Secutech Vietnam 2018 reached new heights as it closed its doors, having seen visitor numbers shoot up to an estimated 13,800+ (2017: 12,097). Positive feedback from buyers and exhibitors alike also cemented the fair’s position as the ideal shop window into the regional security industry. Secutech Vietnam 2018 The new Smart Home and Smart Building zone was added to the show floor this year alongside the returning Security zone and the Fire & Safety zone The enlarged show occupied the...
Pulse Secure, global provider of enterprise Secure Access solutions has announced the release of Pulse Policy Secure 9.0 to enable organisations an easier, flexible and VPN-integrated path to next-generation Network Access Control (NAC). The latest release incorporates more than 36 new features and enhancements; advancing visibility, usability, endpoint and IoT security, and threat response capabilities. As a result, enterprises can strengthen their security posture and mitigate malware, data br...
The National Security Inspectorate’s (NSI) team of 34 full-time, expert auditors recently gathered in Maidenhead to participate in advanced training and sharing of best practice, as part of their continual development. This unique, highly respected team clocks up on average 3.25 million miles each year, fulfilling around 3500 audit days across more than 1800 approved companies. As part of its commitment to raising standards within the industry, NSI’s audit team is increasingly...
Pulse Secure, a provider of secure access solutions for people, devices, things and services, announced a key new release of the Pulse Secure Virtual Application Delivery Controller (vADC). The new solution brings an industry step change in enterprise management and analytics, giving IT and security professionals detailed information about data flows through each application and providing actionable insights into the behavior of applications across virtual and cloud platforms. Following last ye...
New research from WinMagic, the data security company, surveying over 1,000 IT Decision Makers (ITDM) about hyper-converged infrastructure (HCI) has revealed flexibility (65%), performance (58%) and availability (46%) as the highest ranked benefits of the technology. However, the survey also highlighted ITDM concerns around expanding their use of HCI, with complexity leading at 45% and security, a close second (43%). Currently, only 15% of respondents’ report have any HCI technology in th...
Last year, Genetec predicted that cybersecurity would be taken much more seriously as the Internet of Things (IoT) opened more doors for hacking and network take overs. We also predicted that that there would be an increase in the adoption of Software as a Service (SaaS), expanding choice and convenience from new ownership models via hybrid (on-premises and Cloud) and Cloud-only models. Cyber Accountability awareness 2017 was also a year of awareness about ‘Cyber Accountability’....
New to RBH Security Group Ltd is Nick Bartlett, who joins as Business Development Manager to the UK. Nick has over 20 years’ experience in the industry, specialising in access control, and brings a wealth of experience and knowledge to an already strong and progressive RBH team. Caine Jenkins, UK Operations Manager for RBH Security Group said: “We are delighted to welcome Nick on board; his vast knowledge of the industry will be invaluable in promoting and supporting the Axiom product range through our approved distributor network".
Bosch has updated its Building Integration System (BIS) software to Version 4.5. The latest BIS features: Access control that is easier to use, more flexible and even more secure; integration of new or updated Bosch video surveillance, fire alarm and public address systems; and auditing of configuration changes. A key function of BIS is access control. This allows authorised people to enter various areas of a building or site and keeps unauthorised people out. Version 4.5 makes enrollment (and de-enrollment) of authorised people easier, more flexible and more secure. Easier, more flexible, more secure Easier, because: it now integrates fingerprints into the cardholder management dialogue and does not require third party software anymore. Also, enrollment can now be done remotely on any access reader in the system. More flexible, because: the enrollment dialogue via masks and processes are no longer static, but can be customised by the user; identification photos from any USB camera can be used; and access badges can be flexibly designed and printed with barcodes. More secure, because Microsoft Windows Server 2016 supports BIS 4.5 for best cyber protection. Communications throughout BIS are transmitted at a higher encryption level than ever before. Advanced features BIS 4.5 can communicate with and control more Bosch subsystems than before. New additions include: Alarm video plugins for the latest Bosch and ONVIF cameras as well as Bosch DIVAR network and hybrid recorders Smoke and fire detection in Bosch AVIOTEC cameras Monitoring and management of calls on Bosch’s PAVIRO Public Address System. All these components can be controlled by a single operator at a central point. Audited configuration With Version 4.5, all configuration history is captured in a database that records who did what and when they did it. This provides an audit trail that helps colleagues know what each other is doing or has done and aids investigation of past events. 4.5 is first. All these upgrades in Version 4.5 help BIS to be the premium system on offer. It is easy to use, flexible and even more secure. It integrates more equipment than ever, and it audits its own configuration. BIS is well-equipped to monitor and manage, from a central control room, a building or a complex or a full network of stations across a public transport system. It also improves handling of changing and remote workforces and in generating an audit trail to comply with internal or external regulations.
Johnson Controls introduces the latest version of its victor Video Management System and VideoEdge Network Video Recorders (NVRs) from American Dynamics, taking functionality, performance and system security to the next level. Preventing evidence tampering The new victor Incident Locker provides a secure centralised repository to prevent the tampering of sensitive video evidence and maintain chain of custody. New end-to-end multicast functionality enables users to maintain visibility of their facility surveillance even during required VideoEdge NVR system updates, with the ability to view live cameras directly from a victor client during the usual downtime created by the system updates. H.264+ support With added support for H.264+, victor with VideoEdge can reduce storage space and improve transmission efficiency for more flexible and efficient operations. The upgrade to H.264+ allows the victor client to handle both variable sized video streams, such as those created by H.264+, H.264, Mpeg4 & Mpeg codecs. The new version also allows the addition of Illustra Pro cameras to any VideoEdge NVR appliance, hybrid or IP, without additional cost or connection licences. This greatly simplifies deployment when pairing VideoEdge NVRs with Illustra Pro cameras.
OPTEX Europe will be exhibiting for the first time at Sicurezza in Milan to showcase its wider range of detection and LED lighting devices. The portfolio on show will cover perimeter protection and security, as well as transportation safety devices and vehicle sensors – a perfect opportunity to meet the team and discuss new applications. OPTEX presence at Sicurezza Part of the OPTEX team present at the show will be Mark Cosgrave, Western Europe Divisional Manager for OPTEX EMEA and Sandrine Cocks, New Business Product Development Manager – EMEA HQ. “Although Italy is one of our biggest markets, we are mainly known for a small number of our whole sensor range,” Mark says. “So, we thought it’s important to show the many strings we have to our bow – we have reliable intrusion detection systems suitable for everything from home alarm protection, to high security critical infrastructure. “Our sister company, Raytec, will join us to showcase its IP and hybrid white and infrared LED lights, the ideal partner for our fibre optic fence detectors, and our volumetric intrusion sensors, to allow CCTV systems to have the best camera view to see the intruder.” Tailgating issue Intrusion can also happen during normal office hours when an unauthorised person attempts to follow an authorised employee into a controlled area. “Tailgating is a growing issue for companies, leading to loss of intellectual property and in a worse-case scenario, the threat of employee safety,” says Sandrine. “In the case of interlocks, when one single authorised person is allowed in, our Accurance 3D system will act as a tailgating prevention system. If more than one person is detected, the second door of the interlock will not open – and this will also be showcased live on our stand,” she continues. LiDar laser scanner In addition to the security sensors, OPTEX will also exhibit its LiDAR laser scanner that has been specifically designed for transportation safety applications. It can detect obstacles on railway crossings, as well as people falling off a station platform and onto the track. Another non-security range will be presented: a vehicle detection, presence and counting sensor – an alternative way to detect vehicles without the need for a ground-installed device. This new OPTEX vehicle sensor series includes a model for gate automation, one for counting cars, and a third to manage the availability of parking bays. While the OPTEX stand will showcase sensors and lighting used as part of an overall project, OPTEX’s distributor, Hesa, will be showcasing all of the core OPTEX intrusion sensors, including the brand new short-range volumetric and curtain sensors, part of the Shield series. “This all goes to show that there’s a great deal to see from OPTEX at Sicurezza, on two different stands, Hesa Stand Pav. 7 K11 M20, and OPTEX Stand Pav. 7 D6,” Mark concludes.
Matrix, a manufacturer of state-of-the-art Telecom and Security solutions, announced its In-office Experience Centre. With an objective of providing rich experience to customers, Matrix created a dedicated Experience Centre for showcasing cutting-edge Telecom and Security solutions under a single roof. Matrix Experience Centre is crafted to project next generation technologies, test proof of concepts with diversified solutions and applications delivered by our products. It is the best way to give our customers a first-hand look and feel of our group of solutions. With more than 400 products and footprints all over the world, Matrix is making its presence felt in the technology world. Next-generation solutions In Telecom domain, we will be showcasing our next generation solutions - Unified Communication, Multi-location Collaboration, Mobility, Hybrid Communication, Fixed Media Gateway, Universal Media Gateway, and Data-Voice Messaging Convergence. These solutions find their applications in multiple industries such as Manufacturing, Hospitality, Healthcare, Defence, Government, Retail, BFSI and many more. In Security domain, Matrix will exhibit its entire portfolio of Video Surveillance solutions including Video Recorders, IP Cameras, and Enterprise Video Management Software. VMS offers centralised management and monitoring of up to one lakh cameras spread across various locations. Further, Matrix will demonstrate its range of biometric solutions including Time-Attendance, Access Control, Visitor Management, Cafeteria Management, Employee Self Service, and Contract Workers Management. “Our main aim behind building an experience centre at our facility is to give our customers a feel of solutions offered by Matrix products. Live demonstration of the solutions and its features will give a better overview of our product capabilities and help us mould the purchasing decision of our customers in our favour”, said Sagar Gosalia, Senior Vice President of Sales and Marketing, Matrix.
An affiliate of Pulse Secure, LLC, a provider of secure access solutions to both enterprises and service providers, announced that it has entered into a definitive agreement to acquire assets associated with the Virtual Application Delivery Controller (vADC) product family from Brocade Communications Systems, Inc. The transaction includes a leased research and development facility in Cambridge, UK and associated customer support and maintenance contracts. Providing secure access to resources CIOs have become increasingly concerned with the complexity, cost, and security of providing users with secure access to the resources they need, especially as applications have evolved from on premise to virtualised, hybrid, mobile, and web/cloud environments, combined with an explosion in device types and access locations. This acquisition will add significant new capabilities to the Pulse Secure Access Platform, allowing Pulse Secure to deliver a complete end-to-end solution designed to reduce cost and complexity, increase security, and delight users. Originally created as the world’s first fully virtualised application delivery controller, the Brocade vADC solution has become one of the most advanced virtual application delivery controllers in the market today. Importantly, the solution was "born virtual" and is a leader in the rapidly growing virtual ADC market. The solution can be quickly and easily provisioned either on premise, in a private/public cloud, or even through cloud service marketplaces such as AWS, Google, and Azure. The Brocade vADC offering is recognised within the Gartner Magic Quadrant for Application Delivery Controllers and is used by many organisations worldwide. Protecting data centre applications “This acquisition highlights our focus, commitment, and ongoing investment in building the industry's leading secure access platform. The combined company's nearly 750 employees post-acquisition will be uniquely focused on delivering secure access for people, devices, things, and services,” said Sudhakar Ramakrishna, CEO of Pulse Secure. "With the addition of Brocade’s vADC solutions, Pulse Secure will be able to deliver secure access to a complete customer application portfolio, from legacy data centre applications, to web, cloud, and even mobile applications. We anticipate immediate synergies with our 20,000+ customers today, and we'll be offering them this expanded capability via our global partner network.” "Pulse Secure is a great fit for our vADC business and a positive outcome for our employees, customers and partners" Kelly Herrell, Senior Vice President and General Manager of Software Networking at Brocade, said, “Pulse Secure is a great fit for our vADC business and a positive outcome for our employees, customers and partners. Our vADC family is highly complementary to Pulse Secure’s current portfolio, and is expected to enhance Pulse’s capability to deliver a complete end-to-end secure access solution. Upon the close of the transaction, our customers and partners will benefit from access to a broader set of products, as well as Pulse Secure’s planned continued investment in our vADC product roadmap, and its stated commitment to continued support for our existing product lines.” End-to-end access solutions Rik Turner, a Principal Analyst on the Infrastructure Solutions team at Ovum Consulting, commented, "This is a logical move for Pulse, in that it fills out their portfolio and enables them to address more of the customers’ requirements. It also chimes nicely with their overall Secure Access message.” Pulse Secure intends to hire certain Brocade employees associated with the vADC business. This team will be working closely together with Pulse Secure after the acquisition closes to ensure continued support for customers. Financial terms of the transaction were not disclosed. The transaction is expected to close in late June to mid-July 2017, subject to the satisfaction or waiver of customary closing conditions and prior to the closing of the previously announced acquisition of Brocade by Broadcom Limited.
Pulse Secure, a provider of Secure Access solutions to both enterprises and service providers, has announced that Entegrus has successfully deployed Pulse Policy Secure advanced network access control (NAC), to strengthen overall visibility and access security across their hybrid IT infrastructure. Entegrus, a Canadian energy company, leveraged their existing Pulse Secure virtual private network (VPN) implementation to expedite NAC deployment and fortify their infrastructure in accordance with National Institute of Standards and Technology (NIST) and North American Electric Reliability Corporation (NERC) guidelines. As a result, their security organisation extended visibility for remote and on-premise users and devices, as well as enhanced endpoint compliance and Internet of Things (IoT) risk mitigation. We have increased our security posture, and for the most part, there has been zero impact on our end users" Pulse Secure-Entegrus collaboration Entegrus serves over 58,000 customers throughout Ontario. They bring electricity, renewable energy and water across three large regions, with a workforce spread out over 2,300 square miles. Entegrus’ objective is to provide safe, reliable and cost-effective provision of energy and related billing services, while providing high levels of service to its customers, partners and the communities it serves. IT security plays a critical role in protecting their delivery of energy and data services. “The threat landscape is constantly evolving, forcing us to always consider how we can go one step further. With a widely distributed IT infrastructure, we considered NAC as an effective way to improve our security posture without dramatically altering how we operate,” said Dave Cullen, manager of information systems for Entegrus. “We have a long-standing relationship with Pulse Secure. The level of integration between Pulse Secure secure sockets layer (SSL) and NAC, as well as the extended feature set, made it a straightforward choice for us. Perhaps, the two most important things are that we have increased our security posture, and for the most part, there has been zero impact on our end users.” Active control with seamless network access Ensuring always active control while maintaining flexible, seamless access to network and application resources is an essential requirement for utility providers. Within such highly regulated industries, best practices dictate a constant cycle of security readiness review and improvement to meet an increasingly potent threat posed by cyber threat actors. NAC provides foundational endpoint intelligence, resource access enforcement and IoT defences that support industry and regulatory compliance guidelines. These compliance requisites apply to both regional and large national critical infrastructure providers. For stretched IT departments, Pulse Secure’s Secure Access solutions are designed to streamline deployment and on-going administration using an easy, integrated, policy-driven platform that works with a customer’s existing installed base and network infrastructure. In addition, Pulse Secure’s VPN solution utilises the same endpoint client, policy engine and appliance management as the NAC solution. Entegrus took advantage of this platform capability to rapidly implement NAC. As a result, they gained dynamic intelligence, unified policy management, automated enforcement and threat response through a single management console. We needed to make sure our secure access technologies could adapt to new regulatory requirements and new business needs" Secure access solutions Cullen highlights numerous benefits, including a simplified method of managing complex policies and user access rights, as well as an enforceable method of checking end-point devices to ensure that only properly patched operating systems can connect to the network. Another advantage of Pulse Policy Secure was evident after Entegrus recently merged with London, Ontario-based St. Thomas Energy. “We needed to make sure our secure access technologies could adapt to new regulatory requirements and new business needs, as the recent merger added new, unqualified infrastructure and grew our customer base by around a third, which also led to the hiring of 28 new staff members,” Cullen added.
A security camera provided by Hikvision USA Inc., the North American supplier of innovative, award-winning video surveillance products and solutions, was installed by Holmes Security to help Spinner’s Pizza in Fayetteville, NC to improve efficiency. Established in 1999, Spinner’s Pizza is a popular restaurant with a dedicated following and a very busy lunch crowd. Owner Spero Poulos thought of using a “Pizza Cam” to streamline operations during their busiest times. “Holmes Security had installed Hikvision cameras for security in and around the restaurant. We decided, why not use it for the service efficiency and accuracy?” said Poulos. Innovative camera-kitchen monitor system The restaurant owner needed to improve efficiency. The combination of a camera with a kitchen monitor “keeps the staff from running to the buffet just to check what needs to be cooked." Poulos noted that when staff members leave the kitchen they’re “invariably stopped by customers and friends that want to chat. That can slow down the replenishment process." Spinner’s analog and IP hybrid system includes mini domes, bullets and turret cameras. Holmes Security recommended and installed the Hikvision DS-2CE56D5T 1080p Turbo HD-TVI Turret camera for the buffet to deliver HD quality over the existing coax cabling. The turret camera is positioned to capture the entire line of pizzas on the buffet. “We’re able to keep the buffet full at all times. When someone is on a tight lunch break, the last thing you want them to do is wait for their food. With the Hikvision camera in place, they no longer have to wait,” said Poulos. The Pizza Cam enables the operation to be run from the kitchen monitor with no downtime. Monitoring the Hikvision Turbo HD-TVI Turret camera from the kitchen improved efficiency since staff can check the status easily and quickly Ruggedised camera for heat tolerance “Heat tolerance was a big consideration based on the camera’s position in relation to the buffet itself. The specs showed that the Hikvision camera’s operating temperature range was 22 below to 140 degrees Fahrenheit, so we knew it could withstand the heat,” Dave Foster, sales and marketing manager for Holmes Security, told Hikvision. Holmes Security is a 109-year old, family-owned company based in Fayetteville, NC. They use Hikvision cameras because “we have found over time that Hikvision provides higher quality, is easier to install, program and maintain. Tech support is great, and the software is consistent as well. Plus, we have great reps and a great rapport with Hikvision personnel,” said Foster. Holmes Security positioned the camera to the upper right of the buffet to capture the entire line of pizzas. Spinner’s kitchen staff can now see the entire buffet from a monitor in the kitchen, allowing the chefs to stay ahead of customer demand. Poulos adds that he gets “comments all the time about what a great idea it is. The customers especially like the fact that they don’t have to wait for new pizzas to be placed on the buffet.” Greater efficiency and improved operations Spinner’s Pizza is delivering a better experience to its customers by keeping its buffet stocked with fresh pizza. Monitoring the Hikvision Turbo HD-TVI Turret camera from the kitchen improved efficiency since staff do not have to run out to the food line to check the status. The system allows servers to concentrate on serving. The Hikvision Pizza Cam delivers ease of operations for the restaurant staff, owner, and patrons. “Our strength in the field is the partnership among Hikvision, our integrators and their customers, collaborating together to find innovative ways to solve real-world problems,” said Alex Asnovich, director of marketing for Hikvision. “Spinner’s Pizza is a great example of applying our technology to achieve business results in a retail restaurant environment.”
Fifth Third Bancorp, one of the top 15 banks in the U.S., is well on its way toward completing a major upgrade of its March Networks video surveillance system. A customer since 2004, Fifth Third has deployed 12,000 March Networks cameras and approximately 1,400 March Networks 8000 Series Hybrid NVRs over a period of 36 months. Identification and apprehension of suspects “By the end of 2016, we’ll have a total of 1,600 new 8000 Series recorders,” said Mike Neugebauer, Fifth Third’s Vice-President and Director of Corporate Security, who oversees security for 1,300 full-service retail branches, as well as data centres, corporate offices and cash handling facilities across 12 states. The combination of March Networks MegaPX WDR MiniDome Z IP cameras, Analog WDR Indoor Domes and the 8000 Series Hybrid NVRs with advanced video compression allows Fifth Third to provide law enforcement authorities with high-quality video for the identification and apprehension of suspects. Video verification improves urgency “Bank robberies and break-ins appear to be trending higher nationally,” said Neugebauer. “Much of it is a consequence of the heroin epidemic. Typically, they’ll go through a window in the middle of the night to see what there is to steal.Security staff in our 24-hour monitoring centre can verify an alarm and tell responding law enforcement officers what we see" “We constantly get compliments from law enforcement about the quality of our video. Even if the bad guys show up with hoodies or masks, we can zoom in on clothing patterns and brand logos, partial facial features, tattoos or other distinguishing marks.” “Security staff in our 24-hour monitoring centre can verify an alarm and tell responding law enforcement officers what we see,” said Neugebauer. “Video verification is huge. It changes law enforcement’s urgency to respond.” Crystal-clear images In minutes, Fifth Third security staff can email crystal clear images of a suspect to police, dramatically improving the chances of apprehension. The March Networks MegaPX WDR MiniDome Z IP camera’s wide dynamic range and progressive scan in high resolution delivers excellent image quality even in bright backlit situations, while its H.264 compression technology reduces bandwidth and storage costs. The MiniDome Z also features Power-over-Ethernet and is ONVIF-compliant, allowing it to be used with a variety of third-party video surveillance systems. Linking video with teller and ATM transaction data allows fraud investigators to quickly establish the identity of an individual associated with a transaction The Analog WDR Indoor Dome also features wide dynamic range, progressive scan in high resolution and low light sensitivity, making it ideal for capturing quality images in a variety of lighting conditions. Mix of analogue and IP The 8000 Series Hybrid recorder is a perfect fit for Fifth Third, accommodating a mix of analogue and IP cameras and offering up to 16 TB of onboard storage across four hard drive slots. “Typically, we’ll have two IP MiniDomes and 14 analogue cameras per branch, but we’re starting to use more exterior-mounted IP cameras in our elevated risk branches, so storage is important to us,” said Neugebauer. “The other thing we like about the 8000 Series is how it gives us sharper images from our analogue cameras.” The availability of the 8000 Series Hybrid NVR in 4, 8, 16 and 32-channel configurations is also a plus because it allows Fifth Third to acquire a fit-for-purpose unit for every application. Compatibility issues The decision to standardise on March Networks cameras frees Fifth Third from having to worry about any compatibility issues. “When we weren’t buying March Networks cameras, it made management of the cameras a lot harder for us,” said Neugebauer. “That was especially the case for IP megapixel cameras and managing the software patches that have to go on them. The fact that our March Networks cameras work in concert with our NVRs means we don’t have to do any software loads like we had to do when we were buying another camera brand. We were managing many pieces of software instead of just one platform.” Transitioning to Command Enterprise and Searchlight Next on the agenda for Fifth Third is a transition to March Networks Command Enterprise video management software and the acquisition of March Networks’ Searchlight for Banking software. Fifth Third security staff can email crystal clear images of a suspect to police, dramatically improving the chances of apprehension Command Enterprise features a user-friendly, browser-based interface that provides support for up to 10,000 recorders and 128,000 video channels, while Searchlight for Banking is a suite of tools to speed fraud investigations and capture business intelligence such as tracking customer behaviour. Linking video with teller and ATM transaction data, for example, allows fraud investigators to quickly establish the identity of an individual associated with a transaction. Searchlight advantages “On the retail side, we also hope to take advantage of Searchlight to help us make better business decisions,” said Neugebauer. Using Searchlight’s queue length monitoring analytics, Fifth Third will be able to gather and compare metrics on branch traffic and speed of service. It can also be used to track self-serve kiosk usage and gather data on how long customers linger in front of marketing displays. Concurrent with the introduction of Searchlight, Fifth Third is also planning to acquire March Networks’ new MegaPX Indoor Analytics Dome camera with built-in intelligence. “We’ve just done some testing and we’re very pleased with it,” said Neugebauer. While security remains the primary application for video surveillance at Fifth Third, other “lines of business” are taking advantage of it. Weather damage and alarms “In the past, security directors were always hesitant to share their video surveillance system, but we share our system with our facilities and retail groups”, said Neugebauer. “They use it to see if the sidewalk has been shovelled or if the parking lot has been plowed in our northern branches. In Florida, where we’ve had some severe storms, they use it to see if the windows have been blown out or if we have water damage. “Our facilities group has really embraced it. We’ll put cameras in mechanical rooms, for example, so they can see the indicator light configurations on the control panels. It often saves them from making a trip to the site. If a technician gets an alarm from an HVAC system or a generator, for example, he can diagnose the problem remotely and take the necessary steps to resolve it.When we weren’t buying March Networks cameras, it made management of the cameras a lot harder for us" “Retail uses the system to look at compliance with opening and closing procedures. Or, they may have a teller who’s great at selling and go in to look at best practices for training purposes.Sharing their March Networks video surveillance system with other departments “makes funding easier for us,” said Neugebauer. Longer lifecycle However, underlying Fifth Third’s choice of a video surveillance supplier is March Networks’ track record for product durability. Fifth Third began retiring the 4000 C Series recorders it acquired in 2004 two years ago and will only complete the transition to new 8000 Series units in 2016. “Some of my peers in the industry are buying new recorders every three years,” said Neugebauer. “Everything has a lifecycle and we feel the lifecycle for March Networks products is significantly longer than most of the other systems out there.”
Intrusion can be very invasive, damaging and expensive for any industrial or commercial business. The damage of machinery or the theft of goods can be potentially devastating. Not only that, but each commercial and industrial property can vary dramatically in terms of the level of security required, along with the conditions of the installation. Aisles, machinery and varying environmental conditions are all considerations, as is the required function of the security system and the ability to monitor it safely and remotely. Pyronix hybrid solution So, which security system can deliver the right solution? Look no further than the PCX46 APP. This is the professional high-security hybrid solution that delivers maximum security, convenience, flexibility and potential. Tailor the security system to meet the individual needs of the property, with the full range of Pyronix devices. Whether wired for Grade 3 requirements (large casing PCX46 APP) or utilising the multi-award-winning two-way wireless technology for any Grade 2 requirements, you can deliver the ideal system for the property and provide the user with full assurance that they are paying for the best possible security solution. Protecting external areas So, for any environments such as show rooms, factories, garages, banks, entrances or exits, there is the Pyronix range of KX detectors, which utilise Dual Technology (DT) which offer resolute detection in areas with changing conditions. If there are any drafts or fluctuating temperatures, there is the perfect KX. There is also the XD range of external detectors that utilise Tri-Technology (TT), as well as Anti-Masking and Anti-Blocking options. These can offer any external areas the protection they need, as well as be utilised to set off lights. Whether the installation requires sensors, detectors, sirens and much more, this is all possible and easily accomplished with the PCX46 APP. PyronixCloud and HomeControl+ App Utilise this security system and you can also benefit from the PyronixCloud and HomeControl+ App infrastructure. The user gets remote control of their system from anywhere in the world, while you benefit from remote diagnostics and programming, as well as easy set up. The HomeControl+ App delivers unrivalled control over the property for the user, with the ability to: arm and disarm, control any automation outputs, check the status of every individual device on the system, see their event history and much much more, all in real-time. So, whether the user is at work, on holiday or in bed, they are always informed and always in control. This is particularly useful for any business owner or manager, where it may be advantageous to monitor the access to the building, as well as any automation outputs added to the system. With remote programming and diagnostics of the system using InSite UDL software via the PyronixCloud, there are fewer call-outs and therefore reduced costs. This makes the PCX46 APP a more profitable solution for businesses, as systems can be fully managed remotely and even when a call-out is necessary, the engineer will know what the issue is before getting to site. Furthermore, users can also generate recurring revenue streams by offering PyronixCloud management services.
The Melbourne Cricket Ground, known to fans as simply ‘The G’, is Australia’s largest and most iconic sporting venue. With a history dating back to 1853, upwards of 100,000 fans as well as thousands of catering and hospitality staff, hundreds of security officers, police, medical teams, and media crews, as well as sports teams and match officials, flood the site. After a site survey, it was found that the existing access control system not only needed to be replaced, but taking the new public threat levels into account, access control needed to be significantly expanded to protect equipment and infrastructure across the site. Access control-building management integration A key challenge for Frances was that MCG’s electronic security and building management systems were incompatible with each other In addition, a management solution was required that could weave the existing surveillance gear together with the new access control system, as well as other electronic security and building management solutions. Whatever solution was implemented, it also had to be scalable and completely future-proof. MCG facilities manager Andy Frances quickly realised the key to the MCG’s electronic security future would be an open architecture networked solution. A key challenge for Frances was that MCG’s electronic security and building management systems were incompatible with each other and the multiple layers of cabling infrastructure that sprawled across the site were a complete unknown. Frances also knew that he would need a powerful graphical user interface that incorporated mapping, which meant all the hardware employed across the site had to be built for a networked environment. Networked access control According to Frances, integrating the entire system in a networked environment was a crucial factor According to Frances, integrating the entire system in a networked environment was a crucial factor. Frances explains that in terms of what he wanted to achieve at The G, the main goals were to upgrade the access control system, including door controllers and door hardware, and to look at software management programs for controlling access control, CCTV and alarms. “Given the current state of technology, the first thing we had to look at was the security infrastructure,” Frances states. “I saw the key to the site was going to be a futureproof network infrastructure supporting video surveillance, access control and alarm monitoring, integrated by a powerful software management solution.” “That overall management solution was important because for our critical infrastructure areas, we wanted a system that would allow us to know if a door was forced open, and to have some auditing capability,” says Frances. VertX IP access control solution All parts of the new system have been selected on the basis of their ability to support open architecture. The network components include off-the-shelf hardware and firmware installed in IT rooms and supported by the IT department. This part of the system includes switchers and the recording solution. The access control side is the major part of the new installation at the MCG, with Genetec Security Center’s Synergis module supporting VertX IP access control solution, a powerful modular solution designed to carry access control solutions into an IP environment. According to Frances, as the decision solidified and VertX came to the fore, a catastrophic failure of the existing access control system took over the decision-making process. OPIN application programming interface What we liked about VertX was the fact that along with its excellent functionality, HID Global would provide the specifications of that product to any software manufacturer" “While we were calmly assessing the product, we had a failure of the access control system we couldn’t recover from,” Frances explains. “Fortunately, we had already talked to HID about the VertX IP access control solution”, says Frances. “What we liked about VertX was the fact that along with its excellent functionality, HID Global would provide the specifications of that product to any software manufacturer. This satisfied our IT team because it was non-proprietary.” The MCG’s need for open architecture and the proprietary nature of virtually all other access control systems meant HID Global’s VertX solution built on HID’s OPIN application programming interface was the perfect solution for this application. OPIN enables HID Global’s Edge access control devices to operate seamlessly with any management software and in almost any conceivable configuration. The perfect compatibility of VertX meant that it was the first component of the new access control solution selected, which is uncommon. The operational functionality of VertX was also an important part of the decision-making process. Non-proprietary management software “When looking at HID Global’s VertX, there are some key elements that are important. If the system goes offline, it has a cache and when the network is available, VertX downloads all interim events - that was an important thing for us,” Frances says. “While we wanted a fully networked system, we didn’t want to lose any data if the network was offline. We also wanted to retain functionality - we wanted to have the doors operate as they normally would under all circumstances.” Most importantly, VertX’s OPIN architecture allowed the use of non-proprietary management software – this was a major issue for MCG. VertX’s hybrid nature meant virtually the entire site’s existing RS-485 cable could be retained. This saved an enormous amount of money, given the challenges of re-cabling a site so large and heavily constructed. HID’s V1000 network controllerThis robust and highly intelligent Linux-based unit is really the hero of HID’s VertX solutionNo account of the MCG’s access control solution is complete without recognition of the power and capability of HID Global’s V1000 Network Controller. This robust and highly intelligent Linux-based unit is really the hero of HID’s VertX solution. With its RISC processing the V1000 pulls system smarts all the way down to remote network closets giving multiple benefits. The V1000 reduces the number of dedicated ports the access control system needs and buffers events when the network is down. And the V1000 can receive and action commands from third party control software and is also able to activate a digital dialer or GSM modem in the event of longer network failure. Genetec Security Center Frances has no doubt that he has made the right decision going with a fully networked solution at the MCG. “I think the networked model works very well and there’s no question this is the way most security managers on large sites should be heading,” Frances says. “Working with HID Global has been very good for most the same reasons – they understood where we were at and what we wanted. HID Global is able to come to the party very quickly with a system designed with this sort of solution in mind. I can pick up the phone and speak to them and get things resolved.” “The way things are now I can call up the integrator and discuss changes and improvements and talk about ways to keep things within budget. If there’s a location where a low-cost camera works well, and I can save money for other things, then I can buy that. If Bosch releases a new high-end camera for external environments, then I can buy a hundred of those. And it’s the same with access control readers, or if Genetec releases a new version of a module, I can upgrade to it and know I have the best possible system at any given moment,” Frances states. Integrators Australia installed the HID Global VertX access control solution at the Melbourne Cricket Ground. It is managed across the site’s network by Genetec’s Security Center software that includes a Synergis access control module and Omnicast video surveillance module.
A security camera provided by Hikvision USA Inc., the North American provider of innovative, award-winning video surveillance products and solutions, was installed by Holmes Security to help Spinner’s Pizza in Fayetteville, NC to improve efficiency. Established in 1999, Spinner’s Pizza is a popular restaurant with a dedicated following and a very busy lunch crowd. Owner Spero Poulos thought of using a “Pizza Cam” to streamline operations during their busiest times. “Holmes Security had installed Hikvision cameras for security in and around the restaurant. We decided, why not use it for the service efficiency and accuracy?” said Poulos. Full coverage of pizza buffet with kitchen monitor The restaurant owner needed to improve efficiency. The combination of a camera with a kitchen monitor “keeps the staff from running to the buffet just to check what needs to be cooked.” Poulos noted that when staff members leave the kitchen they’re “invariably stopped by customers and friends that want to chat. That can slow down the replenishment process,” said Poulos. Holmes Security installedthe Hikvision DS-2CE56D5T 1080p Turbo HD-TVI Turret camera for the buffet Spinner’s analogue and IP hybrid system includes mini domes, bullets and turret cameras. Holmes Security recommended and installed the Hikvision DS-2CE56D5T 1080p Turbo HD-TVI Turret camera for the buffet to deliver HD quality over the existing coax cabling. The turret camera is positioned to capture the entire line of pizzas on the buffet. “We’re able to keep the buffet full at all times. When someone is on a tight lunch break, the last thing they want is to wait for food. With the Hikvision camera in place, they no longer have to,” said Poulos. The Pizza Cam enables the operation to be run from the kitchen monitor with no downtime. Greater efficiency and improved operations “Heat tolerance was a big consideration based on the camera’s position in relation to the buffet itself. The specs showed that the Hikvision camera’s operating temperature range was 22 below to 140 degrees Fahrenheit, so we knew it could withstand the heat,” Dave Foster, Sales and Marketing Manager for Holmes Security, told Hikvision. Holmes Security is a 109-year old, family-owned company based in Fayetteville, NC. They use Hikvision cameras because “we have found over time that Hikvision provides higher quality, is easier to install, program and maintain. Tech support is great and the software is consistent as well. Plus, we have great reps and a great rapport with Hikvision personnel,” said Foster. Holmes Security positioned the Hikvision camera to the upper right of the buffet to capture the entire line of pizzas Holmes Security positioned the camera to the upper right of the buffet to capture the entire line of pizzas. Spinner’s kitchen staff can now see the entire buffet from a monitor in the kitchen, allowing the chefs to stay ahead of customer demand. Poulos adds that he gets “comments all the time about what a great idea it is. The customers especially like the fact that they don’t have to wait for new pizzas to be placed on the buffet.” Applying technology to achieve business results Spinner’s Pizza is delivering a better experience to its customers by keeping its buffet stocked with fresh pizza. Monitoring the Hikvision Turbo HD-TVI Turret camera from the kitchen improved efficiency since staff does not have to run out to the food line to check the status. The system allows servers to concentrate on serving. The Hikvision Pizza Cam delivers ease of operations for the restaurant staff, owner and patrons. “Our strength in the field is the partnership among Hikvision, our integrators and their customers, collaborating together to find innovative ways to solve real-world problems,” said Alex Asnovich, Director of Marketing for Hikvision. “Spinner’s Pizza is a great example of applying our technology to achieve business results in a retail restaurant environment.”