Internet of Things (IoT)
Pulse Secure, global provider of secure access solutions to both enterprises and service providers, has been recognised as a technology leader and among the top three performers in Network Access Control (NAC) according to research by Quadrant Knowledge Solutions. The NAC market, estimated at nearly $1.3 billion and growing by 27.6 percent per year, is driven by workforce mobility and Bring Your Own Device (BYOD), global regulations, automated threat response and Internet of Things (IoT) securi...
Cloud platforms and applications are becoming prevalent across security solutions. In the simplest terms, cloud systems store and access data and programs over the Internet instead of using an on-premises computer server. The cloud is a metaphor for the Internet. This technology helps security integrators provide managed services and the advantages of off-site systems and services to customers, which is why cloud computing is often mentioned among the 'megatrends' in the physical security indu...
Security industry stakeholders from around the world are readying themselves for a productive three days of business in Taipei, as the countdown to the 22nd edition of Secutech enters its final few weeks. On top of the business and networking opportunities that Secutech creates, the fair also plays a crucial role for information exchange within the security industry. This year, the fair’s fringe programme will cover all of the most important topics for the Asian market, including the appli...
Executives from Johnson Controls, Microsoft Corp. and the Middle East’s sustainability pioneer, Bee’ah, have announced an agreement to enhance Bee’ah’s new headquarters located in Sharjah, United Arab Emirates, with a sweeping array of artificial intelligence (AI) and smart building solutions powered by Microsoft. Digital Vault Johnson Controls will work with Microsoft to outfit the new building with intelligent edge systems Using its Digital Vault offering and extende...
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
Sonitrol, the provider of verified electronic security, announces the launch of TotalGuard Smart Hub & Wireless Devices that offer a more robust security solution to the small and medium business markets. This new offering includes a variety of wireless sensors that connect to the new TotalGuard Smart Hub, expanding reach and alarm capabilities. Sonitrol’s TotalGuard solution, launched in 2018, targets the small to medium business market by offering affordable, professional security....
Keyfactor, a provider of secure digital identity management solutions, announces the launch of Keyfactor Control 6. This newest release of the company’s flagship, end-to-end secure identity platform addresses scalability in connected device security. Keyfactor Control secures, authenticates and future-proofs IoT identity at every step of the device lifecycle, providing a scalable IoT security solution. “The threat landscape is changing – trends like IoMT are creating new security risks and attack vectors, particularly when it comes to connected healthcare,” says Ted Shorter, CTO and Co-Founder of Keyfactor. “Any data transmitted across a network represents digital identities of patients and connected hospital equipment. Protecting highly sensitive data like medical records calls for end-to-end encryption and digital signatures to secure and protect it from compromise.” Security posture of devices Keyfactor Control embeds high-assurance secure device identity from manufacturing through deployment and operation According to Gartner Inc., a research and advisory firm, “the IoT brings significant IT capability to a healthcare delivery organisation, but brings with it additional risks. These new IoT-based vulnerabilities are outside the normally understood boundaries of information security or cybersecurity when viewed from the IT perspective1.” “In terms of IoT devices, getting security ‘right’ must happen at design time,” says Shorter. “But it’s not all about devices – security has become a part of the larger equation and organisations need to consider the security posture of devices as an aspect of its overall effectiveness when making purchasing decisions.” Keyfactor Control embeds high-assurance secure device identity from manufacturing through deployment and operation. The platform’s capabilities include IoT security scalability, one-step Root of Trust (RoT) management and fully managed private PKI. Innovative product teams Key features include: Secure Code Signing – Turnkey firmware signing and verification implementation via Keyfactor Control SDK, which ensures genuine software installations. Centralised PKI Management – Enabling the ability to discover, monitor, issue and replace millions of certificates and keys in real-time. No More Shared Credentials – Allowing every device to generate its own unique cryptographic key securely, which never leave the device that generated them. Global Manufacturing Support – Automatically registering and securing all devices, regardless of where they’re manufactured. Device Encryption – Providing encryption on device and in transit, ensuring continuous device overlay. “As the number of connected devices continues to grow, continuously managing security across those devices becomes a tougher task,” says Kevin von Keyserling, CEO and Co-Founder of Keyfactor. “Keyfactor Control delivers just that – control over every connected device on the network. Critical security tasks that could take weeks can be done with the click of a button. Customers can disconnect compromised or suspicious devices and replace keys and trusted roots instantly, without disruption and in real-time. This is a game changer for innovative product teams needing a competitive edge.”
IdenTrust, (part of HID Global), the provider of digital certificates, and Device Authority, a global leader in Identity and Access Management (IAM) for the Internet of Things (IoT), announces a strategic alliance with a vision to provide trusted identity lifecycle management for enterprises on their digital transformation journey. Device certificates have traditionally been used to secure routers, firewalls, servers, and other devices capable of securely handling private keys and implementing PKI technologies. However, in the new IoT world, device certificates can be used to secure a wide range of networked assets, such as ATM machines, medical devices, surveillance cameras, industrial machines, refrigerators, vehicles and much more. Swift integration IdenTrust’s comprehensive identity-based digital certificate solutions deliver assured individual and device identity for financial institutions, healthcare providers, government agencies and enterprises around the world. With over 5 million certificates in active production, IdenTrust supports over 18 billion validations per year and is the world’s pioneer digital Certification Authority. Device Authority’s KeyScaler automation engine provides secure IoT device registration and provisioning through an innovative policy-driven credential delivery and management system that ensures certificates can be easily rotated, renewed and managed without human intervention. The platform is designed for swift integration and interoperability in support of today’s rapidly expanding IoT application market. The combination simplifies the process of enhancing device security and its administration for our customers" Combining Device Authority’s KeyScaler platform capabilities with IdenTrust’s trusted digital certificate solutions provides customers with a complete IoT security solution that automates compliance, minimises costly manual intervention and manages risks in a diverse industrial regulatory marketplace. Enhancing device security “The relationship between IdenTrust and Device Authority links our trusted certificate authority with a seamless and scalable means to efficiently manage the lifecycle of issued digital certificates in the rapidly expanding IoT device market,” said Brad Jarvis, Vice President and Managing Director of Identity & Access Management Solutions (IAMS) with HID Global. “The combination simplifies the process of enhancing device security and its administration for our customers.” “We’re delighted to be working with the IdenTrust team to provide device and data trust for their customers embarking on their IoT journey. With a mixed environment of devices emerging in healthcare, industrial, and government sectors, the combined value delivered from both companies has a strong positioning for physical, enterprise and IoT IAM customer solutions,” said Darron Antill, CEO of Device Authority.
Honeywell announced a technology integration with Intel that will enable new artificial intelligence (AI) capabilities in its MAXPRO® connected security platform. The new security platform, which will support MAXPRO Network Video Recorders (NVR) and Video Management Systems (VMS), will incorporate Intel® Vision products that enable advanced analytics, deep learning and facial recognition capabilities. These greatly enhanced security solutions will drive cost and time savings by significantly reducing false alarms and will meet compliance requirements such as General Data Protection Regulation (GDPR) through identity anonymisation. Commercial building security “Ensuring the security of commercial buildings and the safety of those within them has always been Honeywell’s top priority,” said Pete Lau, President, Commercial Security, Honeywell. “With emerging technology like analytics, facial recognition and deep learning, Honeywell and Intel are connecting buildings and protecting people like never before.” End users require a solution that combines both building security and IT systems to address the challenge Advances in security and surveillance technology have increased demand for high-definition video and imaging offered by Internet Protocol (IP) cameras. The video surveillance global market is estimated to exceed $68 billion by 2023. At the same time, the technology to properly process the surge in vision data has lagged. End users require a solution that combines both building security and IT systems to address the challenge. AI capabilities and enhanced site security The integration of Intel Vision Products into the Honeywell MAXPRO NVR and VMS products will result in solutions that enhance site security and operator productivity. These integrated, customisable products will accelerate the processing time of each video stream and increase the number of cameras that can stream in real time through a single device. The adoption of Intel® Vision Accelerator Design products will provide Honeywell’s security offerings with advanced AI capabilities with computational efficiency, allowing them to analyse video data with improved detection accuracy. Securing buildings, campuses and banks The Honeywell MAXPRO solution allows customers to process and analyse visual data" “With rapid advances in AI technology fuelled by the influx of enormous amounts of visual data, our customers are presented with powerful new opportunities in multiple areas including edge video analytics and security,” said Jonathan Ballon, Vice President, Intel Internet of Things Group. “The Honeywell MAXPRO solution, powered by Intel Vision Products, allows customers to process and analyse visual data in near real-time to make decisions faster, drive faster time to results and help ensure secure buildings, campus environments and banking institutions.” OpenVINO™ toolkit Beyond the software and hardware integrations, the partnership will also leverage the Intel® Distribution of OpenVINO™ toolkit, which fast tracks the development of computer vision and deep learning inference into vision applications. Through the toolkit, end users can accelerate computer vision performance, shorten vision solution development, and streamline deep learning inference and deployment. The toolkit’s deep learning capabilities will support Honeywell’s Face Recognition analytics, providing another layer of detail in the software that allows it to learn faces of known entities in an organisation. The software is also capable of removing face recognition data it doesn’t recognise in compliance with GDPR requirements. Intel IoT RFP Ready Kits are focused technology offerings that solve a class of market problems IoT Solutions Alliance Honeywell will join the Intel IoT Solutions Alliance (ISA) and participate in Intel IoT RFP Ready Kits. A global organisation comprised of more than 250 technology companies, ISA is dedicated to the development of scalable IoT and machine internet solutions. Intel IoT RFP Ready Kits are focused technology offerings that solve a class of market problems, have been deployed and tested in the field, and provide bundled hardware, software and support. The technology is designed to grow with customer requirements. Honeywell MAXPRO and Face Recognition are among a suite of vision security solutions alongside Xtralis LoiterTrace, an image analysis tool that identifies and tracks suspicious activity, and Xtralis IntrusionTrace, a video analytics program for real-time intrusion detection. The solutions suite is ideal for high traffic, sensitive environments including enterprise campuses, pharmaceutical companies, and banking and financial institutions.
Security and Safety Things (SAST) - A Bosch IoT startup, hosted the first-ever live hackathon at ISC West on the 10th and 11th of April in the Sands Expo Center, Las Vegas. The two-day event featured three teams racing against the clock to create the most deployable application for an American football stadium using the new Security and Safety things system, SAST OS (Operating system). Teams were provided with Google pixel phones, reference cameras and appropriate APIs and development kits, including a video API, control API and a web server API. From there, they were tasked with developing creative solutions that would inspire new use cases and generate business insights, through the use of SAST OS. Software development environment Submissions were reviewed by Jim Coleman, Convergint; Staffan Grundström, Securitas; and Markus Berger-de León, Partner McKinsey & Company. The goal of the challenge was to develop apps, but also to show the industry how easy apps and solutions can be developed using SAST OS. Furthermore, the hackathon provided valuable feedback that will impact future development of SAST OS and the software development environment. SAST believes that the ecosystems and framework they have created will soon be a powerful standard for developers, integrators and hardware manufacturers alike. The hackathon showcased the ease of use of the system overall, and will act as a starting point for future innovations / developments.
Dahua Technology, a video-centric smart IoT solution and service provider, showcases a wide range of competitive product portfolios and smart solutions to top security professionals during the International Security Conference and Expo (ISC West) at booth #14039 from April 10th to 12th. Dahua will also celebrate the fifth anniversary of its USA subsidiary on Wednesday evening, showing strong commitment to the local markets. Running with the theme ‘Empowering through Technology’, the Dahua products and technologies exhibited during ISC West are comprehensive from every aspect covering major surveillance market demands with the most advanced technologies. Competitive product portfolios Facial Recognition - Dahua Facial Recognition technology integrates face recognition, blacklist alarm, stranger alarm, VIP recognition, face tracking, face search, metadata search and other functions to offer a series of smart products including the exhibited AI Smart Capture Camera, 4MP Starlight Face Recognition IR Dome AI Network Camera and IVSS series for various scenarios and customer demands. Low - light Technology - Featuring advanced Starlight technology, Dahua starlight+ products are able to provide excellent colourful image and rich details even at night, solving the problem of poor colour reproduction of images under low illumination environment with image colour reproduction, large aperture, ultra-high sensor, white light and other technologies. Dahua Smart Thermal Series Cameras can be widely used for security monitoring, fire prevention and temperature measurementThermal Technology - Through a new integration of visible-light and thermal-light and a variety of AI-enabled intelligent functions, Dahua Smart Thermal Series Cameras can be widely used for security monitoring, fire prevention and temperature measurement. Combined with the back-end storage NVR and DSS PRO, Dahua Technology can provide an all-in-one system with front-ends, storages, and intelligent analytics to meet the requirements of customers. Smart Tracking - Dahua radar system consists of radar and speed dome camera (PTZ). On the basis of traditional CCTV security system, it combines the accurate target tracking performance of the radar products to provide a complete solution with front-end data acquisition, edge computing and back-end storage for a wide range of applications such as prison perimeter, airport runway, industrial park, energy pipeline and other important protection areas. Wide Area Security - The Dahua Multi-sensor Series Cameras can be used for large scene monitoring, target tracking, simple management and multi-service convergence. The Dahua 4x2MP Multi-sensor Cameras possess ground-breaking flexibility that can simultaneously move each sensor module around the internal track for a 180-, 270-, or 360-degree panorama, minimising blind spots for an improved situational awareness, which is ideal for parking lots, supermarkets and intersections, etc. HDCVI 5.0 - The recently launched Dahua HDCVI 5.0 brings five core values: Perimeter Protection, Face Recognition, Metadata Search, Active Deterrence and Starlight & Full Colour. Perimeter protection can identify humans and vehicles while filtering less important objects, face recognition let authorised persons to pass freely and can do immediate action to strangers, with the latest AI technology we make video surveillance more efficient and easy to use. AI-enabled Intelligent Solutions Featuring the above technologies, Dahua Technology also presented integrated solutions for a variety of vertical markets at the Expo. Intelligent Retail Solution - Dahua Smart Retail Solution applies video intelligence technology to specific retail business scenarios. According to the scenarios of large chain supermarkets, we have developed five smart application scenarios including smart entrance and exit, shelf advertising, cashier loss prevention, operation analysis and remote shop patrol to help retailers optimise store layout and product display, improve storage efficiency as well as attract traffic flow. Intelligent Logistics Solution - Dahua Intelligent Logistics Solution takes Dahua video technology as the cornerstone, combine intelligent analysis technology, machine vision technology, big data technology, etc. to further divide into five sub-solutions including machine vision DWS solution, video tracking solution, vehicle entrance solution, park surveillance solution and logistics vehicle solution for different application scenarios. Intelligent Residential Solution - Dahua Intelligent Residential Solution provides an integrated and economic solution with multi-level protection including personal entrance, vehicle entrance, public area, unit security, home protection and control center to make people’s life more convenient, safer and smarter while improving operation efficient and saving energy for property owners. Intelligent Critical Infrastructure Solution - Dahua Intelligent Critical Infrastructure Solution offers an end-to-end solution featuring perimeter protection, thermal measurement, access control, video surveillance and auto-tracking system for electric power stations, oil and gas industries to ensure the safety of their daily operations, timely detection of terrorist threats and fire, quickly and easily viewing station status. Intelligent Education Solution - Dahua Intelligent Education Solution brings a new concept of pre-warning for campus administrators. The solution incorporates important scenario applications empowered by AI technology such as perimeter, entrance, public area, building and classroom to realise threat prediction, effective management of people and vehicles, establishing a secured and smart system for students and teachers while improving operation efficiency. Reliable security solutions Dahua Technology empowers our dealers and integrators to stay at the top of their field by providing the latest security solutions to their end-users" Empowering signifies Dahua Technology’s dedication to promoting customer satisfaction and partner development. While market demands are constantly evolving, Dahua Technology’s offering is also evolving to meet current and future needs, giving partners and end-users the assurance that they’ve selected competitive and reliable security solutions on the market. “Dahua Technology empowers our dealers and integrators to stay at the top of their field by providing the latest security solutions to their end-users,” Tim Shen, Director of Marketing at Dahua Technology USA, explained. “In addition, the resources we make available to our dealers ensure that they are up-to-speed on their knowledge of our technology and fully trained on the products.” To further address Dahua Technology’s social commitment locally, a group of the staff from Dahua Technology USA will participate in The Security 5KRun / 2K Walk organised by charity group Mission 500 on the morning of April 11th. With a mission of ‘Enabling a Safer Society and Smarter Living’, Dahua Technology will continue to focus on ‘Innovation, Quality, and Service’, to serve partners and customers around the world.
Quantum Corp. has announced the release of the new VS-Series, an efficient, flexible storage cloud platform that has been specially designed for surveillance and industrial IoT applications. The VS-Series is available in a broad range of server choices, suitable for deployments with fewer than ten cameras, up to the largest environments with thousands of cameras. Using the VS-Series security platform, security professionals can efficiently record and store video surveillance footage and run an entire security infrastructure on a single platform. Multiple systems integration Surveillance and security operations continue to get more complex, with more cameras, higher-resolution imagery, and increasing data retention requirements. As buildings become smarter, everything from access control systems to lighting and HVAC systems are now connected – part of the “Internet of Things.” There is an opportunity to simplify operations by consolidating and converging many applications onto a single platform. The Quantum CSP was designed specifically for video and other forms of high-resolution content Quantum’s VS-Series architecture is based on the Quantum Cloud Storage Platform (CSP), a new software-defined storage platform specifically designed for storing machine and sensor-generated data. Like storage technologies used in the cloud, the Quantum CSP is software-defined, can be deployed on bare metal, as a virtual machine, or as part of a hyperconverged infrastructure. Unlike other software-defined storage technologies, the Quantum CSP was designed specifically for video and other forms of high-resolution content – engineered for extremely low latency, maximising the streaming performance of large files to storage. Quantum VS-Series cloud storage platform The Quantum Cloud Storage Platform enables high-speed video recording with optimal camera density and can host and run certified VMS management applications, recording servers, and other building control servers on a single platform. The VS-Series product line is being offered in a variety of deployment options; including software-only, mini-tower, 1U, 2U, and 4U hyperconverged servers. Key VS-Series attributes include: Efficiency: Quantum’s VS-Series supports high camera density and software architecture that enables users to run their entire security infrastructure on a single hyperconverged platform. Flexibility: The VS-Series is a software-defined platform which offers the broadest range of deployment options. Many appliances can scale out for more cameras or scale up for increased retention. Easy to Deploy, Operate and Maintain: The VS-Series comes pre-installed with certified VMS applications, and can be installed and configured in minutes. It is backed by the world-class service and support of Quantum and our integrator partners Resilience: The VS-Series software offers a fault-tolerant design to minimise hardware and software issues, designed to virtually eliminate downtime Quantum products at ISC West 2019 The first products in the VS-Series to launch are the VST10x mini-tower appliances, and the VS2112 and VS2124 2U servers Quantum will highlight the new VS-Series at ISC West, booth #22137. The first products in the VS-Series to launch are the VST10x mini-tower appliances, and the VS2112 and VS2124 2U servers, available this quarter. Additional offerings will be available later this year. Josh Woodhouse, Principal Analyst, IHS Markit, said “There are huge increases in ubiquitous video surveillance data required to be processed, analysed and stored. The total market capacity shipped for enterprise storage systems in video surveillance is forecast to grow at a compound annual growth rate of 40 percent from 2017 to 2022. Storage demand is strongest in safe or smart cities installations, and in retail and transportation hubs around the globe, where end-users are looking to both protect against security threats and maximise the efficient use of collected data. Scalable, flexible data storage systems are important in achieving this goal.” High-resolution network cameras Jeremy Scott, Strategic Alliance Partner Manager, Americas, Milestone Systems said, “Security systems today include more high-resolution cameras to capture relevant situational information. Our partnership with Quantum lets us deliver scalable video surveillance solutions with the storage capacity and access suited to the increased data volumes these systems generate.” I’m pleased that we were able to bring this VS-Series to market so quickly" Keith Bishop, Strategic Growth Manager for Data Enabled Business, Johnson Controls stated, ” Buildings and cities have internet connected devices everywhere – cameras, badge readers, lighting, HVAC systems, and more – which creates a need to consolidate and manage this digital data in one place. Being able to converge surveillance recording, VMS systems, and other building control applications onto a single platform means our customers can simplify their infrastructure as we help them create smarter and safer buildings and cities.” Hyperconverged security infrastructure Jamie Lerner, President and CEO, Quantum, says “As we worked with partners to design a platform for surveillance, we knew that streaming performance and camera density would be critical, as well as hyperconvergence both for efficiency and to consolidate the security infrastructure. I’m pleased that we were able to bring this VS-Series to market so quickly – it demonstrates both the software-defined nature of the Quantum Cloud Storage Platform and how we can take our years of expertise working in movie and TV production and construct a platform with leading performance for the surveillance industry.”
ISC West continues to innovate and adapt to the changing needs of the security marketplace. In 2019, there will be 200 new exhibitors, 100 new speakers and an expanding mix of attendees that includes more end users and international attendees. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas. Among the more than 200 new exhibitors on the show floor will be Dell Technologies, Resideo, SAST (a Bosch IoT startup), Belkin International, NetApp, Lenovo, Kingston Technology and many others. The event continues to see more and more solutions in the area of IoT/connected security, a surge in barrier/bollards exhibitors, an increased number of start-up companies, and an emphasis this year on stadium/major events security. Plus, the new exhibit area of ISC West, Venetian Ballroom, will include a mix of solutions from mid-sized domestic and international companies, and is the home of the Emerging Technology Zone – back for its second year with 50-plus start-up companies expected. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas “ISC West is no longer just about video cameras, access control systems and alarms,” says Will Wise, Group Vice President, Security Portfolio for Reed Exhibitions, which produces and manages ISC West. Embracing and stimulating the market dynamic of comprehensive security for a safer, connected world, solutions on display at the show reflect convergence across physical security, IT (information technology) and OT (operational technology). The ISC West expo floor includes specialised featured areas such Connected Home, Public Safety & Security, Connected Security, Unmanned Security Expo and the Emerging Technology Zone. Plus, complimentary education sessions in the Unmanned Security Expo theatre will include topics such as drones, counter-drone solutions, ground robotics and regulations/policies that support autonomous technology. This year’s event will feature more than 1,000 products and brands covering everything from video surveillance, access control and alarms/alerts, to IoT, IT/cybersecurity convergence, AI, embedded systems, drones and robotics, smart homes, smart cities, public safety and more. The ISC West expo floor includes specialised featured areas such Connected Home and the Emerging Technology Zone Elevating the Keynote Series Over the past few years, ISC West has elevated its Keynote Series (open to all attendee types) to include more speakers and dynamic content covering relevant topics. Attendees should be sure to head to the Keynote room Wednesday and Thursday mornings at 8:30 a.m. before the expo floor opens at 10 a.m. Relating to attendance, ISC West continues to diversify and grow the attendee universe by attracting additional enterprise government end-users across physical and IT/OT responsibilities. The show also continues to attract and grow the channel audience, and there will be an increasing number of International attendees. “Years ago, ISC West was known exclusively as a dealer/integrator/installer show, but not anymore,” says Wise. “Today, the demographic mix continues to evolve as the event diversifies its product and educational offerings, embracing the current market reality of collaboration among integrators/dealers/installers, end-user decision-makers, and public safety and security professionals.” When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities Within the SIA Education@ISC West conference program, there are over 100 new speakers. Through ISC West’s strong partnership with the Security Industry Association (SIA, the Premier Sponsor of ISC), the SIA Education@ISC West program has expanded and become increasingly dynamic and diverse over the last three years. In addition, ISC West and SIA are hosting a Women in Security breakfast on Friday morning April 12th. Women in Security is a new track for the education program. “Our attendance data reflects the demand for a mix of physical security integrator and end-user content, a balance of technical and management/strategic topics, and diverse topics incorporating IoT and cybersecurity/physical security convergence, and analytics expertise,” says Wise. “Last year was a record year for conference program attendance, and 2019 will yet again set new benchmarks.” Mobile apps, information desks and ease of registration ISC West is also focusing on the attendee experience. Need advice on what exhibitors are a fit for your business needs and interests? The Information Desk adjacent to the main expo entrance will provide customised recommendations based on the information attendees provided during the registration process. Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website to research exhibitors and product categories, receive exhibitor recommendations that best fit business needs, review complimentary educational opportunities as well as 85-plus sessions from the paid SIA Education@ISC program. There are many networking opportunities being offered at the show this year. When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities. Whether attendees want to network with peers or customers at an awards ceremony (Sammy Awards, Fast 50, New Product Showcase Awards), Charity event (AIREF Golf Classic, Mission 500 Security 5K-2K Run/Walk), or an industry party (SIA Market Leaders Reception, ISC West Customer Appreciation Party at Tao), there are a variety of special events offered, all designed to help you make new connections. Make sure to check out the ISC West website for all the Special Events taking place at ISC West.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organisations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organisations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using smartphone apps to open doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Improved fingerprint solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defence and other public section use cases where higher security is needed. Flexible subscription models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimisation solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating valuable insights with machine learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focussed on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organisations incorporate this type of analytics engine into their access control systems, they will improve security and personalise the user experience while driving better business decisions.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile credentials are not secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organisation more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organisation deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All smartcards are equally secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organisation vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organisation if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic locks are more vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorised access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be prepared to unlock future benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
The excitement of ISC West 2019 continued until the very end – almost. Exhilarated by the first two busy days of the show, attendees and exhibitors seemed to welcome a slower third day. There were no complaints about booth traffic, and still plenty of thoughtful conversations taking place, everyone determined to maximise the value of face time with customers until the last second. Building an IoT ecosystem in SAST At a show lacking in high-profile new technology announcements, the biggest news is perhaps the possible long-term impact of first-time exhibitor Security and Safety Things (SAST), a Bosch startup. SAST is building a new Internet of Things (IoT) ecosystem for the security and safety industry, including an app store, an open and secure camera operating system, a software developer environment, and a portal for integrators. SOCs (system-on-chips inside cameras) are becoming much more capable" Their 1,800-square-foot booth was big for a first-time exhibitor, and the American football theme was well received, as was the substance of the company’s effort to drive innovation in a highly fragmented industry. Seeing actual cameras and apps on display at the ISC West booth is “more real than PowerPoint,” says Hartmut Schaper, CEO of Security and Safety Things (SAST). “For us, seeing is believing,” says Schaper. “It was important for us to show cameras and apps for the first time. People are surprised at how far down the road we are.” “This dynamic will change in the industry,” says Schaper. “SOCs (system-on-chips inside cameras) are becoming much more capable. Soon there will be more processing power on the edge. People will find a way to use the extra processing power.” “Seeing is believing” at the SAST booth at ISC West 2019, where CEO Hartmut Schaper showed several manufacturers’ cameras whose functionality can be expanded using Android apps Developing more apps Several large manufacturers are already involved in the initiative, but there are some holdouts. “We are having ongoing talks with everyone to convince them to join,” Schaper says. “Some of the bigger ones will come around. We are not a camera manufacturer, and not a threat. We are owned by Bosch but are managed completely separately. There will be more and more apps developed, and momentum will increase.” “A year from now we will have successful customers we can talk about, and more camera manufacturers on board,” he says. “This year we are taxiing on the runway, but next year we will have cleared the tarmac and be climbing.” If the approach succeeds, their first appearance at ISC West will be remembered as historic. Future of surveillance cameras Off the show floor, in a nearby meeting room, chip maker Ambarella demonstrated technologies that will be driving the future of video surveillance cameras, including more intelligence at the edge. “People have been using more traditional video analytics approaches, though most of them have been disappointing,” says Chris Day, Ambarella VP of Marketing and Business Development. “What is ground-breaking now is the use of neural networks and real artificial intelligence, which has increased capabilities 100x. "You will see camera products coming out over the next year that are massively better than before. It’s not just incrementally getting better. Cameras will be coming out later this year with analytics that are absolutely amazing based on [the new chips.]” Larry Anderson, editor-in-chief of SecurityInformed.com, talks about Ambarella HDR and Low Light Solutions with Jerome Gigot, Senior Director of Marketing for Ambarella. (Source: Ambarella) New systems-on-chips Ambarella has introduced four new systems-on-chips (SoCs) in the last year, with emphasis on computer vision (video analytics). The newest is the S6LM Camera SoC with 4K imaging technology, unveiled at ISC West. The S6LM includes Ambarella's latest high dynamic range (HDR) and low-light processing technology, highly efficient 4K H.264 and H.265 encoding, multi-streaming, on-chip 360-degree de-warping, cyber-security features, and a quad-core CPU. People shouldn’t forget what a good camera is, and there doesn’t have to be a tradeoff" “With so much focus on AI and computer vision, I’m concerned the industry has taken focus away from low light imaging, wide dynamic range and image quality,” says Day. “You have to see the details in an image. People shouldn’t forget what a good camera is, and there doesn’t have to be a tradeoff, it’s all included in one chip.” From products to systems With a new general manager on board (Daniel Gundlach, formerly of Bosch), FLIR Systems Security Division is continuing its transition from a product company to a solutions provider, removing internal silos to clear the path. FLIR offers a strong end-to-end portfolio for Smart Cities applications, including the TruWITNESS line of body worn cameras and newly acquired Aeryon drones. FLIR’s historical strength as the top thermal imaging provider continues, but today they are much more than a thermal imaging company, offering visible day/night cameras, infrared pan-tilt-zoom cameras, video management systems and other technologies to provide a broader platform. FLIR's Saros security cameras combine multiple security technologies, including thermal sensors, high-resolution visible imaging, IR and visible LED illuminators, onboard analytics and two-way audio and digital input/outputs. Products in critical infrastructure applications In addition to Safe Cities, FLIR installs a range of products in critical infrastructure applications, such as oil and gas and electric utilities. Ports also tend to combine traditional security with an emphasis on perimeter protection, a FLIR strength. Existing perimeter protection applications can open opportunities for the broader platform. For example, installing a complete system in an airport that already uses FLIR’s thermal technology represents “low-hanging fruit” for the company, says Fredrik Wallberg, FLIR Director of Marketing – Security and Intelligent Transportation Systems. Ambarella demonstrates its latest imaging technology for video security during ISC West 2019 (Source: Ambarella) Integrated solutions Bosch's focus At the Bosch booth, there was an emphasis on integrated solutions and the customer experience. A mock retail store setup demonstrated systems such as overhead cameras for people counting and alarm communication to provide an alert if a refrigerator door is left ajar. A wireless panic button generates a silent alarm, communicates with a 2-way radio, and triggers a camera to focus on the area. An AVIOTEK IP camera alarms if there is a fire, based on observing actual flames rather than smoke. A new Bosch fixed dome camera series offers wireless remote commissioning capabilities that reduce installation and set-up time by up to 75 percent. Set-up only takes three steps: install the mounting bracket, connect the cables, and attach the camera module. Commissioning can be done wirelessly or remotely with no need for ladders or lifts. Dahua marks five years in the U.S. An IR illuminator is attached to each lens module to ensure there is always illumination in the field of view Time flies in the security industry, and it has already been five years since the Dahua brand entered the U.S. market. Today the company offers products through ADI and some 20 distributors, and has more than 30 technical consultants and technical support employees and 50 or 60 sales people in the field (including independent rep firms). “We are growing,” says Tim Shen, Director of Marketing at Dahua Technology USA. “It’s exciting for the company.” At ISC West, Dahua introduced a line of Multi-Flex panoramic cameras with lens modules that can be repositioned along an internal track for 180-, 270- or 360-degree views, providing flexibility for integrators. An IR illuminator is attached to each lens module to ensure there is always illumination in the field of view. Cost savings come from ease of installation (one camera instead of four) and only one VMS license (instead of four). AI and night colour cameras Dahua is also emphasising its Night Colour cameras that remain in full colour mode regardless of how dark it gets. There is no IR illumination or IR cut filter – the camera stays in color mode and displays any visible image in colour with as little as 1 lux of illumination. The 2 megapixel version is on display at ISC West, and a 4 megapixel version will come in the fall. A year ago at ISC West, Dahua emphasised its initiatives in artificial intelligence (AI) in order to position the company as a technology leader. This year, the message was more general – ‘Power Through Technology.’ The range of Dahua technologies includes AI, Night Colour, Starlight low-light imaging, fifth-generation HDCVI, and e-POE (Enhanced Power over Ethernet). Dahua USA's Director of Marketing says "the market itself likes AI", and expects more AI applications to follow (Source: Dahua USA's LinkedIn) “When we present AI to customers, they are happy, but when it comes to the budget they don’t have it,” says Shen. “The market itself likes AI, and it’s very much a buzzword. But we still need a proof of concept that it can do something good for end users. We need time to develop broader applications. The ‘smart retail’ market and education are good places to start.” he says. “AI is for project business,” adds Jennifer Hackenburg, Dahua’s Senior Product Marketing Manager. “Projects that are looking at AI haven’t come to fruition yet; they are still in the pipeline. It’s not for your everyday business. They are implementing it, but not as fast.” Access control beyond doors Access control should extend beyond doors. That’s the message I heard at the ASSA ABLOY booth, which displayed a variety of physical locks and intelligent access systems. An example is traffic cabinets, those metal boxes in public locations that could potentially be accessed to invade an internal network. ASSA ABLOY emphasises the need to secure the variety of enclosures, cabinets, drawers and small spaces ASSA ABLOY emphasises the need to secure the variety of enclosures, cabinets, drawers and small spaces throughout an enterprise. The company’s ‘security continuum’ message draws attention to the need for the right level of security for the right opening, using existing infrastructure as well as new electronic technologies. “Customers face a combination of non-traditional access control and questions on how they can secure things that are not doors,” says David Corbin, ASSA ABLOY Director of Access Control Accessories. The security message is resonating beyond the traditional security department to involve other stakeholders in an enterprise, including IT directors. There is new awareness of vulnerabilities that have been there forever, such as traffic cabinets that can be opened with a key purchased on eBay.
Delivering on high expectations, the first day of ISC West 2019 kicked off with a crowded Sands Expo Center and exhibitors putting forward their best new technologies. Developments seemed more evolutionary than revolutionary, but attendees quickly found plenty of interest. Thermal cameras Hanwha Techwin also showed off a new Android camera that can deploy new apps The largest booth at ISC West, Hanwha Techwin, remained crowded throughout the first day as attendees checked out the company’s eight new thermal cameras offering features such as pan-tilt-zoom, H.265 encoding to minimise storage needs, VGA resolution and detection of temperature changes, all built on Hanwha Techwin’s Wisenet chip. There is also a new 5-megapixel version of Hanwha’s popular 2-megapixel multi-sensor camera, and a new panoramic camera; multi-sensor panoramic cameras ‘stitch’ the images together rather than just aligning them. Hanwha Techwin also showed off a new Android camera that can deploy new apps developed as part of the Korean company’s role as a founding member of Open Security & Safety Alliance (OSSA). Avigilon's H5 series Avigilon is introducing a new line of cameras — the H5 series — with improved imaging and designed to provide deep learning/neural network processing at the edge. Improvements to video analytics will enable the cameras to track multiple moving objects simultaneously in a field of view and to track objects more accurately. More granularity enables better differentiation among types of vehicles, and the cameras enable more detailed data to be pulled from video. The improved analytics engine will also support better face detection and recognition. Operators can view the dashboard and react to information provided in a more digestible format The new version of Avigilon Control Center 7 (ACC7) software will apply principles of AI to enhance an operator’s ‘Focus of Attention’ when monitoring live video. Video is fed into an AI engine that determines which events in the live footage are most worthy of an operator’s attention. Monitoring live video can be a challenge for human operators, whose short attention spans undermine the best surveillance systems. Automation helps to direct that limited attention span to events most worthy of attention. A ‘dashboard’ displays clusters of cameras that are colour-coded to reflect the types of activity that are detected. Rather than watching video, operators can view the dashboard and react to information provided in a more digestible format. Clicking brings up the live video. Quantum Cloud Storage Platform Video storage is another area of innovation at ISC West. The Quantum Cloud Storage Platform is flexible for video surveillance and industrial IoT applications. The architecture is built from the ground up for video surveillance applications and can scale from five cameras to millions of cameras in a simple deployment model — no settings or configurations needed. Products range from a small ‘mini-tower’ configuration for a retail store or gas station up to rack-mount servers that can accommodate thousands of cameras. We make the storage piece so simple that you don’t have to think about it" Quantum introduced the VS-Series in a range of server choices at ISC West. The hyperconverged and software-defined environment will support a combination of video management systems (VMS), along with access control, HVAC and lighting controls. Quantum worked with Johnson Controls to develop the products. “It’s designed for an installer, not for an IT guru,” says Jamie Lerner, Quantum’s CEO, President and Chairman of the Board. “We make the storage piece so simple that you don’t have to think about it.” Quantum is showing its VS-Series publicly for the risk time at ISC West. S2’s Magic Monitor LenelS2 is a newly coined name in the industry — resulting from a recent acquisition. The combination of Lenel and the acquired S2 is playing out to the benefit of both product lines. For example, Lenel’s Blue Diamond mobile credentialing system can now be used along with the S2 Netbox hardware. Lenel’s OnGuard is being combined into S2’s Magic Monitor unified solution that combines video, access control, and digital messaging. OnGuard is also benefitting from Magic Monitor’s graphics maps. The S2 Cumulus cloud-based service, focused on system health monitoring, is being applied to OnGuard. LenelS2 is also developing a full commercial access control as a service (ACaaS) offering The combined LenelS2 is stepping up with new solutions for frictionless access control, too. A ‘phone as a badge’ approach enables a door to be unlocked by a smart phone, even if it is in a pocket, locked and/or the app has not been opened. Another alternative is a ‘shake to open’ action that sends the credential to the nearest reader. LenelS2 is also developing a full commercial access control as a service (ACaaS) offering, which is being previewed at ISC Show and will be released commercially later in the year. Video surveillance product line Mobotix is expanding its MOVE video surveillance product line with six new models announced at the show and broadening its reach into new vertical markets. A solutions approach offers both end-to-end Mobotix systems and other systems offered in conjunction with technology partnerships displayed in the Mobotix booth. Top of the list of new verticals is education, and Mobotix’s edge-based approach includes programmable logic built in so that ‘technology can take over when the human element is the weakest.’ Automated response is faster and ‘seconds equal lives’ during an emergency. In an education scenario, the Mobotix system acts as an Internet of Things (IoT) device that offers more functionality than other manufacturers’ ‘cameras.’ There are 22 steps involved to ensure the cybersecurity of Mobotix products, reflecting a higher level of cybersecurity commitment Mobotix has thermal products that are also finding uses in a variety of verticals, from oil and gas to manufacturing process control. Mobotix systems that can detect defects in products in the manufacturing process are expanding usage in applications beyond the traditional ‘security’ industry. Cybersecurity Commitment Mobotix is looking at the market in a completely different way, redefining how their products can fit into a variety of scenarios, and with a focus on cybersecurity. There are 22 steps involved to ensure the cybersecurity of Mobotix products, reflecting a higher level of cybersecurity commitment than some other manufacturers. “There are so many features within our solutions, and we want to get the word out to the end users, so they understand the features,” says Thomas Lausten, Mobotix CEO. “There is untapped potential.”
Safety and Security Things GmbH (SAST) will be both a first-time exhibitor at ISC West and also feature a larger booth – 1,800 square feet. The Bosch startup is looking to make a big splash in its first-time appearance at the largest security trade show in the United States. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas. Founded in September 2018 and based in Munich, Germany, SAST is building a new Internet of Things (IoT) ecosystem for the security and safety industry, including an app store, an open and secure camera operating system, a software developer environment, and a portal for providing knowledge and functionalities tailored to integrators. SAST’s open IoT platform The open IoT platform is based on an open standardised operating system for video security cameras The open IoT platform is based on an open standardised operating system for video security cameras that creates a common basis for innovation and growth for the security industry. Apps built on SAST will enable airports, restaurants, stadiums and other facilities to transform security cameras into smart devices. The first partners are already developing apps based on the SAST ecosystem. “We will bring all the partners of our platform together and will showcase the first applications already realised on the platform,” says Nikolas Mangold-Takao, SAST Vice President of Marketing and Product Management. “In order to showcase this effectively at ISC West, we will create a space to demonstrate solutions effectively. At the same time, we are using the booth as our meeting space and will create a collaborative environment for our partners and all participants.” IoT and access control “We want to ensure that all visitors of our booth (No. 10073) are getting to see first-hand solutions which are already realised based on first apps and cameras using our Operating System,” he adds. “We also want to demonstrate the benefits of the SAST platform for solution developers, integrators and manufacturers.” SAST is about bringing different players from the industry together in order to deliver better solutions" SAST will be looking for measurable results at ISC West. “On the one hand, we measure results by hard facts, such as the number of new partners who will join us and how satisfied our current ones are with the output,” says Mangold-Takao. “On the other hand, direct feedback from visitors at the booth, especially professionals from our industry and end-customers, is also extremely important to us, and we will measure it. SAST is about bringing different players from the industry together in order to deliver better solutions.” Openpath Access solution Another new exhibitor with a relatively large booth is Openpath, whose booth (No. 23051) will be 1,200 square feet. Openpath Access combines cloud-based software and sleek hardware with an app to enable hands-free access to an office using a smartphone that doesn’t need to leave your pocket. Although large for first-time exhibitors, the Openpath and SAST booths fall squarely in the “medium range” of overall exhibit sizes at ISC West – larger than the smallest 100-square-feet exhibits typical for many first-time exhibitors, but still smaller than the largest booths such as Hanwha Techwin America (5,500 square feet). In addition to the new exhibitors on the main show floor, the Emerging Technology Zone, located in the Venetian Ballroom, will welcome new startups in the security marketplace.
HID Global, a global provider of trusted identity solutions, announced that Tasmania’s Old Kempton Distillery (OKD) has deployed its Internet of Things (IoT) enablement platform, HID Trusted Tag Services, to combat counterfeiting of its world class whiskeys, gins and other liquor products. HID’s innovative IoT platform for brand protection, combined with the web application developed by local integrator AusNFC, enables Old Kempton Distillery to guard against grey market activities and allows customers to authenticate their product at the point of sale. It also strengthens the appellation registration for the Australian island state of Tasmania, which boasts some of the most pristine water and climate conditions for manufacturing premium, top-shelf liquor products. Taking measures to prevent counterfeiting HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience"“Old Kempton Distillery makes one of the world’s finest whiskeys, and with counterfeiting in our industry becoming a global issue, we recognised the need to take proactive steps to protect our brand,” said Robbie Gilligan, Business Manager and Brand Ambassador for Old Kempton Distillery. “We were seeking the best brand protection technology available and a solution that would also allow us to securely engage with our customers, long after a sale. We believe that HID Trusted Tag Services and the support provided through AusNFC provide just that.” Beyond its anti-counterfeiting features, HID’s IoT offering opens a new and powerful avenue for Old Kempton Distillery to stay connected with customers via direct and hyper-personalised communications that helps the distillery build brand loyalty in a privacy-preserving, closed environment. “We find HID’s solutions to be applicable to many different industries,” said Larry Hower, CEO of AusNFC. “HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience.” Working of the system The distillery’s solution incorporates HID Trusted Tag Services into the AusNFC web application that drive the front-end mobile experience on customers’ phones. A HID cryptographically secure Near Field Communication (NFC) tag is embedded into the label of every liquor bottle, which links to HID’s cloud authentication service. By tapping their iPhone or Android phone to the bottle, the customer activates a secure communications channel that authenticates the provenance of their premium product – down to the actual bottle number. Each tap generates a unique URL, preventing counterfeiters from copying, spoofing or manipulating the URL for false verification. Combining cloud authentication with NFC tags The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied“HID’s IoT technology is enabling mass adoption of brand protection by major brands worldwide that are seeking to address more sophisticated attempts by fraudsters focussed on imitating their products,” said Mark Robinton, Director of Business Development and Strategic Innovation at HID Global. “Manufacturers and consumers alike can rest assured that their product can be authenticated at every stage of its lifecycle – from production to the shopping bag.” HID Trusted Tag Services combine HID’s cloud authentication services with its trusted NFC tags that come in many form factors for variety of product shapes and sizes requiring brand authentication. HID’s trusted NFC tags are embedded into each product during the manufacturing process, and are easily read using NFC-enabled smartphones (both Android and iOS v11 and newer). The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied, and the extended security features in HID’s cloud authentication service provide privacy-preserving brand authentication and consumer engagement in a closed and trusted environment.
HID Global, globally renowned trusted identity solutions provider, and Phunware, Inc., a fully integrated enterprise cloud platform for mobile that provides products, solutions, data and services for brands worldwide, has announced their collaboration to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Wayfinding and HID Location Services Phunware and HID are addressing the need of healthcare institutions to deploy standardised technology “The combination of Phunware’s market-leading wayfinding and mobile engagement capabilities with innovative HID Location Services will ultimately revolutionise wayfinding within healthcare institutions,” said Phunware co-founder and CEO Alan S. Knitowski. “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk. With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” Phunware and HID are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. Unified Healthcare IoT solutions Healthcare organisations can easily lay out the foundation for IoT applications, such as wayfinding" “Wayfinding is one more application that we are integrating into HID’s unified healthcare IoT solution to make it easier for healthcare systems to manage a growing demand for automated and streamlined experiences,” said Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global. “With HID technologies, we have changed the location-aware landscape, delivering location as a service. Now, healthcare organisations can easily lay out the foundation for IoT applications, such as wayfinding.” Healthcare IoT-enabled platform HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Multiscreen-as-a-Service (MaaS) platform Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more.
Videowall technology supplied by Ultimate Visual Solutions (formerly eyevis UK) is at the heart of a new customer experience centre unveiled by independent system integrator Capula. UVS videowall technology The installation allows Capula to showcase a wide range of software technologies, including the latest IoT solutions, to clients from within the energy, manufacturing and utilities sectors at its headquarters in Stone, Staffordshire. Ultimate Visual Solutions (UVS) installed four eyevis EYE-LCD-5500-XSN-LD-FX 55-inch LCD displays to make up the videowall, along with a custom-made sound bar and a Netpix 4900 video wall controller. Netpix 4900 videowall controller We are delighted to have been chosen to complete such an important project for Capula" The installation also includes two 65-inch Samsung DM-65E touch interactive whiteboards; which give the Capula team the ability to show content from the Netpix videowall controller and allow them to annotate over it mid-discussion and feed content back to any display. UVS managing director Steve Murphy said: “We are delighted to have been chosen to complete such an important project for Capula, which will showcase the solutions we provide to visitors to their headquarters.” Capula Business Manager, Neil White commented: “We are very pleased with the service provided by Ultimate Visual Solutions. The expertise, guidance and follow on support was second to none. The technology installed in our prestigious customer experience centre has provided an excellent showcase for our business’ solutions.” Video wall and audio-visual solutions Burnley-based UVS, formerly eyevis UK, provides video wall displays and audio-visual solutions to a range of clients across the UK. Capula specialises in industrial control, instrumentation and automation and has decades of expertise, having worked in some of the most complex and demanding industrial environments. The Netpix 4900 is a network-based graphic controller for the management of video wall systems, single displays or projectors. The controller creates a big joined desktop for network-applications, video and graphic sources.
HID Global, a worldwide provider of trusted identity solutions, was selected by Skanska, one of the world’s project development and construction groups with operations in Europe and North America, to incorporate HID’s mobile solution for secure access to its new office complex in Warsaw. Powered by Seos, HID Mobile Access improves the user experience and increases security throughout the entire building – from the parking lot and elevators to areas with limited access to the public. Located at 173 Solidarności Avenue in Warsaw, the new Spark office complex is not only the new headquarters of Skanska, but a large part of the 70,000 square-meter office building has also been set aside for other tenants. Because the building is intended to be a mixed-tenant space, it was crucial to restrict access to secure areas from unauthorised visitors. Using smartphones for access The Spark building was designed to enable mobile access so that employees can now use their smartphones to open doors and enter secure areas. Skanska, with help from system integrator Sharry Europe, created a new system for building occupants that integrates numerous building applications, including HID Mobile Access. As a result, all building applications have been incorporated into an integrated mobile app, which marked an advancement in creating a more streamlined and convenient experience for the users. HID Mobile Access enhances the security for accessing our entire building" Both Spark building employees and their guests can now move throughout the building with nothing more than a smartphone, without the risk of them gaining access to restricted areas – unless the proper access rights are granted. When users arrive at the door, they simply tap their iOS and Android devices to an iCLASS SE reader using Near-Field Communications (NFC) or Bluetooth Low Energy (BLE) and HID’s ‘twist and go’ feature to gain access from a distance. Any changes to the user’s access rights are remotely managed by the administrator through a cloud-based portal. Integrating all building applications into one “HID Mobile Access enhances the security for accessing our entire building. In one application, we have integrated all building applications, such as parking, virtual reception and other Internet of Things functionality, bringing the whole user experience to a new level,” said Renata Nowakowska, Innovation Manager at Skanska. “One of the most pressing objectives for facility managers in smart buildings is to crack the code on how to enable as many building applications and services on mobile devices as possible in order to simplify how occupants move through a facility and interact with building services,” said Hilding Arrehed, Vice President of Cloud Services, Physical Access Control. “Skanska’s integration of HID Mobile Access into their mobile platform is a perfect example of how organisations are leveraging the power of mobile credentials and the cloud to realise the full potential of creating a connected and more intuitive experience for their users, while increasing security at the same time.”
Rasilient Systems, Inc., the pioneer in video surveillance systems purposely architected for IP video recording, has been chosen to provide video surveillance server and storage solutions for Zero 6 Mall, the impressive new-generation shopping destination that opened in April this year in Sharjah, United Arab Emirates. Zero 6 is a 16,000 square-metre complex that offers a diverse selection of dining, retail and entertainment attractions. Strategically located in Al Juraina, in close proximity to prominent city landmarks like University City and Sharjah International Airport, Zero 6 celebrates Sharjah’s evolving lifestyle community experience. Security integration software “Security is always the top concern in designing and developing a popular tourist and resident destination like Zero 6 Mall. Rasilient is honored to have been chosen to help secure this impressive and unique facility,” said Sean Chang, CEO of Rasilient Systems. Rasilient worked with UAE-based system integrator Exceed Communications, LLC, on the Zero 6 Mall project. Exceed Communications is a leading provider of IT infrastructure and security system needs including network design, installation and management and video surveillance and IPTV systems. Video surveillance at Zero 6 is managed by SeeTec Video Management Software (VMS). An OnSSI Company, SeeTec is one of the leading solution providers for video surveillance in Europe. Unmatched data integrity “Video surveillance storage is critical for security point of view and we are fortunate to have the services of Rasilient Systems, which is a trusted name for unmatched data integrity and storage reliability,” said Issa Ataya, Managing Director, Alef Group. We are confident that Rasilient Systems will provide the most innovative and state-of-the-art technology for Zero 6 Mall" “Zero 6 Mall is a one-stop destination in Sharjah that appeals more to a new generation as it’s a premier lifestyle-oriented place. We are confident that Rasilient Systems will provide the most innovative and state-of-the-art technology for Zero 6 Mall,” Ataya said. Video management software Rasilient provided video surveillance storage for Zero 6 that offers unmatched data integrity, storage reliability and scalability to address future growth. Rasilient’s purpose-built technologies lower CAPEX and OPEX by extending product life expectancy and enabling scheduled maintenance instead of reactive maintenance as systems age. The video surveillance system in place at the mall provides petabytes of storage using Rasilient’s fully redundant ApplianceStor AS85R Server and PS5000 Rackmount IP Storage. Rasilient’s ApplianceStor AS85R is a modular server system which packs four high performance server modules in a single 2U rack mount platform providing unmatched performance and density. Each module can be used to integrate VMS, failover, archive, administration and access control servers in a single high density 2U system. The AS85R significantly reduces cost over a separate VMS server, reduces cabling and the ordeal of integrating VMS, OS, commodity server and storage. Because the AS85R is ideally suited for use in conjunction with Rasilient’s PS5000 Rackmount IP storage, the Zero 6 project also utilises the PS5000. Rasilient’s PS5000 Rackmount IP storage provides a simple-to-use, high performance, and large capacity video surveillance solution Large surveillance installations Rasilient’s PS5000 Rackmount IP storage provides a simple-to-use, high performance, and large capacity video surveillance solution. The purpose-built storage array is optimised for high performance megapixel and large video surveillance installations – both key characteristics of the video solution used at the Zero 6 Mall. Rasilient's patented advanced video caching technology – VAN, FlowThrough, StreamAlign – enables no recording gaps and data locking and increases read/write performance. This allows the capability of using both high resolution megapixel cameras and heavy camera loads. With Rasilient’s video surveillance storage solutions, every single camera frame is processed and recorded – which is essential for the variety of mall security scenarios that might call for video retrieval. The Rasilient system is also engineered to monitor its own “health” and operations to ensure that the system doesn’t fail when it’s most needed. This Proactive technology monitors the health of every disc drive in the system to enable cloning right before an actual drive failure. Reliable video surveillance solutions Zero 6 Mall is just one of many projects Rasilient has completed in the UAE and surrounding areas over the last few years, said Chang. “With the successful implementation of quality and reliable video surveillance solutions for projects like Zero 6, Rasilient continues its growth in the very important Middle East market,” he added.
HID Global, a worldwide provider in trusted identity solutions, announced that 85-year-old fire protection provider RAEL Automatic Sprinkler Company and integrator Automated Decision have deployed HID Trusted Tag Services at one of Manhattan’s most iconic skyscrapers. The combined solutions help secure, digitise, automate and streamline inspection and maintenance of the building’s massive fire and safety sprinkler system. "HID Trusted Tag Services are a real competitive differentiator for us when we bid for projects now," said David Israel, President, RAEL Automatic Sprinkler Company. "We plan to deploy it in other noteworthy buildings and we’re exploring using it for other mission-critical equipment we inspect and repair as well." The RAEL solution incorporates HID Trusted Tag Services into Automated Decisions’ work order management system and mobile inspection app HID Trusted Tag Services HID Trusted Tag Services empower robust Internet of Things (IoT) applications by attaching unique and trusted identities to virtually any object that can be read by mobile devices. Smartphones and other devices can then be used for innovative use cases, without compromising the privacy of end users. The RAEL solution incorporates HID Trusted Tag Services into Automated Decisions’ work order management system and mobile inspection app. The deployment includes HID’s trusted and tamper-evident NFC tag using dual NFC and QR code technology; unique cryptographic authentication and a unique QR code placed on every component of the RAEL sprinklers. After authenticating to HID’s cloud authentication service, RAEL technicians move through the building, tapping each applied tag with their mobile devices to authenticate upon completion of their component inspection or repair. Proof of presence Each individual tap generates a unique encrypted code appended to a URL to provide proof of presence. This process confirms the technician was physically at the site and conducted the required sprinkler inspections and repairs. "Proof of presence was critical for us,” said Israel, “as property managers are now expected to deliver a much higher level of compliance reporting." The solution also logs the user, tap time and date into the Automated Decisions work order management platform. Mobile online access provides inspectors with service request maintenance records, sprinkler part specifications, diagrams and photographs. Combined HID and Automated Decisions solution has enabled faster, more efficient inspections and repairs Combined tag services and mobile devices "That RAEL and Automated Decisions are leveraging our offering for fire and safety at an immense, iconic skyscraper reinforces the breadth of IoT use cases that our identification and sensing portfolio addresses," said Mark Robinton, Director of Business Development & Strategic Innovation, Identification Technologies with HID Global. "Facility managers are also increasingly seeking to combine the use of HID Trusted Tag Services and mobile devices to automate other safety and security functions, including guard tour and key management, as buildings become more intelligent and connected." In addition to providing peace of mind to RAEL and their property management clients, RAEL also reported the combined HID and Automated Decisions solution has enabled faster, more efficient inspections and repairs, improved first-time fix rates and fewer repeat visits.
Round table discussion
Our Expert Panel is an opinionated group on a wide variety of topics, and we are dedicated to providing a useful and flexible forum to share those opinions. This week, our panelists address a range of opinions about several self-selected topics, culled from the large number of Expert Panelist responses we have collected in the last year. In this Expert Panel Roundtable article, we will share these varied and insightful responses to ensure they are not lost to posterity!
Ethical hackers are familiar to the world of cybersecurity. As cybersecurity awareness increases in physical security, they are also playing a larger role to ensure the safety of networked and information technologies used in our market. We asked this week’s Expert Panel Roundtable: What is the role of ‘ethical hackers’ to ensure cybersecurity of networked products in the physical security market?
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?