin’s Wisenet Q series cameras were installed on the terminal’s ceilings and walls. The cameras are able to help detect any problems occurring to the automated conveyer systems which have a constant flow of parcels on them. They also oversee the movement of over 1,500 vehicles in and around the terminal and help create a safe working environment. Highly accurate recognition Wisenet X series bullet cameras, running license plate recognition (ANPR) software onboard, have been installed at the main gate of the terminal to enhance security at the entrances and exits, providing highly accurate recognition of license plates. These cameras enable effective vehicle monitoring within the terminal where cargo moves in and out around the clock, and are particularly useful in monitoring the main entrance. Both camera types are equipped with 12x optical zoom and 150dB WDR Wisenet X series bullet and PTZ cameras have been installed at indoor staircases and corridors of the office building. Both camera types are equipped with 12x optical zoom and the World’s best 150dB Wide Dynamic Range (WDR) which ensures clear images are captured from scenes that contain a challenging mix of bright and dark areas, normally causing overexposed or underexposed images. Intelligent video analytics As part of the Wisenet X series, these cameras feature intelligent video analytics and offer movement, loitering and intrusion detection. They are also equipped with audio analysis functionality which recognises critical sounds such as gunshots, explosions, screams and broken glass. “Thanks to the Hanwha Techwin’s Wisenet security solution, we were able to build a safe video surveillance system that can match the size and the cutting edge facilities of Asia’s largest logistics terminal,” said an official at CJ Logistics. “Now we can safeguard every corner of our terminal including vehicles, parcels, and personnel, not to mention indoor and outdoor spaces.”
King Chulalongkorn Memorial Hospital (KCMH) is a public medical facility in Bangkok, Thailand. The hospital is operated by the Thai Red Cross Society and functions as the teaching/training medical center for Chulalongkorn University’s Faculty of Medicine as well as the Thai Red Cross College of Nursing. With 1,479 in-patient beds, it is one of the largest hospitals in Thailand. Bhumi Siri Mangalanusorn Building (BSMB) is the largest Centre for Medical Excellence in Thailand. The building has 34 floors and total area of 225,000m. Gallagher security solution benefits Can integrate with other systems, such as Symphony video management software, building automation, parking and fire alarm systems Has a user-friendly Graphical User Interface (GUI) Is highly reliable and scalable, to meet future security needs Can meet increasing compliance requirements Supported IT industry standards for integration, XML, SQL, OPC, BACnet, etc Gallagher and AES Group Ltd, the local Gallagher system integrator, worked closely with the designer to ensure that the proposed system met the tender requirements of securing the hospital and protecting staff, patients and assets. The system is fully integrated, scalable and expandable, digital-based, user-friendly and crucially, a combination of enhanced operational efficiency and cost saving. Gallagher Command Centre Through Command Centre, Gallagher’s site management solution, KCMH is able to integrate multiple systems Through Command Centre, Gallagher’s site management solution, KCMH is able to integrate multiple systems, including fire alarm, video management system, building automation and parking, and feed the information into Command Centre. KCMH Security Manager, Adul Karutbumrung, says having one central monitoring platform ensures operational staff quickly identify, locate and respond to any risks on site. “The Gallagher system provides us with a higher level of validated access control in critical areas”. Centralised operation platform Gallagher’s system streamlines operations for KCMH to lower total cost of operation through its centralised operation platform. The user-friendly GUI also delivers the best value to reduce training time. In addition to meeting KCMH’s requirements for security, privacy and compliance, Gallagher provides additional benefits and features not available in other systems. Its scalability ensures that future expansion requirements can be addressed in a cost effective manner.
Wellington is the southernmost capital city in the world and is the centre of New Zealand government. With the second highest population in the country, Wellington is a large coastal city with a diverse range of facilities and attractions. A large portion of those facilities and attractions are the responsibility of the Wellington City Council (WCC) – a local body government organisation employing around 1,800 staff. As with all councils that manage a large number of facilities on behalf of their city, the WCC has a broad range of security needs and an accountability to the rate-paying citizens of Wellington. Since 2001, WCC has met those security needs with Gallagher’s integrated security solutions. Central management platform WCC developed a five year plan to migrate all 150 sites on to the Gallagher system With 1,800 employees and 150 sites located across Wellington, the council has a large number of people and assets to secure. With sites including libraries, swimming pool complexes, community and recreation centres, housing blocks, a city zoo, event facilities, and a multi-story central office building, the security requirements vary considerably. “We’re responsible for securing and monitoring all 150 sites around the clock” said Chetan Prasad, Security Manager for Wellington City Council. “It’s imperative we have a reliable system that provides us with a complete view of activity at all sites”. In order to deliver this, WCC uses Gallagher’s Command Centre central management platform to manage security across numerous sites. Utilising a single security platform has been a long-term objective of the council. Initially operating six different systems, WCC developed a five year plan to migrate all 150 sites on to the Gallagher system. Chetan links the Council’s growth with their need to become smarter about how security is managed. Primary security solution “Gallagher’s system has enabled us to standardise our infrastructure and bring all elements including alarm management, fire systems, vehicle bollards, video surveillance, facility and carpark access, reporting, visitor management, and more, on to one platform. That was a key factor in why we chose Gallagher initially, and why we will continue with them as our primary security solution.” Visibility is critical when you have 150 independent sites to secure. An integration between Command Centre and over 400 cameras located throughout the WCC’s facilities provides live video footage to the security team. “Our camera integration with Command Centre means that in addition to being able to continuously observe critical areas, any site alarm that is triggered will immediately bring up a live video feed for the security staff in our control room. This visibility is invaluable for us in activating appropriate responses and, in the event of a crime, being able to provide crucial evidence to police” said Prasad. Electronic access control WCC is utilising Gallagher security technology to ensure staff are protected In addition to securing facilities and assets, WCC secures and protects staff working at each of its sites. From initiatives like integrating building elevators with access control to prohibit unauthorised entry, to the integration of panic buttons at each site, WCC is utilising Gallagher security technology to ensure staff are protected and that in the event of an incident, a rapid security response is initiated. According to Prasad, the Gallagher system is delivering cost savings to the Council in several key areas. The first area relates to the shift from traditional key systems to smart card technology. “With such a large staff base and so many sites, we inevitably faced challenges with traditional keys being lost or not returned by staff or contractors” said Prasad. Rekeying a site cost the Council approximately $4,000 each time – an expense that has now been eliminated by the replacement of traditional lock and key systems with electronic access control. Visitor management solution “Now if a card is lost or not returned, we simply deactivate it in our system. Not only is it a solution that saves us money” said Prasad, “it is also a solution that can be applied instantly.” Similarly, the ability for security personnel to assess a site and reprogram an alarm remotely, also saves the council considerable costs associated with dispatching guards to site. The second area where cost savings are apparent relates to intelligent automation. An integration with WCC’s HR system means that as staff leave employment, their cardholder profiles are automatically disabled in the system. The use of Gallagher’s Visitor Management solution, means that appropriate staff are automatically notified if a guest or contractor fails to sign out or return a key. These two automations alone, save the WCC security team approximately 4-5 days of cardholder administration each year. Software maintenance contract WCC elected to take a 10 year Software Maintenance agreement with Gallagher In 2014, following 13 years as a Gallagher customer, WCC elected to take a 10 year Software Maintenance agreement with Gallagher. The Software Maintenance contract ensures the Council have access to the latest developments as soon as they are released, keeping WCC at the forefront of security technology. “Software Maintenance makes good business sense” says Prasad. “It gives us access to a comprehensive range of licensable features and benefits, and ensures our upgrade costs are effectively distributed.” Prasad describes the Council’s confidence in Gallagher as another significant factor in the 10 year agreement. “We have found Gallagher’s security solution to be a reliable and versatile, highly secure, modern system. It has supported our significant growth to date, and we are committed to using Gallagher systems for the Wellington City Council’s future.”
Comelit has ensured future residents at Kebbell Homes’ new luxury Aubury Place development can experience smart door entry with the installation of its latest Mini Handsfree monitors. Set in Chiswick, London, Aubury Place is a new gated community of nine four, five and six bedroom homes. Every element of the design is focussed on creating an exceptional first impression, right from the bespoke touch screen entrance panel. Comelit’s Specification team, together with chosen installers Wheeler Electrical, was involved with Kebbell from the initial design process, through the works programme to project completion. Door entry requests Kebbell was instantly impressed with the capability of newly launched Mini Handsfree Wi-Fi Monitors Whilst originally, Comelit’s stylish Icona monitors were considered, Kebbell was instantly impressed with the capability of newly launched Mini Handsfree Wi-Fi Monitors. The new Comelit system would enable new residents to respond to door entry requests from any compatible mobile and benefit from video memory, to record missed calls. Says Andrea Fawell Sales and Marketing Director at Kebbell Homes: “The aim with Aubury Place, as with all our developments, was to offer families spacious home options in prime locations. The ideals of luxury, convenience, comfort and understated elegance were all of paramount importance, and seeing everything from our resident’s point of view, to ensure our homes allow natural flows in tune with daily living.” Mobile connected lifestyle “Every small detail has been carefully considered and this is where Comelit latest options for door entry fitted our requirements. It means our residents can benefit from the latest technology, seamlessly installed, enabling them to instantly respond to door entry requests, with video, from wherever they are. And we can achieve this without compromising on the style, look and feel of this beautiful collection of homes.” Kebbell Homes is well-known for meticulously planning and creating homes of exceptional quality" Ed Wheeler, Director from Wheeler Electrical added: “Kebbell Homes is well-known for meticulously planning and creating homes of exceptional quality. When it came to door entry at Aubury Place, Comelit was the specification of choice and the new Mini Handsfree Monitors exceeded expectation, even over an initially approved specification. It has proven itself more cost effective and a better fit for today’s increasingly mobile connected lifestyle choice.” Powerful security solution Each home at Aubury Place has been fitted with a Mini Handsfree monitor complete with integrated WiFi, operating through Comelit’s innovative VIP system. At the striking gates to the development is Comelit’s premium stainless steel flush mounted 316 Touch entrance Panel, branded to Kebbell Homes. The system enables new residents to grant access through the vehicle gates or adjacent pedestrian gate using the 4.3” internal monitor or a dedicated mobile app. And up to fifteen smart devices can be connected to each and every property’s individual WiFi monitor. Daniel Wood, Southern Sales Manager at Comelit UK concluded: “Comelit worked closely with Kebbell Homes to ensure the door entry system installed, achieved the desired balance between timeless style and latest technology. The combined solution, completed using our very latest app enabled monitors, provides aspiring residents with a powerful security solution and the convenience of audio and visual communication, together with ease of use in everyday life.”
Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, announces that its SmartCode 888 Deadbolt Lock was chosen to become part of the new Home is Connected smart home system from D.R. Horton, Inc. The inclusion of Kwikset’s SmartCode 888 in the system was based on its value (great functionality at an entry-level price), reliability, and high degree of security. Incorporating the latest Z-Wave 500 chipset, the SmartCode 888 offers keyless entry through a convenient, easy-to-use touchpad. Kwikset’s patented Home Connect technology enables the lock to wirelessly communicate with other devices in the home through a third-party smart home controller, as well as to remotely check the door lock status, lock or unlock the door and receive notifications. Innovative program D.R. Horton’s Home Is Connected system is included in the base price of each new home from the company’s family of brands D.R. Horton’s 'Home Is Connected' system is included in the base price of each new home from the company’s family of brands. The system includes a robust central hub by Qolsys that controls the smart home features, including a home alarm and automation platform by Alarm.com, Honeywell Home thermostat from Resideo, smart switches by Eaton Corporation, video doorbell by SkyBell and hands-free, voice-first experiences with Amazon Alexa. “We are pleased to be part of such an innovative program created by the nation’s largest volume homebuilder,” said Dave Seeman, Director of National Builder Accounts, Kwikset and Baldwin, Spectrum Brands, Inc. – Hardware & Home Improvement Division. Convenience of keyless entry “We are confident that buyers of D.R. Horton homes will not only appreciate the security and convenience of keyless entry that our SmartCode 888 provides, but also the endless benefits of whole home automation. To be a part of a system that includes such well-known, reputable brands indicates to us the high level of trust D.R. Horton puts in our products.” Brad Conlon, Vice President of National Accounts for D.R. Horton, said, “We are pleased to work with Kwikset to provide this essential component to D.R. Horton’s new Home is Connected smart home system. We know our customers will appreciate the peace of mind that comes from Kwikset’s SmartCode 888 lock and the Home is Connected system overall.”
ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, and Dwelo LLC, a provider of smart-home solutions purpose-built for apartment owners, managers and residents, has announced a partnership that is seamlessly integrating PDK’s cloud access control technology into the Dwelo smart apartment platform. Dwelo’s web and mobile software, which currently offers apartment dwellers the ability to control smart devices such as light switches, thermostats and door deadbolts for their individual units, has added features to manage access to common areas of their building or community, such as entry gates, clubhouse, gym and laundry facilities. These spaces can now be secured by PDK’s cloud access control solution, pdk.io, providing apartment property managers and owners with valuable operational efficiencies. The administrative software interface, not visible to residents, enables management to easily establish and enforce authorised hours of use for common facilities. An audit trail reports all traffic into the property, including any one-time credentials issued by residents, which can be used to assist in investigations in cases of theft or vandalism. When residents move out, their access to unit, common, and perimeter access is immediately deactivated, eliminating the risks that accompany traditional keys that would otherwise remain in circulation. The system is subscription based, with property managers able to recoup the cost in both efficiencies and enhanced revenue Scalable and affordable security solutions Beyond operational efficiencies, residents can unlock perimeter and common doors or gates using the same mobile app they use to control their apartments. In addition, they have the ability to use their phones or computers to generate temporary, one-time credentials that allow visitors, delivery and service people to gain access as needed. These features add to the conveniences afforded to residents living in Dwelo-enabled smart apartments. Both Dwelo and PDK have built successful businesses by leveraging the power of cloud technology to create scalable, affordable solutions that offer unprecedented ease of installation for contractors and simple usability for customers. With their combined areas of expertise in home automation and security, together they see an opportunity to serve a large and generally neglected market sector – apartment renters who desire the same smart home technological conveniences as today’s home owners and seek out communities that offer those smart home solutions. The Dwelo/PDK solution is available for both new construction and retrofits. After an initial per-unit installation charge, the system is subscription based, with property managers able to recoup the cost in both efficiencies and enhanced revenue. Enhanced apartment living “Dwelo is thrilled to be partnering with such an innovative company as PDK. PDK is a technology leader in the electronic access control space, and Dwelo and its customers are already benefitting from their forward-thinking approach to access." Our partnership will bring tangible benefits to all stakeholders involved within the multi-family residential market sector" "The consolidation of smart home control and perimeter and common area access control, in one platform, is a powerful marriage for multifamily property owners. We look forward, with PDK, to crafting more solutions that address the specific needs of these customers,” says Mike Rovito, CEO of Dwelo, LLC. “PDKs solution has been embraced by customers in the commercial sector for its simple ease of use and platform flexibility. Our wireless and PoE options allow for cost-effective takeover of legacy equipment, while supporting new construction projects with all the benefits derived from leveraging the network." "Our mantra, simplicity without compromise, dovetails perfectly with Dwelo’s corporate mission to enhance apartment living through easily accessible IoT technology. Our partnership will bring tangible benefits to all stakeholders involved within the multi-family residential market sector,” says Evan Tree, CEO of ProdataKey.
Round table discussion
Our Expert Panel is an opinionated group on a wide variety of topics, and we are dedicated to providing a useful and flexible forum to share those opinions. This week, our panelists address a range of opinions about several self-selected topics, culled from the large number of Expert Panelist responses we have collected in the last year. In this Expert Panel Roundtable article, we will share these varied and insightful responses to ensure they are not lost to posterity!
A big trade show, such as the upcoming ISC West, has a lot to offer for attendees. How, can attendees maximise the value they get out of ISC West? For advice, we go to our Expert Panel Roundtable, all seasoned veterans of many big trade shows. Specifically, we asked the panel: How can attendees get the most out of a big trade show like ISC West?
The residential/smart home market is undergoing revolutionary transformation, with a flood of new products and technologies helping to make our homes more connected, easier to manage and, yes, smarter. These massive steps forward provide challenges, and also opportunities, for the security industry, which has played a major role in protecting homes and residents for decades. We asked this week’s Expert Panel Roundtable: How are changes in the residential/smart home market impacting security?