Senstar, global perimeter intrusion detection and video management solutions provider, is pleased to announce its Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system has received the Fixture Seal of Approval (FSA) from the International Dark Skies Association (IDA). IDA is the recognised authority on light pollution. Its mission is to preserve and protect the nighttime environment and the heritage of dark skies through environmentally responsible outdoor lighting....
Aqua Security, global platform provider for securing container-based and cloud native applications, has announced version 3.5 of its cloud native security platform, which now protects a wide range of cloud native technologies, including applications using serverless functions. Customers can deploy end-to-end security to establish a consistent policy enforcement layer spanning container, serverless containers (such as AWS Fargate) and serverless functions (such as AWS Lambda). Aqua CSP v3.5 In...
Pivot3, global provider of security, Internet of Things (IoT) and hybrid cloud infrastructure solutions, has announced the introduction of the Pivot3 Architect and Engineer (A&E) Program. This initiative will provide architects, engineers and consultants with the resources and support needed to make intelligent decisions when specifying infrastructure platforms at the core of enterprise-class IoT, video surveillance and security solutions for their clients. Pivot3 A&E Program The Pivo...
Pulse Secure, global provider of Secure Access solutions to both enterprises and service providers, has announced the launch of new packaging of its award-winning Pulse Access Suite for Managed Security Service Providers (MSSPs). The solution offers service providers an accelerated, cost-effective means to differentiate and build out their service portfolio to meet the massive demand for protected connectivity to cloud applications and hybrid IT resources. Pulse Secure Pulse Secure offers a co...
Aqua Security, platform provider for securing container-based and cloud-native applications, announced that Hitachi Vantara has integrated Aqua security capabilities into the Hitachi Enterprise Cloud (HEC) Container Platform. HEC Container Platform delivers a public cloud experience for organisations that use data services, DevOps and microservices architectures on premises in a private or hybrid cloud. Hitachi Vantara selected the Aqua platform in part for its ability to deliver runtime securit...
ExtraHop, global provider of analytics for security and performance management, has announced the availability of Reveal(x) for Microsoft Azure. With Reveal(x) for Microsoft Azure, enterprise security and cloud operations teams now have enterprise-grade network traffic analysis (NTA) that uses advanced machine learning to instantly surface high-risk threats and automate response across the entire hybrid enterprise. With this latest release, Reveal(x) is also available for remote site deployments...
DigiCert Inc., the global provider of scalable PKI solutions for identity and encryption, Gemalto, a global provider in digital security, and ISARA Corp., the provider of quantum-safe security solutions, announced a partnership to develop advanced quantum-safe digital certificates and secure key management for connected devices commonly referred to as the Internet of Things (IoT). “DigiCert, Gemalto and ISARA are collaborating today to solve tomorrow’s problem of defending connected devices and their networks against the new security threats that the implementation of quantum computers will unleash,” says Deepika Chauhan, Executive VP of Emerging Markets at DigiCert. “The work we’re doing now will ensure that the connected systems that serve as the brains of automobiles, industrial control systems, medical devices, nuclear power plants and other critical infrastructure are safe from those threats in five, 10 and 20 years.” ISARA recognises DigiCert’s track record in advancing many of the certificate innovations in use Secure key storage and management The partnership provides significant advantages for enterprise security teams looking to secure connected devices with lengthy product lifetimes to avoid expensive security retrofitting as quantum computing becomes more prevalent. Organisations can deploy these solutions at any scale, given that DigiCert is already capable of issuing and reliably hosting billions of digital certificates for public trust and private PKI systems. The work of DigiCert with ISARA and Gemalto will enable quantum-resistant certificates with the full capability of hosted, on-premise and hybrid deployment options. DigiCert already works with many companies and consortiums using PKI to authenticate, encrypt and provide integrity for their connected devices. ISARA recognises DigiCert’s track record in advancing many of the certificate innovations in use, as well as its robust certificate management capabilities, and in operating the industry’s most ubiquitous, trusted roots. Gemalto offers secure key storage and management via its SafeNet Hardware Security Modules (HSMs) that integrate with DigiCert APIs to enable large-scale, automated credential issuing for connected devices via an internet-enabled gateway to distribute identity over the cloud. Certificates obtained through this partnership will be enabled with quantum-safe cryptography ahead of any breakthroughs that could eventually lead to quantum computing threatening connected device security. Quantum-safe cryptography Gemalto’s SafeNet Hardware Security Modules act as the root of trust to secure the most sensitive data and applications" “Experts estimate that the dawn of large-scale quantum computing will arrive in the next eight to 10 years, bringing with it the moment when all current public key cryptography can no longer be trusted,” says Scott Totzke, CEO & Co-founder at ISARA. “The work we’re doing today ensures that a fundamental element of the security stack, root certificates, is secure by embedding quantum-safe cryptography. This means that IoT manufacturers and other large organisations will have the solutions and tools they need to prepare for the quantum threat well in advance of that date, keeping confidential information and high-value assets safe.” “Gemalto’s SafeNet Hardware Security Modules act as the root of trust to secure the most sensitive data and applications and protect billions of the digital transactions every day around the world,” said Todd Moore, Senior Vice President for Encryption Products at Gemalto. “This partnership with DigiCert and ISARA will help organisations build secure and future-proof cryptographic operations that can guard against the potential security threats of quantum computing and ensure a more secure world for connected automobiles, devices, machines, smart cities and mission-critical infrastructure.” Quantum computing security Many IoT devices rely on RSA and ECC cryptography to protect the confidentiality, integrity and authenticity of electronic communications. However, NIST and others in the security community predict that within a decade, large-scale quantum computing will break RSA and ECC public key cryptography. DigiCert, Gemalto and ISARA recognise that crypto-agility becomes paramount for manufacturers of connected devices that will be in use a decade or more from now. Efforts to address quantum computing security will support connected device manufacturers and users well into the future To advance the use of reliable quantum-proof certificates, DigiCert, Gemalto and ISARA are collaborating with industry standards bodies that also are pursuing the advancement of post-quantum cryptography such as the Internet Engineering Task Force (IETF). Efforts to address quantum computing security will support connected device manufacturers and users well into the future. Sustainable security management Consider the automobile industry, which is producing more vehicles with semi- and fully-autonomous driving capabilities. A car should last for 20 years or more, and manufacturers will need to ensure that the IoT devices they install will be secure and continue to function even if there is a breakage in the RSA algorithms that would render digital certificates ineffective. “The automotive industry is very focused on long-term and sustainable security management that covers the lifecycle of our vehicles," said SAE Hardware Security Sub-Committee Chair Bill Mazzara. “Crypto agility is one of the key areas we consider and that includes quantum-resistant technology.”
Secutech Vietnam 2018 reached new heights as it closed its doors, having seen visitor numbers shoot up to an estimated 13,800+ (2017: 12,097). Positive feedback from buyers and exhibitors alike also cemented the fair’s position as the ideal shop window into the regional security industry. Secutech Vietnam 2018 The new Smart Home and Smart Building zone was added to the show floor this year alongside the returning Security zone and the Fire & Safety zone The enlarged show occupied the entirety of Hall A at the Saigon Exhibition & Convention Center and was categorised into three separate zones that accommodated buyers from different sectors. Of particular note was the new Smart Home and Smart Building zone, which was added to the show floor this year alongside the returning Security zone and the Fire & Safety zone. The addition of the new zone contributed to an uptick in exhibitor numbers at the show, which rose 16% from last year’s total to reach 310 exhibitors from 20 countries and regions (2017: 270). The knock-on effect of this increase was an 11% rise in exhibition space, which reached 10,000 sqm (2017: 9,000 sqm). Speaking about the driving forces behind these impressive numbers, Ms. Regina Tsai, Deputy General Manager of Messe Frankfurt New Era Business Media Ltd said: “The high number of government and commercial sector development projects in Vietnam has translated into significant demand for surveillance, access control, biometric recognition and other related security and fire safety solutions. With this in mind, I am delighted that buyers are increasingly recognising Secutech Vietnam as the place to source these products and cross paths with major international and domestic suppliers.” Smart Home and Smart Building solutions A large number of suppliers were present at the Smart Home and Smart Building zone, which was a hive of activity during the fair. Astec, Dahua, Phuong Viet, Samsung, Smart Z and a blend of related companies displayed products at the zone, with solutions that stretched from home automation and controls, to intelligent building and energy saving devices. The addition of these technologies to the show floor contributed to making the 2018 edition of Secutech Vietnam the most comprehensive to date. One notable debutant at Secutech Vietnam was hosted at the new zone in the form of the Z-Wave Pavilion. The flourishing residential property sector helped to attract system integrators, distributors and end users of home automation technologies to the pavilion, which housed smart lock manufacturers Saykey and Kaadas. Meanwhile, SMAhome also made its first appearance at Secutech Vietnam with a host of IoT enabled technologies for Smart Home. Fire and Safety solutions Two other pavilions to experience high footfall during the show were the Korea Fire Institute (KFI) and UL Pavilions at the Fire & Safety zone Two other pavilions to experience high footfall during the show were the Korea Fire Institute (KFI) and UL Pavilions at the Fire & Safety zone. A host of Korean companies and associations were present at the KFI Pavilion to showcase fire extinguishers, fire alarms, fire hoses, alarm control units, firefighting suits, escape chutes, valves, and related equipment. Meanwhile, the UL Pavilion was home to UL certified fire safety products from brands such as CSJ, HD Fire, NM Fire, Newage Fire, PCJ, UL and WEFLO. Plenty of attention and positive feedback also surrounded the new Singapore Pavilion. Led by the Association of Small and Medium Enterprises, the pavilion featured modular control platforms, key management systems, facial recognition systems, and surveillance solutions with applications for Vietnam’s growing smart city market. Smart Solutions Vietnam Forum To supplement the exhibition portion of Secutech Vietnam, a fringe programme of concurrent events was organised to promote information exchange. One highlight was the new Smart Solutions Vietnam Forum which allowed speakers from high profile companies Bosch, Kedacom, ICP DAS, Samsung, Seagate, and Western Digital to deliver presentations about their latest innovations as well as future industry trends. The well-received forum, which was followed by a business networking party, focused on new and upcoming solutions for the six vertical markets of smart transportation, smart storage, smart factory, smart building, smart enterprise, and smart city. Fire & Safety Rescue Seminar Further opportunities for learning and information exchange were on offer at the Fire & Safety Rescue Seminar Meanwhile, further opportunities for learning and information exchange were on offer at the Fire & Safety Rescue Seminar which returned again this year with a host of informative presentations, such as “Fire Safety Applications for Industrial Revolution 4.0”. Among the speakers were members of the Korea Fire Institute and UL pavilions, who discussed solutions for factory, building and personal safety.
Pulse Secure, global provider of enterprise Secure Access solutions has announced the release of Pulse Policy Secure 9.0 to enable organisations an easier, flexible and VPN-integrated path to next-generation Network Access Control (NAC). The latest release incorporates more than 36 new features and enhancements; advancing visibility, usability, endpoint and IoT security, and threat response capabilities. As a result, enterprises can strengthen their security posture and mitigate malware, data breaches and compliance risks. “With growing attacks, BYOD and data privacy issues, enterprises must get a handle on users, endpoints and IoT devices accessing their network resources,” said Tony Massimini, senior industry analyst at Frost & Sullivan. “Pulse Secure is distinguished by offering the benefits of both pure-play and infrastructure NAC providers. Unlike infrastructure NAC, Pulse Secure is integrated and works with popular switches, wireless, and security infrastructure to facilitate deployment and threat response. Unlike pure-play NAC offerings, Pulse Secure offers VPN and NAC solutions that amalgamate mobile, cloud and network oversight. The combination delivers enterprise value for user, endpoint and IoT visibility, as well as threat response.” Pulse Policy Secure Pulse Policy Secure (PPS) is an enterprise-class NAC solution that delivers network visibility, “comply to connect” policy enforcement and security orchestration Pulse Policy Secure (PPS) is an enterprise-class NAC solution that delivers network visibility, “comply to connect” policy enforcement and security orchestration with popular switch, wireless controller, NGFW, SIEM, EMM and endpoint security solutions. PPS tackles the challenges of securing corporate networks, which are being redefined by Hybrid IT, mobile devices and IoT. Frost & Sullivan predicts that IoT connections will reach 45.4 billion by 2023. IoT brings new exposures as mobile, wearables, medical and other IP-enabled devices are introduced to the corporate network. Policy Secure 9.0 boosts compliance enforcement with broader endpoint discovery mechanisms, vulnerability assessment to prevent malware attacks such as WannaCry, as well as OS and patch management verification to safeguard Windows and macOS devices. Beyond supporting TACACS+ for role-based network device support, the release also streamlines user experience by incorporating host checking caching, directory, authentication and firewall integration techniques to reduce login prompts, authorisation and device compliance time. Pule Profiler and Secure 9.0 Pulse Profiler, sold separately or integrated within PPS, automatically identifies managed and unmanaged devices Pulse Profiler, sold separately or integrated within PPS, automatically identifies managed and unmanaged devices (e.g. printers, VOIP phones, cameras) that are connecting to the corporate network. The system dynamically monitors for device profile and security state changes. The new version further extends IoT device discovery, classification and management features with added means to ascertain new and custom IoT devices, and to apply policy for conditional access. Policy Secure 9.0 further enables threat response orchestration. PPS can share identity and endpoint information with popular network and security infrastructure, as well as receive network policy enforcement requests from external solutions. The release extends integration with Palo Alto Networks, Checkpoint, Juniper and Fortinet firewalls to enrich their operational context, as well as to allow the firewall to invoke NAC endpoint network segregation or blocking. IoT Security and threat mitigation Organisations understand NAC advantages for visibility, IoT security and threat mitigation" "Organisations understand NAC advantages for visibility, IoT security and threat mitigation, but perceive the technology to be cumbersome. The latest release of Pulse Secure NAC continues to advance our deployment, usability and integration capabilities while delivering enterprise-class functionality,” said Scott Gordon, chief marketing officer at Pulse Secure. “With our unique means to offer a simple, unified NAC and VPN solution, we allow enterprises to gain essential intelligence, compliance and protection for remote, cloud and data center access.” Pulse Secure offers organisations an easy, flexible and scalable path to next generation NAC: Start with the Pulse Profiler for dynamic endpoint and IoT device visibility, assessment, inventory and monitoring Deploy Pulse Policy Secure for automated guest management, mobile on-boarding, endpoint remediation, network enforcement and threat response Streamline implementation with wizard templates and the means to phase in access enforcement, network coverage, and core integrations Scale cost-effectively with the PPS appliance, which includes a high-performance RADIUS server supporting up to 50,000 concurrent devices Centrally manage appliances and over a million endpoints though the Pulse One console Simplify and expedite NAC deployment for Pulse Secure VPN customers by leveraging the same user client, policy framework and centralised management console Network Access Control solutions The evolution of Network Access Control solutions is critical to the security industry" "We are seeing more IoT deployments especially within our larger clients in healthcare and manufacturing and we welcome the enhancements to Pulse Policy Secure that help to discover and protect a wider array of devices,” said David Hood, MD of ANSecurity, “The evolution of Network Access Control solutions is critical to the security industry and deeper support for next generation firewalls and other security platforms offered by the new 9.0 release will go a long way towards helping organisations to simplify security in what is an increasingly complex infrastructure landscape.”
The National Security Inspectorate’s (NSI) team of 34 full-time, expert auditors recently gathered in Maidenhead to participate in advanced training and sharing of best practice, as part of their continual development. This unique, highly respected team clocks up on average 3.25 million miles each year, fulfilling around 3500 audit days across more than 1800 approved companies. As part of its commitment to raising standards within the industry, NSI’s audit team is increasingly adopting hybrid powered vehicles which deliver low emissions and excellent fuel economy. “Up to 37 miles of my daily commute to audits can be completed on electric only power, as I charge my car every night. It’s beneficial knowing I can select electric mode when driving through residential and city areas, thus reducing pollution,” advises NSI Auditor Doug Malcolm. Having owned a hybrid vehicle prior to starting my employment with NSI, it was an easy decision to opt for one" Zero emission zones NSI Auditor Dave Bartram comments: “Having owned a hybrid vehicle prior to starting my employment with NSI, it was an easy decision to opt for one. I’m not an eco-warrior but I do feel passionate about contributing to cleaner emissions. As discussions are underway with respect to zero emission zones in major city centres, the continued ability to drive into zero emission zones is a great positive." "I believe we will see more and more of these types of vehicles in the coming years, as the benefits far out way the future impacts and limitations of solely combustion engine cars.” NSI’s forward-looking approach to its vehicle fleet is just one of the ways in which the UK’s leading certification body in the security and fire safety sectors is delivering greater efficiency and environmental benefits. The organisation’s integrated audit policy has been a welcome and proactive step, benefitting its clients through cost saving as well as delivering the environmental benefit of fewer road miles.
Pulse Secure, a provider of secure access solutions for people, devices, things and services, announced a key new release of the Pulse Secure Virtual Application Delivery Controller (vADC). The new solution brings an industry step change in enterprise management and analytics, giving IT and security professionals detailed information about data flows through each application and providing actionable insights into the behavior of applications across virtual and cloud platforms. Following last year’s acquisition of the vADC product line from Brocade, this announcement demonstrates Pulse Secure’s commitment to product innovation and the vADC market segment, which is experiencing dramatic growth and is a driver behind today’s digital business transformation initiatives. “This new vADC release from Pulse Secure overcomes the challenges of early application visibility tools, which can be expensive and require a lot of care and feeding to set up and maintain. By offering a turn-key approach to application visualisation and analytics with intuitive analysis tools, this solution enables a customer to quickly drill down and gain a better understanding of application performance as well as pinpoint patterns and problems that can be optimised and repaired." "The flexible licensing model lets enterprises tightly align their IT spend with demand and avoid over spending,” said Mike Fratto, Research Director at GlobalData. “I look forward to seeing where Pulse Secure goes with its vADC platform and closing the loop with orchestration in the future.” Virtual ADC analytics allows IT and security professionals to readily view high-level dashboards and drill down to detailed behavioural data flows" Pulse Services Director version 18.1 Pulse Services Director version 18.1 supports customers moving to virtual, cloud, software and micro-service-centric architectures. IT and security professionals no longer have to wade through large streams of unstructured data in order to identify patterns and unusual events. Powerful new intuitive graphical analytics make it easy to visualise end-to-end application traffic flows in order to baseline normal activity and highlight issues that need to be addressed, leading to quicker investigation, interpretation and corrective actions. Customers benefit from: Graphical analysis of data flows through the application Insights into application behaviour Segment-by-segment breakdown of traffic statistics Microsecond-accurate timing analysis and connection tracing Drill downs into performance problems and identification of optimisation strategies Sharable reports for closer collaboration with co-workers “We are excited by our pace of innovation and business growth since we have been acquired by Pulse Secure. In just six months, we are enjoying new flagship customer wins across a variety of industries and realising healthy revenue growth,” said Marion Smith, VP and GM, vADC Business Unit at Pulse Secure. “Virtual ADC analytics allows IT and security professionals to readily view high-level dashboards and drill down to detailed behavioral data flows of each application in real time. The enhanced operational insight, triage and reporting capabilities in this new release demonstrate our continued commitment to leading the virtual ADC market with world class products and services.” Pulse SD automates the management, licensing, and metering of virtual network services for Pulse Secure vADC Enterprise management Pulse SD Version 18.1 brings other Enterprise Management (EM) capabilities into the same package, including centralised backup and restore of ADC instances as well as centralised authentication for administration of ADC instances. It also supports centralised logging and Application Data Export for integration with third-party analytics engines. Pulse SD automates the management, licensing, and metering of virtual network services for Pulse Secure vADC, one of the most advanced virtual application delivery controllers in the market today. Intelligent access capabilities “We have been fortunate to be involved with Pulse Virtual Traffic Manager for over 12 years and are very excited about the opportunity to work with Pulse Secure following its acquisition of vADC. Many of our customers already use Traffic Manager’s built-in activity graphs for traffic analysis and visibility, and this new release will give customers a centralised view of the data with rich analytical tools." "We expect to see new and innovative solutions come out of Pulse Secure leveraging its best-in-class Secure Access and Traffic Manager platforms,” said Ken Tan, Sales Director at Network Armada. “This release is the first step in a larger vision to help provide customers with more intuitive tools enabling visibility, availability and control of their applications. You will see us build on this release in the future as we start to bring our Secure Access product portfolio together to include intelligent access capabilities around hybrid cloud,” added Smith.
New research from WinMagic, the data security company, surveying over 1,000 IT Decision Makers (ITDM) about hyper-converged infrastructure (HCI) has revealed flexibility (65%), performance (58%) and availability (46%) as the highest ranked benefits of the technology. However, the survey also highlighted ITDM concerns around expanding their use of HCI, with complexity leading at 45% and security, a close second (43%). Currently, only 15% of respondents’ report have any HCI technology in their infrastructure. Yet, the HCI market is expected to expand, with Gartner stating that “By 2021, hyper-converged integrated systems (HCIS) will represent 54% of total converged infrastructure shipments by revenue, with HCIS reaching $10.8 billion.” (Hype Cycle for Storage Technologies, July 2017). ITDMs are clearly seeing the benefits of HCI technology, so what is holding them back from using it more? Deployed with the correct controls, HCI can be one of the best ways to simplify data centre infrastructure Simplifying data centre infrastructure Deployed with the correct controls, HCI can be one of the best ways to simplify data centre infrastructure. However, its dynamic nature and reliance on virtual machines creates challenges such as how to unify security and control data sprawl as IT departments struggle to maintain control as workloads expand. ITDMs highlighted four areas, making them reluctant to include HCI as part of their future infrastructure plans: Increased complexity of IT infrastructure (45%) Maintaining security across HCI environments (43%) Maintaining management control as HCI scales across the business (39%) The lack of an ability to manage virtual machines in hybrid environments (34%) Risks from security shorcuts A quarter (27%) of respondents admitted to not limiting access to the control planes of their hyper-converged infrastructure. Rather than encrypting individual workloads, many are simply encrypting the whole platform, ignoring the need for encryption and access controls to certain sensitive datasets. The result is that unfettered access may be given to workloads that should be geo- or time restricted, leaving a company at risk of breaking its governance, regulatory and compliance obligations. In addition, there were other areas of concern relating to security when using HCIs, such as: Having a security solution that scales with our needs (29%) Ensuring compatibility with any type of hypervisor technology (23%) Maintaining identity access management and authentication (22%) Unified approach to security management “Hyper-converged infrastructure offers a wide range of benefits for IT departments and they want to embrace the technology, but often the security and management concerns make it feel like a risky investment,” said Mark Hickman, Chief Operating Officer at WinMagic.WinMagic SecureDoc Enterprise offers 100% encryption of endpoints, data centre and cloud workloads with a single platform “The truth is the benefits can be easily realised by IT teams, if a unified approach is taken to security and management, through a single tool where they are dependent, not separate tasks. In reality, this approach should extend beyond the hyperconverged hardware to the whole infrastructure whether on premises or in the cloud." "WinMagic SecureDoc Enterprise offers 100% encryption of endpoints, data centre and cloud workloads with a single platform, meaning data is protected across the enterprise while IT leaders are free to deliver the enormous benefits of hyperconvergence.”
Last year, Genetec predicted that cybersecurity would be taken much more seriously as the Internet of Things (IoT) opened more doors for hacking and network take overs. We also predicted that that there would be an increase in the adoption of Software as a Service (SaaS), expanding choice and convenience from new ownership models via hybrid (on-premises and Cloud) and Cloud-only models. Cyber Accountability awareness 2017 was also a year of awareness about ‘Cyber Accountability’. Rising cyber-crime and the increasing threats saw organisations taking direct action to mitigate their risks. There was a greater demand for cybersecurity/cyber-incompetence malpractice insurance in the physical security space. The physical security industry is continuing to grow at a rate that most other industries would envy. However, the “race to the bottom” and the rise of ultra-low-cost surveillance sensor equipment is negatively affecting the industry as a whole on several levels: Not only are profit margins being eroded, but these ultra-low-cost devices are being fielded and subsidised by state-owned organisations which raises troubling questions around privacy, data sovereignty and cyber security. More focus on privacy protection In 2018, we will see a lot more focus on privacy protection and compliance. People want to feel safe, but not watched. This is where privacy protection and encryption technology play a role in ensuring that security professionals have enough information to be able to do their job while protecting the privacy of the public. In addition to privacy and data protection, there is a greater demand for organisations and institutions to not only make sense of an increasing array of data from sensors and connected devices, but to take meaningful and smart action on these data. Software that help organisations build and activate this type of operational resiliency and security intelligence will lead the way in 2018. Genetec celebrated its 20th anniversary and welcomed its 1,000th employee in 2017. We are still proudly privately owned and will continue to grow and march to our own drummer while delivering our usual brisk pace of software innovation.
Organisations are moving to align their physical and digital security initiatives, especially in today’s more connected world Organisations must address growing security threats using fewer resources in an increasingly challenging regulatory environment. They are looking to ensure data security while also protecting their facilities’ physical security. At the same time, their users are demanding more choices of smart cards, smartphones, wearables, and other mobile devices that can do much more than simply open doors in an increasingly connected world. Cobbling together disparate solutions creates vulnerability gaps and can be expensive and difficult to manage. For these and other reasons, many organisations are moving to align their physical and digital security initiatives, especially in today’s more connected world tied to the Internet of Things (IoT). They are adopting new ways of thinking about trust in smart environments and evolving how they use trusted identities across their operations. In the process, they are discovering better ways to establish, create, use and manage secure credentials using hybrid on-premises and cloud solutions both for access control and to tie people, assets and processes to the Internet of Trusted Things (IoTT). Simpler and more efficient approaches Cloud-based solutions such as Microsoft Azure are already widely used for IT access management and there is now growing interest in harnessing the cloud to manage trusted identities used for physical access management as well. Today’s solutions span the full identity lifecycle, from badge printing or mobile credential issuance all the way through to the management and application of access rights. These solutions tie everything together and automate other manual workflows to provide an end-to-end physical identity and access management solution These integrated solutions will be joined by new cloud models for delivering network-based, service-focused badge printing and encoding that eliminates the need for stand-alone card printers attached to dedicated PC workstations and delivers the security of end-to-end encryption. Such solutions will transform the operational management of ID badge printing, reduce costs, eliminate capex outlay, simplify system maintenance and improve security as compared to on-premises solutions. Reducing vulnerabilities and simplifying compliance In parallel with the move to the cloud, there is also a growing awareness of the interdependencies of technologies and platforms that are used to optimise business agility, manage costs and improve the user experience in today’s increasingly mobile environment, or to extend the reach, flexibility and security of digital commerce and relationship management. These interdependent technologies require an organisation-wide approach to identity management that connects multiple platforms, systems and devices for multi-factor authentication. This approach increases security, reduces vulnerabilities and simplifies compliance. To achieve this vision, unified identity cloud-based physical and IT access management solutions can create a far more seamless experience for users while simplifying procurement, deployment and maintenance. These solutions tie everything together and automate other manual workflows to provide an end-to-end physical identity and access management solution that integrates with access control systems, logical identity and other applications so organisations can manage all types of physical identities and their details. Encompassing identity management lifecycle This approach incorporates trusted credential and other advanced security technologies and encompasses the entire identity management lifecycle. The result: organisations achieve a single, comprehensive security view and more coordinated way to protect privacy, while also lowering total cost of ownership, extending strong authentication from the desktop to the door and supporting a multitude of advanced use cases. This unified approach is especially effective for government agencies and other regulated industries such as banking, healthcare, and transportation. It improves the organisation’s overall security posture while consolidating physical and IT security into a single solution. The user experience is improved by having a single credential for opening doors and accessing IT systems, networks and data and the organisation can more easily comply with federal security requirements while extending public key infrastructure (PKI) strong authentication throughout their operations. Unified identity cloud-based physical and IT access management solutions can create a far more seamless experience for users This unified approach also enables using strong cryptographic credentials in a range of additional applications, including digitally signing emails or documents, decrypting emails or files, full disk encryption and boot protection to secure laptops, among others. This approach also makes it easier to monitor and manage users’ access rights as their roles change within an organisation, ensuring they only have access to what they need in a current role. Incorporation of biometrics In banking, unified platforms provide a holistic, mobile-relevant, multi-channel solution for managing customer identities across all channels, improving the user experience without increasing cost or complexity. The incorporation of biometrics further improves the user experience with higher levels of trust and makes it easier to combat fraud while complying with “know your customer” and other regulatory mandates. Unified platforms for healthcare enable administrators to consolidate identity and access management across the continuum from hospital to home, simplifying operations ranging from opening hospital doors and accessing healthcare records to e-prescribing while simplifying compliance and improving how healthcare professionals interact with patients and log their activities. Institutions can leverage e-prescribing architectures for other valuable capabilities such as authenticating to VPNs and enabling remote access using credentials, key fobs, mobile smartphones and other smart devices and one-time password (OTP) tokens. Path to converged solutions The move to unified platforms offers new ways to establish, create, manage and use trusted identities and combine on-premises systems and the cloud to simplify identity and access management using common, flexible and adaptable platforms. Organisations that adopt these platforms can more easily secure access to everything from the facility’s doors to its computers, data, applications, and cloud-based services and can also tie their smart buildings to the IoT. As they deploy these unified platforms, they will be embarking on a path to truly converged solutions that will ultimately consist of a single security policy, one credential and one audit log, delivered through a fully interoperable, multi-layered security infrastructure. Between now and then, they will be able to preserve their investments while continuing to grow, evolve and continually improve their security capabilities in the face of ever-changing threats.
As the whirlwind of 2016 quickly winds down, it is a good opportunity to look back at the significant trends from this year. As predicted, the industry experienced accelerated data growth, the continued convergence of security and IT, and the ever-expanding impact of the Internet of Things (IoT).Overall, 2016 was a good year. IT investments were strong and organisations rapidly adopted new data centre advancements such as hyper converged infrastructure (HCI) to help manage the huge influx of critical data without incurring new major costs.What was most unexpected about the last year was the significant impact of cybersecurity on the IoT. The security of connected devices has been a continued concern, but many were taken by surprise at the extent of the outlying vulnerabilities and how easily hackers can take over the control of devices and gain access to stored data. Luckily, minimal permanent damage was done, but edge device manufacturers and integrators must take significant precautions to prevent this type of event from reoccurring.Cyber and physical security Looking toward 2017, one can expect to see increased scrutiny over very low-cost, private-label or white-box products that may not meet modern data security requirements. Organisations will continue to align internal security departments and processes with IT to address evolving cyber and physical security threats. New technologies, such as deep learning and GPU acceleration, will enable the rise of more reliable, accurate analytics and broader market adoption of these types of technologies. Additionally, one also expects to see the emergence of cloud and hybrid-cloud platforms as viable enterprise video storage alternatives.On the business-front, 2016 was a phenomenal year for Pivot3. They continued to experience record growth and momentum, and most recently increased revenue growth by 105 percent over the same period in Q3 2015, with 67 percent of revenue coming from new customers. They focused on expanding their customer base, and added seasoned executives to help lead the organisation and fuel major growth efforts in 2017. Overall, it is exciting to see the enthusiasm for Pivot3 HCI solutions across multiple use cases and markets, and they’re well primed for further success in 2017. See the full coverage of 2016/2017 Review and Forecast articles here
On his 2018 two-day visit to Ireland for the World Meeting of Families, Pope Francis’s scheduled activity was protected by high-performance Predator and Invictus cameras from UK CCTV design and manufacturing company, 360 Vision Technology. Specialists in a wide range of leading-edge CCTV, Access Control, PA, AV and radio communications, County Kildare-based Mongey Communications was chosen to provide the additional security surveillance protection measures necessary to secure the Pope’s visit to Dublin. With the massive crowds expected to see the pontiff, the temporary surveillance installation needed to be minimally disruptive and use mobile radio to provide the multi-scene coverage required during the two-day visit. Multi-site CCTV surveillance The camera images were to be used for co-ordination and management by multiple agencies To support an existing small-scale CCTV installation at the Pope’s final venue of Phoenix Park (the largest enclosed city park in Europe), there was a need for further camera coverage along the park’s approach routes, entrance/exit gates, search areas and general areas of crowd movement and congregation. A similar solution was also required for the Pope’s visit to the Knock Shrine pilgrimage site and the Capuchin Day Centre, where public space CCTV was again already in place but of limited overall coverage. Full integration with the existing CCTV system at the 82,300 capacity Croke Park stadium for a papal address to the Festival of Families extravaganza was also required, with communications and CCTV feeds from all locations required to be transmitted back to local on-site control rooms at each location, and additionally to a central Command and Control room at Dublin Castle. At the main Command and Control Centre, the camera images were to be used for co-ordination and management by multiple agencies, including the Office of Public works (OPW), Garda Síochána, Defence Forces Ireland, Dublin Fire Brigade, HSE / Ambulance Services and Civil Defence. High-definition video security to secure Phoenix Park “With 300,000 people expected to attend a papal mass at Phoenix Park to close the World Meeting of Families, we were briefed to provide the very best possible reliability and imaging performance from the additional cameras we employed,” explains Kevin McGrath of Mongey Communications. We needed to be confident of camera reliability straight out of the box, along with simple and fast set-up" He further added, “With this in mind, we needed to be confident of camera reliability straight out of the box, along with simple and fast set-up, and quality high-definition video for forward transmission to the various control rooms. Our very positive experience of employing 360 Vision Technology cameras on many high-security installations in the past led us to be confident about the image and build quality of the manufacturer’s cameras, and product support.” “So, to fulfil the challenges we faced for this high-profile project, we specified the latest version of 360 Vision’s Predator camera, and also their new cost-effective and ruggedised Invictus Hybrid HD PTZ camera.” 360 Vision Invictus Hybrid HD PTZ camera The new 360 Vision Invictus cameras specified for the project employ the latest compact camera modules with a choice of 20:1 or 30:1 zoom and are available with 1/2.8” Sony StarVis or 1/1.9” Sony Exmor (Ultra) sensor packages. Bridging the divide between analogue and IP technology, all Invictus cameras are equipped with Hybrid functionality enabling installation in existing analogue systems and also in full 1080P HD IP video streaming networks. Alongside ONVIF 2.4 Profile S compatibility, this means the Invictus range is not only economical, but simple to install, providing Mongey Communications engineers with a reliable, flexible and high- performance solution with which to enhance the existing electronic surveillance measures for the Pope’s 2018 visit. HD IP video streaming networks An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view Further enhancing camera reliability for this important event, the new Invictus camera range design draws cost-effectively on features usually associated with very high-end cameras, including construction from high grade, hardened aluminium and stainless steel, to ensure a rugged, durable and compact camera. An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view, plus the ability to tilt above the horizon – enabling operators to view targets above camera installation height (i.e. up hills) – an invaluable asset where cameras were being installed in the difficult installation and operational conditions of Phoenix Park. Technical relationship with 360 Vision Technology “Our decision to once again entrust the provision of the best technology available for the project to 360 Vision Technology was proven correct, and we had no issues of consequence with the installation, commissioning and performance of all the cameras - straight out of the box,” explains Kevin. “Because of the condensed set-up period available and challenging terrain of some of the installation areas, we had to act fast to ensure the successful inclusion and full control of the cameras for the multi-agency command and control room,” adds Kevin. “Here our technical relationship with 360 Vision Technology really paid dividends throughout this time-critical project, affording easy integration of all the additional cameras into the control room’s Cathexis VMS. Cathexis VMS Images from the cameras were relayed back to the various event control centres In all, over 60 additional 360 Vision Technology cameras were employed over the various sites throughout the Pope’s visit. With extensive digging and cabling not a practical option, images from the cameras were relayed back to the various event control centres via a network of reliable and secure microwave transmission links, powered by temporary generators and back-up batteries. “The new Invictus cameras were perfect for the role thanks to their low power consumption compared to other similar specification PTZ cameras,” explains Kevin. “Low power consumption really helps when adding multiple cameras to a network with a temporary power system - and meant we could add more cameras for the benefit of maximum scene coverage.” High-speed fibre-optic connectivity High-speed fibre-optic connectivity between the various remote sites and Dublin Castle was installed, together with video walls at the various control rooms. “The Pope’s visit was a great success with no security issues reported,” says Kevin. “Images relayed to the control room from the additional 360 Vision Technology cameras were vital in the smooth running of the visit and allowed all of the state agencies involved to keep a constant update on the movements of the vast crowds drawn over the pontiff’s two-day visit.” “Our long-term technical partnership with 360 Vision Technology and our direct input in to the development of their new products really pays off with high-profile projects like this,” concludes Kevin. “We have many new and exciting installation challenges on the horizon and I’m confident that 360 Vision Technology camera products will continue to be an integral part of those future projects.”
Pulse Secure, a provider of Secure Access solutions to both enterprises and service providers, has announced that Entegrus has successfully deployed Pulse Policy Secure advanced network access control (NAC), to strengthen overall visibility and access security across their hybrid IT infrastructure. Entegrus, a Canadian energy company, leveraged their existing Pulse Secure virtual private network (VPN) implementation to expedite NAC deployment and fortify their infrastructure in accordance with National Institute of Standards and Technology (NIST) and North American Electric Reliability Corporation (NERC) guidelines. As a result, their security organisation extended visibility for remote and on-premise users and devices, as well as enhanced endpoint compliance and Internet of Things (IoT) risk mitigation. We have increased our security posture, and for the most part, there has been zero impact on our end users" Pulse Secure-Entegrus collaboration Entegrus serves over 58,000 customers throughout Ontario. They bring electricity, renewable energy and water across three large regions, with a workforce spread out over 2,300 square miles. Entegrus’ objective is to provide safe, reliable and cost-effective provision of energy and related billing services, while providing high levels of service to its customers, partners and the communities it serves. IT security plays a critical role in protecting their delivery of energy and data services. “The threat landscape is constantly evolving, forcing us to always consider how we can go one step further. With a widely distributed IT infrastructure, we considered NAC as an effective way to improve our security posture without dramatically altering how we operate,” said Dave Cullen, manager of information systems for Entegrus. “We have a long-standing relationship with Pulse Secure. The level of integration between Pulse Secure secure sockets layer (SSL) and NAC, as well as the extended feature set, made it a straightforward choice for us. Perhaps, the two most important things are that we have increased our security posture, and for the most part, there has been zero impact on our end users.” Active control with seamless network access Ensuring always active control while maintaining flexible, seamless access to network and application resources is an essential requirement for utility providers. Within such highly regulated industries, best practices dictate a constant cycle of security readiness review and improvement to meet an increasingly potent threat posed by cyber threat actors. NAC provides foundational endpoint intelligence, resource access enforcement and IoT defences that support industry and regulatory compliance guidelines. These compliance requisites apply to both regional and large national critical infrastructure providers. For stretched IT departments, Pulse Secure’s Secure Access solutions are designed to streamline deployment and on-going administration using an easy, integrated, policy-driven platform that works with a customer’s existing installed base and network infrastructure. In addition, Pulse Secure’s VPN solution utilises the same endpoint client, policy engine and appliance management as the NAC solution. Entegrus took advantage of this platform capability to rapidly implement NAC. As a result, they gained dynamic intelligence, unified policy management, automated enforcement and threat response through a single management console. We needed to make sure our secure access technologies could adapt to new regulatory requirements and new business needs" Secure access solutions Cullen highlights numerous benefits, including a simplified method of managing complex policies and user access rights, as well as an enforceable method of checking end-point devices to ensure that only properly patched operating systems can connect to the network. Another advantage of Pulse Policy Secure was evident after Entegrus recently merged with London, Ontario-based St. Thomas Energy. “We needed to make sure our secure access technologies could adapt to new regulatory requirements and new business needs, as the recent merger added new, unqualified infrastructure and grew our customer base by around a third, which also led to the hiring of 28 new staff members,” Cullen added.
A security camera provided by Hikvision USA Inc., the North American supplier of innovative, award-winning video surveillance products and solutions, was installed by Holmes Security to help Spinner’s Pizza in Fayetteville, NC to improve efficiency. Established in 1999, Spinner’s Pizza is a popular restaurant with a dedicated following and a very busy lunch crowd. Owner Spero Poulos thought of using a “Pizza Cam” to streamline operations during their busiest times. “Holmes Security had installed Hikvision cameras for security in and around the restaurant. We decided, why not use it for the service efficiency and accuracy?” said Poulos. Innovative camera-kitchen monitor system The restaurant owner needed to improve efficiency. The combination of a camera with a kitchen monitor “keeps the staff from running to the buffet just to check what needs to be cooked." Poulos noted that when staff members leave the kitchen they’re “invariably stopped by customers and friends that want to chat. That can slow down the replenishment process." Spinner’s analog and IP hybrid system includes mini domes, bullets and turret cameras. Holmes Security recommended and installed the Hikvision DS-2CE56D5T 1080p Turbo HD-TVI Turret camera for the buffet to deliver HD quality over the existing coax cabling. The turret camera is positioned to capture the entire line of pizzas on the buffet. “We’re able to keep the buffet full at all times. When someone is on a tight lunch break, the last thing you want them to do is wait for their food. With the Hikvision camera in place, they no longer have to wait,” said Poulos. The Pizza Cam enables the operation to be run from the kitchen monitor with no downtime. Monitoring the Hikvision Turbo HD-TVI Turret camera from the kitchen improved efficiency since staff can check the status easily and quickly Ruggedised camera for heat tolerance “Heat tolerance was a big consideration based on the camera’s position in relation to the buffet itself. The specs showed that the Hikvision camera’s operating temperature range was 22 below to 140 degrees Fahrenheit, so we knew it could withstand the heat,” Dave Foster, sales and marketing manager for Holmes Security, told Hikvision. Holmes Security is a 109-year old, family-owned company based in Fayetteville, NC. They use Hikvision cameras because “we have found over time that Hikvision provides higher quality, is easier to install, program and maintain. Tech support is great, and the software is consistent as well. Plus, we have great reps and a great rapport with Hikvision personnel,” said Foster. Holmes Security positioned the camera to the upper right of the buffet to capture the entire line of pizzas. Spinner’s kitchen staff can now see the entire buffet from a monitor in the kitchen, allowing the chefs to stay ahead of customer demand. Poulos adds that he gets “comments all the time about what a great idea it is. The customers especially like the fact that they don’t have to wait for new pizzas to be placed on the buffet.” Greater efficiency and improved operations Spinner’s Pizza is delivering a better experience to its customers by keeping its buffet stocked with fresh pizza. Monitoring the Hikvision Turbo HD-TVI Turret camera from the kitchen improved efficiency since staff do not have to run out to the food line to check the status. The system allows servers to concentrate on serving. The Hikvision Pizza Cam delivers ease of operations for the restaurant staff, owner, and patrons. “Our strength in the field is the partnership among Hikvision, our integrators and their customers, collaborating together to find innovative ways to solve real-world problems,” said Alex Asnovich, director of marketing for Hikvision. “Spinner’s Pizza is a great example of applying our technology to achieve business results in a retail restaurant environment.”
Fifth Third Bancorp, one of the top 15 banks in the U.S., is well on its way toward completing a major upgrade of its March Networks video surveillance system. A customer since 2004, Fifth Third has deployed 12,000 March Networks cameras and approximately 1,400 March Networks 8000 Series Hybrid NVRs over a period of 36 months. Identification and apprehension of suspects “By the end of 2016, we’ll have a total of 1,600 new 8000 Series recorders,” said Mike Neugebauer, Fifth Third’s Vice-President and Director of Corporate Security, who oversees security for 1,300 full-service retail branches, as well as data centres, corporate offices and cash handling facilities across 12 states. The combination of March Networks MegaPX WDR MiniDome Z IP cameras, Analog WDR Indoor Domes and the 8000 Series Hybrid NVRs with advanced video compression allows Fifth Third to provide law enforcement authorities with high-quality video for the identification and apprehension of suspects. Video verification improves urgency “Bank robberies and break-ins appear to be trending higher nationally,” said Neugebauer. “Much of it is a consequence of the heroin epidemic. Typically, they’ll go through a window in the middle of the night to see what there is to steal.Security staff in our 24-hour monitoring centre can verify an alarm and tell responding law enforcement officers what we see" “We constantly get compliments from law enforcement about the quality of our video. Even if the bad guys show up with hoodies or masks, we can zoom in on clothing patterns and brand logos, partial facial features, tattoos or other distinguishing marks.” “Security staff in our 24-hour monitoring centre can verify an alarm and tell responding law enforcement officers what we see,” said Neugebauer. “Video verification is huge. It changes law enforcement’s urgency to respond.” Crystal-clear images In minutes, Fifth Third security staff can email crystal clear images of a suspect to police, dramatically improving the chances of apprehension. The March Networks MegaPX WDR MiniDome Z IP camera’s wide dynamic range and progressive scan in high resolution delivers excellent image quality even in bright backlit situations, while its H.264 compression technology reduces bandwidth and storage costs. The MiniDome Z also features Power-over-Ethernet and is ONVIF-compliant, allowing it to be used with a variety of third-party video surveillance systems. Linking video with teller and ATM transaction data allows fraud investigators to quickly establish the identity of an individual associated with a transaction The Analog WDR Indoor Dome also features wide dynamic range, progressive scan in high resolution and low light sensitivity, making it ideal for capturing quality images in a variety of lighting conditions. Mix of analogue and IP The 8000 Series Hybrid recorder is a perfect fit for Fifth Third, accommodating a mix of analogue and IP cameras and offering up to 16 TB of onboard storage across four hard drive slots. “Typically, we’ll have two IP MiniDomes and 14 analogue cameras per branch, but we’re starting to use more exterior-mounted IP cameras in our elevated risk branches, so storage is important to us,” said Neugebauer. “The other thing we like about the 8000 Series is how it gives us sharper images from our analogue cameras.” The availability of the 8000 Series Hybrid NVR in 4, 8, 16 and 32-channel configurations is also a plus because it allows Fifth Third to acquire a fit-for-purpose unit for every application. Compatibility issues The decision to standardise on March Networks cameras frees Fifth Third from having to worry about any compatibility issues. “When we weren’t buying March Networks cameras, it made management of the cameras a lot harder for us,” said Neugebauer. “That was especially the case for IP megapixel cameras and managing the software patches that have to go on them. The fact that our March Networks cameras work in concert with our NVRs means we don’t have to do any software loads like we had to do when we were buying another camera brand. We were managing many pieces of software instead of just one platform.” Transitioning to Command Enterprise and Searchlight Next on the agenda for Fifth Third is a transition to March Networks Command Enterprise video management software and the acquisition of March Networks’ Searchlight for Banking software. Fifth Third security staff can email crystal clear images of a suspect to police, dramatically improving the chances of apprehension Command Enterprise features a user-friendly, browser-based interface that provides support for up to 10,000 recorders and 128,000 video channels, while Searchlight for Banking is a suite of tools to speed fraud investigations and capture business intelligence such as tracking customer behaviour. Linking video with teller and ATM transaction data, for example, allows fraud investigators to quickly establish the identity of an individual associated with a transaction. Searchlight advantages “On the retail side, we also hope to take advantage of Searchlight to help us make better business decisions,” said Neugebauer. Using Searchlight’s queue length monitoring analytics, Fifth Third will be able to gather and compare metrics on branch traffic and speed of service. It can also be used to track self-serve kiosk usage and gather data on how long customers linger in front of marketing displays. Concurrent with the introduction of Searchlight, Fifth Third is also planning to acquire March Networks’ new MegaPX Indoor Analytics Dome camera with built-in intelligence. “We’ve just done some testing and we’re very pleased with it,” said Neugebauer. While security remains the primary application for video surveillance at Fifth Third, other “lines of business” are taking advantage of it. Weather damage and alarms “In the past, security directors were always hesitant to share their video surveillance system, but we share our system with our facilities and retail groups”, said Neugebauer. “They use it to see if the sidewalk has been shovelled or if the parking lot has been plowed in our northern branches. In Florida, where we’ve had some severe storms, they use it to see if the windows have been blown out or if we have water damage. “Our facilities group has really embraced it. We’ll put cameras in mechanical rooms, for example, so they can see the indicator light configurations on the control panels. It often saves them from making a trip to the site. If a technician gets an alarm from an HVAC system or a generator, for example, he can diagnose the problem remotely and take the necessary steps to resolve it.When we weren’t buying March Networks cameras, it made management of the cameras a lot harder for us" “Retail uses the system to look at compliance with opening and closing procedures. Or, they may have a teller who’s great at selling and go in to look at best practices for training purposes.Sharing their March Networks video surveillance system with other departments “makes funding easier for us,” said Neugebauer. Longer lifecycle However, underlying Fifth Third’s choice of a video surveillance supplier is March Networks’ track record for product durability. Fifth Third began retiring the 4000 C Series recorders it acquired in 2004 two years ago and will only complete the transition to new 8000 Series units in 2016. “Some of my peers in the industry are buying new recorders every three years,” said Neugebauer. “Everything has a lifecycle and we feel the lifecycle for March Networks products is significantly longer than most of the other systems out there.”
Intrusion can be very invasive, damaging and expensive for any industrial or commercial business. The damage of machinery or the theft of goods can be potentially devastating. Not only that, but each commercial and industrial property can vary dramatically in terms of the level of security required, along with the conditions of the installation. Aisles, machinery and varying environmental conditions are all considerations, as is the required function of the security system and the ability to monitor it safely and remotely. Pyronix hybrid solution So, which security system can deliver the right solution? Look no further than the PCX46 APP. This is the professional high-security hybrid solution that delivers maximum security, convenience, flexibility and potential. Tailor the security system to meet the individual needs of the property, with the full range of Pyronix devices. Whether wired for Grade 3 requirements (large casing PCX46 APP) or utilising the multi-award-winning two-way wireless technology for any Grade 2 requirements, you can deliver the ideal system for the property and provide the user with full assurance that they are paying for the best possible security solution. Protecting external areas So, for any environments such as show rooms, factories, garages, banks, entrances or exits, there is the Pyronix range of KX detectors, which utilise Dual Technology (DT) which offer resolute detection in areas with changing conditions. If there are any drafts or fluctuating temperatures, there is the perfect KX. There is also the XD range of external detectors that utilise Tri-Technology (TT), as well as Anti-Masking and Anti-Blocking options. These can offer any external areas the protection they need, as well as be utilised to set off lights. Whether the installation requires sensors, detectors, sirens and much more, this is all possible and easily accomplished with the PCX46 APP. PyronixCloud and HomeControl+ App Utilise this security system and you can also benefit from the PyronixCloud and HomeControl+ App infrastructure. The user gets remote control of their system from anywhere in the world, while you benefit from remote diagnostics and programming, as well as easy set up. The HomeControl+ App delivers unrivalled control over the property for the user, with the ability to: arm and disarm, control any automation outputs, check the status of every individual device on the system, see their event history and much much more, all in real-time. So, whether the user is at work, on holiday or in bed, they are always informed and always in control. This is particularly useful for any business owner or manager, where it may be advantageous to monitor the access to the building, as well as any automation outputs added to the system. With remote programming and diagnostics of the system using InSite UDL software via the PyronixCloud, there are fewer call-outs and therefore reduced costs. This makes the PCX46 APP a more profitable solution for businesses, as systems can be fully managed remotely and even when a call-out is necessary, the engineer will know what the issue is before getting to site. Furthermore, users can also generate recurring revenue streams by offering PyronixCloud management services.
The Melbourne Cricket Ground, known to fans as simply ‘The G’, is Australia’s largest and most iconic sporting venue. With a history dating back to 1853, upwards of 100,000 fans as well as thousands of catering and hospitality staff, hundreds of security officers, police, medical teams, and media crews, as well as sports teams and match officials, flood the site. After a site survey, it was found that the existing access control system not only needed to be replaced, but taking the new public threat levels into account, access control needed to be significantly expanded to protect equipment and infrastructure across the site. Access control-building management integration A key challenge for Frances was that MCG’s electronic security and building management systems were incompatible with each other In addition, a management solution was required that could weave the existing surveillance gear together with the new access control system, as well as other electronic security and building management solutions. Whatever solution was implemented, it also had to be scalable and completely future-proof. MCG facilities manager Andy Frances quickly realised the key to the MCG’s electronic security future would be an open architecture networked solution. A key challenge for Frances was that MCG’s electronic security and building management systems were incompatible with each other and the multiple layers of cabling infrastructure that sprawled across the site were a complete unknown. Frances also knew that he would need a powerful graphical user interface that incorporated mapping, which meant all the hardware employed across the site had to be built for a networked environment. Networked access control According to Frances, integrating the entire system in a networked environment was a crucial factor According to Frances, integrating the entire system in a networked environment was a crucial factor. Frances explains that in terms of what he wanted to achieve at The G, the main goals were to upgrade the access control system, including door controllers and door hardware, and to look at software management programs for controlling access control, CCTV and alarms. “Given the current state of technology, the first thing we had to look at was the security infrastructure,” Frances states. “I saw the key to the site was going to be a futureproof network infrastructure supporting video surveillance, access control and alarm monitoring, integrated by a powerful software management solution.” “That overall management solution was important because for our critical infrastructure areas, we wanted a system that would allow us to know if a door was forced open, and to have some auditing capability,” says Frances. VertX IP access control solution All parts of the new system have been selected on the basis of their ability to support open architecture. The network components include off-the-shelf hardware and firmware installed in IT rooms and supported by the IT department. This part of the system includes switchers and the recording solution. The access control side is the major part of the new installation at the MCG, with Genetec Security Center’s Synergis module supporting VertX IP access control solution, a powerful modular solution designed to carry access control solutions into an IP environment. According to Frances, as the decision solidified and VertX came to the fore, a catastrophic failure of the existing access control system took over the decision-making process. OPIN application programming interface What we liked about VertX was the fact that along with its excellent functionality, HID Global would provide the specifications of that product to any software manufacturer" “While we were calmly assessing the product, we had a failure of the access control system we couldn’t recover from,” Frances explains. “Fortunately, we had already talked to HID about the VertX IP access control solution”, says Frances. “What we liked about VertX was the fact that along with its excellent functionality, HID Global would provide the specifications of that product to any software manufacturer. This satisfied our IT team because it was non-proprietary.” The MCG’s need for open architecture and the proprietary nature of virtually all other access control systems meant HID Global’s VertX solution built on HID’s OPIN application programming interface was the perfect solution for this application. OPIN enables HID Global’s Edge access control devices to operate seamlessly with any management software and in almost any conceivable configuration. The perfect compatibility of VertX meant that it was the first component of the new access control solution selected, which is uncommon. The operational functionality of VertX was also an important part of the decision-making process. Non-proprietary management software “When looking at HID Global’s VertX, there are some key elements that are important. If the system goes offline, it has a cache and when the network is available, VertX downloads all interim events - that was an important thing for us,” Frances says. “While we wanted a fully networked system, we didn’t want to lose any data if the network was offline. We also wanted to retain functionality - we wanted to have the doors operate as they normally would under all circumstances.” Most importantly, VertX’s OPIN architecture allowed the use of non-proprietary management software – this was a major issue for MCG. VertX’s hybrid nature meant virtually the entire site’s existing RS-485 cable could be retained. This saved an enormous amount of money, given the challenges of re-cabling a site so large and heavily constructed. HID’s V1000 network controllerThis robust and highly intelligent Linux-based unit is really the hero of HID’s VertX solutionNo account of the MCG’s access control solution is complete without recognition of the power and capability of HID Global’s V1000 Network Controller. This robust and highly intelligent Linux-based unit is really the hero of HID’s VertX solution. With its RISC processing the V1000 pulls system smarts all the way down to remote network closets giving multiple benefits. The V1000 reduces the number of dedicated ports the access control system needs and buffers events when the network is down. And the V1000 can receive and action commands from third party control software and is also able to activate a digital dialer or GSM modem in the event of longer network failure. Genetec Security Center Frances has no doubt that he has made the right decision going with a fully networked solution at the MCG. “I think the networked model works very well and there’s no question this is the way most security managers on large sites should be heading,” Frances says. “Working with HID Global has been very good for most the same reasons – they understood where we were at and what we wanted. HID Global is able to come to the party very quickly with a system designed with this sort of solution in mind. I can pick up the phone and speak to them and get things resolved.” “The way things are now I can call up the integrator and discuss changes and improvements and talk about ways to keep things within budget. If there’s a location where a low-cost camera works well, and I can save money for other things, then I can buy that. If Bosch releases a new high-end camera for external environments, then I can buy a hundred of those. And it’s the same with access control readers, or if Genetec releases a new version of a module, I can upgrade to it and know I have the best possible system at any given moment,” Frances states. Integrators Australia installed the HID Global VertX access control solution at the Melbourne Cricket Ground. It is managed across the site’s network by Genetec’s Security Center software that includes a Synergis access control module and Omnicast video surveillance module.