Ping Identity, globally renowned provider of identity defined security solutions, has announced the release of PingCloud Private Tenant, a private cloud identity solution for the enterprise. Cloud identity, access management PingCloud Private Tenant provides cloud identity and access management (IAM) by combining highly-configurable capabilities within a dedicated environment. Enterprises can provide authentication for all users with a highly-configurable global authentication authority that...
The mission of the North American Electric Reliability Corporation (NERC) is to ensure the reliability of the North American bulk power system (BPS). While electric utility companies are responsible for administering the day-to-day operations of the electric grid, regulators such as NERC and the Federal Energy Regulatory Commission (FERC) are charged with the overall responsibility of ensuring reliability and security. NERC develops and enforces Reliability Standards, annually assesses seasonal...
Pulse Secure, global provider of software-defined Secure Access solutions to both enterprises and service providers, has announced that it has become a member of the MSPAlliance, the oldest managed services group and the only accrediting and standards based body created specifically for the managed services provider industry. Secure Access services Recognising the push towards utility computing and an expectation for workforce mobility, multi-cloud performance and Zero Trust defenses, organisa...
Intelligent solutions, such as those derived from artificial intelligence, help critical infrastructure organisations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command centre technologies, fusing critical data input from...
Verkada was founded by three computer scientists and security experts who studied together at Stanford University. They connected with a former founder of Meraki and created Verkada with a mission to “modernise the world of physical security”. The fast-growing company currently focuses on delivering an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. On the surface, the product is simple: cameras record video, connect to the internet, and...
Airbus’ new development, Dabat Hybrid Roaming, makes its grand entrance during the Critical Communications World 2019 in Kuala Lumpur. The new solution, a unique combination between Airbus’ Tactilon Dabat hybrid terminal and the Tactilon Agnet 800 Solution, will bring ease and simplicity to daily operations thanks to state-of-the-art seamless switchover technology. The new solution will extend and secure end users’ operations by maximising the benefits of hybrid network communi...
Cloud Security Alliance (CSA), globally renowned organisation dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, and AlgoSec, global provider of business-driven network and cloud security management solutions, has announced the results of a new study titled, ‘Cloud Security Complexity: Challenges in Managing Security in Native Cloud, Hybrid and Multi-Cloud Environments.’ Complexities of cloud securityThe survey of security professionals aims to analyse the state of security in current hybrid and multi-cloud security environments The survey of 700 IT and security professionals aims to analyse and better understand the state of adoption and security in current hybrid cloud and multi-cloud security environments, including public cloud, private cloud, or use of more than one public cloud platform. Key findings of the study include: Cloud creates configuration and visibility problems: When asked to rank on a scale of 1 to 4 the aspects of managing security in public clouds they found challenging, respondents cited proactively detecting misconfigurations and security risks as the biggest challenge (3.35), closely followed by a lack of visibility into the entire cloud estate (3.21). Audit preparation and compliance (3.16), holistic management of cloud and on-prem environments (3.1) and managing multiple clouds (3.09) rounded out the top five. Human error and configuration mistakes the biggest causes of outages: 11.4% of respondents reported a cloud security incident in the past year, and 42.5% had a network or application outage. The two leading causes were operational / human errors in management of devices (20%), device configuration changes (15%) and device faults (12%). Cloud compliance and legal concerns: Compliance and legal challenges were cited as major concerns when moving into the cloud (57% regulatory compliance; 44% legal concerns). Security is the major concern in cloud projects: 81% of cloud users said they encountered significant security concerns. Concerns over risks of data losses and leakage were also high with users when deploying in the cloud (cited by 62%), followed by regulatory compliance concerns (57%), and integration with the rest of the organisations’ IT environment (49%). Integrating multiple cloud services “As companies of all sizes are taking advantage of the value of the cloud with its improved agility and flexibility, they are also facing unique new security concerns, especially when integrating multiple cloud services and platforms into an already complex IT environment,” said John Yeoh, Global Vice President of Research, Cloud Security Alliance. “The study findings demonstrate how important it is for enterprises to have holistic cloud visibility and management across their increasingly complex hybrid network environments in order to maintain security, reduce the risk of outages and misconfigurations, and fulfil audit and compliance demands.” Multi-cloud and hybrid networks This survey makes clear that there is no one-size-fits-all cloud deployment model" “This survey makes clear that there is no one-size-fits-all cloud deployment model: organisations are choosing to adopt and use cloud resources in the way that suits their business needs. But this cloud flexibility also creates many security challenges for today's enterprise. Irrespective of how they choose to use cloud resources, end-to-end visibility across the networks is critical to meet security and compliance obligations,” said Jeffrey Starr, CMO of AlgoSec. “Robust network security management and automation become increasingly mission critical. We see organisations moving to automate security management across native cloud, multi-cloud, and hybrid network estates, driving agility while ensuring continuous security for next-generation enterprise environments.” Commissioned by AlgoSec and conducted by the CSA, the survey also looked to uncover insights on topics such as workloads being used in or moved to the cloud and how they are being deployed/migrated; types of cloud platform(s) being used by companies; common security challenges faced by companies when deploying workloads in the cloud; methods of managing risk and vulnerabilities in the cloud environment; and causes of network or application outages and the amount of time it took to remediate.
Aqua Security, global platform provider for securing container-based and cloud native applications, has announced that Aqua Cloud Native Security Platform (CSP) has attained VMware Partner Ready status for PKS. The validation of Aqua’s CSP validates that the solution has been tested and verified to interoperate with VMware Enterprise PKS, and can fully manage and secure workloads running on VMware Enterprise PKS. Cloud Native Security Platform We are pleased that Aqua Security has validated its Cloud Native Security Platform for VMware Enterprise PKS" “We are pleased that Aqua Security has validated its Cloud Native Security Platform for VMware Enterprise PKS. This signifies to customers that Aqua Security can be deployed with the knowledge and reassurance that Aqua fully supports the specified versions and configurations on VMware Enterprise PKS,” said Pat Lee, vice president, Emerging ISVs & Solutions, VMware. VMware Enterprise PKS enables organisations to easily deploy, run and manage Kubernetes for production with productivity and efficiency. Using Aqua’s Cloud Native Security Platform with VMware Enterprise PKS, businesses can secure their cloud native applications across the entire lifecycle at scale, getting granular visibility into security issues, and detecting and blocking attacks in real-time. Aqua’s support for PKS is an extension of the company’s existing product line, providing enterprises with multi-cloud and hybrid cloud environments with the same level of auditability, accountability and protection across the full spectrum of their cloud native infrastructure. VMware Enterprise PKS “We are excited to continue our collaboration with VMware and to be validated for VMware Enterprise PKS," noted Upesh Patel, vice president, Business Development, Aqua Security. “Enterprise adoption of Kubernetes is exploding, and with it the need for a scalable enterprise security platform. The combined strength of VMware Enterprise PKS and Aqua’s CSP delivers a secure, enterprise-ready solution to deploy cloud-native applications.” VMware Enterprise PKS Partner Application Program allows partners to test and validate their solutions that interoperate with VMware Enterprise PKS platforms. By completing the Partner Ready process and achieving the Partner Ready PKS logo, partners validate their products interoperability with VMware technologies, and agree to solely manage customer support requests for the combined solution. Aqua’s CSP can be found within the online VMware Solution Exchange (VSX) here. The VMware Solution Exchange is an online marketplace where VMware partners and developers can publish rich marketing content and downloadable software for our customers.
Milestone Systems, the open platform company in IP video management software (VMS), announces Tom Bjerre as its new Vice President for Research & Development. He will oversee planning, development, testing and release of Milestone Systems’ video management software, and supervise employees located in Copenhagen, Barcelona and Sofia. IoT and data management The investment encompasses development capacity in deep-driver device integration, advanced video rendering & IoT One of Tom Bjerre’s primary tasks will be to ensure the return on investment by Milestone Systems to increase its development capacity by 45%, that will reinforce the company’s ability to create unique innovations to meet market demand for smart solutions. The investment encompasses development capacity in deep-driver device integration, advanced video rendering, IoT and metadata sources, online services, advanced data management and the platform Software Development Kit (SDK). Tom Bjerre is well experienced from working in platform-based and market-disrupting companies, bringing the perfect mindset to Milestone Systems. Milestone Systems VMS “I believe that the power of platform economy and platform business model is a game-changer. Milestone Systems’ open platform enables partners to reach customers, with Milestone Systems as the orchestrator of the platform. This makes innovations available to buyers through enabling the industry to build intelligent solutions together and expand their reach. I’m excited to take this open platform approach to the next level,” says VP R&D Tom Bjerre, Milestone Systems. Culture and values are also of huge importance to Tom Bjerre. Milestone Systems’ culture is based on values such as growth, passion and empathy - people values that I believe are essential for a company’s success. And always people first: The most creative ideas come from diverse teams. Mixing people with different backgrounds and cultures brings different viewpoints into the discussion, and this is the fuel that sparks innovation.” Hybrid cloud solutions Tom Bjerre will be playing a significant role in executing on Milestone Systems’ cloud strategy “Tom Bjerre is a great match for Milestone Systems’ values and culture and has the required skills that the job requires in terms of agile management and ability to collaborate across teams and within the wider leadership group,” says Chief Technology Officer Bjørn Skou Eilertsen, Milestone Systems. He adds, "Moreover, Tom Bjerre is an experienced leader of large-scale and mission-critical IT development and operations. He has been responsible for Saxo Bank’s global IT Infrastructure, Application Infrastructure and Business Support and IT Services. In his most recent position as CIO at TV 2 Danmark A/S, he was responsible for Data, Integration & Services, IT Operations and TV Technology.” Tom Bjerre will be playing a significant role in executing on Milestone Systems’ cloud strategy, which will offer hybrid solutions combining on-premise and cloud solutions to fit customers’ needs and levels of market maturity. During his time as CIO at TV 2 Danmark A/S, Tom Bjerre and his team worked both with cloud and on-premise solutions. A migration of digital services, including an online video platform, required an entirely new architecture, including transforming the platform from a large, complex on-premise monolith to a more flexible architecture based on microservices.
Executives from Johnson Controls, Microsoft Corp. and the Middle East’s sustainability pioneer, Bee’ah, have announced an agreement to enhance Bee’ah’s new headquarters located in Sharjah, United Arab Emirates, with a sweeping array of artificial intelligence (AI) and smart building solutions powered by Microsoft. Digital Vault Johnson Controls will work with Microsoft to outfit the new building with intelligent edge systems Using its Digital Vault offering and extended capabilities built on Microsoft Azure, Johnson Controls will work with Microsoft to outfit the new building with intelligent edge systems, devices and software designed to optimise energy efficiency, make the best use of available space and help the building’s occupants be more productive through a virtual AI persona. Evoteq, Bee’ah’s digital venture, will serve as the technical project management partner for this unique project, deploying integrated solutions and enhanced digital capabilities for greater operational output. From digital workspaces to smart back-office integration, and from smart lobby-visitor management to smart security, employees and visitors at Bee’ah’s new headquarters will experience a diverse range of cutting-edge AI features through multiple touchpoints across various functions including HR, customer care, procurement, administration, and mechanical, electrical and plumbing systems. AI-enabled Smart Building solutions “Environmental sustainability and digital technologies are mutually inclusive factors in driving an economy of the future,” said HE Khaled Al Huraimel, Bee’ah’s Group CEO. “Our headquarters embodies our vision for this future and exemplifies the most sustainable solutions and advanced technologies, with no compromise on strategic partnerships, innovation or delivery. This will be the first building in the region, and one of the first in the world, to have full integration with AI to support new seamless experiences for optimisation of efficiencies, performance and functionality." "Our office of the future will manifest our commitment to the continual advancement of our valued staff body, and AI solutions will provide new avenues of employee development and operational convenience. We look forward to the gradual rollout of AI-powered smart building solutions at other Bee’ah offices and locations across the UAE.” Bee’ah is setting a benchmark in AI capabilities within the region and around the world through smart platforms As one of the Middle East’s first companies dedicated to the pursuit of improving quality of life, Bee’ah is setting a benchmark in AI capabilities within the region and around the world through smart platforms. Bee’ah’s progressive technology achievements have been made possible due to the continual support from the Sharjah government and the UAE’s leadership, which sets the foundations for developing sustainable smart cities. Green Energy Building Designed by the renowned Zaha Hadid Architects, Bee’ah’s futuristic new headquarters will be fully powered by renewable energy and optimised for the sustainable use of resources to have zero net energy consumption and achieve a LEED platinum certification — the highest recognition awarded to green buildings. Under the agreement, Johnson Controls will deploy a technical infrastructure for the building capable of monitoring its entire environment virtually with Microsoft Azure Digital Twins and IoT technologies. The solution will enable Bee’ah to analyse volumes of data to optimise building operations and drive efficiency. AI-powered personal concierge services As Bee’ah’s exclusive cloud provider, Microsoft will also optimise the experience of the building for people through technology and solutions powered by Microsoft Azure. Intelligent concierge capabilities will engage visitors and employees to help locate available meeting spaces, book appointments, give directions, hail rides and support day-to-day tasks. These AI-powered personal concierge services are believed to be the first in the Middle East designed specifically for building occupants. Digital Vault and our building apps will give Bee’ah the power to make faster, intelligent data-driven decisions" “Digital Vault and our building apps will give Bee’ah the power to make faster, intelligent data-driven decisions to run its headquarters more safely, efficiently and sustainably, and will increase productivity for the people working and visiting Bee’ah’s headquarters,” said Bill Jackson, vice president and president, Global Products, Building Technologies & Solutions, Johnson Controls. “In partnership with Microsoft, Johnson Controls is transforming traditional building systems with services that merge the physical and digital worlds. Through this project, we are showcasing how the cloud and AI can tap into data from physical spaces to drive better engagement with occupants and achieve new levels of efficiency and sustainability.” Azure Digital Twins and IoT Johnson Controls’ Digital Vault offering takes advantage of the capabilities of Azure Digital Twins, Azure IoT and Azure Container Registry to provide a complete virtual representation of data from connected devices and systems throughout the building. With this approach, Digital Vault translates the physical world inside the building into a digital representation of the building with rich data that can be visualised, analysed and acted upon to deliver proactive maintenance, optimise building systems and deliver intelligent support for the people inside. Bee’ah started with a vision to create one of the most sustainable and smartest buildings in the Middle East Bee’ah started with a vision to create one of the most sustainable and smartest buildings in the Middle East. After an exhaustive search, the firm selected Microsoft as its trusted digital advisor because of the company’s deep industry expertise and commitment to empowering smart cities around the world. Microsoft collaborated with Bee’ah to design the new digital experiences and to build an executable strategy using cloud and AI that would not only deliver smart building systems, but also lead to the creation of spaces and services designed to delight its occupants. Bee’ah selected Johnson Controls based on the company’s skills and offerings across smart building systems and the underlying software platforms, as well as its commitment to and close relationship with Microsoft. Microsoft-Johnson Controls-Bee’ah partnership “Together with Johnson Controls and Bee’ah, we are driving the digitisation of smarter, more sustainable buildings and spaces,” said Scott Guthrie, executive vice president, Cloud + AI Group, Microsoft. “Bee’ah’s iconic new headquarters will be among the first buildings globally to have end-to-end experiences designed and built on the Azure platform. Azure is the platform that can truly integrate across all the devices, systems and services required for such a large and diverse implementation. Microsoft has been able to reduce energy consumption by 20% on our own campus in Redmond by using machine learning on edge devices and in the cloud, and we can’t wait to see what Bee’ah is able to do by applying this approach to its ultramodern new headquarters in Sharjah.”
Quantum Corp. has announced the release of the new VS-Series, an efficient, flexible storage cloud platform that has been specially designed for surveillance and industrial IoT applications. The VS-Series is available in a broad range of server choices, suitable for deployments with fewer than ten cameras, up to the largest environments with thousands of cameras. Using the VS-Series security platform, security professionals can efficiently record and store video surveillance footage and run an entire security infrastructure on a single platform. Multiple systems integration Surveillance and security operations continue to get more complex, with more cameras, higher-resolution imagery, and increasing data retention requirements. As buildings become smarter, everything from access control systems to lighting and HVAC systems are now connected – part of the “Internet of Things.” There is an opportunity to simplify operations by consolidating and converging many applications onto a single platform. The Quantum CSP was designed specifically for video and other forms of high-resolution content Quantum’s VS-Series architecture is based on the Quantum Cloud Storage Platform (CSP), a new software-defined storage platform specifically designed for storing machine and sensor-generated data. Like storage technologies used in the cloud, the Quantum CSP is software-defined, can be deployed on bare metal, as a virtual machine, or as part of a hyperconverged infrastructure. Unlike other software-defined storage technologies, the Quantum CSP was designed specifically for video and other forms of high-resolution content – engineered for extremely low latency, maximising the streaming performance of large files to storage. Quantum VS-Series cloud storage platform The Quantum Cloud Storage Platform enables high-speed video recording with optimal camera density and can host and run certified VMS management applications, recording servers, and other building control servers on a single platform. The VS-Series product line is being offered in a variety of deployment options; including software-only, mini-tower, 1U, 2U, and 4U hyperconverged servers. Key VS-Series attributes include: Efficiency: Quantum’s VS-Series supports high camera density and software architecture that enables users to run their entire security infrastructure on a single hyperconverged platform. Flexibility: The VS-Series is a software-defined platform which offers the broadest range of deployment options. Many appliances can scale out for more cameras or scale up for increased retention. Easy to Deploy, Operate and Maintain: The VS-Series comes pre-installed with certified VMS applications, and can be installed and configured in minutes. It is backed by the world-class service and support of Quantum and our integrator partners Resilience: The VS-Series software offers a fault-tolerant design to minimise hardware and software issues, designed to virtually eliminate downtime Quantum products at ISC West 2019 The first products in the VS-Series to launch are the VST10x mini-tower appliances, and the VS2112 and VS2124 2U servers Quantum will highlight the new VS-Series at ISC West, booth #22137. The first products in the VS-Series to launch are the VST10x mini-tower appliances, and the VS2112 and VS2124 2U servers, available this quarter. Additional offerings will be available later this year. Josh Woodhouse, Principal Analyst, IHS Markit, said “There are huge increases in ubiquitous video surveillance data required to be processed, analysed and stored. The total market capacity shipped for enterprise storage systems in video surveillance is forecast to grow at a compound annual growth rate of 40 percent from 2017 to 2022. Storage demand is strongest in safe or smart cities installations, and in retail and transportation hubs around the globe, where end-users are looking to both protect against security threats and maximise the efficient use of collected data. Scalable, flexible data storage systems are important in achieving this goal.” High-resolution network cameras Jeremy Scott, Strategic Alliance Partner Manager, Americas, Milestone Systems said, “Security systems today include more high-resolution cameras to capture relevant situational information. Our partnership with Quantum lets us deliver scalable video surveillance solutions with the storage capacity and access suited to the increased data volumes these systems generate.” I’m pleased that we were able to bring this VS-Series to market so quickly" Keith Bishop, Strategic Growth Manager for Data Enabled Business, Johnson Controls stated, ” Buildings and cities have internet connected devices everywhere – cameras, badge readers, lighting, HVAC systems, and more – which creates a need to consolidate and manage this digital data in one place. Being able to converge surveillance recording, VMS systems, and other building control applications onto a single platform means our customers can simplify their infrastructure as we help them create smarter and safer buildings and cities.” Hyperconverged security infrastructure Jamie Lerner, President and CEO, Quantum, says “As we worked with partners to design a platform for surveillance, we knew that streaming performance and camera density would be critical, as well as hyperconvergence both for efficiency and to consolidate the security infrastructure. I’m pleased that we were able to bring this VS-Series to market so quickly – it demonstrates both the software-defined nature of the Quantum Cloud Storage Platform and how we can take our years of expertise working in movie and TV production and construct a platform with leading performance for the surveillance industry.”
Senstar, global provider of video management and perimeter intrusion detection solutions, is pleased to introduce two new products at ISC West - Senstar Symphony Access Control (AC) and the FiberPatrol FP400 zone-based intrusion detection system for fence applications. Symphony AC is an open software solution designed to support the industry’s most trusted brands of access control and intrusion hardware. Available as an extension to the Symphony Video Management Software (VMS), the module provides a full set of access control functions, including enrollment, scheduling, monitoring, and reporting. FiberPatrol FP400 intrusion detection system The FiberPatrol FP400 is one of the most affordable fiber optic perimeter intrusion sensors on the market. Each processor provides up to 4 zones of detection and supports insensitive lead-in enabling electronics to be installed up to 12 miles from the perimeter fence. It is ideal for small sites with concerns over EMI, lightning, or conductive elements on the perimeter. Symphony AC and FiberPatrol FP400 are examples of Senstar’s continued commitment to developing products" “Symphony AC and FiberPatrol FP400 are examples of Senstar’s continued commitment to developing products to meet the evolving security needs of our customers," said Kristen Cory, Vice President Sales, North America. "Both these products address very specific site requirements, allowing Senstar to offer more options to our customers and continue to build on our success as one of the industry’s most trusted and reliable security providers." Senstar Symphony VMS To learn more about Senstar Symphony AC and the FiberPatrol FP400, visit Senstar at ISC West Booth 17109. Also check out other award-winning products, including Senstar Symphony VMS, the Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system, FlexZone ranging fence-mounted intrusion detection system, and the Senstar Thin Client PC-alternative for video management. Senstar is also proud to be working with valued partners at ISC West. Senstar will be exhibiting on the Axis booth 14051 and is a sponsor at the Anixter booth 16039 at the event.
Last year, Genetec predicted that cybersecurity would be taken much more seriously as the Internet of Things (IoT) opened more doors for hacking and network take overs. We also predicted that that there would be an increase in the adoption of Software as a Service (SaaS), expanding choice and convenience from new ownership models via hybrid (on-premises and Cloud) and Cloud-only models. Cyber Accountability awareness 2017 was also a year of awareness about ‘Cyber Accountability’. Rising cyber-crime and the increasing threats saw organisations taking direct action to mitigate their risks. There was a greater demand for cybersecurity/cyber-incompetence malpractice insurance in the physical security space. The physical security industry is continuing to grow at a rate that most other industries would envy. However, the “race to the bottom” and the rise of ultra-low-cost surveillance sensor equipment is negatively affecting the industry as a whole on several levels: Not only are profit margins being eroded, but these ultra-low-cost devices are being fielded and subsidised by state-owned organisations which raises troubling questions around privacy, data sovereignty and cyber security. More focus on privacy protection In 2018, we will see a lot more focus on privacy protection and compliance. People want to feel safe, but not watched. This is where privacy protection and encryption technology play a role in ensuring that security professionals have enough information to be able to do their job while protecting the privacy of the public. In addition to privacy and data protection, there is a greater demand for organisations and institutions to not only make sense of an increasing array of data from sensors and connected devices, but to take meaningful and smart action on these data. Software that help organisations build and activate this type of operational resiliency and security intelligence will lead the way in 2018. Genetec celebrated its 20th anniversary and welcomed its 1,000th employee in 2017. We are still proudly privately owned and will continue to grow and march to our own drummer while delivering our usual brisk pace of software innovation.
Organisations are moving to align their physical and digital security initiatives, especially in today’s more connected world Organisations must address growing security threats using fewer resources in an increasingly challenging regulatory environment. They are looking to ensure data security while also protecting their facilities’ physical security. At the same time, their users are demanding more choices of smart cards, smartphones, wearables, and other mobile devices that can do much more than simply open doors in an increasingly connected world. Cobbling together disparate solutions creates vulnerability gaps and can be expensive and difficult to manage. For these and other reasons, many organisations are moving to align their physical and digital security initiatives, especially in today’s more connected world tied to the Internet of Things (IoT). They are adopting new ways of thinking about trust in smart environments and evolving how they use trusted identities across their operations. In the process, they are discovering better ways to establish, create, use and manage secure credentials using hybrid on-premises and cloud solutions both for access control and to tie people, assets and processes to the Internet of Trusted Things (IoTT). Simpler and more efficient approaches Cloud-based solutions such as Microsoft Azure are already widely used for IT access management and there is now growing interest in harnessing the cloud to manage trusted identities used for physical access management as well. Today’s solutions span the full identity lifecycle, from badge printing or mobile credential issuance all the way through to the management and application of access rights. These solutions tie everything together and automate other manual workflows to provide an end-to-end physical identity and access management solution These integrated solutions will be joined by new cloud models for delivering network-based, service-focused badge printing and encoding that eliminates the need for stand-alone card printers attached to dedicated PC workstations and delivers the security of end-to-end encryption. Such solutions will transform the operational management of ID badge printing, reduce costs, eliminate capex outlay, simplify system maintenance and improve security as compared to on-premises solutions. Reducing vulnerabilities and simplifying compliance In parallel with the move to the cloud, there is also a growing awareness of the interdependencies of technologies and platforms that are used to optimise business agility, manage costs and improve the user experience in today’s increasingly mobile environment, or to extend the reach, flexibility and security of digital commerce and relationship management. These interdependent technologies require an organisation-wide approach to identity management that connects multiple platforms, systems and devices for multi-factor authentication. This approach increases security, reduces vulnerabilities and simplifies compliance. To achieve this vision, unified identity cloud-based physical and IT access management solutions can create a far more seamless experience for users while simplifying procurement, deployment and maintenance. These solutions tie everything together and automate other manual workflows to provide an end-to-end physical identity and access management solution that integrates with access control systems, logical identity and other applications so organisations can manage all types of physical identities and their details. Encompassing identity management lifecycle This approach incorporates trusted credential and other advanced security technologies and encompasses the entire identity management lifecycle. The result: organisations achieve a single, comprehensive security view and more coordinated way to protect privacy, while also lowering total cost of ownership, extending strong authentication from the desktop to the door and supporting a multitude of advanced use cases. This unified approach is especially effective for government agencies and other regulated industries such as banking, healthcare, and transportation. It improves the organisation’s overall security posture while consolidating physical and IT security into a single solution. The user experience is improved by having a single credential for opening doors and accessing IT systems, networks and data and the organisation can more easily comply with federal security requirements while extending public key infrastructure (PKI) strong authentication throughout their operations. Unified identity cloud-based physical and IT access management solutions can create a far more seamless experience for users This unified approach also enables using strong cryptographic credentials in a range of additional applications, including digitally signing emails or documents, decrypting emails or files, full disk encryption and boot protection to secure laptops, among others. This approach also makes it easier to monitor and manage users’ access rights as their roles change within an organisation, ensuring they only have access to what they need in a current role. Incorporation of biometrics In banking, unified platforms provide a holistic, mobile-relevant, multi-channel solution for managing customer identities across all channels, improving the user experience without increasing cost or complexity. The incorporation of biometrics further improves the user experience with higher levels of trust and makes it easier to combat fraud while complying with “know your customer” and other regulatory mandates. Unified platforms for healthcare enable administrators to consolidate identity and access management across the continuum from hospital to home, simplifying operations ranging from opening hospital doors and accessing healthcare records to e-prescribing while simplifying compliance and improving how healthcare professionals interact with patients and log their activities. Institutions can leverage e-prescribing architectures for other valuable capabilities such as authenticating to VPNs and enabling remote access using credentials, key fobs, mobile smartphones and other smart devices and one-time password (OTP) tokens. Path to converged solutions The move to unified platforms offers new ways to establish, create, manage and use trusted identities and combine on-premises systems and the cloud to simplify identity and access management using common, flexible and adaptable platforms. Organisations that adopt these platforms can more easily secure access to everything from the facility’s doors to its computers, data, applications, and cloud-based services and can also tie their smart buildings to the IoT. As they deploy these unified platforms, they will be embarking on a path to truly converged solutions that will ultimately consist of a single security policy, one credential and one audit log, delivered through a fully interoperable, multi-layered security infrastructure. Between now and then, they will be able to preserve their investments while continuing to grow, evolve and continually improve their security capabilities in the face of ever-changing threats.
As the whirlwind of 2016 quickly winds down, it is a good opportunity to look back at the significant trends from this year. As predicted, the industry experienced accelerated data growth, the continued convergence of security and IT, and the ever-expanding impact of the Internet of Things (IoT).Overall, 2016 was a good year. IT investments were strong and organisations rapidly adopted new data centre advancements such as hyper converged infrastructure (HCI) to help manage the huge influx of critical data without incurring new major costs.What was most unexpected about the last year was the significant impact of cybersecurity on the IoT. The security of connected devices has been a continued concern, but many were taken by surprise at the extent of the outlying vulnerabilities and how easily hackers can take over the control of devices and gain access to stored data. Luckily, minimal permanent damage was done, but edge device manufacturers and integrators must take significant precautions to prevent this type of event from reoccurring.Cyber and physical security Looking toward 2017, one can expect to see increased scrutiny over very low-cost, private-label or white-box products that may not meet modern data security requirements. Organisations will continue to align internal security departments and processes with IT to address evolving cyber and physical security threats. New technologies, such as deep learning and GPU acceleration, will enable the rise of more reliable, accurate analytics and broader market adoption of these types of technologies. Additionally, one also expects to see the emergence of cloud and hybrid-cloud platforms as viable enterprise video storage alternatives.On the business-front, 2016 was a phenomenal year for Pivot3. They continued to experience record growth and momentum, and most recently increased revenue growth by 105 percent over the same period in Q3 2015, with 67 percent of revenue coming from new customers. They focused on expanding their customer base, and added seasoned executives to help lead the organisation and fuel major growth efforts in 2017. Overall, it is exciting to see the enthusiasm for Pivot3 HCI solutions across multiple use cases and markets, and they’re well primed for further success in 2017. See the full coverage of 2016/2017 Review and Forecast articles here
Security is always one of the top concerns for any stores, especially for multinational hypermarkets, and IP surveillance is becoming the norm in the retail sector. The multinational hypermarket in South America has adopted 70 Surveon NVR7816, which was designed as a recording server with an archiving function that offers cost advantages and easy maintenance. Besides, NVR7816 ensures high video image quality with high throughput capability, providing a safe environment for people and goods in their 66 stores. Price and performance are always the key elements to help SI win projects. Surveon NVR7800 Series was designed as a recording server with an archiving function that offers cost advantages compared to traditional system structures composed of recording server plus a separate storage device, making it the top choice for the multinational hypermarket. Better image quality The NVR7800 Series is 100% compatible with major 3rd party VMS, including Milestone and Genetec VMSEach hypermarket installs 80 to 100 cameras with improved image quality. The multinational hypermarket needed a reliable system which supports recording with hundred channels and is able to transmit high resolution images smoothly. The NVR7800 Series delivers a high level of recording throughput of nearly 2000 Mbps, supporting recording with more channels, allowing system to receive better video image quality by higher bitrates, and ensuring smooth transmission even with high frame rate. The multinational hypermarket bought 6,000 channels Genetec VMS license before deciding the supplier of server and storage, making the system most composed by brands. The multinational hypermarket needed a solution which is fully compatible with Genetec VMS. The NVR7800 Series is 100% compatible with major 3rd party VMS, including Milestone and Genetec VMS. Hybrid server-storage design The hybrid server-storage design of NVR7800 Series gives us a big hand with its high throughput and easy maintenance" With Genetec VMS, NVR7800 Series can serve up to 300CH 1.3MP cameras with continuous recording or 190CH 1.3MP cameras with motion detection recording. Based on Milestone test findings, NVR7800 Series supports up to 150 cameras, more than twice Milestone’s benchmark level in a non-stop recording scenario. The system is even capable of supporting more than four times the number of cameras estimated by benchmark under the testing scenario where motion detection is enabled, giving medium to large projects the best price-performance solution. "The hybrid server-storage design of NVR7800 Series gives us a big hand with its high throughput and easy maintenance. And it also gives us a better performance with affordable budget in every perspective. We are very satisfied with the result and look forward to working with Surveon in the future." said the administration manager of the multinational hypermarket.
On his 2018 two-day visit to Ireland for the World Meeting of Families, Pope Francis’s scheduled activity was protected by high-performance Predator and Invictus cameras from UK CCTV design and manufacturing company, 360 Vision Technology. Specialists in a wide range of leading-edge CCTV, Access Control, PA, AV and radio communications, County Kildare-based Mongey Communications was chosen to provide the additional security surveillance protection measures necessary to secure the Pope’s visit to Dublin. With the massive crowds expected to see the pontiff, the temporary surveillance installation needed to be minimally disruptive and use mobile radio to provide the multi-scene coverage required during the two-day visit. Multi-site CCTV surveillance The camera images were to be used for co-ordination and management by multiple agencies To support an existing small-scale CCTV installation at the Pope’s final venue of Phoenix Park (the largest enclosed city park in Europe), there was a need for further camera coverage along the park’s approach routes, entrance/exit gates, search areas and general areas of crowd movement and congregation. A similar solution was also required for the Pope’s visit to the Knock Shrine pilgrimage site and the Capuchin Day Centre, where public space CCTV was again already in place but of limited overall coverage. Full integration with the existing CCTV system at the 82,300 capacity Croke Park stadium for a papal address to the Festival of Families extravaganza was also required, with communications and CCTV feeds from all locations required to be transmitted back to local on-site control rooms at each location, and additionally to a central Command and Control room at Dublin Castle. At the main Command and Control Centre, the camera images were to be used for co-ordination and management by multiple agencies, including the Office of Public works (OPW), Garda Síochána, Defence Forces Ireland, Dublin Fire Brigade, HSE / Ambulance Services and Civil Defence. High-definition video security to secure Phoenix Park “With 300,000 people expected to attend a papal mass at Phoenix Park to close the World Meeting of Families, we were briefed to provide the very best possible reliability and imaging performance from the additional cameras we employed,” explains Kevin McGrath of Mongey Communications. We needed to be confident of camera reliability straight out of the box, along with simple and fast set-up" He further added, “With this in mind, we needed to be confident of camera reliability straight out of the box, along with simple and fast set-up, and quality high-definition video for forward transmission to the various control rooms. Our very positive experience of employing 360 Vision Technology cameras on many high-security installations in the past led us to be confident about the image and build quality of the manufacturer’s cameras, and product support.” “So, to fulfil the challenges we faced for this high-profile project, we specified the latest version of 360 Vision’s Predator camera, and also their new cost-effective and ruggedised Invictus Hybrid HD PTZ camera.” 360 Vision Invictus Hybrid HD PTZ camera The new 360 Vision Invictus cameras specified for the project employ the latest compact camera modules with a choice of 20:1 or 30:1 zoom and are available with 1/2.8” Sony StarVis or 1/1.9” Sony Exmor (Ultra) sensor packages. Bridging the divide between analogue and IP technology, all Invictus cameras are equipped with Hybrid functionality enabling installation in existing analogue systems and also in full 1080P HD IP video streaming networks. Alongside ONVIF 2.4 Profile S compatibility, this means the Invictus range is not only economical, but simple to install, providing Mongey Communications engineers with a reliable, flexible and high- performance solution with which to enhance the existing electronic surveillance measures for the Pope’s 2018 visit. HD IP video streaming networks An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view Further enhancing camera reliability for this important event, the new Invictus camera range design draws cost-effectively on features usually associated with very high-end cameras, including construction from high grade, hardened aluminium and stainless steel, to ensure a rugged, durable and compact camera. An upright camera mount design allows full 360-degree continuous pan and unobstructed field of view, plus the ability to tilt above the horizon – enabling operators to view targets above camera installation height (i.e. up hills) – an invaluable asset where cameras were being installed in the difficult installation and operational conditions of Phoenix Park. Technical relationship with 360 Vision Technology “Our decision to once again entrust the provision of the best technology available for the project to 360 Vision Technology was proven correct, and we had no issues of consequence with the installation, commissioning and performance of all the cameras - straight out of the box,” explains Kevin. “Because of the condensed set-up period available and challenging terrain of some of the installation areas, we had to act fast to ensure the successful inclusion and full control of the cameras for the multi-agency command and control room,” adds Kevin. “Here our technical relationship with 360 Vision Technology really paid dividends throughout this time-critical project, affording easy integration of all the additional cameras into the control room’s Cathexis VMS. Cathexis VMS Images from the cameras were relayed back to the various event control centres In all, over 60 additional 360 Vision Technology cameras were employed over the various sites throughout the Pope’s visit. With extensive digging and cabling not a practical option, images from the cameras were relayed back to the various event control centres via a network of reliable and secure microwave transmission links, powered by temporary generators and back-up batteries. “The new Invictus cameras were perfect for the role thanks to their low power consumption compared to other similar specification PTZ cameras,” explains Kevin. “Low power consumption really helps when adding multiple cameras to a network with a temporary power system - and meant we could add more cameras for the benefit of maximum scene coverage.” High-speed fibre-optic connectivity High-speed fibre-optic connectivity between the various remote sites and Dublin Castle was installed, together with video walls at the various control rooms. “The Pope’s visit was a great success with no security issues reported,” says Kevin. “Images relayed to the control room from the additional 360 Vision Technology cameras were vital in the smooth running of the visit and allowed all of the state agencies involved to keep a constant update on the movements of the vast crowds drawn over the pontiff’s two-day visit.” “Our long-term technical partnership with 360 Vision Technology and our direct input in to the development of their new products really pays off with high-profile projects like this,” concludes Kevin. “We have many new and exciting installation challenges on the horizon and I’m confident that 360 Vision Technology camera products will continue to be an integral part of those future projects.”
Pulse Secure, a provider of Secure Access solutions to both enterprises and service providers, has announced that Entegrus has successfully deployed Pulse Policy Secure advanced network access control (NAC), to strengthen overall visibility and access security across their hybrid IT infrastructure. Entegrus, a Canadian energy company, leveraged their existing Pulse Secure virtual private network (VPN) implementation to expedite NAC deployment and fortify their infrastructure in accordance with National Institute of Standards and Technology (NIST) and North American Electric Reliability Corporation (NERC) guidelines. As a result, their security organisation extended visibility for remote and on-premise users and devices, as well as enhanced endpoint compliance and Internet of Things (IoT) risk mitigation. We have increased our security posture, and for the most part, there has been zero impact on our end users" Pulse Secure-Entegrus collaboration Entegrus serves over 58,000 customers throughout Ontario. They bring electricity, renewable energy and water across three large regions, with a workforce spread out over 2,300 square miles. Entegrus’ objective is to provide safe, reliable and cost-effective provision of energy and related billing services, while providing high levels of service to its customers, partners and the communities it serves. IT security plays a critical role in protecting their delivery of energy and data services. “The threat landscape is constantly evolving, forcing us to always consider how we can go one step further. With a widely distributed IT infrastructure, we considered NAC as an effective way to improve our security posture without dramatically altering how we operate,” said Dave Cullen, manager of information systems for Entegrus. “We have a long-standing relationship with Pulse Secure. The level of integration between Pulse Secure secure sockets layer (SSL) and NAC, as well as the extended feature set, made it a straightforward choice for us. Perhaps, the two most important things are that we have increased our security posture, and for the most part, there has been zero impact on our end users.” Active control with seamless network access Ensuring always active control while maintaining flexible, seamless access to network and application resources is an essential requirement for utility providers. Within such highly regulated industries, best practices dictate a constant cycle of security readiness review and improvement to meet an increasingly potent threat posed by cyber threat actors. NAC provides foundational endpoint intelligence, resource access enforcement and IoT defences that support industry and regulatory compliance guidelines. These compliance requisites apply to both regional and large national critical infrastructure providers. For stretched IT departments, Pulse Secure’s Secure Access solutions are designed to streamline deployment and on-going administration using an easy, integrated, policy-driven platform that works with a customer’s existing installed base and network infrastructure. In addition, Pulse Secure’s VPN solution utilises the same endpoint client, policy engine and appliance management as the NAC solution. Entegrus took advantage of this platform capability to rapidly implement NAC. As a result, they gained dynamic intelligence, unified policy management, automated enforcement and threat response through a single management console. We needed to make sure our secure access technologies could adapt to new regulatory requirements and new business needs" Secure access solutions Cullen highlights numerous benefits, including a simplified method of managing complex policies and user access rights, as well as an enforceable method of checking end-point devices to ensure that only properly patched operating systems can connect to the network. Another advantage of Pulse Policy Secure was evident after Entegrus recently merged with London, Ontario-based St. Thomas Energy. “We needed to make sure our secure access technologies could adapt to new regulatory requirements and new business needs, as the recent merger added new, unqualified infrastructure and grew our customer base by around a third, which also led to the hiring of 28 new staff members,” Cullen added.
A security camera provided by Hikvision USA Inc., the North American supplier of innovative, award-winning video surveillance products and solutions, was installed by Holmes Security to help Spinner’s Pizza in Fayetteville, NC to improve efficiency. Established in 1999, Spinner’s Pizza is a popular restaurant with a dedicated following and a very busy lunch crowd. Owner Spero Poulos thought of using a “Pizza Cam” to streamline operations during their busiest times. “Holmes Security had installed Hikvision cameras for security in and around the restaurant. We decided, why not use it for the service efficiency and accuracy?” said Poulos. Innovative camera-kitchen monitor system The restaurant owner needed to improve efficiency. The combination of a camera with a kitchen monitor “keeps the staff from running to the buffet just to check what needs to be cooked." Poulos noted that when staff members leave the kitchen they’re “invariably stopped by customers and friends that want to chat. That can slow down the replenishment process." Spinner’s analog and IP hybrid system includes mini domes, bullets and turret cameras. Holmes Security recommended and installed the Hikvision DS-2CE56D5T 1080p Turbo HD-TVI Turret camera for the buffet to deliver HD quality over the existing coax cabling. The turret camera is positioned to capture the entire line of pizzas on the buffet. “We’re able to keep the buffet full at all times. When someone is on a tight lunch break, the last thing you want them to do is wait for their food. With the Hikvision camera in place, they no longer have to wait,” said Poulos. The Pizza Cam enables the operation to be run from the kitchen monitor with no downtime. Monitoring the Hikvision Turbo HD-TVI Turret camera from the kitchen improved efficiency since staff can check the status easily and quickly Ruggedised camera for heat tolerance “Heat tolerance was a big consideration based on the camera’s position in relation to the buffet itself. The specs showed that the Hikvision camera’s operating temperature range was 22 below to 140 degrees Fahrenheit, so we knew it could withstand the heat,” Dave Foster, sales and marketing manager for Holmes Security, told Hikvision. Holmes Security is a 109-year old, family-owned company based in Fayetteville, NC. They use Hikvision cameras because “we have found over time that Hikvision provides higher quality, is easier to install, program and maintain. Tech support is great, and the software is consistent as well. Plus, we have great reps and a great rapport with Hikvision personnel,” said Foster. Holmes Security positioned the camera to the upper right of the buffet to capture the entire line of pizzas. Spinner’s kitchen staff can now see the entire buffet from a monitor in the kitchen, allowing the chefs to stay ahead of customer demand. Poulos adds that he gets “comments all the time about what a great idea it is. The customers especially like the fact that they don’t have to wait for new pizzas to be placed on the buffet.” Greater efficiency and improved operations Spinner’s Pizza is delivering a better experience to its customers by keeping its buffet stocked with fresh pizza. Monitoring the Hikvision Turbo HD-TVI Turret camera from the kitchen improved efficiency since staff do not have to run out to the food line to check the status. The system allows servers to concentrate on serving. The Hikvision Pizza Cam delivers ease of operations for the restaurant staff, owner, and patrons. “Our strength in the field is the partnership among Hikvision, our integrators and their customers, collaborating together to find innovative ways to solve real-world problems,” said Alex Asnovich, director of marketing for Hikvision. “Spinner’s Pizza is a great example of applying our technology to achieve business results in a retail restaurant environment.”
Fifth Third Bancorp, one of the top 15 banks in the U.S., is well on its way toward completing a major upgrade of its March Networks video surveillance system. A customer since 2004, Fifth Third has deployed 12,000 March Networks cameras and approximately 1,400 March Networks 8000 Series Hybrid NVRs over a period of 36 months. Identification and apprehension of suspects “By the end of 2016, we’ll have a total of 1,600 new 8000 Series recorders,” said Mike Neugebauer, Fifth Third’s Vice-President and Director of Corporate Security, who oversees security for 1,300 full-service retail branches, as well as data centres, corporate offices and cash handling facilities across 12 states. The combination of March Networks MegaPX WDR MiniDome Z IP cameras, Analog WDR Indoor Domes and the 8000 Series Hybrid NVRs with advanced video compression allows Fifth Third to provide law enforcement authorities with high-quality video for the identification and apprehension of suspects. Video verification improves urgency “Bank robberies and break-ins appear to be trending higher nationally,” said Neugebauer. “Much of it is a consequence of the heroin epidemic. Typically, they’ll go through a window in the middle of the night to see what there is to steal.Security staff in our 24-hour monitoring centre can verify an alarm and tell responding law enforcement officers what we see" “We constantly get compliments from law enforcement about the quality of our video. Even if the bad guys show up with hoodies or masks, we can zoom in on clothing patterns and brand logos, partial facial features, tattoos or other distinguishing marks.” “Security staff in our 24-hour monitoring centre can verify an alarm and tell responding law enforcement officers what we see,” said Neugebauer. “Video verification is huge. It changes law enforcement’s urgency to respond.” Crystal-clear images In minutes, Fifth Third security staff can email crystal clear images of a suspect to police, dramatically improving the chances of apprehension. The March Networks MegaPX WDR MiniDome Z IP camera’s wide dynamic range and progressive scan in high resolution delivers excellent image quality even in bright backlit situations, while its H.264 compression technology reduces bandwidth and storage costs. The MiniDome Z also features Power-over-Ethernet and is ONVIF-compliant, allowing it to be used with a variety of third-party video surveillance systems. Linking video with teller and ATM transaction data allows fraud investigators to quickly establish the identity of an individual associated with a transaction The Analog WDR Indoor Dome also features wide dynamic range, progressive scan in high resolution and low light sensitivity, making it ideal for capturing quality images in a variety of lighting conditions. Mix of analogue and IP The 8000 Series Hybrid recorder is a perfect fit for Fifth Third, accommodating a mix of analogue and IP cameras and offering up to 16 TB of onboard storage across four hard drive slots. “Typically, we’ll have two IP MiniDomes and 14 analogue cameras per branch, but we’re starting to use more exterior-mounted IP cameras in our elevated risk branches, so storage is important to us,” said Neugebauer. “The other thing we like about the 8000 Series is how it gives us sharper images from our analogue cameras.” The availability of the 8000 Series Hybrid NVR in 4, 8, 16 and 32-channel configurations is also a plus because it allows Fifth Third to acquire a fit-for-purpose unit for every application. Compatibility issues The decision to standardise on March Networks cameras frees Fifth Third from having to worry about any compatibility issues. “When we weren’t buying March Networks cameras, it made management of the cameras a lot harder for us,” said Neugebauer. “That was especially the case for IP megapixel cameras and managing the software patches that have to go on them. The fact that our March Networks cameras work in concert with our NVRs means we don’t have to do any software loads like we had to do when we were buying another camera brand. We were managing many pieces of software instead of just one platform.” Transitioning to Command Enterprise and Searchlight Next on the agenda for Fifth Third is a transition to March Networks Command Enterprise video management software and the acquisition of March Networks’ Searchlight for Banking software. Fifth Third security staff can email crystal clear images of a suspect to police, dramatically improving the chances of apprehension Command Enterprise features a user-friendly, browser-based interface that provides support for up to 10,000 recorders and 128,000 video channels, while Searchlight for Banking is a suite of tools to speed fraud investigations and capture business intelligence such as tracking customer behaviour. Linking video with teller and ATM transaction data, for example, allows fraud investigators to quickly establish the identity of an individual associated with a transaction. Searchlight advantages “On the retail side, we also hope to take advantage of Searchlight to help us make better business decisions,” said Neugebauer. Using Searchlight’s queue length monitoring analytics, Fifth Third will be able to gather and compare metrics on branch traffic and speed of service. It can also be used to track self-serve kiosk usage and gather data on how long customers linger in front of marketing displays. Concurrent with the introduction of Searchlight, Fifth Third is also planning to acquire March Networks’ new MegaPX Indoor Analytics Dome camera with built-in intelligence. “We’ve just done some testing and we’re very pleased with it,” said Neugebauer. While security remains the primary application for video surveillance at Fifth Third, other “lines of business” are taking advantage of it. Weather damage and alarms “In the past, security directors were always hesitant to share their video surveillance system, but we share our system with our facilities and retail groups”, said Neugebauer. “They use it to see if the sidewalk has been shovelled or if the parking lot has been plowed in our northern branches. In Florida, where we’ve had some severe storms, they use it to see if the windows have been blown out or if we have water damage. “Our facilities group has really embraced it. We’ll put cameras in mechanical rooms, for example, so they can see the indicator light configurations on the control panels. It often saves them from making a trip to the site. If a technician gets an alarm from an HVAC system or a generator, for example, he can diagnose the problem remotely and take the necessary steps to resolve it.When we weren’t buying March Networks cameras, it made management of the cameras a lot harder for us" “Retail uses the system to look at compliance with opening and closing procedures. Or, they may have a teller who’s great at selling and go in to look at best practices for training purposes.Sharing their March Networks video surveillance system with other departments “makes funding easier for us,” said Neugebauer. Longer lifecycle However, underlying Fifth Third’s choice of a video surveillance supplier is March Networks’ track record for product durability. Fifth Third began retiring the 4000 C Series recorders it acquired in 2004 two years ago and will only complete the transition to new 8000 Series units in 2016. “Some of my peers in the industry are buying new recorders every three years,” said Neugebauer. “Everything has a lifecycle and we feel the lifecycle for March Networks products is significantly longer than most of the other systems out there.”
Intrusion can be very invasive, damaging and expensive for any industrial or commercial business. The damage of machinery or the theft of goods can be potentially devastating. Not only that, but each commercial and industrial property can vary dramatically in terms of the level of security required, along with the conditions of the installation. Aisles, machinery and varying environmental conditions are all considerations, as is the required function of the security system and the ability to monitor it safely and remotely. Pyronix hybrid solution So, which security system can deliver the right solution? Look no further than the PCX46 APP. This is the professional high-security hybrid solution that delivers maximum security, convenience, flexibility and potential. Tailor the security system to meet the individual needs of the property, with the full range of Pyronix devices. Whether wired for Grade 3 requirements (large casing PCX46 APP) or utilising the multi-award-winning two-way wireless technology for any Grade 2 requirements, you can deliver the ideal system for the property and provide the user with full assurance that they are paying for the best possible security solution. Protecting external areas So, for any environments such as show rooms, factories, garages, banks, entrances or exits, there is the Pyronix range of KX detectors, which utilise Dual Technology (DT) which offer resolute detection in areas with changing conditions. If there are any drafts or fluctuating temperatures, there is the perfect KX. There is also the XD range of external detectors that utilise Tri-Technology (TT), as well as Anti-Masking and Anti-Blocking options. These can offer any external areas the protection they need, as well as be utilised to set off lights. Whether the installation requires sensors, detectors, sirens and much more, this is all possible and easily accomplished with the PCX46 APP. PyronixCloud and HomeControl+ App Utilise this security system and you can also benefit from the PyronixCloud and HomeControl+ App infrastructure. The user gets remote control of their system from anywhere in the world, while you benefit from remote diagnostics and programming, as well as easy set up. The HomeControl+ App delivers unrivalled control over the property for the user, with the ability to: arm and disarm, control any automation outputs, check the status of every individual device on the system, see their event history and much much more, all in real-time. So, whether the user is at work, on holiday or in bed, they are always informed and always in control. This is particularly useful for any business owner or manager, where it may be advantageous to monitor the access to the building, as well as any automation outputs added to the system. With remote programming and diagnostics of the system using InSite UDL software via the PyronixCloud, there are fewer call-outs and therefore reduced costs. This makes the PCX46 APP a more profitable solution for businesses, as systems can be fully managed remotely and even when a call-out is necessary, the engineer will know what the issue is before getting to site. Furthermore, users can also generate recurring revenue streams by offering PyronixCloud management services.
Round table discussion
Will 2016 see faster adoption of video analytics? Will cyber-security have more impact on physical security? Is the market likely to see greater use of cloud-based products and services? Will technology help to drive greater involvement by everyday citizens in public safety initiatives? Could the market focus shift from selling products to selling solutions? We asked this week’s SourceSecurity.com Expert Panel to look ahead to 2016, and these were some of the surprises they see in our industry’s near future. Specifically, we asked this week’s panel: What will be the biggest surprise in 2016 for the security market?