VuWall, global provider of video wall control and AV network management solutions, has announced an update to its flagship video wall control and collaboration platform, VuWall2. New enhancements to the powerful software solution include coloured borders and colour detection, support for the Milestone XProtect unified security platform, further integration with the IHSE Draco tera matrix, and extended KVM support of IP sources. VuWall2 solution "A control room must be a highly flexible enviro...
Lattice Semiconductor, the low power programmable pioneer, announced its MachXO3D™ FPGAs for secure system control received the National Institute of Standards and Technology’s (NIST) Cryptographic Algorithm Validation Program (CAVP) certification. CAVP validates that critical MachXO3D cryptographic algorithms are compliant with Federal Information Processing Standards (FIPS), the U.S. federal government’s standard for cryptographic software. By complying with both the CAVP an...
After eight years as an Engineer in the Royal Australian Army, I briefly worked at Telstra before joining Honeywell Australia. In 2000 I moved with Honeywell to Europe, and in 2010 took a position at ASSA ABLOY. My current role is global CTO for the ASSA ABLOY Group. During my career I have developed extensive knowledge of the global residential and commercial security industry, and of all aspects of building automation. I have had responsibility for sales leadership, project and product manage...
Promoting the company’s ethos of establishing close working partnerships, CCTV design and manufacturing company, 360 Vision Technology, is celebrating a long-term technical relationship with IP CCTV and security system specialists, Check Your Security. Based in the east of England, with offices in London and Liverpool, Check Your Security offers a wide range of professional expertise and experience in delivering integrated security solutions, using best in class technology - and were the v...
Fugue, the company delivering autonomous cloud infrastructure security and compliance, has announced its support for Open Policy Agent (OPA), an open source general-purpose policy engine and language for cloud infrastructure. Fugue is leveraging OPA and Rego, OPA’s declarative policy language, for cloud infrastructure policy-as-code to provide customers with maximum flexibility when implementing their custom enterprise policies. The Cloud Native Computing Foundation (CNCF) accepted OPA as...
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
ThreatScan® allows bomb technicians to perform rapid and accurate threat assessment in a wide range of operational scenarios. Each system consists of a portable X-ray generator, a detection panel and an operator’s workstation running the Company’s market-leading image processing software, together with a customer-specific range of ancillary equipment. ThreatScan® is lightweight, incredibly thin, has a large imaging area of 600 x 460mm, enabling bags and packages to be scanned in one scan. This system can penetrate up to 34mm steel at 120kV while producing high quality, sub-millimetre resolution images. ThreatScan® can be used to inspect suspect bags and packages in mass transit areas, such as rail and bus stations, shopping malls, airports, stadia, and sports arenas as well as, general security inspection by first responders such as Police, Military and Private and Government Security agencies. 3DX-RAY LTD, Sales and Marketing Director, Vincent Deery said: “We are delighted with this contract as it was from a customer with such exacting standards." "We were also in direct competition with many other major manufacturers, and we won.”, he adds. 3DX-Ray will be present at the 21st edition of Milipol in Paris on the 19-22 November at stand 5D122 in the UK Pavilion.
DigiCert, Inc., a provider of TLS/SSL, IoT and PKI solutions, announced that it has issued the world’s first Verified Mark Certificate (VMC) for a domain that sends email at scale: CNN.com. With this certificate, CNN is the first company prepared to participate in upcoming pilots of the BIMI (Brand Indicators for Message Identification) standard that require validated logos. Type of digital certificate A VMC is a new type of digital certificate that proves the authenticity of a logo tied to an email sender’s domain. VMC certificates are not currently in use in BIMI pilots, but they are expected to become a requirement, because they are a scalable way to ensure that corporate logos are not used fraudulently. Businesses have long sought ways to better identify themselves to customers in emails, and VMC certs for BIMI will enable verified brand marks to be displayed. Yahoo Mail is currently running a pilot of BIMI; Google is planning its own BIMI pilot in 2020, though it has not provided specific timing or commented on whether VMC would be required. Other email providers are also expected to begin their own BIMI implementations in the coming year. Enhancement of internet email VMC is a game-changing development for the email ecosystem and demonstrates CNN’s technical leadership"“CNN’s adoption of BIMI with VMC is a game-changing development for the email ecosystem and demonstrates CNN’s technical leadership,” said Seth Blank, director of industry initiatives for Valimail and chair of the AuthIndicators Working Group, which is developing the BIMI standard. “We commend DigiCert for helping to lay the groundwork for this important enhancement of internet email. The AuthIndicators Working Group is excited for many more brands to follow CNN’s leadership.” "DigiCert is excited to work with CNN and members of the AuthIndicators Working Group to take this first step in demonstrating the feasibility and benefit of VMCs for global brands under the BIMI pilot program,” said DigiCert Chief of Product Jeremy Rowley. “We know that there is a demand for issuing VMCs at scale and we are fully committed to providing that capability.” Supporting BIMI and VMC “It’s amazing to see the progress that BIMI has made in the last few years, and the ability to validate logos using VMC is a tremendous step forward,” said Alexander García-Tobar, the CEO and co-founder of Valimail, a leading provider of VMC-enabled BIMI services for domains. García-Tobar is also a co-founder of the AuthIndicators Working Group. “Valimail is committed to supporting BIMI and VMC in the industry as well as our own products, and we are excited to work with DigiCert on this important enhancement to email technology.” Secure, global framework BIMI is a new standard that provides a secure, global framework enabling email inboxes to display sender-designated logos for authenticated messages. It allows domain owners to specify a logo that will appear in the inbox, alongside authenticated email messages sent from their domains. Brands will be able to amplify their online presence in the inbox through authenticated messagesBIMI will work only when both the email and the logo are properly validated. The email must be authenticated through the Domain-based Message Authentication, Receiving & Conformance (DMARC) standard with a policy of quarantine or reject; the logo itself will be validated by the VMC. VMC certificate issued by DigiCert The VMC certificate issued by DigiCert for CNN.com is the first such certificate for a domain used to send email to consumers at high volumes. This certificate puts CNN — which has already been authenticating its domain with DMARC — in an “all systems go” position for participating in BIMI pilots that utilise VMC next year. With widespread use of VMC, BIMI and DMARC, brands will be able to amplify their online presence in the inbox through authenticated messages to consumers that are instantly recognisable through known, protected brand marks. DigiCert is ready to assist customers with pilot projects now and plans to have VMC certificates integrated into its DigiCert CertCentral platform by early 2020.
VuWall, a pioneer in video wall control and AV network management, announced new engineering and sales hires in the United States. Francisco Provencio has been appointed application engineer while Christian Cooper joins as account manager for the East Coast. These new positions will provide additional resources for customers throughout the U.S. as VuWall continues to grow globally. Currently, VuWall has more than 1000 deployments in over 45 countries, with more than 200 in the U.S. alone. As this number continues to grow, expanding the U.S. service and sales support team is a critical step toward healthy growth for the company. This is a continuation in overall North American corporate strategy, as earlier in the year, VuWall added resources to its marketing and inside sales teams at its Canadian headquarters. "As the demand for agile and scalable video wall and control room systems increases rapidly, VuWall has become the chosen solution provider for many installations in the U.S.," said Paul Vander Plaetse, CEO. Supporting AV integrators We strive to help our customers make informed decisions in their control room projects." "Building a solid American team will make it easier to help our customers achieve a superior visualisation experience. Francisco and Christian have years of expertise that will ensure customers are well supported in every step of the design and deployment process.", he adds. Provencio, based in Atlanta, Georgia, has more than 10 years of international experience in the AV industry — specialising in control rooms — having held both technical engineering and sales roles. In this new position, Provencio will focus on the U.S. market, supporting AV integrators and consultants with project designs, technical drawings, and on-site or remote customer demos. Cooper, based in Miami, Florida, is a seasoned AV sales manager with broad experience and technical expertise in control rooms, display walls, and digital signage for utility companies, emergency operation centers, traffic management centers, and other critical infrastructure industries. Prior to joining VuWall, he served as regional sales manager for Mitsubishi Electric. Cooper will focus on supporting integrators, consultants, and end users with their video wall projects. "We are thrilled to have Francisco and Christian join our team. In addition to being an excellent fit with the VuWall culture, bringing them on board is perfectly aligned with our consultative approach to sales," says Maryse Montagne, sales director of North America at VuWall. "Their technical expertise was a critical part in our selection process as we strive to help our customers make informed decisions in their control room projects."
The ETSI Industry Specification Group (ISG) for Network Functions Virtualisation (NFV) has started working on its next specification release, known as Release 4. While NFV-based deployments are expanding worldwide and show the benefits of network function virtualisation, new technologies are expected to be leveraged and features are being added in support of 5G and novel fixed access network deployments that are emerging in many countries. Network Functions Virtualisation-based deployments The Release 4 work programme will provide the right setting to further enhance the NFV framework The Release 4 work programme will provide the right setting to further enhance the NFV framework by considering recent technological advances, as well as ways to simplify its usage, that are aligned with the current trends in the industry towards network transformation. Release 4 addresses several new issues in the following technical areas: the evolution of the NFV framework to support the most recent cloud, software, and virtualisation techniques; novel management architectural styles and operationalisation aspects, leveraging virtualisation characteristics to simplify deployments; and increased support for automation. VNF generic operations More specifically, at its twenty-seventh plenary meeting, the ETSI ISG NFV approved, among others, new Release 4 work items to conduct a set of studies about service-based architecture design for NFV, VNF generic operations, administration and management (OAM) functions, as well as enablers for autonomous management in NFV management and orchestration (NFV-MANO). Normative work in Release 4 to enhance the support in the NFV framework for container-based deployment of VNFs was also started, addressing service interfaces for OS container management and orchestration, as well as the requirements for the management and orchestration of container cluster nodes. A better setting for the applicability to NFV of current network cloudification trends, as well as new tools to make network deployments and their operation more automatic and simpler, yet flexible, are among the expected outcomes from the new work that was launched. Network and cloud security Technical topics comprising the Release 4 scope exemplify how the NFV framework is continuously being enhanced" “The technical topics comprising the Release 4 scope exemplify well how the NFV framework is continuously being enhanced to consider existing and new technology trends and provide the demanded support by network operators and network function providers for deploying current and future network generations”, says Joan Triay, ETSI ISG NFV Technical Manager. While the ETSI ISG NFV is transitioning into the new release, the group will also continue the maintenance of Release 2 specifications, dealing with implementable protocol and data models, as well as their counterpart testing specifications to the end of 2019 and into 2020. This will ensure that bug fixes based on industry feedback are addressed, and that interoperability activities are continuously fostered. ETSI ISG NFV At the same time, protocols and data models for supporting Release 3 features are also under development. The Release 3 feature set has been frozen, after the ETSI ISG NFV delivered the specifications of the corresponding enhancements to the architecture, interface and information models in the summer of 2019.
ThreatQuotient, a security operations platform innovator, announced the company was named McAfee’s 2019 Global Security Innovation Alliance (SIA) Partner of the Year. Revealed at MPOWER Cybersecurity Summit, McAfee’s annual user conference, in Las Vegas on 1st October 2019, ThreatQuotient was selected by the SIA partner team for demonstrated commitment to customers and technical efficiency. Relevant threat intelligence The volume of available threat data has increased dramatically over the last decade, gradually becoming a cacophony of noise. Mature security organisations have raced to develop tools, teams and processes to turn threat data into timely and relevant threat intelligence. The intelligence must be distributed to existing security tools across networks that may be isolated Once this is accomplished, the intelligence must be distributed to existing security tools across networks that may be isolated from one another, and the intelligence team must get feedback from internal sighting matches. ThreatQuotient’s partnership with McAfee includes integrations and use cases that help solve these problems for customers. “With over 120 SIA partners for McAfee to choose from, ThreatQuotient is honoured to receive this award,” said Matt McCormick, SVP of Corporate and Business Development, ThreatQuotient. “Customer success is ThreatQuotient’s top priority, and this recognition reinforces both our dedication to our partnership with McAfee, as well as the on-going innovation and market leadership ThreatQuotient aims to bring to the table.” Integrated security solutions The McAfee SIA program provides customers with integrated security solutions that allow them to resolve more threats faster with fewer resources, simplify the integration of these products with complex customer environments, and provide a truly integrated, connected security ecosystem to maximise the value of existing customer security investments. By acting as a central repository of global threat intelligence, ThreatQ™ is able to correlate and enhance that intelligence against events gathered from a variety of McAfee sources. This integration expands the capability to distribute actionable intelligence to multiple security teams in an automated and near-real-time distribution architecture, increasing the effectiveness of security operations and accelerating detection and response. Threat visibility ThreatQuotient, like all SIA partners, provides strategic value, innovation and market leadership"“ThreatQuotient, like all SIA partners, provides strategic value, innovation and market leadership among other requirements to ensure our integrations improve threat visibility and create powerful new security behaviours and workflows,” said DJ Long, Vice President, Business Development at McAfee. “ThreatQuotient’s approach to threat management and their platform’s technical capabilities that allow organisations to improve the effectiveness of their security operations helped earn them this award.” Use cases for the ThreatQ and McAfee integration include, but are not limited to: MVISION Endpoint Detection and Response (EDR) Advanced Threat Defense (ATD) Enterprise Security Manager (ESM) Threat Intelligence Exchange (TIE) Active Response (MAR) Network Security Manager (NSM)
The newest version of an iconic access control and site management system looks set to revolutionise, both, the operator and user experience. Gallagher Security has released Command Centre v8.10, the latest version of its site management software, with a range of features and enhancements that simplify and improve operation. Improvements to site plans reduce information overload for busy or complex sites by introducing progressive disclosure – the ability to zoom in to reveal more information. It is now easier to create a site plan that includes all floors in the building and easily navigate between them, while new site plan privileges provide greater control over the level of information operators are exposed to. Integration with IDEMIA MorphoWave Compact allows users to be identified with a wave of their hand. This high-level biometric integration delivers faster, more secure biometric access while simplifying the collection and management of biometric data and access rights, and preventing duplication and synchronisation issues. Reducing cyber risk Gallagher’s Mobile Connect app can now be used to open both Gallagher and SALTO Bluetooth® doors with Command Centre v8.10. The SALTO credential has been combined with the Gallagher credential to retain a single mobile credential for each user in Command Centre. Using a single credential and app to open doors creates a simpler experience for users and is easier for operators to manage on a day-to-day basis. The newest release introduces car park management, making it easy to manage and configure parking allocation. Site plan functionality provides detailed oversight, ensuring car park spaces are used efficiently. Improvements to the Inbound Events REST API allow Command Centre to receive external events from third party systems to generate alarms, view alarm instructions, provide alarm indications on site plans, generate notifications, and run reports in Command Centre. This new release builds on Gallagher’s ongoing commitment to design and manufacture security technology that protects people, places, and assets across the world. Enhanced functionality As with all Gallagher version releases, a wide range of minor enhancements that improve existing functionality are included. Gallagher offers a software maintenance programme which provides customers the opportunity to upgrade to every new version of Command Centre as it is released. Adopting the latest technology as it is released helps ensure customers stay ahead of emerging threats and new vulnerabilities – reducing their cyber risk, enhancing system performance, and guaranteeing continued compliance with government standards.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilised than others: financial services were quick to recognise the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realise is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimise displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyse and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organisations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organisations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using smartphone apps to open doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Improved fingerprint solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defence and other public section use cases where higher security is needed. Flexible subscription models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimisation solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating valuable insights with machine learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focussed on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organisations incorporate this type of analytics engine into their access control systems, they will improve security and personalise the user experience while driving better business decisions.
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analogue with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cyber security requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available” “We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organisations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organisations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our heathcare mini series here and here.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilising so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilising a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organisation, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualisation tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organisations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson football game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analysing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organisational change is difficult, and our team hopes to make the transition process easier for our customers.”
One of the common characteristics of trade shows is booths with walls and walls of new products. Sometimes exhibitors seem intent on displaying everything in their portfolio, even though the displays appear cluttered and may not be welcoming. In an age of system sales, in particular, the emphasis on products can seem off kilter. Discussions with exhibitors at this year’s GSX show reveal a new awareness of the need for less cluttered booths, but the equipment walls persist. Here’s a review of Day 2 from the show floor. Allegion embrace more open booth design At GSX 2019, Allegion is among the exhibitors embracing a new, more open booth design that encourages engagement with customers and puts less emphasis on product displays. Discussions at the Allegion booth have centred around the value proposition and lower complexity of network-connected access control systems. The approach has been gaining a higher profile at Allegion since the company acquired Isonas, whose system configuration involves a reader-controller connected to the network via power-over-Ethernet cable. “Customers are also asking about Bluetooth technology and mobile applications,” said Jonathan Mooney, Allegion sales leader. Allegion is looking to deploy the Isonas software in other products in their portfolio; it will be offered in the range of Schlage wireless locks by the middle of 2020.The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control" “The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control,” said Mooney. Bosch offer complete security solution Bosch is introducing 55 new products at GSX 2019, but when it comes down to it, the company’s overarching message is not about individual products but about how they can be combined into a larger system. “At the end of the day, the message from Bosch is ‘how do I create a complete security solution?’” said Paul Garms, Bosch Director, Regional Marketing Security. “That’s what we are trying to demonstrate: How do all these things integrate?” Most of interest to attendees are actual demonstrations, which are a unique aspect of the trade show experience. “It’s nice at a show where we can really demonstrate what we are talking about when we say ‘integrated solution,’” said Garms. “And people can say, ‘oh yeah, if I trip this video analytic, the speaker will warn me I am approaching a restricted area.’ Or, when the manager signs in on the intrusion panel, now the associate can access a door he wasn’t able to before. It’s that integration and the complete solution that resonates. People are also interested in new products. At a show, they like to see them in operation.” At the Bosch booth, there is a big wall that illustrates some integration possibilities. An array of cameras was among the 55 new products introduced by Bosch, which also emphasised systems. Machine learning and advanced video analytics One implementation featured on the wall is Bosch’s Camera Trainer machine learning system. The system can “train” a camera to recognise a car in a parking lot, for example. Among the new Bosch products is the Autodome 7000i, the next generation of a best-selling camera, now with H.265 encoding and analytics such as line crossing. There is also an outdoor panoramic camera that is adjustable to 180-degree or 360-degree views. The new, less expensive 3000i series cameras provide an affordable option with edge analytics and Bosch’s data security protection included. Integration from Honeywell as well as 'the bigger picture' At Honeywell Security Group, Senior Product Manager G. Eric Green said the show seems to be much better attended than last year, “and we have had a lot of interest in our products.” Even end-user attendees typical of the GSX show are interested in the details of technology, as well as “the bigger picture,” commented Green. “Some of our booth visitors want to get into the weeds,” he said. “They say they want this piece of hardware. But they also also interested in the big picture. How things are interacting is very important.” Honeywell announced the 30 Series IP cameras, which can be used as part of video systems that comply with National Defense Authorization Act Section 889" “Most customers have installed products from other vendors that they expect us to work with. So integration is always at the top of the list. Can you work with these guys? Do you have an API? Do you support this piece of equipment? We always hear that a lot,” said Green. “There are customers who want best-in-breed products, but they’re not necessarily concerned about that coming from one manufacturer,” he said. “Other customers want ‘one throat to choke.’ When something goes wrong, they don’t want any finger-pointing.” Web-based security console and frictionless access control Honeywell is showing a beta version of its Pro-Watch 5.0 product, which is coming out in Q1 next year. It is an integrated security console that provides a map view of access control, video management, intrusion and other third party systems. The web-based platform offers access to each element, all controlled by permissions. “We are also building in an incident workflow engine that allows an operator to see exactly what steps he should take when something occurs as defined by the supervisor or a security director,” said Green. “It can literally walk you through, and it is completely freeform. Whatever you want it to say, it will say. This works in conjunction with access control, video, and all the things we talk to.” The Honeywell booth was a busy place on day two of GSX 2019 Another new Honeywell product is the OmniAssure Touch reader, a “frictionless” device that can read a credential off a smart phone in a user’s pocket. The user merely touches the reader, and it scans the area for a nearby mobile device that is authorised, and you can walk through the door. Honeywell also announced the 30 Series IP cameras, which are encrypted and can be used as part of video systems that comply with National Defense Authorization Act Section 889. They are made in Taiwan. Arcules' cloud security solution “There are fewer people here at GSX 2019, but we have seen a lot of really big companies looking for a cloud service,” said Andreas Pettersson, CEO of cloud video company Arcules. At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive: They say “we want to move to the cloud.” Pettersson theorised that concerns about a possible weakening economy may prompt some companies to avoid the large capital expenditure of procuring a new on-premise system and instead opt for the minimal investment needed for a cloud system. Monthly operating expenses of a cloud system are also predictable and more easily managed, said Pettersson.At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive Arcules is proactive on the subject of cybersecurity and has a two-page handout that summarises the cybersecurity advantages of their system. They are eager to talk about cybersecurity as it relates to cloud systems, said Pettersson. He said that, in his experience, on-premise systems tend to have more cybersecurity issues, whether because ports are left open or a firewall is implemented incorrectly. Users may also seek to bypass the firewall — a dangerous practice that is not an option with cloud systems. Security patches may not have been implemented; in a cloud system, such updates are pushed out automatically. The recurring monthly revenue (RMR) aspect of cloud systems are a windfall to integrators who embrace the cloud. “One integrator said he went on vacation for the first time in years because he had the extra money coming in,” said Pettersson. Control room integration from Vistacom "We're still fairly new to GSX, as our first show was 5 years ago, but what we have noticed is that the show continues to attract valuable attendees and drive critical conversations around what companies like ours must bring to the table in order to be successful in this space," said Dan Gundry, Director of Sales and Marketing, Vistacom. "We've had so many chances to learn from and share with potential customers and partners, and as a result, we continue to forge great relationships.” Vistacom is highlighting its control room integration and the value enterprise organisations can gain from implementing one in their facility. The company works alongside end-user customers and security integrators to build a command centre space, taking into account video wall display technology, operator consoles and furniture, audio and lighting considerations, as well as temperature and more, in an effort to optimise these centres. Stay tuned for the full GSX 2019 show review.
An upgrade of surveillance, using the latest video technology from IDIS, has put Circuit Zandvoort in poll position as host venue for the 2020 Formula 1 Grand Prix in the Netherlands. As well as wider improvements to the track, a top priority at the circuit was a complete overhaul of the video monitoring capability to meet the requirements of Formula 1. Security and safety surveillance For Track Manager Niek Oude Luttikhuis a key objective was to rapidly implement a solution that would be much easier than the previous system to use, maintain and adapt in the future. To achieve this, he brought together a team including IDIS – Korea’s surveillance manufacturer. Significantly improving security and safety surveillance of the track, their solution will also let the Formula 1 organisers temporarily receive functional authorised access of video data for the duration of the competition. Video management software Circuit Zandvoort will be able to take advantage of IDIS Critical Failover technology as a service module within the IDIS VMS At the heart of Circuit Zandvoort’s new system is IDIS’s server-crunching, 64 channel DS-IR300 NVR technology, pre-loaded with IDIS Solution Suite video management software (VMS). This allows all the track’s existing cameras to be easily integrated and operated alongside the latest IDIS 5MP speed dome PTZs and 12MP bullet cameras. It also delivers impressive new functionality, including ultra-high-definition monitoring capability using IDIS Smart UX Controls. The system now provides real-time image capture of the highest quality, with no lag, ghost-shadowing or stuttering of images, even when cars travelling at high speed are displayed. Critical Failover technology Images on the racing control room video wall are now crisp and clear. And looking ahead, the IDIS Solution Suite VMS will make it easier to sustain this high standard by allowing cost-efficient, remote firmware updates and system maintenance. Circuit Zandvoort will also now be able to take advantage of IDIS Critical Failover technology as a service module within the IDIS VMS. This protects against video data loss due to a wide range of potential fault conditions, such as network instability or power failure. It ensures that recordings are automatically updated without the need for engineer callouts and with no risk of gaps in recordings while the fault is resolved. No interruption to surveillance IDIS demonstrated a deep understanding of the security and operational requirements of our circuit"The entire upgrade was completed while the original system continued to run in parallel, confirms Track Manager Niek Oude Luttikhuis. This meant there was no interruption to surveillance during implementation, which was vitally important as the track is in almost continuous use. “There is fantastic mutual communication between IDIS and the different suppliers – they think ahead and complement each other,” says Mr Luttikhuis. “And from the start IDIS demonstrated a deep understanding of the security and operational requirements of our circuit and a passion for motor racing.” PTZ cameras for tracking With the new system operational as promised, in the control room a rotating team of 10 people work with the IDIS Solution Suite VMS, with minimal training required to use all its features and functions – including easy search and retrieval, and silky-smooth control of the ultra-high-definition (UHD) PTZ cameras for tracking in real-time. Authorisation levels can be set, giving each individual specific user rights, and during the Grand Prix itself the Formula 1 organisers will also be given access to the system. If necessary, this will also include the ability to view and retrieve footage on mobile devices via the IDIS Mobile app – helping the 2020 Formula 1 Grand Prix to run smoothly behind the scenes.
A global UK department store, with a commitment to offering quality products and outstanding service, has ensured the protection of its customer service mobile equipment with Traka’s intelligent locker solutions. Traka’s specialist locker systems The high street favourite has integrated Traka’s specialist locker systems throughout its branch network and top ranking online operations, to store, charge and manage dedicated mobile devices, enabling instant availability for customer service teams across the UK. The high street favourite has integrated Traka’s specialist locker systems throughout its branch network The move was part of a key store investment strategy, which introduced the mobile devices to enable authorised users to take web orders and respond to customer enquiries and stock checks, instantly and efficiently. Digital key management Speaking about the use of digital key management and its impact on the department store processes, a representative for the store said, “We are devoted to working on every aspect of our operations, to continue our pledge of delivering quality products and outstanding service. We believe this, put together with our continued commitment to price matching is what is resonating with our customers.” “We want to streamline our stores and online services to be equally enjoyable places to shop. We are aware we need to respond to personalised customer queries quickly and efficiently, with the right information on any product or service. Intelligent tracking technology “To achieve this, we need our customer-facing teams to be equipped with fast working intelligent technology. Here, Traka excelled at providing a branch solution that allows us to not only store dedicated devices securely, but also integrates into our daily operational systems. We can track where each device is and provide staff with peace of mind that every device is fully charged and up to date with our latest exclusive offers.” Traka’s intelligent lockers were fully networked into existing systems, using its latest generation TrakaWEB software Traka’s intelligent lockers were fully networked into existing systems, using its latest generation TrakaWEB software. This offered in-locker charging facilities, full audit control capability, dedicated fault reporting on any issues with a piece of equipment, and capability to exchange an item with minimal time or resource disruption. Intelligent locker systems Steve Bumphrey, Traka UK Sales Director added, “Any department store’s success is dependent on providing a high level of service, deep knowledge of what it is they’re selling, and a willingness to ensure customers receive the right item. Being able to do so quickly and efficiently, is where the introduction of mobile devices have proven invaluable.” Steve adds, “Traka’s involvement was to understand the unique requirements of the customer services teams and create and network our intelligent locker systems, to make a significant operational difference. Staff no longer need to hunt for working devices to respond to customer enquiries, safe in the knowledge they are ready to use with very latest cross brand and department product and service information and pricing.”
AASA, The School Superintendents Association, has formed a new partnership with Armor At Hand™, a company that manufacturers Smart Shields™ connected to the internet and are capable of protecting users from handguns and high-powered rifles. The Shields serve as a first layer of protection in the event of an intrusion and serve as an alarm to alert those connected to the system a potential threat is occurring. Armor At Hand manufactures the world’s first lightweight, mobile Smart Shields with internet connectivity and U.S. National Institute of Justice (NIJ) level 3 equivalent test rating, giving it the ability to stop high-powered rifle rounds. Schools, workplaces, places of worship and other venues now have access to the Smart Shield. AASA members can receive a special offer to receive a Smart Shield from Armor At Hand. Immediate protection at first encounter "Armor At Hand’s partnership with AASA speaks to both organisations’ commitment to providing resources to assist school districts before, during and after a crisis,” said Chad Ahrens, founder and CEO, Armor At Hand. “With access to more than 12,000 school districts, the AASA partnership enables us to reach the people that the Smart Shields are designed to protect.” The Shields hide discreetly in plain sight, yet, provide immediate protection at first encounter. Once one of the shields is moved, all the shields in the area are alerted and will light up and buzz while autonomously sending an alert to authorities of a potential threat. Armor At Hand Smart Shield uses ArcGIS by Esri to map real-time danger areas and safe zones while simultaneously offering route guidance to safety for those in harm’s way. Activation movement amount and timeframes are setup at installation to meet the needs of each site. Emerging technology in security “AASA is proud to be partnering with Armor At Hand,” said Daniel A. Domenech, executive director, AASA. “Threats of violence at our schools has continued to be an issue that must be addressed. AASA is committed to keeping students, teachers and schools around the country safe. Launching this partnership with Armor At Hand is indicative of our commitment to doing that by using emerging technology in security.” AASA is the premiere membership organisation representing public school district superintendents across the country and the world. The primary goal of AASA is to advocate for highest quality public education for all students, as well as to develop and support school system leaders.
The sensor solutions provider HENSOLDT will equip the Royal Thai Police with its Single Mast Solution (SMS) consisting of the Spexer 360 radar integrated with an electro-optics system and the CxEye Software. After passing acceptance trials without issue, the SMS was delivered. SPEXER 360 X-band radar “Our Single Mast Solution is an extremely reliable radar, particularly suited for situational awareness”, said Nathan Manzi, Head of Asia Pacific for HENSOLDT. “CxEye assists the users, in real time, to easily and quickly evaluate and coordinate a response to threats.” SPEXER 360 is a lightweight, low power, X-band radar, designed to be deployed on a variety of platforms. SPEXER 360 can be easily integrated with additional sensors through a highly flexible C2 system. Designed for both military and civil applications SPEXER 360 offers a highly capable and affordable surveillance capability. HENSOLDT’s CxEye, command, control and display software, provides powerful integration for sensors, such as radars and cameras, within a single, simple, easy to use display package.
Genetec Inc., globally renowned technology provider of unified security, public safety, operations, and business intelligence has announced that the city of New Orleans (NOLA) is relying on Security Center, the company’s unified IP security platform, to improve public safety and enhance city-wide collaboration. With about 400,000 residents, New Orleans (NOLA) is the most populous city in the State of Louisiana. Like other big cities, NOLA is focused on enhancing public safety for its citizens and the 1.2 million visitors who flock to the city’s French Quarter for Mardi Gras celebrations. Using Security Center, the NOHSEP agency has saved police officers about 2000 hrs of investigative work in just a year Genetec Security Center As part of a Citywide Public Safety Improvement Plan that included the deployment of a new citywide public safety system and the construction of a Real-Time Crime Center (RTCC), the New Orleans Homeland Security and Emergency Preparedness (NOHSEP) chose the Genetec Security Center unified platform to support all city agencies. Using Security Center, the NOHSEP agency has saved police officers about 2000 hours of on-foot investigative work in just one year. “It might take a police officer over an hour to visit business locations, speak with owners, look through video, find what they are looking for, get a copy of video onto USB keys, drive back to the precinct, and then submit that into evidence." said George Barlow Brown, IT Manager at the New Orleans Real Time Crime Center. Video and ALPR cameras He adds, “So, we have essentially saved the department over 2000 hours of manual labor in physically collecting and storing video evidence. That’s more time for officers to respond to calls of service and be present in our many neighborhoods, which helps build community confidence. The ROI is there for us in terms of the efficiency,” The team can now easily retrieve evidence from over 325 city-owned video cameras and 100 automatic license plate recognition (ALPR) cameras (60 of which are Security Center AutoVu cameras) from the Real-Time Crime Center. The new security platform is integrated with other public safety solutions such as a Briefcam analytics system and a computer-assisted dispatch (CAD) system. All this information gets routed through to a central command center, speeding up emergency response. Share video access with RTCC “Our operators do the full investigative work right from within Security Center. It’s just one of the most intuitive solutions that I have ever seen. We can display up to six video tiles and hit ‘synchronise video’ to see various angles of the same scene playing at the same time. We can then select the segment of video we need and hit export. Each 10-minute segment from all the video tiles is then archived for viewing later on,” said Brown. NOLA is also leveraging Security Center to foster a true public-private partnership. The city launched a platinum version of the SafeCam project, which allows businesses to share access to external video cameras with the RTCC. Motion-detection alarms Using the Genetec Federation feature, the NOHSEP team can access video from participating companies’ systems Using the Genetec Federation feature, the NOHSEP team can access video from participating companies’ systems. Participating businesses can be identified by discrete signage at their front entrances. This tells on-the-ground officers that this business has shared their outdoor cameras with the RTCC, and there is no reason to disturb the establishment or their customers. The officer can simply call RTCC operators to get the evidence they need. Brown and his team also have motion-detection alarms set up on cameras facing some known illegal dumping sites. As soon as someone dumps refuge in these locations, the team can proactively notify the Sanitation Department so they can collect the debris. Mining video and data NOLA is making the most of its security investments to improve city life too. For one, the RTCC operates a backup emergency operations center for the city of New Orleans. The NOHSEP team has also shared video feeds with other city departments such as the Sewage and Water Board, so they can determine the rate at which an intersection floods. As plans continue to evolve, the RTCC team is taking full advantage of the new technology to keep NOLA safer. “As far as investigations and the ability to mine video and data, Security Center is hands-down the best product out there. With this platform, we’re extending greater efficiency to responding officers, and we’re also forging stronger partnerships with our community. Together, we’re all working smarter and faster to keep New Orleans safe,” concluded Brown.
As in every health facility, security for the Haute Savoie region’s new hospital presented a complex challenge. Access control required multiple checkpoints and access rights tailored to individual staff and contractors. Real-time control, enabling managers to respond proactively including by opening and closing doors remotely, was another essential. To meet their security challenges, managers selected Aperio® locking technology integrated online with an ARD access management system. Because Aperio® locks are wireless, the hospital could introduce many more layers of security and secure doors without incurring excessive installation or operating costs, including for sensitive offices and drug stores. Central access system software Secure 128-bit AES encryption protects communications between Aperio® lock, hub and system Now staff no longer carry key bunches or waste valuable time hunting down relevant keys. All their individual permissions are stored on a single, programmable RFID credential. Alongside standard wired locking, the hospital chose 1,300 Aperio® wireless escutcheons, 10 Aperio® wireless handles with integrated RFID reader, and 301 Aperio® wall readers. A network of 228 Aperio® communications hubs connects every Aperio® lock wirelessly to the central access system software. All these battery-powered Aperio® devices integrate natively with the centralised access system, so wired and wireless access points at Centre Hospitalier Métropole Savoie (CHMS) are managed together, with real-time management logs, remote door opening and free time slot management. Secure 128-bit AES encryption protects communications between Aperio® lock, hub and system. Maintaining access control autonomously “Having just a single badge — and not having to carry around heavy keys — has been a major advantage for us,” says Béatrice Dequidt, Health Executive at CHMS. “This solution's advantage is it represents a single site from an authorisation management and systems perspective,” explains Aurélien De Riols, ARD’s Eastern Region Director. One single, intuitive management interface enables security teams to administer and maintain access control autonomously, as well as streamline laborious everyday tasks. “We have implemented internal HR management procedures, creating badges that are automatically integrated into ARD's operating software,” adds Alain Gestin, CHMS’s IT Systems Architect. Aperio and ARD maintain compatibility of credentials with the French government’s electronic Health Professional Card (CPS), for added staff convenience. For every site user, the advantages of carrying a single RFID-enabled badge — instead of multiple keys — are clear.
Round table discussion
Along with the integration of security and other systems in an enterprise environment comes a need to centralise monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyse the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
The high cost of thermal imaging cameras historically made their use more likely in specialised law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?