CNL Software, a provider of Physical Security Information Management (PSIM) software, announces that it has formalised its technology partnership with Wavestore, an independent Video Management Software (VMS) provider.
The partnership follows long-term collaboration, which has allowed the two companies to deploy their respective technologies within a large scale Middle Eastern oil and gas security program. Furthering its dedication to be the world’s leading global PSIM solution provider, CNL Software has renewed its technology partnership with Wavestore under its Technology Alliance Program.
Allow deeper integrations
This partnership aligns with our core strategy on many fronts and can help provide our mutual customers with greater insight"
The program is designed to enable CNL Software to work closer with technology developers to allow deeper integrations and extract greater value for end users of IPSecurityCenter PSIM.
“We value our technology partnership with Wavestore, they are working hard to constantly create better, more open, video solutions to deal with the changing threats the security industry faces. The more we collaborate with them the more valuable our joint solution will become,” commented Adlan Hussain, VP Marketing at CNL Software. “This partnership aligns with our core strategy on many fronts and can help provide our mutual customers with greater insight to make more informed decisions across the enterprise."
Robust integration process
With its PSIM software, IPSecurityCenter, CNL Software works to help security departments across numerous industries capture critical security data in real time while providing an elite user experience – from a rich user interface to a robust integration process to live dashboard overviews. Its software is purpose-built for the security industry, providing product features designed to help security heads to manage their environments on their terms.
"Our Video Management Software (VMS) enables you to manage video from any type of camera from any leading brand, including the latest 4K and 360-degree and multi-sensor formats, mixing live and recorded views on the same screen at the same time,” said James Smith Managing Director of Wavestore Global Ltd.
Deliver unique benefits
CNL Software and Wavestore technical teams provide mutual end-user clients with cost-effective, future-proof solutions"
“Equally important, our VMS is able to interact with a wide range of third-party systems and technologies, including access control, intelligent video analytics, intruder and perimeter detection. As such, it perfectly complements IPSecurityCenter PSIM in its ability to provide users with greater situational awareness.”
“We are excited to partner with another innovator. The relationship which has been established between the CNL Software and Wavestore technical teams enables us to provide our mutual end-user clients with cost-effective, future-proof solutions which deliver unique benefits by using both companies' technology together.”
“Our close relationship means that this can even be for bespoke requirements for specific sites and projects. Looking forward, our close cooperation will also enable us to efficiently respond to changing market requirements and deliver the benefits of new technologies, as they emerge.”
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression.
“Just learning about this made the whole trip worthwhile,” said one GSX attendee at the Johnson Controls booth, referring to the company’s new PowerSeries Pro intrusion devices. It’s the kind of feedback that makes the expense of exhibiting at a big trade show worthwhile. The new PowerSeries Pro is an extension of Johnson Controls’ existing line that is expressly designed for the commercial security market.
The ‘hybrid’ (wired or wireless) device offers ease of installation and full cybersecurity including 128bit AES encryption with spread spectrum for no jamming or interference. It employs frequency hopping technology first developed for the Israeli defence force.
Wireless technology for cybersecurity
PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product
PowerSeries Pro uses PowerG wireless technology and expands the portfolio of PowerG devices from residential through commercial. For use in a wired solution, the main advantage is ease of installation; terminal blocks ‘pop out’ easily and can be wired and plugged back in. Alternatively, PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product – wireless at the same level of cybersecurity as wired.
Johnson Controls addresses three big factors with the product line: cybersecurity, user control, and easy installation and dependability. It’s part of Johnson Controls’ broader approach to provide ‘one-stop shopping’, enabling an end user to control their environments, video and access, and protect their contents, according to the company.
Need for more security in K-12 schools
In addition to reaching end users, lock company Allegion sees the show as an opportunity to meet with technology partners. “It’s great to bring together a concentration of people in the industry,” said Brad Aikin, Channel Led Business Leader, Integrator Channel. “We have had good conversations with technology companies here at the show in terms of partnering, both physical access control and OEM partners. We have also had good conversations with the integrator channel.”
From speaking with education end users at GSX, Aikin sees a large unmet need for security in K-12 schools, more so than in colleges and universities. “K-12 is underserved,” he says. “They need to identify their priority of needs, and now they can serve needs they couldn’t before, both layering levels of security and phasing in implementation over time. Now things can be applied and tried out without disrupting the environment.”
An example is the Von Duprin RU RM (Remote Undogging and Remote Monitoring) door exit devices, which are being integrated by access control partners Sielox, IDenticard and Vanderbilt. Intelligence is added to the door exit device to enable inexpensive monitoring of secondary, previously unconnected doors. The doors can be monitored and locked or unlocked at various points in the day.
Lock company Allegion sees the show as an opportunity to meet with technology partners
Bridging the gap between IT and physical security
One exhibitor – ADT – noticed more information technology (IT) professionals accompanying their physical security counterparts at this year’s GSX exhibition. “They come along to kill dreams on the spot,” said Morgan Harris, Senior Director Enterprise Solutions, noting the IT department’s frequent hesitancy to add untrustworthy elements to the network.
ADT is looking to transform and expand its 144-year-old brand in the commercial security space and has completed eight acquisitions in the last year to accomplish the goal. Some of the acquisitions build on ADT’s expanding cybersecurity initiative, which is both a fully-functioning stand-alone business and an effort to bridge the divide between IT and physical security. ADT is positioning itself to manage enterprise risk in the broadest sense.
Combining IT and cybersecurity
The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?"
“The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?” asked Harris. “Projects have failed because information was lost in translation.” ADT seeks to have skillsets, experience and certifications on both sides of the issue.
“It enables us to be the in-between,” says Harris. “We can blend the two together and be the translator. It’s great for both sides, advocating for security counterparts and for the network simplifies deployment and processes.”
Harris sees a trade-off between cybersecurity and convenience in the industry. For example, if a manufacturer says they have a simplified process and only offers firmware updates once a year, cybersecurity suffers, he said. Lack of third-party testing is another way that manufacturers sometimes trade cybersecurity for convenience, at heightened risk to integrators and end users.
Training courses for integrators and partners
Milestone Systems is expanding its level of involvement with integrator partners, and now provides Partner Business Reviews (PBR) to assess an integrator’s activities, sales and training, pipeline and marketing initiatives.
The partner reviews often uncover issues that can be easily rectified through additional training, says Megan McHugh, Milestone’s Training Marketing Manager, Learning and Performance. Milestone uses a dashboard to track each integrator’s completed training courses and can point out additional courses needed to ensure an integrator partner’s success.
Milestone offers a variety of in-person, e-learning and YouTube video courses to train installing partners, systems integrators and self-integrators on best practices
Milestone offers a variety of in-person, e-learning and YouTube video courses (in 12 different languages) to train installing partners, systems integrators and self-integrators on best practices. ‘Cloud Labs’ are instructor-led online classes.
All courses are linked to a variety of support resources. Sometimes a simple checklist accessed on a smart phone can ensure that every aspect of an install is performed and can instil added confidence in customers.
The open platform company’s new agile development cycle – releasing multiple versions of XProtect software throughout the year – creates extra challenges to keep learning initiatives up to date. Along with each new release, various existing courses are updated.
The concepts of “training and certification” are being replaced at Milestone with “learning and performance,” says McHugh. Milestone is also looking to hire 170 new R&D staff and open a new centre in Barcelona (in addition to current R&D centres in Copenhagen and Sofia, Bulgaria).
Making camera installation easy
Hanwha Techwin is another company that is seeing more interest in cybersecurity, as well as concern about whether a product is supported professionally. They have doubled-up production in South Korea and added capacity in Vietnam to avoid manufacturing in China.
Thinking about their integrators, Hanwha Techwin is putting more emphasis on making installation easy. Installation costs may be up to 50 percent of a job, so easier installation frees up money to buy more or better cameras. With a new design of their cameras, an electrical contractor can now install the camera base and conduit, and then the integrator can easily plug in the camera later.
Camera bases are common across multiple models, so a customer could switch out a 5-megapixel for a 2-megapixel camera later on if they want to (same housing plate). ‘Skins’ allow the colour of cameras to be changed to match surrounding décor. “We are changing the idea of how people approach selling a camera, and it’s a whole new idea of how to install cameras,” said Tom Cook, Senior Vice President, North American Sales, Hanwha Techwin.
Hanwha cameras can include a sound classification analytic to detect sounds such as gunshots
Cameras with sound detection technology
Hanwha offers more flexibility in the field – interchangeable parts are packed together to enable configuration on site. And there is no need to stand on a ladder to position cameras; stepper motors help with remote camera positioning. Multi-sensor cameras have modules (combining lenses and sensors) that can be switched out at installation. Hanwha Techwin cameras can also include a sound classification analytic to detect sounds such as gunshots, screams or glass breaks, especially useful in K-12 education environments.
Unification and the customer journey were a key emphasis for Genetec at GSX 2018. Unification for Genetec means combining multiple functions on one platform, from one vendor and using one source code. The company approaches the market by analysing each customer’s journey as it relates to Genetec products.
A typical customer journey involves (1) a company looking for standalone systems; (2) the need to centralise systems through integration and unification; (3) increasing automation and workflow; and (4) adding intelligence for more informed decision-making.
“Genetec wants to get more in-depth with customers, be more comfortable with their business, and understand their challenges,” said Derek Arcuri, Product Marketing Manager. “We want to get naked with our customers.”
Machine learning engine for crime prevention
In the city of Chicago, Citigraf detects patterns in crime behaviour and determines where a crime is likely to occur
There was a big crowd at the Genetec booth, and not because the comment was applied literally. Genetec has divided itself into multiple parts, each focussed on a vertical market such as retail or transportation.
The approach is to operate as a ‘federation of startups’, with each market sector accountable to fill in the gaps in the portfolio to meet the specific needs of each vertical. For example, Genetec’s Citigraf is an unsupervised machine learning engine with an algorithm to detect anomalies and trends from a large pool of data in a municipal environment.
In the city of Chicago, Citigraf detects patterns in crime behaviour and determines where a crime is likely to occur. The system alerts operators in a bureau or area that has a higher risk level and should beef up the number of first responders.
Chicago has seen a 39 percent decrease in average response time of first responders as a result. In the retail market, Genetec leverages the security infrastructure to analyse shopping trends and provide data for merchandising and operations. “Each customer is getting a portfolio of products tailored to the industry they are in,” says Arcuri.
Demonstrating IoT devices
Axis Communications displayed its range of products at GSX, demonstrating its almost total transformation from an IP camera company to a supplier of a full range of Internet of Things (IoT) devices. “Axis is broadening its portfolio to include more solutions,” said Scott Dunn, Senior Director, Business Development Systems and Solutions. “Our success is driven by continuing to innovate our portfolio. The market is continuing to grow, and Axis is continuing to expand its market share.” Eight ‘Axis Customer Experience Centers’ around the United States help Axis stay close to their integrators, customers, partners and prospects.
IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security
Axis has offered access control IP edge devices since 2013, and now has a new A1601 door controller being sold with partner-only software (no embedded Axis software like previous A1001 devices). In audio products, Axis has a portfolio of speakers, intercoms, and public address systems.
Acquisition of IP door intercom company
Enhancing the audio line was acquisition in 2016 of 2N, an IP door intercom company headquartered in Prague, Czech Republic. In North America, the 2N team is now fully part of Axis. The line emphasises simple architecture, programmability, and the ability to integrate widely. The products use Session Initiation Protocol (SIP) to integrate through the cloud or peer-to-peer.
IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security. Retail, education and enterprise customers are gravitating to IP audio. An IP bridge can tie existing analogue components into the IP system. For perimeter security, Axis offers a radar device to help eliminate false alarms, as well as thermal cameras.
UK’s renowned manufacturer and supplier of electronic and electrified perimeter security systems, Harper Chalice has added to its dealer network with what it describes as ‘one of its most prestigious signing to date’.
Harper Chalice-Binns Fencing partnership
Harper Chalice has secured premier prison perimeter systems installer Binns Fencing as an authorised dealer of its high security defence and detection systems and complementary products.
The range is specifically designed to meet the growing demand for reliable protection of people, property and assets worldwide.
People, property and asset protection This is one of our most prestigious signing to date and is an indication of where our business is headed"
Harper Chalice MD Chris Hackett said: “This is one of our most prestigious signing to date and is an indication of where our business is headed. We have launched a major focus on prisons, where our PID systems are going from strength to strength, so Binns’ accreditations, relationships and expertise in this field will be critical.”
Chris adds, “They will also be dealers for our CPNI-accredited electric fencing and have just completed their first installation of such a system at a wind farm in Yorkshire.”
Perimeter security and detection systems
Harper Chalice has enjoyed rapid growth in the past three years since Hackett led the purchase of a majority shareholding from previous owner and founder Graham Harper which are held on behalf of all of the employees in an employee ownership trust.
The company grew 50% last year and has targeted a further 30-50% this year and is looking to continue to expand its dealer network. Binns signed up after a number of successful installations using Harper Chalice product.
One integrated security solution
MD Adam Binns said: “The partnership will enable us to offer prisons, utility sites and other high-security corporates, governments and organisations one integrated solution to manage security and safety risks effectively throughout their enterprises.”
Senstar and Aimetis, a Senstar company, showcases perimeter intrusion detection and video management solutions at Security 2018. New products, including the Security Innovation Award finalist Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system, and Senstar Symphony 7.1 video management software, were on display at Booth 5C09.
“Since the last Security show we have introduced exciting new products and have been working hard to transition Aimetis to the Senstar brand,” said Senstar’s VP of Sales – EMEA Fabien Haubert. “We look forward to demonstrating how bringing together the world’s largest portfolio of perimeter intrusion detection products and world-class video management software creates intelligent, integrated security solutions that provide true value for our customers.”
Implement video analytics
Products on display includes: The Senstar LM100 combines two key security functions in one cutting-edge product, acting as a powerful deterrent against intruders by detecting and illuminating them at the fence line. The Senstar LM100 is one of 13 finalists from 75 entries for the prestigious Security Innovation Awards to be presented at the show.
Senstar Symphony 7.1 is the new benchmark for intelligent video management software (VMS) allowing for control of an entire video surveillance system
Senstar Symphony 7.1 is the new benchmark for intelligent video management software (VMS) allowing for control of an entire video surveillance system from one central location. Users can connect and configure cameras, monitor open spaces, implement video analytics, and use centralized cloud management tools for multi-site management.
Intelligent surveillance system
Symphony Analytics are ideal for businesses searching for a more efficient and intelligent surveillance system. License Plate Recognition – track, record and report vehicle license plates. Face Recognition – identify known and unknown individuals.
Outdoor Object Tracker – classify people and vehicles, filtering objects by size and location FlexZone is a cable-based fence-mounted system that detects and locates any attempt to cut, climb or otherwise break through the fence. FlexZone adapts to most fence types and is ideal for sites of all sizes.
Thin Client is a PC alternative designed to easily display 1080p video from 30+ network video manufacturers, as well as digital signage. Its easy setup and compact design are ideal for space constrained environments. For live demonstrations of the above products and others, visit Senstar at Security 2018 Booth 5C09.
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8,8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state.
Detecting and deterring power thefts
Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometers distribution network and 4,386 kilometers of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables.
Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters.
Bosch video security and intrusion detection systems For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS)
As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS).
For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. All systems and cameras are monitored by security personnel at the company’s control center in Recife.
IP cameras with built-in video analytics
For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites.
Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
Living in the era of global village, everything is rapid change. To keep up with the pace, the large-scale enterprises need to take every movement of branches in control, ensuring every policy has delivered well. HQ-Branch management, including central control, alarm synchronisation, data retention and protection is becoming a great important challenge to enterprises nowadays.
Without integrating lots of systems and management tools, Surveon HQ-Branch security solutions provide VMS with easy remote deployment, advanced VA for alerts and post events search, storage with large capacities for 365-day recording, and local /remote replication through NAS or ISCSI, supporting headquarters (HQ) to easily manage all branches.
Surveon Control Center and Enterprise NVRs
Surveon Control Center provides enterprises with an easy remote deploymentUnlimited number of cameras, users, NVRs, and monitors are supported in one domain architecture, Surveon Control Center (SCC), which provides enterprises with an easy remote deployment. Its monitor wall can be set up with any combination of camera views, making HQ can be easier awarded every branch's movements.
Surveon NVR embedded 12 Video Analytics which can identify and initiate alerts for various user-defined events, offering effective monitoring, detections, alerts, and responses to events for enterprises. For example, intrusion detection can prevent uninvited people from entering the sensitive areas. Moreover, the advanced Post VA Search provides enterprises an efficient tool to quickly identify useful information and relative footage from hundreds of hours of video recording, reducing the time and efforts of HQ security manager, making HQ-branch surveillance system more efficient.
Data retention and storage
Surveon Enterprise NVRs provide large capacities for 365-day non-stopping recordingThe data retention of recorded videos and the system which can support hundreds of camera records are of great importance to the planning of enterprise surveillance. Surveon Enterprise NVRs provide large capacities for 365-day non-stopping recording, fulfilling the long-time storage requirements from enterprises.
Surveon NVR supports remote replication through NAS or ISCSI. Enterprise can keep 1st copy in local branch and 2nd copy in remote HQ. If the source data fails due to system malfunctions or disasters, enterprise can leverage the remote copy to restart services in a few minutes.
Agribank, the largest commercial bank in Vietnam, and House Green, a home improvement retail chain in Taiwan, has adopted Surveon HQ-branch solutions. “Different from PC-based NVR solutions, Surveon adopts a system design fully customised for surveillance applications. This offers higher value for SIs, including advanced levels of integration and stability.” said the Sales Director of Surveon partner in Vietnam.
Dallmeier offers comprehensive security solutions for all areas of application around airports. Specifically, in the area of cameras a wide range of systems allow customers to tackle all of their safety and security challenges and be able to comply fully with operational and regulatory requirements.
On top of that, Dallmeier supplies video management solutions that not only give operators an exhaustive overview of security-relevant events, but also allow the video data to be analysed with a view to optimising business processes such as ground handling operations.
One of the paramount concerns for airports is perimeter protection; an issue, which was highlighted by a number of recent incidents involving unauthorised access onto airfields. It is important to be able to use video system to track an intruder, but the ultimate goal is to prevent an intrusion in the first place.
IR cameras with integrated IR illumination
With its range of high-performance IR cameras with integrated IR illumination, Dallmeier offers the right solution for every area of applications across airports
IR cameras are a key component of any video security system that must provide around-the-clock monitoring capabilities, and the Dallmeier line of advanced IR cameras is ideally suited for that. With its range of high-performance IR cameras with integrated IR illumination, Dallmeier offers the right solution for every area of applications across airports.
The IR cameras are designed specifically for applications requiring images with highest resolution in real-time at day and in the IR mode at night. Dimly lit areas on the apron or sections along the airport perimeter, which might only be lit in case lighting systems are triggered by movement, are among the many possible applications.
Multi-focal sensor technology Panomera
Airports typically encompass wide areas and stretch over long distances, which poses particular challenges for video monitoring system. In the past, in order to adequately monitor the entire area, it was necessary to use a number of cameras installed in a whole range of locations. Dallmeier’s multifocal sensor system Panomera, however, represents an entirely new technology and a fundamentally different approach to the issue of video security. The patented multi-focal sensor technology Panomera from Dallmeier is the ideal video solution for landside and airside safety and security.
It was specially developed for the all-encompassing video surveillance of expansive areas. With Panomera, huge widths, as well as areas with large distances can be displayed with a completely new resolution quality, in real time and at high frame rates of up to 30 fps. With Panomera, a huge area can be surveyed from a single location and depending on the customer’s needs, the resolution can be scaled nearly limitlessly. For example, one Panomera system equipped with eight sensors is sufficient to replace up to 35 standard megapixel cameras.
Optimising airport operations
Panomera offers unique capabilities for optimising airport operations, such as aircraft turnaround time, as well as monitoring airfield traffic on both aprons and runways
Moreover, in conjunction with intelligently designed video management and analysis systems, Panomera offers unique capabilities for optimising airport operations, such as aircraft turnaround time, as well as monitoring airfield traffic on both aprons and runways (e.g. ground support equipment on the way to restocking aircraft galleys). The fact security personnel are provided with a comprehensive overview of the entire airport, regardless of where their individual focus may at any given time, means that they can react quickly to any incidents.
Video technology can therefore assist airports with the implementation of the Europe-wide optimisation concept of Airport Collaborative Decision Making (A-CDM), which is supported by a number of organisations including the European Organisations for the Safety of Air Navigation (EUROCONTROL) and the Airport Council International Europe. The latter represents over 500 airports from 45 European countries. A-CDM specifically aims to enhance the operational efficiency of airports, which opens up various application areas for video technology.
Proactive video monitoring as is enabled by the Dallmeier video information systems, instead of passive surveillance, is the way forward across different industries - including airports.
Ava Group a provider of risk management services and technologies, announces that an Ava Group Company solution has been selected to protect a major military closed data network from the threat of tampering and tapping. The project to deploy its fibre optic intrusion detection and location solution is valued at around US $11M and asserts Ava Group’s status as a pioneer in data network protection.
Ava Group Chief Executive Officer, Chris Fergus states: “We are proud that the Future Fibre Technologies (FFT) solution has been selected through a rigorous competitive tender, to deliver the very highest levels of protection to a closed data fibre optic network.”
Asset owners can be potentially exposed to the threat of state-on-state action, terrorism and industrial espionage, as well as incident without motive
Closed fibre network
The principal task of this project supports The Ministry of Defence in India, who has the responsibility to protect its closed user group data network which is one of the largest in the world and used by more than one million military personnel.
Any data network is as strong as its weakest link. Government departments, intelligence services, military organisations, financial organisations, nuclear facilities and commercial businesses with valuable intellectual property will have stringent measures in place to mitigate physical and cybersecurity threats yet are often oblivious to the danger of leaving even a closed fibre network unprotected. As such, the asset owners can be potentially exposed to the threat of state-on-state action, terrorism and industrial espionage, as well as incident without motive.
Introducing additional vulnerabilities
With low-cost readily available technology that requires little expertise, it is possible for an agenda-driven individual, or state-sponsored actor to tap and infiltrate a network at the fibre optic level and harvest data, without raising the alarm, or leaving an evidence trail. Chris Fergus, Ava Group CEO comments: “Any data breach is of grave concern, but those that pass undetected raise the stakes significantly. What’s more, in some instances fibre networks run across vast distances, meaning there could be tens of thousands of potential entry points for attack.”
Unlike the widely used data encryption and protection schemes used to protect data in transit, Ava Group’s solution does not involve manipulation or processing of the data streams, thus avoiding third-party access to the data and therefore introducing additional vulnerabilities. Furthermore, processing or encryption of the data has a significant detrimental impact on bandwidth and latency, thus negating a major benefit of using fibre networks.
Ava Group expects additional revenue from spares and support for seven years after the initial three-year warranty period
Globally-recognised cybersecurity standards
Kevin Berry, Ava Group’s Head of Information Security explains: “The FFT solution does not see or process the data, cannot access it and there is no requirement for encryption. Consequently, the network infrastructure is fully protected at every point and crucially performance is unaffected. Another major benefit of the FFT solution is that deployment is completed with zero network downtime and can be rolled out across live infrastructure utilising dark fibres.”
A further reason for organisations to choose Ava Group company solutions is the recent launch of its Global Cybersecurity Centre of Excellence (CCoE). The initiative provides all customers with expert guidance and assurance that the products deployed on their data networks meet globally-recognised cybersecurity standards. The project is expected to be delivered in phases over a 15-month period, with the FFT solution beginning to strengthen the network from day-one of the installation. Ava Group expects additional revenue from spares and support for seven years after the initial three-year warranty period.
We are living in the age of Big Data, and businesses are inundated with large volumes of data every day. Success depends on capturing, analysing and ultimately transforming that data into information and intelligence that can be used to improve the business. So, it is with today's physical access control and video systems, too, which also generate unprecedented levels of data. But how can we make the data useful to end users and how can they realise its full value? We asked this week's Expert Panel Roundtable: Relating to physical security systems, what is the value of data and how can that value be measured?
The end of the year is a great time to take stock of one’s accomplishments during the year, and to reflect on successes and failures, where we are and where we’re going. 2017 brought a lot of change to the physical security market, but were the changes positive or negative? Our Expert Panelists tend to be a thoughtful and reflective group, so we wanted to get their thoughts and insights at year-end about 2017 in the security market. We asked this week’s Expert Panel Roundtable: Was 2017 a good year or bad year for the physical security industry -and why?
Video systems today offer more capabilities than ever. Consequently, the systems can be used in new ways. For a variety of reasons, however, many customers don’t take full advantage of the capabilities of their video systems and therefore are leaving value on the table. Education and training are tools to alleviate the situation, but the first step is to identify the new ways that video can be used. We asked this week’s Expert Panel Roundtable: How do customers under-utilise their video systems, and what should they do differently?