ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, will host the second annual Cloud Access Summit on June 13, 2019 in Salt Lake City, UT. This exclusive event for dealers, integrators and security professionals offers a day packed with educational sessions focusing on the hottest industry trends and topics related to cloud access and its many complementary technologies, presented by executives and thought leaders representing a cross-sect...
With the rising number of active shooter events in the United States, Johnson Controls has released the new Detect360 Active Shooter Response (ASR) system. The system combines reliable gunshot detection with industry-leading notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the th...
Percepto, the provider of autonomous industrial drone solutions, launches the next generation of its AI-powered autonomous industrial Drone-in-a-Box (DIB). Available now, the solution includes a highly portable, smaller, lighter-weight and extreme weather resistant base station. Adding field-proven 5G compatibility, the new DIB also features seamless integration of 2D mapping and 3D modelling, highly customised reporting, comprehensive compliance and enhanced safety functions. The award-winning...
Synectics commences the roll-out of Synergy 3 2019, the latest release of its command and control platform for demanding surveillance and security environments. Introducing enhanced customisable mapping, camera management, and third-party integration capabilities, the feature-rich platform is the most customer-centric iteration of the software to date and aims to make the Synergy 3 experience more user-friendly. The new release will be available across Synectics’ key markets, spanning tra...
Iris ID, a global provider of iris recognition technology, announced its award-winning multimode iCAM M300 handheld biometric platform now offers gateless access control, time and attendance and employee mustering for both commercial and government markets. The new functions are possible with embedded XPressEntry software from Telaeris, a provider of real-time personnel tracking solutions. Also using Iris ID’s Iris Access EAC software, the iCAM M300 continues to provide an ideal portable...
Sargent and Greenleaf (S&G), a manufacturer of high-quality mechanical and electronic locks, announces its Digital Hood Defense for ATM security. Compatible with S&G’s Digital Platform products, this innovative device increases the overall security of ATM units by protecting the hood from jackpotting attacks - whereby malware has been attached to an ATM to rapidly access money - without compromising convenience for operators. Digital Hood Defense for ATM security The Digital Hood...
Over a fifteen-month period, Sonitrol has opened new franchises and expanded current markets in eight states including Illinois, Indiana, Kentucky, Ohio, Connecticut, Massachusetts, California and Florida. The expansion of current markets where Sonitrol has a footprint assists in the growth of the Sonitrol brand and secure more businesses with the best in verified electronic security, keeping our communities safe and keeping more criminals off the streets. “Sonitrol is excited to continue to expand our footprint and bring best-of-class service and verification technology to every market in North America,” says Julie Beach, VP of Sonitrol Corporate. “The need for alarm verification and false alarm reduction is growing in every community. We pride ourselves in providing police with the very best information to improve their safety and increase police response time to our clients.” In addition to this exciting growth, Sonitrol is celebrating its 55th anniversary this year Celebrating 55th anniversary In addition to this exciting growth, Sonitrol is celebrating its 55th anniversary this year. Bryan Bates, VP of Sales of Sonitrol of Northeast Florida and Sonitrol of Lexington says, “I have always been impressed with the entrepreneurs of the Sonitrol family. My mother and father worked for Sonitrol of Dallas before taking the chance on purchasing their own Sonitrol dealership in Lexington, KY in 1984. “With our recent opening of Sonitrol of NE Florida in 2018 and continuing to grow the Sonitrol of Lexington business, my brother, Jeremy Bates, and I can continue the legacy and provide the best security technology in the industry.” Tested and verified security services Expansion for us to Columbus, Ohio is very exciting especially with Sonitrol’s tested and proven verified security services"Chip Shiver, President of Sonitrol of SW Ohio, also has found recent success in growing the Sonitrol presence from the SW Ohio area to expansion in Columbus, OH. Shiver says, “Expansion for us to Columbus, Ohio is very exciting especially with Sonitrol’s tested and proven verified security services. Sonitrol’s enhanced verified technology and our many years of operation in Cincinnati, Dayton, and Springfield brings huge opportunities for us in Columbus, Ohio.” Sonitrol of SW Ohio has been in business since 1971. Lastly, Sonitrol of Fort Lauderdale recently expanded the Sonitrol brand to the Miami-Dade market. John Ray, President & CEO, says, “Sonitrol’s unique verified intrusion technology has grown over the past 55 years to become part of a world-class integrated security solution, keeping us at the forefront of protecting people and assets. Here in South Florida, we’ve expanded our franchise area with the recent addition of the Miami market, paving the way to providing more businesses in Dade County with the best security technology available on the market.”
Hikvision, the global supplier of innovative video surveillance products and solutions, has announced that IPS Intelligent Video Analytics is the first company to join the Hikvision Embedded Open Platform (HEOP) program. Through HEOP, IPS will upload its cutting-edge analytics modules to Hikvision 5-Series Network Cameras. The global HEOP program enables third-party providers to develop their own applications and install them directly onto Hikvision cameras. This brings a greater variety of intelligent functionality directly to customers, while development partners can benefit from Hikvision’s global reach. Five camera-based analytics modules Through HEOP, IPS is embedding five analytics modules into Hikvision 5-Series Network CamerasIPS Intelligent Video Analytics has decades of analytics expertise, and has developed a wealth of advanced analytics functionality. Through HEOP, IPS is embedding five analytics modules into Hikvision 5-Series Network Cameras: Motion Detection, Sabotage Detection, Intrusion Detection, Loitering Detection and Indoor Detection. Motion Detection This intelligent video analytics module offers real-time alerts when objects are seen to move within predefined areas. Sabotage Detection Sabotage Detection alerts users in real-time when attempts are made to tamper with the camera (e.g. if the camera is covered, redirected, sprayed or blinded). Intrusion Detection Intrusion Detection delivers real-time alerts in the event of an intruder entering a secured outdoor area. Loitering Detection This module delivers real-time alerts if individuals are loitering in monitored areas. Indoor Detection The Indoor Detection module alerts users in real-time in the event of intruders entering secured indoor areas. Combining DarkFighter low-light surveillance Embedding these modules into the cameras means there is no need for additional servers, which saves money for Hikvision customers and increases flexibility in solutions architecture design. One module can be operated per installed camera, and the data can be viewed easily on a web browser. The cameras are ideal for anywhere where 24-hour colourful images are needed The Hikvision 5-Series Network Cameras are already impressive, combining DarkFighter low-light surveillance with high definition recognition for the first time. Improved codec technology also boosts transmission efficiency. The cameras are ideal for anywhere where 24-hour colourful images are needed, from streets and shopping malls to office buildings. Cost-effective security solutions Jens Berthelsen, Global Partner Alliance Manager at Hikvision says, “We’re excited that IPS has become our very first partner for the HEOP program. We’re looking forward to seeing how their functionality can help our customers extract new value from our Hikvision 5-Series Network Cameras, while helping them to build even more streamlined, cost-effective security solutions.” Alain H. Benoit, Head of Marketing and Sales at IPS says, “The HEOP platform design makes it incredibly easy to integrate our video analytics into the Hikvision cameras. This integration provides customers with an advanced solution when it comes to real-time detection of suspicious objects or events.” Hikvision will be showcasing the IPS HEOP solution at IFSEC International on 18-20 June 2019, at the Hikvision stand IF1530.
Ping Identity, global provider of Identity Defined Security solutions, announced its participation at Identiverse 2019, slated to take place from June 25-28 in Washington, D.C. Company experts will share best practices in working toward digital transformation, address the current state of the industry and provide ways enterprises can elevate their identity security programs. Attendees also will have an opportunity to hear from Ping Identity customers eBay and Royal Dutch Shell, as they talk through their successful deployments. Andre Durand, Ping Identity’s CEO, will kick off the conference in the opening keynote on June 26 at 8:30am ET. With a focus on highlighting the importance of forecasting the timing and impact of industry disruptions, the presentation will help security professionals prioritise investments in digital identity. Attendees will walk away with knowledge to help prepare their organisations for success in volatile conditions. Identity and access management Ping experts, spanning the company’s product marketing, product management and engineering groups, will also speak on a variety of themes and topics, including the following: API Security Multi-Factor Authentication Identity and Access Management Open Banking Identity Authentication Ping Intelligent Identity platform Make a memorable stop at Ping’s booth #601 to participate in several fun activities, including: Take a virtual hot air balloon ride, showcasing updates to the Ping Intelligent Identity platform experience and cloud offerings. Learn about the company’s new Pingtopia community, which brings together customer advocates. Download free trials of Ping’s Cloud MFA & SSO, PingOne for Customers and PingIntelligence for APIs solutions.
German manufacturer Dallmeier announces a development partnership with AnyVision, a pioneer in AI-based facial, body, and object recognition. The aim of the cooperation is to integrate AnyVision’s facial recognition technology into the Dallmeier ‘HEMISPHERE’. The HEMISPHERE software platform offers customers from various industries a wide variety of modular solutions for security applications and business process optimisation. From the optimisation of marketing activities to forensic evaluations – the use of facial recognition technologies is becoming increasingly important for customers of video technology solutions. The integration of AnyVision’s technology will enable Dallmeier customers to utilise facial recognition data within various modules of the Dallmeier HEMISPHERE software platform. Facial recognition solution This allows customers of the Dallmeier HEMISPHERE software platform to access and leverage the data In this way, security and business processes can be optimised, e.g. through blacklist/whitelist procedures, marketing optimisation through VIP-customer recognition, forensic evaluations in law enforcement procedures or the automation of access controls in office or manufacturing environments. This allows customers of the Dallmeier HEMISPHERE software platform to access and leverage the data within various solution suites. Specifically, AnyVision’s facial recognition solution will be integrated into the Dallmeier HEMISPHERE SeMSy® Video and Security Management Suite, as well as in other solution suites of the HEMISPHERE platform, such as the Situational Awareness / Incident Management or Data and Security Information Management. Video security technology “In today’s increasingly complex world, customers need solutions that can integrate powerful components from leading manufacturers within a single platform strategy. Partnerships like this with AnyVision ensure that our customers always have the optimal combination of leading technologies at their disposal,” said Dieter Dallmeier, Founder & CEO, Dallmeier. “Dallmeier’s solutions in sectors such as safe city, stadiums, airports, logistics, casinos but also in the processing industry cover more and more topics that go far beyond classic video security technology. This makes it all the more important to work together with the right partners for complementary technologies which, when combined, offer decisive added value.” The German manufacturer Dallmeier electronic has been manufacturing solutions for security applications and process optimisation for 35 years. The portfolio includes cameras, recording systems and software. Security and surveillance AnyVision currently develops technology for security and surveillance Dallmeier’s solutions are used worldwide by customers in areas such as safe city, stadiums, airports, logistics, casinos but also in the processing industry. The partnership is also part of AnyVision’s mission to make its innovative AI-powered technology available to more businesses and environments across the globe. Unlike other software solutions in the market, AnyVision’s software is plug-and-play for new and existing systems, and able to overcome challenges such as occlusions, different angles of view, and poor lighting conditions. AnyVision currently develops technology for security and surveillance, mobile authentication, access control, and real-world analytics. Boris Gokhman, Vice President of Strategic Partnerships at AnyVision, commented: "Facial, body, and object recognition have real-world benefits right now. Collaborating with best-of-breed technology partners to help more organisations ‒ working across diverse sectors ‒ harness new capabilities and achieve those benefits is hugely important to us. We are delighted to be working with Dallmeier on this and look forward to expanding this partnership in the future.”
Controlsoft, global developer, manufacturer and distributor of access control solutions, has fully integrated its latest Identity Access platform with the Aperio wireless locking technology from the ASSA ABLOY Door Hardware & Access Control Group. Identity Access platform upgraded By updating and upgrading its Identity Access platform to fully integrate with the Aperio AH30 1-to-8 communication hub, Controlsoft’s customers can easily add mechanical doors to their existing access control system. Aperio ensures users require minimal additional hardware to upgrade their premises to wireless access control. A communications hub providing a wireless connection with up to eight doors, the Aperio AH30 operates within a 25-metre transmission range, and has been designed for prompt, cost-effective installation and integration. Suitable for interior doors, the hub is particularly practical for hallways with a number of adjacent corridors. Identity Access security management software Easy to use and intuitive, Controlsoft’s Identity Access is a complete security management software Easy to use and intuitive, Controlsoft’s Identity Access is a complete security management software. The individual access rights of employees, visitors and contractors can be assigned according to their responsibilities. Individual time restrictions can also be applied for each access control point, and the system offers full auditing and reporting capabilities. The software also includes advanced features such as a lockdown function, which prohibits authorised users from accessing doors, as well as a further function that can allow for multiple levels of lockdown, depending on the scenario. Identity Access can even be integrated with a fire alarm system, so that selected doors automatically open when a fire alarm is activated. Controlsoft access control solutions Jonathan Summers, Managing Director at Controlsoft, said: “We are committed to providing a comprehensive range of access control solutions that are competitively priced, easy to install and highly secure. It is with this commitment in mind that we have fully integrated our Controlsoft access control solution with the Aperio AH30 1-to-8 communications hub from the Door Hardware & Access Control Group.” He further said, “The AH30 has an excellent reputation as a reliable, functional and high-performance access control solution, and this integration will help us provide customers with faster, more effective installations.” Battery-operated Aperio innovations David Hodgkiss, Director of Access Control at the Door Hardware & Access Control Group, added: “As one of our original Aperio partners, we are delighted to continue our long-standing relationship with Controlsoft and integrate our award-winning technology with its latest access control platform, Identity Access. Battery-operated Aperio innovations are highly reliable, available in a stylish, contemporary design, and offer a quick and easy installation.”
Access control manufacturer Inner Range will be rewarding lucky visitors to its stand with a drone every day of IFSEC International (June 18-20). Delegates who watch a demonstration of an Inner Range product will be invited to enter their details into the manufacturer’s flagship product, Integriti, and the system will randomly select a winner at the end of each day. Winners will receive a Holy Stone Mercury 3 racing drone, which can travel at 45km an hour and transmit HD video and aerial photos in real time. The camera, which has a 120-degree wide-angle lens, is easy to install or remove, and the drone is designed to reduce wind resistance for more stable filming conditions. Integration of Inception with XProtect VMS The integration allows the Inception controller to become the security and access mechanism supporting the Milestone systemInner Range has two demonstrations linked to IFSEC’s official ‘Show Me How’ series of presentations and trials. The first showcases how Inner Range’s Entry-level access control system, Inception, can now integrate with the Milestone XProtect video management system. The integration allows the Inception controller to become the security and access mechanism supporting the Milestone system. Inner Range’s Enterprise-level intelligent integrated access control system, Integriti, will also feature in the ‘Show Me How’ series. Delegates can see how ‘user qualifications’ can boost health and safety procedures, or ease car park credit renewals by alerting users when qualifications or credits are about to expire. Chance to win a racing drone Tim Northwood, General Manager at Inner Range said: “We love showing what our products can do and will happily demonstrate any aspect of our systems that people are curious about. To add an element of fun, anyone who has had a demonstration can enter our prize draw to win a racing drone. IFSEC is full of technology enthusiasts and drones are the latest gadget, whether people use them for serious business purposes or fly them just for fun. We hope delegates will like them, either way.” The Inner Range stand will include eight large screens to demonstrate the manufacturer’s access control systems The Inner Range stand (Stand IF1030) will include eight large screens to demonstrate the manufacturer’s award-winning access control systems and software in action at IFSEC International on June 18-20 at ExCel London. Inner Range has been a pioneer in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Customers include hospitals and high-security units, colleges, distribution centres and pharmaceutical companies, government and critical national infrastructure.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organisations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organisations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using smartphone apps to open doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Improved fingerprint solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defence and other public section use cases where higher security is needed. Flexible subscription models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimisation solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating valuable insights with machine learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focussed on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organisations incorporate this type of analytics engine into their access control systems, they will improve security and personalise the user experience while driving better business decisions.
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (CCTV at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labour to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open architecture platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple licensing processes and pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing and matching camera license types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto camera detection and configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart camera driver technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance of network security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomised video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies acquires Arecont Vision after bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion acquires access control company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilise power over ethernet, making them easy to install and cost effective as they utilise existing customer infrastructures. The company is based in Boulder, Colo. 5. HID buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam announces acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal acquires U.S. Security Associates Allied Universal, a security and facility services company, finalised its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT acquires Red Hawk Fire & Security (and others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies continues to acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with security personnel at a public place to report any crimes or security infractions and to enable rapid response. Think of it as “crowdsourcing” security – the app provides more eyes and ears to keep a venue safer. In effect, it enables each of its users to be an extension of the security presence at a venue or event. Krowdsafe improves crowd resilience. “Crowdsourcing” security – the app provides more eyes and ears to keep a venue safer Krowdsafe security app Krowdsafe also opens a channel of communication for the security team to provide ad-hoc security information reminders or messages. Krowdsafe can be used at a variety of venues, including stadiums, transport hubs, office blocks, retail malls, college campus and major events organisers. The app does not access identities, violate privacy, or track the movements of users. Other app users only know the information fellow users disclose. Still, group chats, one-on-one engagement, and other social media interactions can ensue, whether about a favourite football team or the excitement of a rock concert. The system fosters digital engagement that centers around a physical space. Krowdsafe applies those capabilities to promoting better security. Enhancing crowd safety and management The elements of Krowdsafe beat out 67 competitors to win the Defence & Security Accelerator Competition to Innovate Crowd Safety, launched by the UK Home office after terror events in 2017. Key areas of interest in the competition were to improve the detection of threats from explosives and weapons within a range of crowded places with high footfall and so reduce the chance of future attacks. Krowdsafe provides a prioritised, readily accessible and simple way for members of a crowd to communicate with a security team charged with keeping them safe. The £250,000 government award has helped the product move forward commercially at a faster pace. Krowdsafe app does not access identities, violate privacy, or track the movements of users Krowdsafe users can tap a red button, prominent on the Krowd app, that says “Report.” They may then choose from a listing of common threat types – from suspicious activity or unattended activity to medical emergency or fire services. The list is configurable by venue and corresponds to any specific threat models. The list corresponds to the nature of any situation security wants to address, such as “anti-social behavior” at a football club. Users in the crowd can anonymously report racist chanting, for example. In a children’s sporting event, the app can be used to facilitate lost-and-found children. If a child gets lost, a user can share a photo with the security team, who can alert the “public” (other Krowdsafe users) and find the child within minutes or seconds. Encrypted identifier code A user taps the “Report” button, selects an issue, and an alert goes directly to the security team A user taps the “Report” button, selects an issue, and an alert goes directly to the security team, who can respond because they have the encrypted identifier code from which the message came. For that point, the security team communicates one-on-one with the user, who can then choose to share their current location with the security team to facilitate response. (The “legitimate interest” of knowing the location negates any privacy concerns.) Once location is enabled, the security team can follow the precise positioning of threats on a map, using GPS and other technologies, or even on a three-dimensional digital map of a multi-story building. Another security benefit of Krowdsafe is prevention. Event organisers and venue managers can promote the use of Krowdsafe on posters or in announcements throughout the venue. Additional eyes and ears are the equivalent of CCTV coverage on every inch of a venue and use of the system makes the environment more hostile to mischievous, malicious and/or terrorist activity. In effect, bad guys will go somewhere else. Enhancement to Krowd app Krowdsafe is an enhancement to the Krowd app, which has been around for a couple of years and is available in app stores for iOS and Android. The app approximates in the digital world the experience of being a stranger in the crowd in the real world. Users can join a conversation based on their username, and then disclose to the crowd whatever they wish (or not). Event managers/organisers can promote hashtags to help identify others in the crowd (such as #ManUnited to identify fans of the same football team). In general, users can identify themselves (voluntarily) according to common interests using hashtags. “Krowd is a group chat that connects people together at the same place at the same time in a group, but without anyone having to disclose personal information,” says Geoff Revill, Managing Director, Krowdthink Ltd. “You have a digital presence in the same place with other people at the same time.” Wireless connectivity Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue. Once someone signs in, information about them is merely a grouping of “hash” numbers, which are used to identify them as they communicate with others in the location. However, the “hashing” cannot be hacked to find a user’s location, thus ensuring greater privacy. Because Krowd does not collect personal data (which is a revenue source for most social media companies), the company generates revenue by providing the service to venue owners who wish to interact with and manage a crowd. Data security Location data is considered sensitive under General Data Protection Regulation (GDPR), and tracking locations can help to identify where someone lives, works, who they associate with, etc. By not tracking location, Krowd avoids the related privacy issues. After initially signing in on WiFi, Krowd communications can also use 2G, 3G and other cellular networks in addition to WiFi. Addressing privacy concerns is essential to encouraging involvement in the Krowd app, and in Krowdsafe. “If you want people to participate in keeping the crowd safe, you have to get their trust and respect them, that’s a building block behind the behavioral science,” says Revill. By not tracking location, Krowd avoids the related privacy issues Privacy protection Because Krowd users remain anonymous (except for the information they choose to share), user data is not collected (and/or sold or used for future marketing purposes). Krowd’s paying customers are event venues and public places that provide the Krowd service and can promote their commercial messages or provide other information to their populations while on site. Krowdsafe can provide immediate security benefits to a venue. Even if only 25 staff members use the app in a given location, for example, that’s 25 more sets of eyes and ears to help the security department. In a retail mall, if the staffs of 200 tenant businesses use the app, that’s another 500 or so people watching out for security. Among the general public, use of the app can be promoted in customer newsletters, or by posting group discussions on big screens around a venue. Wide marketing scope It enables members of a crowd to report any broken doors, water leaks or blocked toilets Security is a secondary benefit for some Krowd users, who are drawn to the app because of marketing opportunities, such as the ability to provide discounts or promotional offers to customers while they are on site. The app also encourages social media interaction, while maintaining the venue’s ability to “manage” the crowd by moderating any discussions. The Krowd app also provides management benefits to a venue. For example, it enables members of a crowd to report any broken doors, water leaks or blocked toilets. In general, the app helps to promote a better brand experience for the customer. Incident management One of the UK government’s concerns about Krowdsafe was its possible use by terrorists or other to cause incidents in a public venue. Think of the case of Olly Murs, a U.K. singer, whose mistaken tweets about hearing gunshots caused a brief panic at a department store on a busy shopping day. Might Krowd be uses similarly by a terrorist or other evil-doer to cause chaos or a distraction? No, says Revill, who points to a higher level of control over content exchanged in Krowd versus Twitter, for example. The security team can censor content or limit its propagation. They can also disable or block a user from communicating on the app. Messages containing dangerous or troubling content, such as racist terms, can trigger alerts to enable security teams to respond quickly.
While most security teams are focused on preventing malicious outsider attacks, recent data suggests that close to 30 percent of confirmed breaches today involve insiders. Today’s increasingly complex networks across physical, information technology (IT) and operational technology (OT) systems make it difficult for security teams to detect and prevent insider threats. This is compounded by the proliferation of data, devices, applications, and users accessing networked resources. Rising insider malicious attacks threat As the threat landscape evolves rapidly, CISOs need to step up their game According to the 2017 U.S. State of Cybercrime Survey, 50 percent of organisations experience at least one malicious insider incident per year. And the Verizon 2018 Data Breach Report found that close to 30 percent of confirmed breaches today involve insiders. In August 2018, a tragic crash involving a Seattle airplane stolen by an employee raised awareness for the need for physical insider threat awareness (as well as more psychological screening before employment). As the threat landscape evolves rapidly, CISOs need to step up their game, says Aamir Ghaffar, Director of Solutions Engineering at AlertEnterprise. They should implement security controls that protect their company’s people, physical assets, data, intellectual property, and reputation both inside and out. And they need to do it while simultaneously satisfying industry compliance requirements. In response to our questions, Aamir Ghaffar offered some additional insights on the timely topic of insider threats. Q: We are hearing discussion about the emergence of cyber-physical security systems. What are they and how do they help organisations address insider threats? Threats now originate not only in the physical space but also in cyber environments Ghaffar: The concept of convergence has evolved in response to risk and the overall threat landscape. Threats now originate not only in the physical space but also in cyber environments – this is what is commonly referred to as blended risk. These blended risks require a converged approach and a converged view of security as a whole; connecting data, building new capabilities and gaining new insights to allow security teams to better defend against attacks. Q: How are organisations responding? Ghaffar: They are shifting towards centralisation – from the security operations center all the way to the executive level, where one C-Suite executive manages all security across physical, IT and OT domains. According to Gartner by 2023, 75% of organisations will restructure risk and security governance to address new cyber-physical systems (CPS) and converged IT, OT, Internet of Things (IoT) and physical security needs, which is an increase from fewer than 15% today. Q: How does the shift impact insider threats? Ghaffar: Unifying cyber and physical unlocks powerful new capabilities. For example, cyber-physical teams faced with a threat such as an intrusive device planted within their network environment, can quickly connect the cyber footprint to a physical location – understanding where the threats originate and identify those responsible for bringing it in. Converging physical and cyber identity through platforms that connect physical access control, IT and OT systems is an example of how organisations can better prepare for blended security threats An AI-enabled automated system is the most practical and human error-proof solution today Q: How is AI being used to protect against insider threats? Ghaffar: With increased security convergence we are now collecting such a large volume of data that relying on manual detection of insider or external threats is no longer a viable solution. An automated system, powered by artificial intelligence used with digital identities, is now the most practical and human error-proof solution today. AI and machine learning (ML) technology helps organisations map complex patterns of user behavior, process tens of millions of events within seconds to detect threats in near-real-time and respond swiftly. This benefits security operations personnel to go from distraction to action, allowing them to focus on what really matters, which are their most critical security events. Q: Sometimes the threat is about human error. Oftentimes we think the most harmful insider threats are intentionalGhaffar: Oftentimes we think the most harmful insider threats are intentional; however, unintentional user behavior and negligence could have serious ramifications for an organisation. Organisations should deploy technology that delivers automation and active policy enforcement to prevent employees from making inadvertent yet critical errors. Organisations should also do regular risk assessments – not one and done. Don’t implement a process and think you’re secure. Automated identity and access management technology can provide scheduled access reviews to help detect high-risk user profiles with accumulated or a toxic combination of access, as well as segregation of duties violations due to department change or job transfers. Q: What are the biggest misconceptions about insider threats? Ghaffar: First, that the biggest threats originate outside my company. Or that insider threats are a problem for government agencies and highly sensitive organisations, not “regular” companies like us. A company may also mistakenly think that they have limited assets that could be exposed, or that the assets are of little value; therefore, a large-scale breach is less likely to happen. And even if it does, it probably won’t have a big impact. Risk management leaders should start by developing a compelling visionQ: So, they think “it can’t happen here.”? Ghaffar: Yes, and they think their employees are inherently trustworthy, and that with basic security measures in place, the risk is small. They think that insider threats are always intentional. Or they think “it’s not my job.” Q: What next steps should security leaders take in addressing insider threats in their organisation? Ghaffar: Security and risk management leaders should start by developing a compelling vision and strategy that will resonate with key company stakeholders. They can expand the visibility they have into user activity beyond things that happen on the network. Go beyond a data-centric approach to a people-centric approach through identity behavior analysis. Improving visibility into user activity and taking a more preventive approach are the best ways to manage risk of an incident. Develop an inside-out approach to security. By converging physical, cyber and OT security you’ll gain a holistic view of your enterprise-wide security landscape.
The focus of the global security industry will shift to London this month for IFSEC International, Europe’s ‘integrated’ security event focusing on the latest technologies and the opportunity to learn from the industry’s top leaders and experts. IFSEC will be held from 18-20 June, 2019, at ExCel London, welcoming 27,000 security directors and managers, installers, integrators and distributors. The exhibition at IFSEC may not be as large as previous years, and several big players are conspicuously absent. Even so, there will be plenty of innovation on display, including big exhibitors such as Avigilon, Axis, Dahua, dormakaba, FLIR, Genetec, Hanwha Techwin, HID Global, Hikvision, IDIS, and Uniview. Exhibitions will likely reflect a continuing shift in emphasis away from individual products and toward integrated solutions, including some end-to-end solutions provided by single manufacturers. Also, likely to be abundantly evident at IFSEC will be a trend toward manufacturers who partner together to provide integrated solutions. For example, look for some manufacturers to host other manufacturers at kiosks within their stands. Texecom will explain the value of training and digital services and their impact on the future of the industryValue of security training Emphasis will continue to be on the practical aspects of using technology: Throughout the show floor, designated technicians wearing ‘Show Me How’ badges will provide demonstrations of products and solutions on display at the various stands. Texecom will explain the value of training and digital services and their impact on the future of the industry. The Loss Prevention Certification Board (LPCB) Attack Testing Zone features LPCB’s security experts conducting live attack tests on a range of perimeter and façade security products, as well as safes, security enclosures and padlocks. More than 35 hours of seminar sessions will cover timely topics such as ‘Future Proof your CCTV Networks’, ‘Social Media and Internet Security’ and ‘AI and Machine Learning for Security’. Security topics at the Keynote Arena This year, topics will include video analytics, AI, machine learning, GDPR, Brexit and security in smart citiesThe new programme will replicate last year’s successful changes. The Keynote Arena will again be placed at the heart of IFSEC, sponsored by Western Digital. The Keynote Arena will host influential speakers and real-life case studies to inspire attendees. Topical issues will take front and centre, from cybersecurity to ethical and legal challenges to extremism. This year, topics will also include video analytics, AI, machine learning, GDPR, Brexit and security in smart cities. The Future of Security Theatre will present CPD-accredited sessions and presentations that share a vision of the industry’s future and answer burning questions about critical topics, technologies and issues. Education partner Tavcom will present the programme of education dedicated to the ideas, products and innovations driving the industry’s development. The Converged Security Theatre will highlight new approaches that combine cyber and physical defences to tackle dangerous security threats. Included will be real-time technical solutions enhanced by artificial intelligence, powered by Vidsys and partners. Participation by government organisations The Government Pavilion will feature representatives from government bodies such as JSaRC, DIT, and DSOFor the third consecutive year, The Government Pavilion will feature representatives from government bodies such as JSaRC (Home Office & Counter Terror Unit), the Department of International Trade (DIT), and the Defence & Security Organization (DSO). New this year will be participation by the British Transport Police. IFSEC 2019 will again present a snapshot of how manufacturers from across video, access control and intrusion detection are continuing to innovate and collaborate to stay competitive in the challenging market. Innovations first unveiled in the spring at the ISC West 2019 show in the United States will be promoted anew for the European and global markets. IFSEC will be co-locating with FIREX International, a dedicated fire safety event that attracts 18,000 fire prevention and protection professionals; the FACILITIES Show highlighting building management and workplace technologies; and the Safety & Health Expo, dedicated to innovative health and safety products. IFSEC attendees can access the Smart Buildings Expo, the Workplace Wellbeing Show, and the Sprinkler & Suppression Presentation Area within the co-located events.
As a major transportation hub in Northeastern China, Changchun Longjia International Airport processes a huge amount of passengers every year. In response to massive economic growth in the region, the airport – with a total volume of almost 13 million passengers in 2018 – needed an additional terminal. Built over the course of three years, the state-of-the-art Terminal 2 building covers a total area of 55,600 square meters. Since its opening in October 2018, the expansive Terminal 2 building has been serving all domestic flights from 22 airlines including Air China, Shenzhen Airlines and Shandong Airlines while international flights are now concentrated in Terminal 1. Meeting airport security guidelines Bosch received the contract based on a proven track record of large-scale airport security installationsLooking to safeguard this vital new infrastructure, the airport security managers wanted to integrate video security, intrusion detection, public address and access control for staff within one platform while meeting current government security guidelines for airports. Since 2017, these laws include mandatory storage of all video data for a 90-day period, which puts a premium on adequate data storage in a space covered by over 1,000 cameras around the clock. Given the project’s massive scale, managers wanted to work with a one-stop provider to ensure seamless integration of all solutions and delivery according to stringent timelines with end-to-end security intact on opening day. After diligent market research, Bosch received the contract based on a proven track record of large-scale airport security installations and the ability to connect all components – video security, intrusion alarms, access control and public address systems – on the Building Integration System (BIS). Installation of IP dome cameras Outdoor cameras are able to withstand temperatures down to -40 °C during Changchun’s harsh wintersFor video security, Bosch experts installed nearly 1,500 cameras inside and outside Terminal 2, including moving cameras such as the AUTODOME IP 4000i and IP 5000i and FLEXIDOME IP 6000 VR series. All IP-based cameras are centrally managed on the Bosch Video Management System (BVMS) and support security personnel by detecting threats and triggering automated alerts via built-in Essential Video Analytics. Outdoor cameras are able to withstand temperatures down to -40 °C during Changchun’s harsh winters. And to maintain a small data footprint while meeting the legal obligation for 90-day data storage, the cameras use efficient H.265 compression technology, thereby reducing bandwidth to a low 2 Mbps and storage space by up to 50 percent compared to other cameras. As a direct result, security managers in Changchun have been able to achieve savings in the number of networked storage units as well as energy consumption and cooling cost for the server room. Unified management of access control “The reduced bandwidth leading to a fewer number of storage cabinets in the server room was a major reason why our client opted for the Bosch solution,” said Mustaine Hu, Technical Support Manager at Bosch Building Technologies. The Building Integration System supports unified management of access control for airport personnel at 350 doorsMeeting another key customer requirement, the Building Integration System (BIS) from Bosch supports unified management of access control for airport personnel at nearly 350 doors. A combination of card reader and video security eliminates the risk of non-employees accessing critical areas with a stolen card and creates a seamless passage for authorised staff without additional screening. Bringing security full circle, the installed public address system allows security personnel to broadcast real-time announcements via more than 1,200 ceiling loudspeakers. The system ensures controlled evacuation in emergency situations and also sounds alarms triggered by connected intrusion sensors to alert personnel. Security for travellers and personnel Fully operative since the grand opening of Terminal 2, the Bosch system now provides end-to-end security for travellers, personnel and property at Changchun Longjia International Airport. As a scalable and IP-based system, it is future-proof to accommodate further expansions and has delivered cost savings on video storage and power consumption since day one. In face of China’s rapid economic growth, about 200 of the country’s 497 airports will require similar expansions over the coming years, making Changchun an important reference for Bosch Building Technologies in the region.
South Africa’s Athlone Campus is home to the Western Cape College of Nursing, a sprawling complex of lecture halls, administration blocks and four hostels that house around 2000 nursing students. Gallagher Command Centre was chosen as the most effective system to manage access to the hostels and keep the students safe. The nursing college had no method of limiting access to its hostels. People came and went as they liked, there was no record of who was on site and it was difficult to enforce visitor hours. Theft was a problem and reported cases of sexual assault had become a major concern. Access needed to be more secure. Access control system for authorised entry Biometric fingerprint readers were mounted on turnstiles at each of the hostel entrances and exits to manage general accessSafety and security are essential to providing a healthy living and learning environment for students. Athlone Campus partnered with local security solutions provider, FS Systems, to install access control and video surveillance in its hostels. Gallagher Command Centre was chosen to manage the access control system, monitoring access points and allowing only authorised students, staff and visitors to enter the hostel buildings. Biometric fingerprint readers were mounted on full-height turnstiles at each of the hostel entrances and exits to manage general access. Fingerprint readers prevent unauthorised entry from people using lost or loaned cards, and the anti-passback measures built into Command Centre means students can’t ‘pass in’ a visitor or bypass the system, as it recognises and records that someone has tried to enter twice. Integrated visitor management system Gallagher’s integrated visitor management system now monitors visitors and allows the college to control visiting hours. Visitors to the college hostels must register at reception and have their fingerprint captured by the visitor management system. They are then granted access to only the hostel they are visiting. In the evening, the system generates an alarm and reports on visitors still on site – allowing security to ask people to leave and prevent further visitors from entering. The general feeling from students and staff is that they are more secure" Jason Adams, Cost and Estimating Manager for FS Systems says, “The general feeling from students and staff is that they are more secure knowing that everyone entering the facility has gone through some sort of screening or registration process at the security office. The presence of physical security barriers (full-height turnstiles) is reassuring, in that not just any person can gain entry without the necessary authorisation.” Installation of video surveillance solution Alongside access control, the college installed a comprehensive video surveillance solution to reduce incidents of violence, vandalism and crime. The entire video management system is seamlessly integrated with Command Centre, creating one easily managed security solution to track student, staff and visitor movements and ensure that when an incident does occur, security staff are quickly informed and able to respond effectively. “It’s essential for the system to be user-friendly and easy to operate and manage,” says Jason. “The detailed maps that appear onscreen with Gallagher Command Centre clearly indicate the location of alarms and give security staff the ability to respond more quickly to emergencies.” Using Gallagher Command Centre, the nursing college now has a powerful and versatile security system that meets the unique needs of its site. Reduction in criminal activity The college has achieved significant cost savings through the prevention of vandalismThe system provides a reliable way to clearly capture data to monitor students, staff and visitors, lower criminal activity and improve onsite safety. In particular, security personnel can easily find the right information for quick incident resolution, which has led to improved processes, procedures and convictions when necessary. The college has also achieved significant cost savings through the prevention of vandalism and a significant reduction in reported cases of theft. The combination of the new access control system and an increase in physical security barriers means they have also been able to decrease the number of security guards patrolling the facility, reducing overhead costs. Customising and generating reports for college management is also a straightforward task, saving time and money. Most importantly, Gallagher’s security solution has given Western Cape College of Nursing control of who is on site and when – allowing its students to be safe, secure and focussed on learning.
PotashCorp is the world’s largest fertilizer company by volume. They have facilities and business interests in seven countries and are dedicated to the challenges of feeding the world’s growing population. PotashCorp produces three primary crop nutrients – potash, phosphate, and nitrogen. Recognised as the world’s leading potash producer, they are responsible for 20 percent of the global capacity. Their facility in Lima, Ohio is one of four locations whose primary function is to create a range of products including ammonia, urea, nitric acid, and nitrogen solutions. Safety is PotashCorp’s number one priority, and this is evident in the number of awards they’ve received. Management are committed to providing a healthy work environment where employees have a strong personal safety ethic, rooted in awareness and focussed on incident prevention. Implementing a cost-effective solution We found that no other product could compare to Gallagher – its feature set, open API, competencies, and price"Security concerns and the need to implement a more cost-effective solution led PotashCorp to discover Gallagher. “We were looking for a system that would allow for seamless integration. After thorough research, we found that no other product could compare to Gallagher – its feature set, open Application Programming Interfaced (API), competencies, and price. The choice was easy,” says Jeff Johnston, Network Administrator for PotashCorp. “The cost of the product along with its capabilities is incomparable in the market.” It made sense for PotashCorp to replace their entire security system rather than updating an outdated and deteriorating system. Safe and secure working environment Driven to providing a best-in-class, safe, and secure working environment, PotashCorp partnered with the Digital C.O.P.S. Division of Perry proTECH, a business technology solutions company, and Gallagher, to develop a customised security solution. The system needed to be fully integrated, scalable and expandable, digitally based, and user-friendly. Benefits of PotashCorp’s new security solution include: Video integration, for safety precautions and oversight Wireless lock integration, utilising Salto locks out in the field on network cabinets User-friendly report generation, creating cost and time savings PotashCorp will soon implement Gallagher Mobile Connect, a secure and convenient access solution that allows people to use their smart phone in place of an access card. Greater efficiency in plant turnaround Gallagher Command Centre provides the flexibility to easily add cardholders to the existing databasePotashCorp is required to undertake a plant turnaround every four to five years. A turnaround, or shutdown, is a scheduled period of non-production, during which day-to-day plant operations cease. All focus shifts to maintenance, cleaning, inspection, and repair, with employees and contractors working around the clock preparing the plant to resume its regular operations. Turnarounds are one of the most crucial events in the routine operation of a chemical industrial plant and are extremely costly, due to production time lost, increased labour costs and equipment expenses. Speed and efficiency is vital as the turnaround process has the ability to strongly affect a company’s bottom line. PotashCorp can have an additional one thousand contractors and staff onsite during a turnaround. Gallagher Command Centre provides the flexibility to easily add cardholders to the existing database, while enabling management and video operators to monitor cardholder movement throughout the plant. Executing a timely turnaround that stays within budget makes a huge contribution to the plant’s efficiency and drives the company’s future success. Immediate headcount in event of emergency Mike Resar, PotashCorp’s Safety, Health and Environmental Manager at the Lima site noted, “The safety of our employees and contractors is of the highest concern for us. We are now able to generate muster reports that provide an immediate headcount in the event of an onsite emergency. We can also produce time reports easily and without the need for external programming help.” By upgrading legacy system and performing the interface with Gallagher, PotashCorp realised a $20,000 savingOne of the world’s largest chemical companies and a leading manufacturer of petrochemicals resides on the PotashCorp site and shares several turnstiles. Both companies selected Gallagher, and a system-to-system integration was developed, allowing control of the turnstiles and several doors to be shared between the two companies. Tangible cost savings By upgrading their legacy system and performing the interface with Gallagher, PotashCorp realised an immediate $20,000 saving. As the system expands, the savings have continued. After thoroughly vetting their options, PotashCorp has found that the cost per door will be one-quarter less than that of their previous system. They are still witnessing a substantial return on their investment. With the recent addition of four controllers and twelve readers, selecting Gallagher has saved PotashCorp nearly $70,000. “The open integration, cost savings, and ease of reporting is truly remarkable. The difference and quality of the system is undeniable in comparison to what we had prior to Gallagher Command Centre,” says Jeff.
The Norpass access control system from Nortech using its Norpass3 software is providing secure access control at the BBFC (British Board of Film Classification) building in central London. Norpass3 software solution Chosen for its ability to provide a secure access control solution, Nortech’s Norpass system was installed on 16 doors around the Soho Square offices to support a range of access levels according to staff responsibilities and include a management system with a user-friendly interface. This allows staff movements to be monitored, ID cards to be issued and access rights to be changed according to ongoing requirements. Nortech’s Norpass system was installed on 16 doors around the Soho Square offices The BBFC is independent and not-for-profit and is in place to help everyone in the UK choose age appropriate films, videos and websites, wherever and however they watch or use them. Founded in 1912, they have been responsible for classifying films released in UK cinemas and on DVD and Blu-ray, and classifying content for Video on Demand services, such as Netflix and Amazon, as well as helping mobile phone operators set parental controls at the right level. Norpass access control modules Bradley Thomas, Facilities Manager at the British Board of Film Certification (BBFC) commented, “We have had the Nortech system in place for many years, we find it reliable and easy to use and their customer service team has always been helpful and informative to any queries.” The flexibility of Norpass access control modules and the user-friendly PC-based Norpass3 software together with Nortech’s elegant card readers made the Norpass access control system the ideal choice for BBFC. Since the installation, the system has provided secure access control throughout the building and, with Nortech’s support, BBFC has been able to keep the system up with changing requirements. Easy-to-use access control system Benefits of using the Norpass system include easy to use software offering a range of access levels Benefits of using the Norpass system include easy to use software offering a range of access levels, security that can be matched to an organisation’s needs, a flexible structure for easy expansion and a system that has been developed in the UK and is supported by a UK based team. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
Since renovation began in the 1990s, the Custard Factory in central Birmingham has grown into an important centre for the creative and digital industries, as well as a destination for leisure, retail and cultural activities. The 15-acre site, which in Victorian days was a pioneering centre for food and ingredients production, has been transformed into a thriving working community for hundreds of small businesses, benefiting from several phases of development. The Custard Factory now comprises multiple buildings in a vibrant city centre location, so the risks of petty crime must be planned for and the safety of users ensured. Upgrading to IP and wireless technology An ageing analogue video system at the Custard Factory was proving expensive to maintain and, without enough cameras, it was giving only limited coverage. An upgrade was needed but installation work had to take place without disruption to the many businesses at the site, so specialist integrator Unison Integrated Technology was asked to find the most suitable solution. Latest video tech from IDIS was selected because it provided the best image quality The latest video tech from IDIS was selected because it provided the best image quality, unrivalled usability and trouble-free installation with the ability to mix and match equipment. It also allowed existing infrastructure such as coax cabling to be incorporated, and by combining HD-TVI with the latest IP and wireless technology it enabled real-time monitoring in the control room without the need for complex and expensive civil works. IDIS IP cameras More than 60 new high-performance cameras have now been integrated into a leading-edge solution giving complete coverage of this diverse estate made up of the main Custard Factory Buildings, an open-air carpark, neighbouring external areas and the Fazeley studios. To protect the carpark and external areas, including historic archways, a mix of cameras has been used, including dome cameras with IR LED and wide dynamic range giving coverage in all lighting conditions. All IDIS IP cameras also benefit from IDIS Smart Failover technology which ensures continued video capture in the event of network instability or failure. DR-6316 H.265 NVR Video is streamed to the control room via a SilverNet wireless link, yet crucially there is no latency or lag on the images. These cameras are connected to a DR-6316 H.265 NVR, supporting 16 channels that utilises IDIS Intelligent Codec to minimise bandwidth and storage requirements. Thanks to IDIS true plug-and-play technology, Unison Integrated Technology installed new cameras without disruption At the Fazeley studios, which includes both indoor and outdoor facilities, a combination of IP and analogue bullet cameras, PTZs and domes are used. And at the Custard Factory main buildings, four PTZ cameras, two fixed domes and 25 bullet cameras are connected to IDIS’s powerful DR-8364D recorder, which supports up to 64 channels with a super-fast 900Mps throughput. IDIS true plug-and-play technology Thanks to IDIS true plug-and-play technology, Unison Integrated Technology installed the new cameras without disruption or any need to stop trading during the work, which included working around operational restaurants and shops. At the purpose-built security control, room operators now have a complete view of the site, allowing them to replace inefficient patrols on foot with more frequent video tours. And the free IDIS Center video management system (VMS) makes it easy to operate the new, enhanced system incorporating third-party cameras, the HD-TVI analogue devices and the latest IDIS IP tech. High-resolution video surveillance With the new surveillance system and improved lighting in place visitors feel safer, particularly walking to and from the car park after evening events. The ability of the security team to monitor events real-time and respond to health & safety incidents is appreciated by event organisers using the Fazely venue. And police have been able to tackle petty theft more effectively thanks to the high-resolution video evidence which is now easily and quickly retrieved in order to tackle crime. The IDIS technology fully delivered on our requirements for an affordable, high-quality surveillance solution" The solution is flexible and scalable, with more cameras easily added as the Digbeth estate continues to evolve and expand. Custard Factory estate manager Simon Dunn says the upgrade has far exceeded expectations. IDIS video security system Simon says, “The IDIS technology fully delivered on our requirements for an affordable, high-quality surveillance solution covering our complete estate. The Unison engineering team delivered the project to the highest standard and they were considerate and respectful of our busy, live environment. I am very pleased with the result, both in terms of the quality of the images and the operation of the system, which is simple and effective.”
The client is a prestigious purpose-built skin, laser and cosmetic surgery clinic based in central Birmingham. In 2018, they relocated to a Georgian building following an expansion of the practice to welcome new professional associates and provide a greater range of patient services. Their upgraded and refurbished building includes a larger operating room with dedicated recovery areas, treatments rooms, consultation rooms and waiting areas. At this clinic, plastic, reconstructive and aesthetic experts carry out surgical and non-surgical procedures for the face and body as well as cosmetic dentistry, IV nutritional therapy and advanced spa treatments. IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham As well as a team of renowned doctors and practitioners and their administration team, the new premise is also accessed by numerous patients and their families visiting the clinic for pre-treatment and post-treatment consultations, as well as for the procedures themselves. Access control and intruder detection system In their new premises, the practice required an access control and intruder detection system that delivered: Hassle-free access for staff with various levels of authority, from surgeons to administrators, for e.g. restricted access to consultation/treatment rooms and post-procedure recovery areas Limited access to patient information, drugs, high value surgical equipment and other high-risk assets Simple and reliable off-site management by permitted personnel, at any time and via their own computer, tablet or smartphone A secure yet serene and private experience for patients and visitors, for e.g. easy entry and exit for visitors to/from the main reception area Safety of staff and visitors IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham. With nearly 100 years of combined experience installing security systems, the IGNIS team delivers on its reputation for quality of service, knowledge, reliability and honesty. An integrated system gives the client reassurance, simplicity and ease of use IGNIS works with integrated access control and intruder detection manufacturer Inner Range to deliver a cost effective, reliable service every time, with safety of staff, customers and visitors of paramount importance. Inner Range provided Inception, the core access control and intruder detection system used by IGNIS Fire Protection Services on this site. Inception was the perfect choice for this customer because it hangs off the same infrastructure with a single user interface. An integrated system gives the client reassurance, simplicity and ease of use. Offers smart building management A pioneer of integrated access control and intruder detection systems, Inner Range has been a pioneer in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Inner Range’s award-winning integrated security systems offer smart building management at local, national and global levels. Inception is Inner Range’s powerful yet affordable access control and intruder detection system, now featuring a range of extra reporting functions, anti-pass back protocols and interlocking doors. The system provides this dynamic clinic with the integrated access control they need to run their business with the utmost efficiency, safety and security. Key features available with Inception: A web-based interface that can be controlled by authorised staff using existing smartphones, tablets or computers Various entry points starting at 2 or 4 doors and 16 users and can be expanded if required up to 32 doors and 512 users Universal inputs and outputs that can be used independently of each other, to directly control door locks and powered sirens modules Secured alarm communication is using 128Bit AES encryption to ensure data privacy Interactive Commissioning Checklist IGNIS installed the Inception system using its interactive Commissioning Checklist that ensures no steps are missedIGNIS installed the Inception system using its industry-first interactive Commissioning Checklist that ensures no steps are missed. That process includes core programming, custom automation, changing default credentials, backing up the database and downloading commissioning reports. Inception’s wireless adaptability not only gives users flexibility, it means technicians don’t need to find an IP address or connect to the user’s local network. They can also use an adaptor as a service tool to perform maintenance on site. Benefits for client: Peace of mind – 24/7/365 access and intruder detection solutions to keep patients, staff, visitors and assets safe and secure Convenience – the system can be controlled at all times via any mobile device No forgotten codes to interrupt the sensitive day to day running of the business or cause issues out of hours Value for money - no costly additional hardware and no need for a set on-site administrator or security guard Easy access and security means reception and support staff can focus on other responsibilities such as patient care
Round table discussion
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?