Office security systems
Invixium, a global provider of modern biometric solutions, announced the release of IXM WEB 2.1, a faster and more responsive version of their enterprise level management software platform. IXM WEB 2.1 is 6X faster delivering seamless navigation and includes a variety of new features and numerous stability and performance related bug fixes. It incorporates the latest development technologies and the highest encryption standards for data privacy and secure communication. The application was desi...
Ignition Technology and Cybereason announced a distribution partnership to grow and support Cybereason’s rapidly expanding channel community across the UK and Ireland. Cybereason’s Cyber Defense Platform offers endpoint prevention, detection and response and active monitoring. The solution delivers multi-layered endpoint prevention by leveraging signature and signatureless techniques to prevent known and unknown threats in conjunction with behavioural and deception techniques to prev...
Copp Systems, a Dayton, Ohio-based security and communications systems provider, is celebrating its 100th anniversary this year. Copp Systems (formerly Copp Integrated Systems) was founded in 1920 by Roy Stanley Copp, an engineer and member of the “Dayton Boys,” a group of young engineers and students interested in technology. Copp began selling and servicing RCA living room consoles from his Monument Avenue storefront to prominent Dayton families, including the Wrights, Deeds, and K...
Vidsys, a global developer of Physical Security Information Management (PSIM) and Converged Security and Information Management (CSIM) technology solutions, announces the release of the latest version of its security software platform – Vidsys Enterprise 2020 R1.0. Vidsys Enterprise 2020 R1.0 is the first release of the product’s 2020 iteration, which focuses on continuing to provide security and performance optimisations to better support the user’s experience. Mapping and v...
Hikvision, the world’s supplier of innovative security products and solutions, will be exhibiting its innovations at Intersec 2020, a security exhibition in the Middle East, January 19-21 in Dubai, UAE. Emerging technologies and applications opened up new possibilities for the security industry. This year, visitors can experience Hikvision’s products and solutions for users across various industries. Multi-dimensional perception Hikvision’s multi-dimensional perception was c...
Swan Island Networks, a SaaS security intelligence provider, announced TX Global, a breakthrough global intelligence alerting service. The all-new TX Global alerting service is built on TX360, a robust global platform for intelligence monitoring and situational awareness, deployed on the Microsoft Azure Cloud, and built for high-performance security intelligence teams. TX Global now offers easy access as a subscription service of critical global alerts aimed at corporate security, business conti...
Synology Inc. has announced the availability of the SA3600 storage system, the latest device in the SA family of high-performance and versatile, petabyte-capable network attached storage servers. Built to tackle both existing and future data storage requirements, SA3600 provides businesses with access to faster and larger on-premises storage in a cost-effective package. "In response to the rising demand for on-premises data storage, we built the SA series to help businesses reach petabyte-scale storage," said Michael Wang, Product Manager at Synology Inc. "SA3600 provides massive storage and high performance to meet the ever-growing compute requirements and to facilitate IT transformation for large-scale businesses." Versatile architecture to accelerate workload Powered by an Intel Xeon 12-core processor, the SA3600 is scalable up to 180 drives. SA3600 provides petabyte-scale storage capacity, suitable for massive surveillance deployments, video post-production, and other business environments. Support of both 2.5" and 3.5" SAS/SATA drives increases flexibility and prevents vendor lock-in, minimising total cost of ownership (TCO). Performance: Over 5,500 MB/s sequential throughput and 176,000 4K random write IOPS1 Scalability: Up to 1,536 TB storage capacity with 7 expansion units2 10GbE built-in: 2 x 10GbE and 4 x 1GbE Ethernet ports PCIe 3.0 expansion: 2 x PCIe slots for additional network interface card support Virtualisation-ready: Certified for VMware vSphere, Microsoft Hyper-V, Citrix XenServer, and OpenStack Cinder Easy to deploy by IT departments and greatly simplifies operations with comprehensive tools designed for businesses to safeguard their data. Integrated data protection and availability VM, SaaS, and endpoint protection Centralised backup solution to protect VMware and Windows Server virtual machines, Windows endpoints, Office 365, and G Suite accounts. Manage all the backup tasks from one single console and restore data instantly with flexible recovery methods. Prevent data loss with snapshots and replication Synology Snapshot Manager integrates with VMware and Windows for application-consistent data protection. Snapshot Replication enables Shared Folder and LUN protection for all other workloads. Maximise availability Add in another SA3600 to combine two servers into a single high-availability cluster. The active/passive structure ensures smooth service transition between clustered servers in the event of hardware failure.
Johnson Controls introduces the exacqVision Facial Matching solution, an Artificial Intelligence enabled system that provides immediate notification of persons of interest who are returning to a retail business, venue, or other premise. Tyco will be displaying the solution at Booth 4142 at the NRF 2020 show in New York, January 12-14. Using highly accurate deep learning analytics, exacqVision Facial Matching serves as a “front door host,” with immediate recall of recognised visitors that arrive on site, such as a suspected shoplifter returning to the store, or to detect persons of interest entering a high-profile sporting event or a place of business. Deep learning capabilities “The power of exacqVision Facial Matching comes from its deep learning capabilities for accuracy as well as in its extensive integrations with exacqVision and other retail tools, such as electronic article surveillance and point of sale systems,” said Ryan Hulse, senior product manager for Exacq. “Leveraging these tools for a complete automated detection and notification system significantly lessens the burden on staff who have a whole host of other responsibilities to fulfil.” Tyco AI harmonises video and access control solutions, streamlining the management of a facility The engine behind exacqVision Facial Matching is Tyco AI an ever-evolving, deep learning solution that will take analytic capabilities such as object classification, behaviour and facial recognition to the next level, using powerful algorithms that customise solutions to specific end user installations. To further automate this approach, Tyco AI harmonises video and access control solutions, streamlining the management of a facility through a surveillance infrastructure rather than by disparate systems or operator intervention. Electronic Article Surveillance In a retail setting, exacqVision Facial Matching continuously compares faces against saved profiles, even with hats, glasses and facial hair, providing instant confirmation of the presence of persons of interest with color-coded facial bounding boxes. Integrated directly into exacqVision for easy configuration and deployment, the solution can capture and automatically enter into the database acceptable facial views triggered by Electronic Article Surveillance pedestals or Point of Sale keywords, growing the database of faces with minimal user interaction. Users can also be added manually into the system. Once a profile has been created and that individual returns to the business, users can receive a push notification through the Exacq Mobile app with the date, time, and image of the person of interest. Personnel will then be able to take appropriate action based on the event. The exacqVision Facial Matching also provides businesses of other types the ability to reference visitors against a known database of terminated employees or other persons of interest, whether they are returning to the same location or to another facility. For example, if a recently terminated employee returned to the workplace within a certain amount of time, Exacq Facial Matching will provide instant notification.
ADT Inc, a provider of security, automation, and smart home solutions serving consumer and business customers in the United States, announced that it has acquired Defenders, its largest independent dealer and only Authorised Premier Provider, for a purchase price of approximately $381 million1. As part of the transaction, Defenders founder David P. Lindsey and Jessica A. Lindsey received approximately 16.3 million shares of ADT common stock for 100% of their ownership in Defenders, while the remaining $260 million of consideration was paid in cash to retire existing Defenders debt, fund other liabilities, and pay transaction expenses. The cash consideration was partially funded from existing revolving credit facilities. Financial and operational advantages Together, we will have greater marketing efficiency through unified brand messaging: “We’re excited to officially join forces with the impressive Defenders team after successfully partnering with them for nearly 22 years so that, as one company, we can create a unique and simplified platform,” said Jim DeVries, ADT’s President and Chief Executive Officer. “This opportunistic acquisition creates numerous strategic, financial and operational advantages for ADT, and is consistent with our stated goal of driving down the capital intensity of the business as we seek to drive long-term, profitable growth.” Mr. DeVries continued, “Together, we will have greater marketing efficiency through unified brand messaging, enhanced control of the customer experience, and the ability to provide a full suite of innovative security and home automation products, including consumer financing, to a complementary geographic footprint. Over time, we also expect lower subscriber acquisition costs, an improved revenue payback period, and new account gains from the optimisation of our combined ecosystem.” Smart home solutions “We have built our business by partnering with ADT to sell and install state-of-the-art security systems, helping to protect more than 2.2 million families through our best-in-class marketing team and expert knowledge of the industry,” said David Lindsey, Chairman and Founder, Defenders. “Given this longstanding and productive relationship, we are proud that this transaction will integrate us even closer into the ADT team, and I am excited to be a significant shareholder and see the benefits we are able to deliver to customers as a combined company.” “We are thrilled to join the ADT team,” said Jim Boyce, President & CEO, Defenders. “This acquisition brings our direct response marketing capabilities, best in class sales expertise and national reach to a provider of security, automation, and smart home solutions. Together, we will be better positioned to leverage the trusted ADT brand, improve the combined company’s go-to-market operations and deliver an enhanced customer experience.” Simplifies Operating Ecosystem Strategic and Financial Benefits of Transaction : Enhances Customer Experience: Provides ability to drive a unified brand message and premium customer experience to the majority of ADT’s residential customers. Simplifies Operating Ecosystem: Establishes a single party focused on the customer experience and lifetime value, and reduces channel conflict and potential for customer confusion. Improves Marketing Prowess: Leverages Defenders’ strengths in customer acquisition to drive optimised spend across channels and enable more effective marketing messaging and customer segmentation. Innovative equipment and service offerings Increases Go to Market Efficiency: Significantly enhances ability to bring new initiatives to a broader customer base more quickly, including consumer financing, DIY, and innovative equipment and service offerings. Drives Capital Efficiency: Results in a more capital efficient ADT through the elimination of dealer “margin.” Expected to be modestly beneficial to 2020 net cash provided by operating activities and free cash flow before special items and to create synergies to further drive net cash provided by operating activities and free cash flow before special items in subsequent years.
UK CCTV camera manufacturer, 360 Vision Technology, announce that its Predator ‘all-in-one’ PTZ range is now an accredited Vision HS camera solution, certified to have completed the CAPSS approval process by the Centre for the Protection of National Infrastructure (CPNI). Ensuring cyber security measures are capable of protecting against the very real threats faced by surveillance system operators, 360 Vision Technology’s team of software developers is constantly working to ensure that these threats can be averted. Video management software “There has been a lot of negative press relating to the potential vulnerabilities integrators may accidentally introduce into their customers’ surveillance systems,” says Adrian Kirk, Strategic Account Director at 360 Vision Technology. “With concerns over the ease at which some edge devices can be used as an access gateway by cyber criminals, we’re taking cyber security seriously and helping integrators to mitigate that risk by specifying Predator UK manufactured cameras and Vision HS video management software." “Action to remove these threats is unlikely to happen fast as the UK market is still flooded by potentially unsafe Far East CCTV cameras that are being sold at bargain basement prices, which make them commercially attractive to some purchasers. The problem is further compounded by installation companies who may have limited expertise when it comes to providing tight network security.” Security and corporate confidentiality 360 Vision cyber security protection ensures surveillance capability is not compromised" "For example, steps should be taken to prevent the edge device’s set-up browser being accessed - enabling a hacker to disable or change critical camera settings, or worse, access the wider corporate network. However, supporting peace of mind for any integrator or end-user, when a 360 Vision Technology Predator camera is deployed at the edge, it cannot be used to enable unauthorised access to a security or corporate network.” Despite the increased emphasis on cyber security, and more and more sophisticated cyber-attacks taking place, many leading camera manufacturers still supply easy to get to, direct access points (typically via an RJ45 port), located within a camera’s power supply – but removing this risk is essential to ensure security and corporate confidentiality is not compromised. Cyber security protection “360 Vision cyber security protection ensures surveillance capability is not compromised, by removing the risks associated with insecure camera access,” Adrian concludes. “To provide additional protection for our customers, we are proud to announce that the ‘Predator HS’ product range is now an accredited camera solution to work with Vision HS - certified to achieve CAPSS approval by the CPNI.”
Meesons, UK’s entry control innovator, will be unveiling its innovative EasyGate Superb at this year’s International Security Expo (ISE19), Olympia London, 3-4 December, stand K40. At 99mm the EasyGate Superb cabinets are the slimmest of any Speed Gate on the market, accentuating the sleek, minimalistic aesthetics created by the glass wings. EasyGate Superb is an ultra-slim, fully customised Speed Gate that is an ideal solution for controlling access to offices, schools, universities or government buildings. The range includes unique and innovative features, including an optional integrated card collector and QR code/ barcode reader. EasyGate Superb can be specified in colours to match a customer’s corporate identity. Its ultra-slim design has already generated significant interest and Meesons is predicting that it will continue to be a major focal point for visitors to stand K40 at ISE19. Gain independent access The EasyGate Superb is the only Speed Gate on the market with such a slim design yet featuring the ability to integrate an optional card collector with a card return function. Where required, a third-party card reader can be built into the EasyGate Superb. The QR scanner, another optional feature, will help improve the efficiency of visitor management - it will be possible for an external visitor to receive a QR code on their mobile phone, allowing unimpeded entry to the facility on arrival without having to verify credentials. The QR code reader can also be used by delivery partners where there isn’t a permanently staffed reception. Sending the QR code in advance will mean they are able to gain independent access to specific areas of the facility. Intuitive light guidance The sensors are smart enough to detect when a person is traversing in a wheelchair, wheeling luggage or pushing a pram Both the QR scanner and card collectors are an integral part of the design, meaning they don’t need to increase the cabinet width or be a bolt on like other ranges. This helps maintain sightlines of the ultra-slim cabinets, which are supplied in brushed, polished or bronzed stainless steel, any RAL colour or alternative surface finishes, along with tempered glass top lids. Other optional functionality of the EasyGate Superb range includes intuitive light guidance; coloured LED illumination of the top lid allows smart settings of light navigation. In addition to standard navigation functions, various lighting effects such as arrow, dots, blending colours and much more can be set. The selection of colours is fully customisable. Safety and security Jonathan Bairam, Commercial Director at Meesons A.I. Ltd, said: “We will have our new EastGate Superb in sleek white on display at ISE19 on 3-4 December. Visitors will be able to view and try this unique new product for themselves. We are expecting a lot of interest especially as its ultra-slim design and minimalistic aesthetic will appeal to specifiers and their clients in a wide range of sectors.” Safety and security are built into EasyGate Superb with 24 pairs of IR sensors that prevent people tailgating their way into a facility without presenting the correct ID or security tag. The sensors are smart enough to detect when a person is traversing in a wheelchair, wheeling luggage or pushing a pram. Optional high glass wings prevent climb-over attempts by would-be intruders.
Fujitsu launches sales of the "FUJITSU Security Solution AuthConductor V2" which uses various authentication methods, including palm vein authentication, to deliver comprehensive biometric authentication support for customers. In addition to providing a unified palm vein authentication office environment, this product features facial authentication, fingerprint authentication and IC card authentication for PC logons, and is fully scalable to support use by anywhere from several people to organisations with tens of thousands of users. With the launch of this upgraded solution, Fujitsu enables customers to enjoy unparalleled convenience with secure and flexible solutions for a diverse range of use cases and authentication scenarios. Sales start in Japan with global rollout to follow within fiscal 2020. Palm vein authentication functionality Fujitsu has integrated PC login authentication solution into the "AuthConductor Server" software Biometric authentication technologies have become increasingly visible in daily life offering businesses and consumers convenience in a variety of areas, ranging from frictionless transactions for cashless shopping and ticketless travel, to access management for membership data and security clearance for sporting events. At the same time, it's anticipated that companies will continue to integrate a variety of biometric authentication methods, including for PC logins and room access management, to further improve convenience and reduce operational burdens in enterprise settings. To this end, Fujitsu has been offering customers its "AuthConductor Server" software since April 2017, enabling users to add palm vein authentication functionality to their existing business systems. Authentication solution for enterprise users Now, in order to meet the increasingly diverse authentication needs of its customers, Fujitsu has integrated its PC login authentication solution for enterprise users into the "AuthConductor Server" software and added new functions to deliver the "AuthConductor V2". This newly enhanced version enables authentication solutions to meet the unique needs of a variety of customers. Comprehensive access with users' palm vein data across different platforms and applications, replacing the need for different authentication methods Unifying in-house authentication methods with palm vein authentication for enterprise users - By centralising palm vein data on the server, upon registration it can be used for authentication for a variety of purposes, including PC logon, physical access management, and printing authentication, eliminating the need for separate registration for each application. This not only enhances system security but also eases access for users and administrators alike. The software now offers expanded support for a variety of authentication methods Improved authentication performance for consumer-facing services - When the palm vein authentication function is added to customer-facing business systems, the verification time can be sped up to 50% over conventional products. This makes palm vein authentication even more convenient for large-scale service deployments like cashless payments, which are expected to grow in use. The new version offers users exceptional scalability, with support for small, standalone deployments or for organisations with tens of thousands of users. Expanded authentication functionality for PC logon The software now offers expanded support for a variety of authentication methods. In addition to palm vein authentication, the new version offers facial authentication using technology developed independently by Fujitsu Laboratories Ltd., as well as fingerprint authentication and IC card authentication, which offers support for My Number identification cards used with the Japanese social security system Flexibility and Scalability for small to large customers - The service can be adjusted flexibly depending on the size of the customer and the authentication method they want to use. Fujitsu aims to expand the availability of the solution globally by the end of the fiscal year 2020.
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture influences door solution decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organisation’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organisation and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training employees on door security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organisation or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate through the decision-making process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New security entrance installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule group meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure you monitor public areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organisation. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What is the ultimate success of the installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
With the coming of a New Year, we know these things to be certain: death, taxes, and… security breaches. No doubt, some of you are making personal resolutions to improve your physical and financial health. But what about your organisation’s web and mobile application security? Any set of New Year’s resolutions is incomplete without plans for protecting some of the most important customer touch points you have — web and mobile apps. Every year, data breaches grow in scope and impact. Security professionals have largely accepted the inevitability of a breach and are shifting their defense-in-depth strategy by including a goal to reduce their time-to-detect and time-to-respond to an attack. Despite these efforts, we haven’t seen the end of headline-grabbing data breaches like recent ones affecting brands such as Marriott, Air Canada, British Airways and Ticketmaster. App-level threats The apps that control or drive these new innovations have become today’s endpoint The truth of the matter is that the complexity of an organisation’s IT environment is dynamic and growing. As new technologies and products go from production into the real world, there will invariably be some areas that are less protected than others. The apps that control or drive these new innovations have become today’s endpoint — they are the first customer touch point for many organisations. Bad actors have realised that apps contain a treasure trove of information, and because they are often left unprotected, offer attackers easier access to data directly from the app or via attacks directed at back office systems. That’s why it’s imperative that security organisations protect their apps and ensure they are capable of detecting and responding to app-level threats as quickly as they arise. It’s imperative that security organisations protect their apps and ensure they are capable of detecting and responding to app-level threats as quickly as they arise In-progress attack detection Unfortunately, the capability to detect in-progress attacks at the app level is an area that IT and security teams have yet to address. This became painfully obvious in light of the recent Magecart attacks leveraged against British Airways and Ticketmaster, among others. Thanks to research by RiskIQ and Volexity, we know that the Magecart attacks target the web app client-side. During a Magecart attack, the transaction processes are otherwise undisturbed Attackers gained write access to app code, either by compromising or using stolen credentials, and then inserted a digital card skimmer into the web app. When customers visited the infected web sites and completed a payment form, the digital card skimmer was activated where it intercepted payment card data and transmitted it to the attacker(s). Data exfiltration detection During a Magecart attack, the transaction processes are otherwise undisturbed. The target companies receive payment, and customers receive the services or goods they purchased. As a result, no one is wise to a breach — until some 380,000 customers are impacted, as in the case of the attack against British Airways. The target companies’ web application firewalls and data loss prevention systems didn’t detect the data exfiltration because those controls don’t monitor or protect front-end code. Instead, they watch traffic going to and from servers. In the case of the Magecart attacks, the organisation was compromised and data was stolen before it even got to the network or servers. Today’s proven obfuscation techniques can help prevent application reverse engineering, deter tampering, and protect personal identifiable information and API communications Best practice resolutions The Magecart attacks highlight the need to apply the same vigilance and best practices to web and mobile application source code that organisations apply to their networks—which brings us to this year’s New Year’s resolutions for protecting your app source code in 2019: Alert The key to success is quickly understanding when and how an app is being attacked First, organisations must obtain real-time visibility into their application threat landscape given they are operating in a zero-trust environment. Similar to how your organisation monitors the network and the systems connected to it, you must be able to monitor your apps. This will allow you to see what users are doing with your code so that you can customise protection to counter attacks your app faces. Throughout the app’s lifecycle, you can respond to malicious behavior early, quarantine suspicious accounts, and make continuous code modifications to stay a step ahead of new attacks. Protect Next, informed by threat analytics, adapt your application source code protection. Deter attackers from analysing or reverse engineering application code through obfuscation. Today’s proven obfuscation techniques can help prevent application reverse engineering, deter tampering, and protect personal identifiable information and API communications. If an attacker tries to understand app operation though the use of a debugger or in the unlikely event an attacker manages to get past obfuscation, threat analytics will alert you to the malicious activity while your app begins to self-repair attacked source code or disable portions of the affected web app. The key to success is quickly understanding when and how an app is being attacked and taking rapid action to limit the risk of data theft and exfiltration. Protecting encryption keys is often overlooked but should be considered a best practice as you forge into the new year with a renewed commitment to app security to ensure your organisation’s health and well-being in 2019 Encrypt Finally, access to local digital content and data, as well as communications with back office systems, should be protected by encryption as a second line of defense, after implementing app protection to guard against piracy and theft. However, the single point of failure remains the instance at which the decryption key is used. Effective encryption requires a sophisticated implementation of White-Box Cryptography This point is easily identifiable through signature patterns and cryptographic routines. Once found, an attacker can easily navigate to where the keys are constructed in memory and exploit them. Effective encryption requires a sophisticated implementation of White-Box Cryptography. One that combines a mathematical algorithm with data and code obfuscation techniques transforming cryptographic keys and related operations into indecipherable text strings. Protecting encryption keys is often overlooked but should be considered a best practice as you forge into the new year with a renewed commitment to app security to ensure your organisation’s health and well-being in 2019. Protecting applications against data breach According to the most recent Cost of a Data Breach Study by the Ponemon Institute, a single breach costs an average of $3.86 million, not to mention the disruption to productivity across the organisation. In 2019, we can count on seeing more breaches and ever-escalating costs. It seems that setting—and fulfilling—New Year’s resolutions to protect your applications has the potential to impact more than just your risk of a data breach. It can protect your company’s financial and corporate health as well. So, what are you waiting for?
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant public safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive risk reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising detection systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organisations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organisations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber risk profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualisations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter intrusion detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security ecosystem members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritise communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realised. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilising so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilising a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organisation, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualisation tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organisations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson football game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analysing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organisational change is difficult, and our team hopes to make the transition process easier for our customers.”
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no searching in a bag or purse for the card). And there’s no personal identification number (PIN) code to remember; no “intrusive” biometric element that can concern some users. James Segil, President and Co-Founder of Openpath, says the simplified process “uses fewer thought cycles.” Reliability of the system comes from Openpath’s SurePath triple-connect technology “We wanted to make mobile access control that people want to use and can use safely and with ease,” he says. “We wanted to make using a smart phone for access control easier and more reliable than using a keycard.” Simplified user operation In the simplified scenario, the mobile credential resides on a smart phone that can remain tucked away in the user’s purse or pocket. The credential remains active without the user needing to open an app. The wave of the hand signals intent, which causes the button to light up, activate and the door is ready to open. Segil says the simplicity of operation has contributed to the system seeing an unheard-of 94% adoption rate among users. Reliability of the system comes from Openpath’s SurePath triple-connect technology. The smart phone credential is delivered using Bluetooth, WiFi or LTE (cellular) – whichever signal reaches the reader first enables the door to be opened. So even if a company’s WiFi is down or Bluetooth proves unreliable, there is still a third option. Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems Seamless cloud integration Segil is a serial entrepreneur who has had experiences as a frustrated user, dealing with many different offices, people and access control deployments over the years – subletting office space, changing PIN codes, dealing with 10 different offices using 10 different cards. Based on that experience, Openpath’s founders saw a need for a more user-centric approach to access control, and a chance to improve the office experience to be more aligned with employees’ experiences in their smart homes. Segil says he also saw “significant lethargy” among incumbent players in the access control space, and a market in which mobile and cloud technologies had still not taken hold. In addition to a simplified user experience built around mobile credentialing, Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems. The “elegant” readers, including a flush-mounted version, fit in well with high-end office environments. The company launched in May 2018. Openpath has been signing up national and regional channel partners all across the U.S. Openpath is focused on the commercial real estate market, where they have already seen significant adoptions, especially among mid-sized companies. Larger deployments as part of new construction are in the pipeline. National system integration In the past six months since its launch, Openpath has been signing up national and regional channel partners all across the U.S. and now has a nationwide footprint and is able to service customers all over the U.S. They are not yet disclosing any specifics about the number of partners they have signed up and who they are. “I can share that we have a number of large national system integration and security brands on board as channel partners and many more regional and local system integrators,” says Segil. They are looking for additional integrator partners. “There is a cohort of folks out there who say ‘I get it,’ and I want to offer it to my customers,” says Segil. The cloud element of the system can provide recurring monthly revenue (RMR). Openpath’s system offers flexibility in terms of meeting each customer’s security needs. In addition to the “super convenient” scenario described above, the system can also be configured to be “super secure,” using two-factor authentication and other measures, says Segil. There are multiple “flavors” between the two extremes. It can also be integrated with elevators to enable the buttons on allowed floors. Integration with existing systems Cloud software simplifies operation for both tenants and landlords. The system is backwards-compatible to existing systems and can be used to retrofit and mobile-enable a legacy system, providing the benefits of mobile features and cloud operation to multiple sites. The software can interface with enterprise applications such as Active Directory, and an application programming interface (API) facilitates integration with other systems and building components. It operates with marketing automation platforms such as Flack and visitor management systems such as Envoy. The system is backwards-compatible, providing the benefits of mobile features and cloud operation to multiple sites Open standards make the system easy to install in new or existing buildings using RS485, or Cat 5 or Cat 6 wiring, whatever is in place. Retrofit installations can use existing panels, servers, software, etc., or they can be replaced. The Openpath panel is installed right next to an existing panel in a retrofit and preserves all legacy integrations of the previous system. Access credentials compatibility In its simplest configuration, the Openpath system consists of single or four-door panels wired using standard ports, Wiegand ports and REX ports, each connected to software in the cloud. Each panel works offline if the internet connection is down. Various key fobs, cards and other credentials are available in addition to mobile credentials. Openpath was one of the new exhibitors at last fall’s GSX show in Las Vegas, occupying a large-sized booth for a startup company. The “beautiful” hardware drew a lot of attention, says Segil. “The channel loves us, and we signed a lot of people,” he adds. “We were excited by the response.”
One factor aggravating concerns about workplace violence in corporate America is the easy availability of firearms. In many states, citizens, including employees, have the right to carry firearms onto a company’s property even though firearms are prohibited in the workplace. In effect, an employee prone to violence may have a firearm as near as their vehicle in the company parking lot. Currently, 23 states in the U.S. have so-called “parking lot storage” laws, which enable employees to store firearms in their vehicle’s trunk or glove box despite any corporate ban on weaponry. The laws have evolved as an expression of the Second Amendment “Right to Bear Arms” in the last decade or so. There is some variance in the laws from state to state, but they generally allow a citizen to carry a gun to and from work and keep it stored out of sight in their vehicle. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show Employee Second Amendment rights “The laws contend that employees should not have to give up their Second Amendment rights between home and the workplace and should be able to have a gun with them for protection from their front door at home to the front door of the workplace,” says Eddie Sorrells, Chief Operating Office/General Council of DSI Security Services. Sorrells will speak about the current state of the laws, how they came about, the nuances of state-to-state differences, and the possible impact on overall corporate security in a session titled “Employees Who Carry: Preventing Workplace Violence” at the upcoming GSX conference in Las Vegas, 23rd - 27th September. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show, attended by more than 22,000 security professionals from 100-plus countries. Sorrells’ session will be Sept. 24 from 10:30 to 11:45 a.m. Restrictions on gun visibility Employees may think the “right to carry” extends to the workplace, but the right only extends to the parking lot. The company still has the right to ban guns inside the premises. However, it is unlawful in some states for companies to search vehicles in parking lots, and companies who do so are violating the law, says Sorrells. Among the various state laws, some exempt public education institutions and other public venues. Depending on how the laws are written, there may be other exemptions, too. In Florida, for example, the law exempts any organisations that have explosives on site. With weapons on a company's property, a high-risk termination could potentially become violent Most laws require weapons to be stored securely out of sight. However, in Alabama, for example, it is legal to store validly permitted guns in full view during hunting season, Sorrells says. A resident of Alabama himself, Sorrells has been in the contract security business for 27 years, working mostly in multi-state operations. He has worked for 500 or so corporate security organisations throughout the country and is a practicing attorney who has studied issues of workplace violence and active shooters. “There is a political element to these laws, which were created with the goal of protecting Second Amendment rights,” says Sorrells, who says he sees arguments on both sides of the issue. However, political opinions aside, “if you’re a business owner, you have to contend with dozens of weapons on a company’s property,” he adds. “That could be an issue if a high-risk termination could potentially become violent. You have to assume there is a weapon in that person’s vehicle.” Sorrells' session will dive into the case law and illuminate some of the legal issues and how courts have addressed them GSX education program After the session, Sorrells hopes attendees will take away a good working knowledge of the state of the laws, how to comply with the laws, and issues such as posting of signs. The session will dive into the case law and illuminate some of the legal issues and how courts have addressed them. The timely session is an example of the valuable information attendees can gain by attending GSX. Sorrells has been attending the yearly ASIS International Conference and Exhibits for more than 20 years, at least since the mid-1990s. As the pre-eminent security organisation around the world, ASIS International provides unrivalled educational and networking opportunities at the yearly conference, he says. “There is a vast amount of networking and educational offerings on a wide variety of topics, including technology, legal issues, risk management, workplace violence, consulting, and anything under the sun,” says Sorrells. The newly branded GSX education program is led by subject matter experts from ASIS International, InfraGard (a public-private partnership between U.S. businesses and the Federal Bureau of Investigation), and ISSA (Information Systems Security Association). Sessions will deliver valuable, actionable takeaways to help attendees shape their security strategies. There will also be an exhibition of 550-plus suppliers and manufacturers highlighting the latest security solutions.
The campus site near Aix-en-Provence is diverse, with offices, event spaces, kitchens and two accommodation blocks totalling 170 units. The Camp must remain open around the clock, all week, while maintaining security for staff and visitors. Aperio provided locking devices tailored to every door type — interior and exterior. So far, The Camp has integrated 221 Aperio Wireless Escutcheons, 42 Aperio Wireless Cylinders and 10 Aperio Wireless Handles within a TIL Technologies security system. Integrated online with the central system and controlled from the same interface, these Aperio devices effortlessly handle daily staff traffic of around 250 people. Meeting rooms, server rooms, living spaces and kitchens are secured with Aperio wireless locks. Up to 2,000 external visitors arrive on-site when The Camp stages an event — and each must also have credentials issued and access filtered through the site. Aperio makes it straightforward to enable visitor access. Real-time and future-proofed “Many credentials get lost and Aperio enables us to handle this efficiently,” says Benjamin Ciotto, Head of Information Technology at The Camp. Online mode is very important because [access] rights are very often updated for the constantly shifting campus population" A few clicks are all it takes to cancel a lost key-card and issue a replacement. Security staff at The Camp ensures only authorised users to enter offices where expensive video projectors and screens are stored. Their TIL integration enables real-time management of the whole site, with specific profiles created to segment individuals who need fine-grained access to specific areas. “Online mode is very important because [access] rights are very often updated for the constantly shifting campus population,” explains Benjamin Ciotto. “We can also program access to defined time slots, which is essential when we welcome 200 people for an all-day meeting, for example.” Environmental Product Declarations Aperio technology also met The Camp’s need for an aesthetically pleasing, wireless solution. They did not want to compromise their interior or exterior design. The Aperio product ecosystem’s sustainability performance also fits The Camp’s ethos. Because Aperio devices are wireless and battery powered, they are much more energy efficient than traditional wired locking systems, which require an “always-on” mains connection. Multiple Aperio devices have independently assessed Environmental Product Declarations (EPDs). These detail the footprint of each device through its full life-cycle, from production to disposal. “Aperio is a real comfort of use,” Benjamin Ciotto concludes. “And we handle the easy maintenance for ourselves.”
Critical building management and security systems at one of the most advanced super-high-rise towers, the landmark Wasl Tower in Dubai, are to be integrated with Maxxess eFusion technology. The 302-metre multipurpose tower, which will be operated by the Mandarin Oriental Hospitality Group, incorporates offices, guest rooms, public areas and apartments, and is situated in a pivotal Dubai location. The Wasl Tower is designed with advanced sustainability features including natural shading and cooling, adaptive lighting, one of the world’s tallest natural ceramic facades, and a vertical boulevard. eFusion was selected for the project because of the flexibility it allows, enabling rapid integration, off-the-shelf, with a wide choice of security, safety and business-critical technologies. With a modular, building block approach, eFusion provides an umbrella management system and drives service efficiency by removing the need for operators to continually switch between systems. Visitor management system By keeping it simple and integrating with the widest choice of technologies, Maxxess removes the complexity A key use of the technology will be to integrate back-of-house operations at the Wasl guest apartments with front-of-house systems, for maximum ease of use and operational efficiency using the Maxxess unified platform. This eFusion solution comprises a 900-plus reader ASSA ABLOY VingCard access control system, a 1700 camera Hanwha surveillance system, and advanced key management with Deister ProxSafe, and it will use the BACnet protocol to integrate the building management system (BMS). The Tower will also benefit from Maxxess VisitorPoint visitor management system, a Zenitel intelligent communication system and disabled call-to-assist alarms. The VisitorPoint integration will improve the guest and resident experience, reduce administration and front-desk queuing, and ensure smooth running of functions from visitor and contractor management to collections and deliveries, and security. Streamline security, safety and facilities management “The challenge with projects of this scale is to find a simple, straightforward platform that communicates with everything and works with all the systems involved,” says Lee Copland, Managing Director EMEA, Maxxess. “By keeping it simple, and integrating with the widest choice of technologies, Maxxess removes the complexity.” The Wasl Tower project is the latest of a growing number of mixed-use developments, including hotels, retail, office and residential complexes to use eFusion to streamline security, safety and facilities management. Last year Maxxess won an Intersec Award for its major eFusion implementation at Bluewaters Island.
PINs protect, just ask your credit card company. How many rooms at your office shouldn’t offer an open access, free-for-all? Probably quite a few. But expecting everyone to keep them locked, and the key-carrying and-tracking that entails, is unrealistic. This is when you need Code Handle. Access control system This simple, secure, easy-to-fit handle works with your current door lock. There is no need for you to change the door lock mechanism; just replace the existing handle to add PIN security to an office door. With Code Handle, there is no wiring, no expensive access control system and no need for cumbersome physical keys. Two screws fit a Code Handle to almost any interior office, meeting room, archive or storage room door. The inbuilt electronic PIN pad does the security work for you. Press a 4-digit code on the handle’s integrated keypad and the door opens. Code Handle comes with a Master Code and 9 different user PINs, so you can restrict access to a select group of people — senior managers, the IT department or the office cleaners, for example. User-friendly security Code Handle keeps sensitive documents, meeting rooms and personal belongings safe at your workplace Code Handle also locks itself. Auto-locking ensures an office, storage room or staff toilet is always secure when you close the door. You know for sure nobody has seen the new org chart you left on your desk, nor entered the stationery cupboard without authorisation. With Code Handle, user-friendly security comes with clean, elegant design. Forget about ugly push-button-and-twist mechanical PIN locks. The low-profile Code Handle is brushed in stainless steel and satin chrome zinc, in a sleek design to blend with any modern office décor. All the security you need is in the handle. Two standard batteries (CR2) slot inside, and typically last for 30,000 lock/unlock cycles before you need to replace them. An indicator tells you when it’s time to change them. Code Handle comes in left- and right-hand versions. Fire tested It is fire tested and enables free exit from the inside of a room. Code Handle keeps sensitive documents, meeting rooms and personal belongings safe and secure at your workplace. You can’t lock every room, nor install CCTV everywhere. With Code Handle, you don’t need to. To learn more about Code Handle, please visit: https://campaigns.assaabloyopeningsolutions.eu/codehandle
H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. Its most recent transformation project involved an access control system — for its own offices. H-Farm needed a solution to streamline access management for lots of people at a growing portfolio of sites and buildings. H-Farm experiences rapid turnover of users, both because new businesses join regularly and because they organise up to 300 events every year. Battery-powered locks Any new locks would need to extend an existing Axis system, but without adding complexity for day-to-day administration. To meet their needs, H-Farm selected a combination of Aperio® handles, security locks and escutcheons, each easy to retrofit, so day-to-day work at their busy offices would not be disrupted by intrusive installation. So far, 40 Aperio® Online H100 wireless door handles, 6 Aperio® Online L100 wireless locks and 4 Aperio® Online E100 wireless escutcheons have been fitted across multiple H-Farm locations in northern Italy. All Aperio® battery-powered locks are wireless, so no ugly cabling runs to H-Farm’s doors. Because Aperio® offers wide range of battery-powered devices, H-Farm can choose the precise wireless lock for every application: the L100 lock protects doors with high security demands; robust H100 handles suit interior doors with high traffic. Wireless access control Aperio® H100 enables customers to add doors to their access control solution because cost per door is lower H-Farm interior doors are mostly secured with the new Aperio® H100 wireless handle — Intersec’s Access Control Product of the Year in 2018. The Aperio® H100 packs the flexibility and affordability of Aperio® wireless access control into a slim, cleverly designed door handle. Its standard battery slots inside the handle, ensuring a minimal footprint. ASSA ABLOY’s device design team incorporated electronics into the handle lever on the outside of the door, without jeopardising security. Design has become a major feature of the H100’s appeal. H-Farm wanted devices to blend with the contemporary architecture of their new €101m H-Campus development. “Aperio® wireless access control hardware is solid, nice looking and perfectly fits our environment — solving our access problem,” says Alberto Aldrigo at H-Farm. The H100 and other Aperio® devices are easy to install; for the H100, basically two screws complete the job. Going forward, this will enable H-Farm to quickly bring new buildings into the same access system as they expand to fresh locations. The H100 fits around 90% of target doors with two main models: one for left-handled doors, the other right-handed. “The Aperio® H100 also enables customers to add more doors to their access control solution because the cost per door is lower,” says Tania Amico, Aperio® Sales Manager at ASSA ABLOY Italy. Seamless integration H-Farm managers want to control access to site doors, or bring entirely new premises into their access system The open architecture underpinning Aperio® devices enabled easy online integration with their existing Axis system via PRYSM AppControl. Remote operation from a single, central software interface is seamless, which makes administering the system easy. “The PRYSM AppControl software utilizes the integration Axis completed with Aperio®,” says Piergianni Marana, Key Account Manager at Axis. “And the AXIS A1001 Door Controller is based on open hardware, which makes installing and configuring an Aperio® wireless lock easy and seamless.” An Aperio® RS-485 Hub coordinates up to 8 Aperio® locks within a typical range of 15 to 25 meters, communicating with the admin system via the powerful AXIS A1001 IP Network Controller. One AXIS A1001 Door Controller can manage one wired door and one Aperio® hub, up to 9 doors per hub. AES 128-bit encryption ensures communication between lock and system is secure. Online Aperio® integration gives facility managers real-time status information about their premises. Aperio® locks are wireless, so there was no expensive or time-consuming cabling. The AXIS A1001 uses Power over Ethernet (PoE), which eliminates the need for power cables to the controllers, too. If needs change at a facility — perhaps H-Farm managers want to control access to more site doors, or bring entirely new premises into their access system — it’s quick, efficient and easy for an installer to fit Aperio® locks and integrate the doors with the AXIS Entry Manager control panel. To discover whether your existing security system is ready for wireless Aperio® locks, download a free, fast Compatibility Checker at https://campaigns.assaabloyopeningsolutions.eu/aperio-upgrade
With roots dating back to the year 1948, Italian pharmaceutical company Alfasigma is dedicated to advancing the state of healthcare under the company motto, ‘Pharmaceuticals with Passion’. Headquartered in Bologna, the multinational corporation was created in 2017 by the merger between Alfa Wassermann and Sigma-Tau. As a result, Alfasigma now employs about 3,000 people and markets a wide range of therapeutic drugs in 18 countries including the US, China, Russia and several European countries with annual revenues of EUR 1.06 billion. In order to keep up with the company’s ongoing evolution while emphasising building protection, Alfasigma decided to update the infrastructure of its corporate offices in Milan and Bologna. This large-scale remodelling project also required updating the fire alarm, intrusion detection and video security systems at both facilities to the highest standards. Security cameras for outdoor surveillance On the exterior of the buildings, FLEXIDOME IP starlight 7000 VR cameras were installed to provide 24/7 securityAssuming a long-term perspective, Alfasigma management headed into the project with three key requirements: First, saving cost by refurbishing already installed system components such as intrusion and fire alarm detectors. Second, accommodating for future building expansions and saving additional costs by installing a future-proof and scalable system. And third, adding around-the-clock security to the building’s exterior through modern security cameras built for outdoor use. For this reason, Alfasigma commissioned Bosch as the one-stop provider to equip the Milan office – home to the International Division – as well as corporate headquarters in Bologna with an IP-based solution. The video security set-up includes high-definition DINION IP 5000 HD cameras connected to recording stations and offering 1080p resolution images at 30 fps. On the exterior of the buildings, FLEXIDOME IP starlight 7000 VR cameras were installed to provide 24/7 security. Recording at 1080p and 60fps, the cameras incorporate starlight technology to deliver relevant images even in challenging light conditions. Extremely weather-resistant, water-tight and able to withstand high impacts, the cameras are highly suited for outdoor use, confirmed by IP66, NEMA type 4X and IK10 rating and installation in mission-critical environments such as airports and government buildings worldwide. MAP 5000 installed with LSN detectors The new fire alarm system is interfaced with the voice alarm system Plena via Smart Safety Link“The video surveillance products are excellent and have impressed me the most. We are very satisfied, above all, with the high quality of the products,” said Stefano Borsarini, Facility, Maintenance and EHS Manager at Alfasigma facilities in Bologna and Milan. The cameras are supplemented by the intrusion panel Modular Alarm Platform MAP 5000 installed with LSN detectors – a large portion refurbished from the legacy system – to safeguard Alfasigma’s offices at night. Fire alarm is provided by the Modular Fire Panel 5000 Series with four loops, processing signals from 190 fire alarm detectors and 28 manual call points. The new fire alarm system is interfaced with the voice alarm system Plena via Smart Safety Link thus optimising the operational security via a monitored connection. Successfully installed and customised according to client specifications, the Bosch fire alarm, intrusion detection and video security solution maintains the safety of Alfasigma’s employees and property at both sites. It also fulfils the key customer requirement of accommodating for future expansions in a modular, IP-based system that is able to keep pace with Alfasigma’s rapid evolution as an innovative multinational company.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announces that the Bradley Business Center, located in Chicago, has installed a 3xLOGIC infinias CLOUD access control system throughout the redevelopment project. HTML Global, an IT Managed Services Provider (MSP), oversaw system installation and continues to provide remote system management. Bradley Business Center (BBC) is the largest redevelopment project on Chicago’s north side, comprising over 500,000 square feet, spread over 22 acres. The BBC offers a unique shared office environment for entrepreneurs and professionals and boasts a wide array of features and amenities. Controlling common areas Both organisations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions At present, the 3xLOGIC infinias system manages a total of 43 internal doors throughout the complex, split between BBC-managed doors and those for a tenant company, Compass Health Center. The two organisations manage their own access separately but use some of the same network and PoE switches. BBC doors managed are mainly those controlling common areas and shared amenities— parking, fitness facility, rooftop terrace, and others—but also data rooms and other sensitive areas within the office space. Both organisations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions when requested. “When we started with BBC, they were looking to us for our knowledge base, and we installed a few doors at that time. Then, we built out the system as they added new offices and common areas to be managed,” explained William Hunt, Managing Director, HTML Global. Cloud-based system “The distributed Ethernet network can easily handle all the doors and that simplified installation and on-going management. The BBC property management staff don’t want a server onsite, so a cloud solution nicely fits their needs. Another advantage for BBC is our RMR services and the fact that a cloud-based system is mainly operating expenses, not hardware capital expenses—that’s economically advantageous for a property management business.” “There are so many other advantages to a cloud-based system, especially our ability to add doors when any of the resident companies want to join the system, or to expand the number of doors for existing customers—we can add one door or hundreds of doors upon request,” said Hunt. “Compass likes the system functionality and ease-of-use so much, they recently expanded it to their Northbrook location, too. That way, when staff move between the two facilities, they only need one set of credentials.” Access control system Such high-level control and ease of use is accomplished with minimal hardware on site BBC controls access by zone and/or amenity for each credential holder, administrators can add zones and close access to other zones with a few keystrokes. Door control is granular, making it easy to provide all-areas access to senior staff and highly-limited access, for example, for contractors and temporary workers. Such high-level control and ease of use is accomplished with minimal hardware on site. Many administrators were up and running on the infinias system with very little training, if any. With a cloud-based access control system, new tenants can join the system with ease, or a tenant can be removed from the system in a matter of minutes. Fix things remotely Hunt again, “As an MSP, we are overseeing a system that updates itself automatically, and because BBC management doesn’t have a full-time IT person, that’s where we come in.” The future looks bright for HTML Global with the Bradley Business Center. Current office space is nearing fully-leased status, and BBC management is looking to expand their property offerings into additional buildings located on the same parcel. Hunt is impressed with another feature of the cloud-based system, “The network is set up on PoE switches, so if a door isn’t acting properly, we can fix things remotely, we don’t need to roll a truck—that’s very cost-effective.”
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Sometimes customers expect more out of a security system. A brand new security system just doesn’t perform as the customer expected it would. In fact, one might argue that the many variables in today’s complex systems make it more likely than ever that some element of a system might not measure up to a customer’s expectations. What happens then? We asked this week’s Expert Panel Roundtable: What happens if a customer’s expectations of system performance are greater than what a physical security system can deliver?