Private sector security
Allied Universal, a security and facility services company in North America, is proud to recognise security professionals during the company’s 5th Annual National Security Officer Appreciation Week starting on September 15 through September 21, 2019. Each day, Allied Universal security professionals help maintain safe and secure workplaces, schools, shopping malls and communities providing peace of mind. The goal of Allied Universal’s National Security Officer Appreciation Week, whi...
ASIS International, the association of security management professionals, is pleased to congratulate the winners of the ASIS Foundation’s 2019 scholarships and grants. In all, the Foundation awarded 54 scholarships totaling more than $38,000 — including 34 scholarships for ASIS certifications that were awarded to ASIS members in 15 countries and six academic scholarships awarded to students pursuing careers in security management. “The ASIS Foundation has no greater mission t...
CNL Software, a global provider of Physical Security Information management (PSIM) software, will be demonstrating the latest features of its IPSecurityCenter PSIM software at the GSX. These demonstrations will help those responsible for the security of major cities, government agencies, public & private critical infrastructure, public & private corporations, and transportation facilities & networks to better understand and more efficiently react to security incidents. Recent IPSecu...
You don’t need to continue using keys and key cards. When you want effective first-line security for private doors in public spaces, you no longer need cumbersome kit. To keep opportunist hands off your belongings, the Code Handle 4-digit code-operated electronic handle locks without any wires, expensive hardware or software, mechanical keys or changes to your existing doors. PIN codes unlock so many features of our daily lives, from a smartphone to your online bank account. Now you can u...
Allied Universal, a security and facility services company in North America, has acquired Shetler Security Services, a Phoenix, Ariz.-based company offering security solutions on a national level. Terms of the deal were not disclosed. “The acquisition of Shetler Security Services aligns perfectly with our long-term strategic plan of adding exceptional security professionals and valuable resources into local markets around the country,” said Steve Jones, CEO of Allied Universal. &ldq...
Allied Universal, a security and facility services company in North America, recently announced the expanded capabilities to deliver risk mitigation solutions through its new Allied Universal Risk Advisory and Consulting Services division. A provider of integrated security solutions, Allied Universal Risk Advisory and Consulting Services offers four decades of extensive experience of industry-leading professional practitioners with notable backgrounds in corporate security, government and local...
The Department of Defense (DoD) recently invited Point3 Security to join the Persistent Cyber Training Environment (PCTE) after learning of Point3’s success in the private sector in cultivating, assessing, and identifying cybersecurity talent. For the United States military, it is imperative to have a strategic and comprehensive cybersecurity talent cultivation plan. Producing qualified personnel to meet the workforce needs of mission commanders is a top priority for the DoD. To meet the demand for technical cybersecurity operators, the DoD created the PCTE, which supports cloud-based training, team certification, and individual skills development for all military branches. Development of gamified learning solutions Point3 designs new challenges to strengthen information security’s most motivated professionalsPoint3’s success in the private sector will now be carried over into serving the mission of the PCTE through the development of gamified learning solutions. Point3 has helped organisations of all shapes and sizes with talent recruitment, retention, and upskilling through its gamified ecosystem, ESCALATE. Point3 continuously designs new challenges to strengthen information security’s most motivated professionals, and currently provides over 100 immersive, self-paced challenges for both individuals and teams. To heighten motivation and performance, members earn points, receive achievement badges, and are ranked on a community leader-board by completing offensive and defensive challenges. Members have access to a global pool of mentors and managers who have a wealth of analytical tools to measure team and individual progress. “It was most humbling to be approached by the Cyber Mission Forces, which sees our success in helping the private industry tackle the ‘cybersecurity skills gap’ and recognises ESCALATE as a best-in-class offering. Because their mission is so critical to the country, it will be a tremendous honour to share our expertise and be a part of the military’s workforce development solution,” says Evan Dornbush, CEO of Point3 Security, Inc.
Videalert, one of the UK’s leading suppliers of intelligent traffic management and enforcement solutions, has announced the appointment of Stuart Scott as Business Development Manager – North. In this new role, he will be responsible for managing relationships and developing new business opportunities with new and existing clients across the Northern England and Scotland. Stuart Scott has over 15 years’ experience of working in both local government and the private sector. He joins direct from Blackburn with Darwen Borough Council where, as Head of Highways, he was responsible for managing the whole highways operations including systems deployment for network management. Further developing UK business This included the first unattended CCTV enforced red route outside London as well as Intelligent Transport Systems. Prior to this, Stuart worked for Parking Eye, part of the Capita Group, as Head of Operations (Local Government). According to Tim Daniels, Sales and Marketing Director at Videalert: “Stuart’s experience of working in this sector will be invaluable in helping us to further develop and grow our UK business. He will also help us meet the increasing demand for Videalert solutions that support multiple traffic management and enforcement applications as well as clean air and low emission zones across the north of the country including Scotland.”
March Networks, a global video security and video-based business intelligence pioneer, is proud to announce that it has been designated as a cybersecure business by Cyber Essentials Canada for a second consecutive year. March Networks was the first company in the country to achieve the certification in 2018, and is the first to re-certify through the program this year. Developed as part of the United Kingdom’s (U.K.’s) National Cyber Security Programme, Cyber Essentials certification is awarded to organisations able to demonstrate good cybersecurity practices and an ability to mitigate risks from Internet-based threats in areas including: boundary firewalls and Internet gateways; network configuration; software management; access control; and malware protection. The toolset is also a valuable asset for end user organisations seeking to verify the security of their supply chain. Adhering to best security practices Our participation in the Cyber Essentials program enables us to confirm that we are adhering to the current security practices"“March Networks works with many Fortune 500 customers, including some of the world’s largest banks, so strong corporate security practices have always been a priority,” said Peter Strom, President and CEO, March Networks. “Our participation in the Cyber Essentials program enables us to confirm that we are adhering to the most current security best practices. It also provides our customers with yet another assurance of our high cybersecurity standards.” March Networks’ holistic approach to security involves a 360° view of all areas of its business – from product development and source code management, to operational processes and customer data privacy. The company’s Network Operations Center, for example, operates with extensive physical access and networking controls and restrictions to ensure the security of customer data. The company also participates in comprehensive security audits initiated by large enterprise customers seeking to confirm the security of their video solution provider. Identifying potential vulnerabilities Proactive resilience strategies help strengthen organisations’ ability to avoid disruption"In addition, March Networks takes a proactive approach to identifying potential vulnerabilities in its products. The company’s Security Updates and Advisories program involves regularly tracking US-CERT reports on identified vulnerabilities, conducting in-depth investigations when required, and alerting customers and partners to any necessary software updates via email alerts and information posted directly on the March Networks website. Endorsed by the U.K. government, Cyber Essentials was originally created in collaboration with industry partners such as the Information Security Forum (ISF) and the British Standards Institution (BSI). CyberNB, a special operating agency of Opportunities New Brunswick, administers the program in Canada, where it is gaining momentum as a requirement to win business in both public and private sectors. “The team at CyberNB is proud of the commitment to security and continuous improvement that we’ve seen from March Networks,” said Josh Waite, Head of Cyber Essentials Canada. “Proactive resilience strategies help strengthen organisations’ ability to avoid disruption and demonstrate responsible practice. We congratulate March Networks for having made Cyber Essentials Canada certification part of their strategy.”
ASIS International, the association of security management professionals, released the ASIS Private Security Officer Selection and Training (PSO) Guideline (ASIS PSO-2019) which provides recommendations for establishing and managing a program for the selection and training of private security officers. The new Guideline is critical as the private security industry employs millions of security officers across the nation to protect people, property, information, and other key assets. Applicable to both proprietary and contract security, the guideline focuses on three key areas of a private security officer selection and training program — its development, implementation, and improvement. The framework comprises: Establishment of policies and procedures; Assignment of roles and responsibilities; Allocation of resources to the program; Setting vetting and selection criteria; Private security officer training and competencies; and Program evaluation and improvement. Improving selection and training program ASIS International develops standards and guidelines to serve the needs of security practitioners in today’s global environmentThe Guideline is consistent with industry best practices and takes into account legal, regulatory, and contractual obligations. “While the guideline includes most elements of the 2010 edition, it goes a step further in providing organisations a generic framework for designing or improving its selection and training program,” said Chuck Baley, PSO Technical Committee Chair. ASIS International, in its role as an accredited Standards Developing Organisation (SDO), develops standards and guidelines to serve the needs of security practitioners in today’s global environment. It is recognised globally through its Category-A Liaison Status in the International Organisation for Standardisation (ISO) Risk Management and Security and Resilience Technical Committees. Current projects under development focus on Active Assailant, Enterprise Security Risk Management (ESRM), and Security Awareness.
CNL Software, globally renowned open, adaptable, scalable, and secure Physical Security Information Management (PSIM) solutions provider, will be showcasing its latest IPSecurityCenter PSIM software at the Connected Security Expo at ISC West in Las Vegas April 10-12, 2019. IPSecurityCenter PSIM software CNL Software will demonstrate how its PSIM platform helps law enforcement, government agencies, the military, public and private critical infrastructure, transportation networks, corporations and campuses integrate, automate and manage systems, allowing increased security intelligence and improved operational efficiency. The Connected Security Expo addresses the convergence of the physical and digital security domains and is designed to help physical security system integrators and end users keep pace as the IoT evolves and security needs to process and interpret more data and respond to more security events each day. The Connected Security Expo is a unique opportunity for physical security system integrators and end users to gain access to cutting-edge security technology designed to increase security intelligence and help mitigate emerging threats in our hyper-connected world. Physical security and risk management “IPSecurityCenter helps organisations efficiently identify and manage the threats that pose the greatest risk to them and that require immediate attention,” says Mike Mostow, General Manager - Americas, CNL Software. “IPSecurityCenter is purpose-built for physical security and includes out-of-the-box correlation rules, analytics, dashboards, workflows and reporting to help organisations quickly and efficiently address their most pressing security use cases.”
UK based PPSS Group has recently seen record sales for their SlashPRO Slash Resistant Clothing brand, offering tested, certified and reliable levels of cut resistance. Poverty and social exclusion, religious and political extremism, drugs, social media as well as serious mental illnesses have all been blamed for the global rise of knife crime. SlashPRO Slash Resistant Clothing is made from 100% Cut-Tex PRO, a highly acclaimed, cut resistant fabric made in Great Britain The news of individuals grabbing a kitchen knife and causing serious harm and injury to others has become a rather normal daily occurrence today. Knives have recently also become the weapon of choice for many so called ‘lone-wolf’ attackers due to the low planning required to conduct a knife attack whether against an individual or mass group. Protecting officers from knife attacks Homeland security agencies, such as police, prison, border control, immigration and customs units, as well as private security companies from around the world have now turned to the firm to purchase garments protecting their officers from such weapon. SlashPRO Slash Resistant Clothing is made from 100% Cut-Tex PRO, a highly acclaimed, cut resistant fabric made in Great Britain. According to the manufacturer, the fabric is comfortable to wear, skin friendly and Latex free. Easy-to-wear slash resistant clothing It is our mission to protect professionals at risk, with a range of easy-to-wear, slash resistant clothing"The company’s CEO, Robert Kaiser said: “Slashing dangers are now relatively frequent for these workers and it is has become a realistic and daily occupational risk. The cutting of an artery or blood vessel can cause rapid blood loss, shock and even fatality, and it is our mission to protect professionals at risk, with a range of easy-to-wear, slash resistant clothing.” “There are men and women out there who have made a professional choice in their lives to protect other human beings, facilities, venues, events and infrastructure from the bad guys.” “We at PPSS Group genuinely believe those men and women have the moral and legal right to be equipped appropriately, and slash resistant clothing is appropriate and ultimately can save valuable lives.”
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban on Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes a Splash with Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact of Data-Driven Smart Cities on Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing the Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends for 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How to Prevent ATM Jackpotting with Physical and Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve- how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need to Look Beyond Technology for Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organisation. 10. The Evolution of Facial Recognition from Body-Cams to Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognise that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unless they are quickly brought under control. Training security officers Governments and organisations across the world are increasingly encouraging businesses to re-assess risks and to plan for and conduct drills for major emergencies. This is driving different agencies and companies to invest in new skills, resources and systems, and encouraging businesses to routinely re-evaluate their emergency response strategies. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents For example: UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents, as part of the UK government’s Action Counter Terrorism programme. And organisations including the Association of University Chief Security Officers (AUCSO) and Higher Education Business Continuity Network (HEBCoN) are developing customised training for their members to improve their own response and business continuity plans. Mass notifications systems Whether an organisation is facing a terrorist attack or a severe weather event, follow up reports consistently identify that the same types of challenges are common to all crisis situations, with similar errors often occurring again and again. Typically, these are centred on three key areas: poor communications, fractured command and control structures, and delayed deployment of resources. Communications skills and technologies clearly play a pivotal role in how effective an organisation is in responding to major incidents, particularly when it comes to assessing the situation and its implications, moving people towards safety and providing updates as an incident unfolds. However, when an organisation is considering its technology options, emergency response and mass notification systems (MNS) are often touted as the ideal platform to deliver all the required critical communications and ongoing updates. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents Emergency notification system All the incident reporting, command and control, and communications functions have been brought together on a single platform But, if an organisation does not know exactly where all its staff or students are, and it cannot see the location and availability of its first responders and other emergency coordinators relative to them and the incident, then how useful is it to send a top-down alert to everyone? And what about fast moving or multi-centre incidents, where previously agreed evacuation procedures, recommended actions or mustering points may need to change if an incident takes an unexpected turn? Many organisations may have been lulled into believing that an emergency notification system will allow them to confidently handle all the communications aspects of virtually any crisis. In reality, too many businesses are still unaware that there are now much more sophisticated and proven technologies where all the incident reporting, command and control, and communications functions have been brought together on a single platform. Using live map tracking The benefit of using these advanced and more integrated approaches – often categorised as mobile distributed command and control systems – is that they enable faster and better decision making in a crisis using real-time feedback and two-way dialogue with those closest to the emergency. And they avoid the risks of any potential delays, miscommunications or mistakes that can happen when an organisation is under pressure to respond and often switching between multiple systems. Leading universities and multi-national corporations are already using new mobile/web-enabled platforms to improve their incident response These next generation emergency management platforms have been specifically designed to enable real-time mapping of an organisation’s security assets and its users on a single screen and to fully integrate it with a highly targeted geo-fenced notification capability. The mass notification aspect of the system can then be used to advise specific groups on the best actions to take at their location as an incident develops. The use of live map tracking enables real time mapping of an organisation's security assets Segmented messaging Many leading universities and multi-national corporations are already using these new mobile/web-enabled platforms to plan, manage and improve their incident response, leading to 50% faster reactions and more positive outcomes.During a crisis, users can receive push notifications so the security centre can immediately see their exact location and advise them accordingly The systems have been widely adopted within the higher-education sector, but they are equally applicable to any large company with multiple international sites or those situated in research or corporate campuses where the bulk of assets and people are based in one or more key locations. Typically, systems provide users with a smartphone app that they can use to call for immediate emergency or first aid support when at work, or to report something suspicious which could prevent an apparently minor incident from escalating into a full-scale emergency. During a crisis, users can receive push notifications, SMS and E-mails asking them to open the app if they are not already logged in, so the security centre can immediately see their exact location and advise them accordingly. Supporting dispersed mustering Now that communications can be more nimble, responsive and flexible this can support the increasing numbers of planners are recognising the advantages of dispersed mustering. This is a strategy that has been developed to reduce the risk of secondary attacks on unprotected people complying with instructions to evacuate from premises and gather in what are, effectively, exposed locations. It is now acknowledged that evacuees waiting outside for any length of time are more vulnerable to targeted attacks or to injury, from flying glass for example. With dispersed mustering – a strategy made more effective by these new mobile distributed command and control systems - a building’s occupants can be advised not to go outside, but to move to known safe internal locations. People in each specific area can then be kept regularly updated. Many corporations are now using new mobile/web-enabled platforms to improve their incident response Coordination between response agencies The software platforms can be integrated with an organisation’s fixed security infrastructure to take real-time sharing of information First responders are permanently logged in, so the emergency operations centre can see their exact locations in real-time and can advise what actions to take in mustering people or in setting up and protecting security cordons. Bringing everything together on one platform, with real-time feedback and in a fully integrated system also removes what is often seen as the weakest communication link in managing any major incident: the need to rely on conventional two-way radio as the sole means of communication between the command and control centre and its first responders and other team members on the ground. The software platforms can be integrated with an organisation’s fixed security infrastructure to take real-time sharing of information to a new level for improved collaboration, coordination and communications between users, the incident management team and external agencies. Improving emergency response strategies One of the most powerful features of some of these new systems is the ability to record and view all alerts, responses and the detailed conversations between first responders, emergency coordinators and other parties. This allows the systems to be used to simulate major incidents involving inputs from the emergency services and other key agencies and to ensure the organisation’s crisis management plans have been fully tested against a range of possible incident scenarios.
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research programme to provide valuable feedback to the GSA Schedule 84 programme and on to the GSA central office. The director of GSA Region 7 Schedules Program, the Schedule 84 Branch Chief and the Category Manager Subject Matter Expert who manages our suppliers' panel gave us their full attention as we discussed the successes of the programme, hot topics, problems and the future. We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort and renewed enthusiasm Innovative review team We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort, renewed enthusiasm and productive changes building upon the successes of 2017. There was high praise for the accessibility to the Schedule 84 staff. Their consistent quick response to questions and concerns, thinking outside the box and supporting the programme by partnering with their contractors was much appreciated. There has been a renewed spirit of partnering to cooperatively bring the best to agency customers. It seems to be working as per the Centre Director sales are growing for GSA Schedule 84. Advocating for the security industry In my experience, business development starts with the Administrator from Region 7 in Ft. Worth, TX. As the annual Schedule 84 Industry Day at the SSAC begins he is shaking every hand and passing out his cards looking folks right in the eye asking, “how can I help you?” They have the best practices and most organised paperwork. The SSAC director has chosen well in her staff and is hands-on in every endeavour to direct things along when challenges occur or to improve the programme. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry It continues with the centre’s CASE Manager encouraging the contractors at events, visiting agency customers and promoting the GSA Schedules Program by helping coordinate the partnering. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry for adding new technology, meeting with industry associations, understanding the complexity and challenges of Homeland Security Presidential Directive 12 (HSPD12) and advocating for the purchasing Physical Access Control Systems (PACS) utilising the appropriate standards and the GSA Program among other innovations. As far as the supplier panel, we gave our GSA Schedule 84 team and leaders high praise for 2018. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List Changes in the GSA programme Some changes this year in certain GSA programmes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) developed to assist with solution procurements. This new SIN was added to Schedules 03FAC, 56, 70, 71, 00Corp, 738X and 84. Under Schedule 84 it is SIN 84-500. GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex Essentially this SIN allows agencies procuring under the aforementioned GSA Schedules’ programmes to purchase and the contractor to add items and services not known prior to the task as a Contract Line Item Number (CLIN) not to exceed 33% of the order. For more information and FAQs on OLMs go to www.gsa.gov/olm. This is not to take the place of “Open Market” items for adding products only that are not listed on a company’s GSA Contract. Physical access control products Previously, GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex for the agencies. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List according to the standards created under FIPS201. These products appear under SIN 246 35-7 after being tested and approved by GSA. To be qualified to install these products under the GSA Program at least one individual from the GSA Contractor company must complete the class and be CSEIP certified before applying for labour SIN 246 60-5. Additionally, the company must demonstrate certain qualifications and have past performance for this type of work. The Security Technology Alliance offers the training class and certification. Certified individuals and approved products are listed at www.idmanagement.gov. Companies listed with SIN 246-35 7 and SIN 246-60 5 may be found by searching at www.gsaelibrary.gsa.gov. Updates to guidance for procurement Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide. The ordering guide posted at www.gsa.gov/firesecurity is a valuable support tool created to assist agencies with understanding the requirements of FIPS201 and procuring a PACS. The guide includes relevant regulations, FAQs, sample systems designs, sample statements of work, a list of key points of contract for additional help and questions. In partnership with GSA and guided by the GSA Ombudsman group, the Security Industry Association and the Security Technology Alliance members and their contractor companies participated in a GSA Reverse Industry PACS Training Day on September 17, 2018. We presented from an industry perspective important fact on PACS system requirements, procurement planning, providing information on resources and further educating with panel discussions, individual presentations and amusing skits to over 300 Government agency staff and acquisition specialists. You can find some of the unedited recording of the PACS Reverse Industry Day Training on YouTube. Some changes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) GSA Schedules Program A hot topic about the GSA programme for 2018 was also an issue for the prior year. The GSA Schedules Program is a streamlined contracting vehicle incorporating specific Federal Acquisition Regulations for more efficiently purchasing commercial items. Companies may apply per a continuous open season for a 5-year contract with three 5-year options to renew. Contractors are vetted for past performance, corporate experience and financial capability. Products and services are considered for offering to Federal, State and Local customers (for Schedule 84) with pricing that is determined to be fair and reasonable through negotiations with GSA. To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor as well as the competition of identical or similar item pricing. The most vocal complaint of concern from the contractors was regarding the consideration of competitor contractors offering identical items with out-of-date pricing or holding a Letter of Supply not authorised by the manufacturer. GSA pricing tool Since the GSA utilises a pricing tool to determine if the pricing offered is competitive, a rogue competitor can cause a pricing action to possibly be rejected due to out of date information even as the manufacturer offers an update of the product. This is an issue on all GSA Contracts that the supplier panel hopes will be reconsidered by GSA policymakers at the central office. Most of us believe the Letters of Supply should only be issued by the manufacturer or with documented specific permission of the manufacturer to a reseller. Manufacturers may want to have a better understanding of the Letter of Supply, how it is considered by GSA and more carefully choose their Government partners for experience and compliance. Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy Overcoming challenges for the security community Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy. GSA eBuy is an online Request for Quotation (RFQ) programme that is for GSA Contract holders only. Agencies will post their requirements by Special Item Number for at a minimum 48 hours. Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract. GSA Participating Dealers may take orders on behalf of a manufacturer if they are authorised under the manufacturer’s GSA Contract. They may also have an online PO Portal to receive orders. But they have no access to GSA eBuy to response to RFQs. Usually, under these arrangements, the manufacturers do not respond directly, so there is a problem using GSA eBuy for opportunities as their GSA Participating Dealers have no access to respond. GSA Schedule 84 leadership In some instances, a contracting officer may allow an emailed quotation. However, with the use of the electronic ordering system, this has become a common problem we hope to bring to the attention of policymakers. Some changes to the programmes may make the presentation of documentation more effective going forwardThe GSA Schedule 84 leadership has been helpful to explain the challenges to the agencies to try and resolve such issues. So, what’s up for 2019? GSA modernisation is coming. There will be improvements to their tools and more consolidations of SINs and more. There have been discussions of a revival of the GSA Expo. The Expo offered training for contracting staff both Government and private industry. Valuable tools for vendor training Equally important is the networking, meetings and the exhibits of the contractors. Expos have been discontinued since 2012 but smaller events have been growing as well as online webinar training. Webinars are valuable tools for GSA and vendor training, but they do not take the place of being able to meet your customers face-to-face. GSA online eOffer and eMod programme have made processing actions more efficient. Some changes to the programmes may make the presentation of documentation more effective going forward. The GSA online website for viewing the items on the GSA Contract and for purchasing items, GSA Advantage could definitely use an update as it has been basically the same for 20 years. Keep an eye on GSA Interact for the latest happenings with GSA.
As physical security systems increasingly resemble the architecture of an IT (information technology) network, the cybersecurity risks are increasing. Sometimes hacks in physical security go unrecognised because of poor detection. Here's part two of our Cybersecurity series. Going forward, the physical security industry should adopt the same principles as the information security market, embracing new elements such as risk assessment and certifications. A change in culture is needed to align and embrace cybersecurity and make necessary improvements, says Terry Gold of D6 Research. Independent testing and access control There are signs of progress. Increasingly, access control systems today are designed to be more cyber-resilient and are tested extensively to discover and address any vulnerabilities. Data capture form to appear here! For example, the latest version of Tyco’s C-Cure 9000 undergoes independent testing to discover and address any critical vulnerabilities, and new firmware and software updates are tested to ensure they do not open any ‘back doors.’ Tyco’s Cyber Protection Program is part of the company’s ‘holistic approach’ to supplying customers with quality solutions. If cybersecurity is managed properly, the new wave of access control systems are as secure as previous systems. In some cases, more secure. For example, the new generation of smart cards, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS, use protocols that are much safer than the last generation Wiegand systems. New secure protocols such as OSDP version 2 are a better alternative to Wiegand. The new wave of access control systems are more secure than previous systems and use protocols that are much safer than the last generation Protocols for wireless electronic locks Wireless electronic locks use security protocols such as encryption and authentication that prevent cybercriminals from accessing the network to get data and intercept commands. In short, the information in an IP-based access control system is at no greater risk than any other information being transmitted over the network, as long as smart decisions are made on how systems are connected and data is transmitted and stored. Standards are one approach to ensure a minimum level of cybersecurity for physical security products and systems. For example, Underwriters Laboratories (UL) seeks to work with manufacturers to up their game on cybersecurity and to certify compliance to a minimum level of cybersecurity ‘hygiene.’ Requirements for software cybersecurity The UL Cybersecurity Assurance Program (CAP) has developed the UL 2900-1 standard, which offers General Requirements for Software Cybersecurity for Network-Connectable Products. It was published in 2016 and in July 2017 was published as an ANSI (American National Standards Institute) standard. The standard was developed with cooperation from end users such as the Department of Homeland Security (DHS), U.S. National Laboratories, and other industry stakeholders. UL 2900-2-3 – the standard that focuses on electronic physical security/Life Safety & Security industry, was published in September 2017. Cybersecurity should be an element in physical security as the risk for data to be physically removed from a building is greater than ever Physical security integral to cybersecurity Not only should cybersecurity be an element in physical security, the reverse is also true: Physical security should be seen as integral to cybersecurity. Looking at the intersection of cybersecurity and physical security from this opposite angle uncovers a world of opportunity to make the enterprise safer. Physical risks to cybersecurity include insider and outsider threats, poor or non-existent screening, and the presence of a seemingly innocent personal item. Off-the-shelf devices such as SD cards, external hard drives, audio recorder and even smart phones can be used to transport audio, video and/or computer data into and out of a building. For the private and public sectors, the risk for data to be physically removed from a building is greater than ever, and physical security systems can protect against this vulnerability. Missed part one of our Cybersecurity series? Click here. Part three, coming soon.
As the Internet of Things (IoT) and other trends drive the convergence of physical and information security, integrators and end users attending ISC West may be struggling to keep pace with new areas of responsibility and expanding roles in the larger security ecosystem. Help is here. The Connected Security Expo, co-locating with ISC West, focuses on building a holistic security strategy for the connected enterprise. Exhibitors will focus on how physical and information security can be used together to mitigate new and emerging cyber-threats in a hyper-connected world. Connected Security Expo provides attendees access to cutting-edge products and technology in both the physical and IT secure realms. It is clearly a growth factor in the market. Here’s a look at some of the companies on display in the 2019 Connected Security Expo: Integrated video cloud service The AI-powered video analysis software suite delivers high-speed object search and facial classification Arcules provides the Arcules integrated video cloud service, which combines untapped video and sensor data with the latest technologies in cloud, artificial intelligence, and machine learning to deliver actionable business and security intelligence for modern organisations. The cloud-based service is designed to ensure security, scalability, streamlined operations, and bandwidth management — all from a single, easy-to-use interface. Hardware-accelerated solutions BrainChip Inc. is a global developer of software and hardware-accelerated solutions for advanced artificial intelligence (AI) and machine learning applications. The AI-powered video analysis software suite delivers high-speed object search and facial classification for law enforcement, counter terrorism and intelligence agencies. PSIM software platform CNL Software Inc. is an open, adaptable, scalable and secure Physical Security Information Management (PSIM) solutions provider. The IPSecurity Center PSIM software platform helps law enforcement, government agencies, the military, public and private critical infrastructure, transportation networks, corporations and campuses to integrate, automate and manage systems, allowing better security intelligence and improved operational efficiency. Facial recognition software IOmniscient Corp. provides facial recognition software that can recognise multiple faces even in crowded and uncontrolled scenes IOmniscient Corp. provides facial recognition software that can recognise multiple faces even in crowded and uncontrolled scenes. Matching faces with an existing database, the system can detect an unauthorised person and track him or her across non-overlapping cameras. Enhance situational awareness Oncam offers 360 and 180-degree video technology. The company has the largest range of wide-angle cameras that are open platform and easy to integrate. Unique dewarping technology allows the creation of award-winning video solutions for stakeholders from the C-suite to the security officer in wide range of industry segments. Oncam’s products greatly enhance situational awareness. Enterprise-class security Pivot3 is a provider of intelligent solutions using hyperconverged infrastructure. Pivot3’s intelligent infrastructure is optimised to deliver performance, resilience, scalability and ease-of-use required for enterprise-class security, video surveillance and IoT deployments. Electronic physical security The UL 2900-1 standard offers general requirements for software cybersecurity for network-connectable productsUL LLC is working to increase the prominence of the Underwriter Laboratories brand in cybersecurity with the UL Cybersecurity Assurance Program (CAP). The UL 2900-1 standard, the standard that offers general requirements for software cybersecurity for network-connectable products, was published in 2016 and in July 2017 was published as an ANSI (American National Standards Institute) standard. The standard was developed with cooperation from end users such as the Department of Homeland Security (DHS), U.S. National Laboratories, and other industry stakeholders. UL 2900-2-3 – the standard that focuses on electronic physical security/life safety & security industry, was published in September 2017. Proactive automated system Viakoo is a provider of the security industry’s first proactive automated system and data verification solution. Create significant value Vidsys is innovating and accelerating a transition to Converged Security and Information Management or CSIM. The company is committed to educating and supporting customers with their evolving needs to provide a more holistic view of risk and throughout the overall business process re-engineering necessary to create significant value across the entire organisation.
If you’re heading to ISC West in Las Vegas this year, it’s helpful to acknowledge immediately that there’s no way you can experience all aspects of the show. Just not enough time and too many options. Once you give up on seeing everything, you can immediately lower stress. But you also raise the stakes in terms of picking and choosing exactly what you have time for – or want to make time for. Hoping to help out as we all set our ISC West priorities, here are some ways to make the most of ISC West. Get there early If you think the show starts on Wednesday (April 10), you have already missed the boat. Wednesday is the first day of the ISC West Exhibition, but there is a whole day of conference programming the day before – on Tuesday, the 9th. So plan to arrive early for conference sessions such as the End User Physical Security and Strategic Management tracks, a whole day of presentations by the PSA Security Network, and many other conference sessions. Learn from the best You can also learn about Body-Worn Cameras for Government Personnel, School Safety and Private SecurityWant to hear about Taming the Surveillance Data Monster? There’s a session on Thursday. Want to learn about Establishing a Corporate Drone Program? That session is on Wednesday the 10th. They’re among the wealth of information-sharing sessions at ISC West. You can also learn about Body-Worn Cameras for Government Personnel, School Safety and Private Security; 3D Virtualisation for Physical Security; and Using Enterprise Security Risk Management to Define Security's Value. Plan for the future So much at ISC West is geared toward the future – new opportunities, tomorrow’s hot new product, and the start of business ventures that will be profitable for years to come. Some of the conference sessions are especially forward-looking, too, including a session on Thursday about the Stadium of the Future. A session called Getting Smarter and Safer: The Campuses of Tomorrow is on Wednesday, April 10. Another Wednesday session is Meet the Jetsons: Understanding the Promise and Challenges of Smart Cities. The Vision of the Future of the ISOC (Intelligent Security Operations Center) is on Thursday, as is the Smart Home of the Future session. All in all, ISC West can help you focus on the future in a big way. Meet someone new Programs like SIA’s New Product Showcase can help, by recognising innovation in a variety of product categoriesISC West sometimes emits the vibe of a yearly reunion of friends (who happen to be in business together). It’s great to see old friends again, but we shouldn’t miss the chance to meet new people, too. There is a multitude of networking events related to the industry’s big spring gathering, so the opportunities to expand one’s network and meet new people are abundant. Making the most of them takes effort, and some level of strategy. And there are also other, not-so-obvious moments to make new friends and acquaintances – whether it’s sharing a taxi or waiting for the next session to start. Bring a lot of business cards Find something new The chance to view industry innovation is a huge draw of ISC West, but it can take discipline to separate the wheat from the chaff. The latest-and-greatest could literally be anywhere on that big trade show floor. Programs like SIA’s New Product Showcase can help, by recognising innovation in a variety of product categories. The announcements of winners will be made on April 10, and, historically, these awards have gone to some of the newest and most innovative products at ISC West. A What’s New at ISC West session on Wednesday can provide additional guidance. Do good in addition to doing well A 10-year tradition at ISC West is the Security 5K/2k Run/Walk, a charity event benefiting Mission 500’s fundraising efforts to assist children in crisisISC West is all about business, but there’s also a specific opportunity to help make the world a better place. A 10-year tradition at ISC West is the Security 5K/2k Run/Walk, a charity event benefiting Mission 500’s fundraising efforts to assist children in crisis around the world. Why not avoid a late night on April 10th and rise early on the 11th to be a part of a remarkable event that has united the security industry to provide aid for children in need? Say thank you Showing gratitude is an under-emphasised opportunity at ISC West, where the promise of new fortunes can eclipse our successes of the past. We will all see colleagues and friends we have been doing business with for years, so what better time to express a simple ‘thank you’, buy them a drink, propose a toast, celebrate? Helping to set a tone of gratitude is the ‘Official ISC West Customer Appreciation Party’ on Thursday. Parties are one way to say thanks, and a heartfelt verbal expression is another. ISC West will provide plenty of both – and they’re not to be missed.
Your Homes Newcastle (YHN) manages more than 26,000 properties on behalf of Newcastle City Council. They are piloting an innovative fire detection system in partnership with OpenView Security Solutions, the UK’s largest privately-owned independent security company and a national supplier of fire, electrical and mechanical services to the public and private housing sector. MOBOTIX thermal imaging cameras have been installed in 3 multi-storey blocks across the city to continually monitor temperatures in the buildings’ bin chute rooms. The thermal cameras will send an alarm to OpenView’s central control centre and the fire service immediately if an unexpected heat pattern is detected. The early detection system provided by the OpenView now means that residents can be reassured of much faster response times from the fire service in the event of an incident, minimising the potential impact on occupants and their properties, so that they and their homes are far safer as a result. Risks and Challenges Ensuring safety of residents through early detection and prevention of potential fires To be able to react quickly to verify a fire situation Alerting the fire service within seconds of a potential fire so they can respond rapidly Keeping residents safe and minimising damage to property in the event of a fire The risk to lives and property caused by rapid spread of a fire in high-density apartment blocks Solution provided by MOBOTIX and OpenView MOBOTIX M16 thermal cameras installed in bin chute rooms of 3 YHN multi-storey blocks Thermal technology continuously monitors temperature, triggering an alarm if an unexpected heat pattern is detected Operators in OpenView’s central control room assess and monitor the situation Fire service instantly alerted ready for rapid response MOBOTIX cameras integrated into existing infrastructure with no disruption to residents Potential risk to lives and property minimised through early fire detection Installation of thermal imaging cameras YHN has installed thermal imaging cameras in 3 of its 45 multi-storey blocks across the cityYour Homes Newcastle (YHN) manages community and public housing on behalf of Newcastle City Council. Set up in 2004, the organisation oversees more than 26,000 properties for the council. With fire safety in tower blocks having been in the spotlight since the Grenfell Tower tragedy in 2017, YHN took the decision to pilot an innovative fire detection system. In a trial partnership with OpenView Security Solutions, the UK’s largest privately-owned independent security company and a national supplier of fire, electrical and mechanical services to the public and private housing sectors, YHN has installed thermal imaging cameras in 3 of its 45 multi-storey blocks across the city. “The tragic events at Grenfell Tower have undoubtedly put fire safety in multi-storey blocks under a microscope, but we have been trialling new measures in our multi-storey properties for some time,” says David Langhorne, YHN’s Assets and Development Director. ONVIF compliant thermal cameras OpenView Security designed and installed an early fire detection system using MOBOTIX dual M16 thermal cameras, featuring one thermal and one optical sensor. MOBOTIX thermal sensors measure minute differences in mid-wavelength infrared radiation emitted from an object or body based on its temperature, allowing them to pick up temperature differences of 0.05 of a degree within a temperature range of -40 to +550 degrees Celsius. The ONVIF compliant MOBOTIX cameras contain a powerful CPU that can deliver up to 3 video streams simultaneously The ONVIF compliant MOBOTIX cameras contain a powerful CPU that can deliver up to 3 video streams simultaneously and fulfil the H.264/ONVIF standard, making it easy to combine them with other systems to create unique solutions to real-world problems. By integrating the cameras into YHN’s existing infrastructure, which uses OpenView installed equipment, it was possible to implement the new system without any disruption to residents. Alerts central control room in case of fire Operators are able to monitor images from the thermal lens to pinpoint the exact location of hotspotsThe MOBOTIX M16 cameras were installed in bin chute rooms, where they continually monitor the temperature, sending an alert to the OpenView’s central control room instantly if an unexpected heat pattern is detected. Operators are then able to monitor images from the thermal lens to pinpoint the exact location of hotspots, such as smouldering fires, as well verify the situation via a live feed from the optical lens. An alarm is also raised with the fire service within seconds of a potential fire, making them ready to respond rapidly to a potential emergency situation. According to Andy Ward, Sales Director of OpenView Security Solutions, the innovative fire protection solution enables housing providers to ensure a safer environment for residents and minimise the incidence of false alarms: “It now forms part of our expanding portfolio of fire and life safety solutions, which is one of the fastest growing areas of our business, and consolidates our leading position in the public and private housing sectors.” Faster response times from fire service The early detection system provided by the OpenView now means that residents can be reassured of much faster response times from the fire service in the event of an incident, minimising the potential impact on occupants and their properties, ensuring that they and their homes are far safer as a result. We have wet and dry risers, central alarm systems, smoke alarm activated bin chute fire dampers and bin room sprinklers"“This trial system is one of many fire safety measures currently in place in the blocks we manage across the city. We also have wet and dry risers, central alarm systems, smoke alarm activated bin chute fire dampers and bin room sprinklers,” Langhorne explains. “We pride ourselves on being innovative, so it was an easy decision for us to test something that had not yet been adopted elsewhere,” he adds. Meeting requirements of integrator and end-users Frank Graham, MOBOTIX Regional Sales Manager UK & Benelux, said of the partnership with YHN and OpenView: “We are very happy to be working so closely with both YHN and OpenView in the development and provision of an innovative solution for such a serious issue. “MOBOTIX cameras have inbuilt intelligence to meet all the requirements of integrator and end-users alike and we look forward to a longstanding and fruitful partnership with both organisations moving forward.”
Vicon Industries, Inc., designer and manufacturer of video surveillance and access control software, hardware and components has announced that The Cathedral of Saint John the Divine, the largest Cathedral and fifth largest church building in the world, recently completed installation of a Vicon Valerus video management system to secure the Cathedral and surrounding 11.3-acre complex in Manhattan. Valerus VMS As the seat of the Episcopal Diocese of New York, the Cathedral is the site of daily religious services, community programing and social outreach. It also plays host to a busy schedule of art exhibitions, concerts, receptions, public and private events and visiting dignitaries, who have included Nelson Mandela, The Most Reverend Desmond Tutu and President Bill Clinton. The new Valerus system combines over 70 Vicon high-resolution IP cameras, a Valerus application server and multiple recording servers The new Valerus system, installed by the Long Island office of ITsavvy, an IT products and technology solutions provider, combines over 70 Vicon high-resolution IP cameras, a Valerus application server and multiple recording servers. The system’s wide range of cameras include models with powerful zoom that provide detailed coverage of surrounding city streets, and others chosen for their ability to perform well in the low and challenging light inside the Cathedral. Vicon IP cameras Cameras also provide coverage of the Cathedral’s’ exterior, administrative and residential buildings that support the Bishop, clergy and Diocese, a world-class textile conservation laboratory, visitor center, information booths and surrounding grounds and gardens. The Valerus system is vital for providing safety for all visitors, staff, residents and students, as well as protecting the property and its many valuable artifacts. Cameras are particularly helpful in protecting the Cathedral from liability in slip-and-fall incidents Cameras are particularly helpful in protecting the Cathedral from liability in slip-and-fall incidents. They also document, for the police, any incidents that arise from the Cathedral’s service to the mentally ill and indigent. Live and recorded video from the Valerus system is frequently shared with NYPD and local security forces from Columbia University and other neighboring institutions. Crime prevention and incident management Keith Hinkson, Director of Security at The Cathedral of Saint John the Divine, says, “The searching feature is so much easier on Valerus, and we can see up to 99 cameras on one screen. This is huge for an institution like ours. I can go from one camera to the next with no trouble whatsoever.” “Vicon is incredibly proud that a world-class institution as prestigious as The Cathedral of Saint John the Divine has entrusted its security to an end-to-end Vicon solution, including our latest Valerus software. Our participation in this project illustrates that Valerus can deliver security effectively to the most high-profile of installations,” said Bret McGowan, Vicon’s Senior V.P. of Sales and Marketing.
HID Mobile Access integration with HRMIS means management can view all staff records on one platform A government department in Malaysia sought to upgrade their access control system and integrate the new system with their internal human resource system, HRMIS. With the proliferation of smart devices in the country, the agency took advantage of the “bring your own device” (BYOD) trend by moving their access control system to an innovative mobile solution. Public service human resources This government department in Malaysia is one of Malaysia’s federal government offices. The department is responsible for the development and implementation of public service human resources in the country. Their functions include planning, development and management of all areas pertaining to human resources for the public sector, to ensure that Malaysia’s public agencies have the human capital and infrastructure to function at optimal efficiency and effectiveness. As the functions of the agency continue to expand in breadth and scope, in accordance with the demand for the public services in the country, their staff has steadily grown over the past years. And, similar to other organisations, an increase in personnel also means an increase in management challenges. Improving security with integrated access control By early 2015, this department had a total of 350 civil servants under its employ. Looking to upgrade its time and attendance system that was tied to a card-based access control system, they sought a new, innovative solution to provide a better user experience for its staff. According to the facility officer in government department of Malaysia, the old access control system had been in place since 2002, and it was a perfect time to upgrade based on current technological developments. “We’ve had a card-based access control system at our entrance for a while, one which has served us well since the requirements we had were very basic,” said the officer. “However, with new technology comes new ways for us to improve our system. It is time for us to embrace change.” Minimising security threats from lost cards Improving security was another goal this department wanted to accomplish with a new solution. With a card-based system, a misplaced access card could result in a security threat – anyone who picked up a lost card could gain access to the department. Also, due to their small form factor, the loss of cards often went unnoticed and was reported late. Thus, another requirement of the new access control system was that it had to minimise the possibility and magnitude of security threats from lost and misplaced cards. The department also wanted a solution that can be integrated into their HRMIS human resources portal The department also wanted a solution that can be integrated into their HRMIS human resources portal, so information about staff attendance and schedules could be viewed online under a unified platform. “In addition to improving the user experience, we also wanted to tie our previously siloed systems together to provide the management with better information about our staff’s time in and out of the office. This would allow us to have the complete picture of each staff member’s availability for better manpower allocation,” said this officer. HID Mobile Access control system The government department in Malaysia procured the services of Prymax Technologies Sdn Bhd, an HID Global partner that provides ICT system integration in the education, government and private sectors. After assessing HID Global’s products and solutions, they chose to deploy HID Mobile Access to enhance its access control system at their building’s entrance. The solution includes HID Mobile IDs and multiCLASS SE RP40 mobile enabled readers, as well as a VertX EVO V2000 reader interface and a network gateway controller. The deployment took less than three months. With more and more staff bringing and using their own smart devices to the office, this department embraced the BYOD trend fully through its new access control system. By deploying HID Mobile Access, the department enabled the staff to use their own mobile phones to replace cards for office access. Connected smart devices The multiCLASS SE RP40 mobile enabled card readers support Bluetooth and work with both iOS and Android devices, as well as a range of credential technologies. The readers are connected to the VertX EVO V2000 controller via a TCP/IP network wired with CAT6 cabling to processes all access control decisions in real-time. At the entrance, the staff member can conveniently tap their mobile device to the reader or use HID Global’s patented “Twist and Go” gesture technology, an option configurable by department’s IT staff. "The HID Mobile Access solution provides and exceeds the level of security we were looking for, while improving the convenience of our staff" The users’ HID Mobile IDs and access rights are provisioned over-the-air to end-user mobile devices via the intuitive HID Mobile Access Portal administration, and can be revoked remotely by the administrators in case the devices are lost or stolen. HID Mobile Access also communicates with their HRMIS portal and relays staff attendance data to the server. Their staff can now view and remark on attendance, as well as send records online through the portal. Integrated resource management solution “The majority of our staff welcomes the change, citing the convenience of using their own mobile phones to check in at work is a great improvement over carrying yet another card for this purpose. From the management perspective, using mobile devices to verify a staff member’s attendance ensures that we are getting the real attendance records, as it completely eliminates card skimming. Also, since reporting is done on a browser, the administrators can generate reports easily at any time,” said the facility officer. HID Mobile Access integration with HRMIS also means that management can view of all staff records on one platform, streamlining the evaluation and allocation of personnel for projects. This also provides management with unprecedented insights into staff productivity to identify highly productive workers. “Like any other government agency around the world, we take security very seriously. Hence, any solution we deploy has to fulfill a stringent set of requirements. The HID Mobile Access solution not only provides and exceeds the level of security we were looking for, but it also does so while improving the convenience of our staff members. We are very pleased with the results of this project,” said the officer.
The IVX, Inc. is a revolutionary technology startup founded by industry veterans from Cisco, Jupiter and Motorola. The company is dedicated to providing innovative, high performance, fully integrated solutions for the public safety sector that effectively manage collaboration among multiple agencies and improve crisis management response time. The IVX enables real-time surveillance data collection, synchronisation and collaboration across the private and public safety sectors. Public safety challenge In the wake of recent mass shootings and terror attacks on high profile cities, public safety is once again at the top of the agenda. The growing number of higher specification surveillance cameras and the huge amount of data they generate, combined with longer data retention periods and real-time response requirements, are pushing the boundaries of what traditional storage approaches can handle. With these market conditions building, The IVX set off to look for an alternative solution for video surveillance. From proprietary to open source to private and public cloud solutions, The IVX tried different approaches, but they failed to deliver the necessary performance and cost efficiency. Both NetApp and EMC solutions required expensive software licenses and would incur hardware and maintenance costs, while open source software lacked reliability, software manageability and support. Additionally, encryption and data security concerns are still inhibiting the widespread use of the public cloud for surveillance solutions. Promise solution at The IVX After testing and conducting proof of concept, The IVX concluded that Promise Technology’s purpose-built hyperconverged infrastructure – VSkyCube – was the only solution to meet all of their current needs while providing a path for the future. By using the VSky Cube software defined approach, The IVX can deploy and launch surveillance services with just a few clicks VSkyCube pre-integrates computing, storage, and networking into hyperconverged nodes, giving a pre-integrated and adaptable cluster with a unified pool of resources that can be deployed, adapted, scaled, and managed quickly and easily. It is specifically optimised for video surveillance workloads and brings the benefits of the hyper-scale datacentre to the market. By using the VSky Cube software defined approach, The IVX can deploy and launch surveillance services with just a few clicks. They also have the ability to manage, monitor, scale and adjust compute, storage and networking resources all in the same web interface with the centralised management software, VSkyView. As the number of cameras and the amount of video they capture continue to increase, the IVX can dynamically scale out to multiple PB for 24x7x365 intensive workloads without interruption, thanks to Promise’s software-defined cloud storage – VSkyStor. And, most importantly, all sensitive data is protected by RAID and RAIN. High resilience and high availability features prevent drive and server failure, making for uninterrupted video capture and access. Promise solution business benefits With 24/7 support from Promise Technology, The IVX has successfully delivered surveillance services through a virtual private cloud on top of VSkyCube. The IVX can now handle 250 TB of HD surveillance video data, and is enjoying a 20-40% reduction in budget that was previously going to things such as hardware and software licensing and operating costs.VSkyCube is the only enterprise-class surveillance infrastructure that delivers the highest levels of performance, resiliency and data protection, all without the cost, complexity and skills typically required by virtualised environments. Anson Chen, Vice Chairman and Co Founder of The IVX Inc. said: “VSkyCube is an advanced hyperconverged system with all of the enterprise storage features we need. It is a perfect fit for solution providers like us who need a reliable solution that can grow over time, and allow us to maximize budgets. Promise Technology delivered on everything they promised! The close collaboration and timely support from Promise’s global teams help us provide excellent service to our customers.”
SafeZone is fast, easy to implement, and alleviates the need to invest in additional physical security measures CriticalArc announced that its pioneering SafeZone personal protection and campus security system has been selected by Swansea University to boost 24/7 safety for its students and staff both on and off campus. Swansea University is the latest in a fast-growing list of UK higher education establishments to choose SafeZone, following its European launch in 2014. The university has more than 19,000 students, including many international students, studying on a range of courses from Engineering, Law and Criminology, Arts and Humanities, Science, Medical, Human and Health Science, and Business Management supported by just over 3,000 staff (includes academics). SafeZone campus security system SafeZone will be deployed at the two principal campuses, that is, the Singleton Park and the Bay Campuses, as well as 7 other sites frequented by students and staff in the Swansea Bay region, where it will offer enhanced protection for any staff and student when they are at risk or need urgent help. It will meet the need of the campus security teams to support an increasingly round-the-clock learning culture that offers safe 24/7 access to libraries, study hubs, and other facilities. A major benefit will be the creation of safe corridors between each campus, its halls of residence, and popular destinations such as the train and bus stations. Additional monitoring and response cover along these thoroughfares will offer extra protection for people walking alone late at night. SafeZone protection will also extend to designated areas off campus, for example, for individuals on field trips, research projects or international placements, anywhere in the world. Distributed command and control platform SafeZone will equip the University with a cost-effective, people-centred safety solution plus an effective distributed command and control platform for managing response and mass communication during small or large-scale emergencies. All staff and students will be able to download the free smartphone app that makes it easy for them to raise a location-based alert at the touch of a button, so eliminating potential language or communication barriers. "SafeZone will enhance our ability to respond appropriately to any event, whether it’s a call for first aid, fire alarm, or a major incident" Ideally suited to dispersed estates, SafeZone is fast and easy to implement, alleviating the need to invest in additional physical security measures such as help points. It will give Swansea University access to zero-cost, targeted mass notifications, privacy-compliant group management functionality and a host of features like lone worker check-in. These force-multiplier capabilities will significantly improve its ability to enable collaboration between security first responder and volunteers such as building wardens during critical incidents as well as improving the efficiency of everyday team operations. Integrated security strategy Darren Chalmers-Stevens, from CriticalArc said: “It is great to be working with Swansea University as our first Welsh University. The team at Swansea University share a similar vision for real time situational awareness to us and have a great vision for the solution to include collaborating with local authorities and private organisations alike for a smart city which is envisaged will lead to further safety and security initiatives that will benefit staff and students alike. We very much look forward to a close working relationship with Swansea University as an industry leader in this space.”Russ Huxtable, Head of Resilience & Business Continuity at Swansea University said: “We have implemented an integrated security strategy for our University in order to provide, as far as practicable, a secure and safe environment for those who use, study, or work at the university. We are always looking at innovative ways to further mitigate risk, enable rapid response readiness, and fulfil our duty of care. By complementing our existing health and safety measures, SafeZone will enhance our ability to respond appropriately to any event, whether it’s a call for first aid, fire alarm, or a major incident. Using SafeZone to ensure a consistent security approach across our campus locations and beyond will provide an extra level of protection to give all students and staff added peace of mind.” SafeZone went live at Swansea University in September 2016, initial reaction to the service is extremely positive matched by a strong continuous uptake for the scheme which is only expected to increase further when the new University term begins in September 2017.
HID Global’s improved card quality and security for licences decreased counterfeit IDs in Bhutan HID Global, a worldwide leader in secure identity solutions, announced that its industry-leading FARGO HDP5000 printing and encoding solution has been selected by the Road Safety and Transport Authority (RSTA) of Bhutan, the government agency responsible for printing and issuing driver’s licences, to meet the high-volume in driver’s licence issuance demand for the country’s growing population of road users. The new solution allows the RSTA to quickly print more secure and durable driver’s licenses, lowering the total cost of ownership while meeting the country’s need for more secure ID cards. Established in 1997, the RSTA is responsible for all vehicle registration and driver license issuance throughout Bhutan, as well as numerous other services for private and commercial motor vehicles. Efficient printing solution “We needed a more efficient printing solution that did not compromise security, durability and image quality,” said Tshering Nidup, ICT Officer at RSTA. “Since the driver licences are also used as citizen identification, it is critical for the ID card to be highly secure and resistant to cloning or counterfeiting.” Bhutan previously experienced high rates of ID cloning since its licences lacked the necessary security features to prevent tampering. Additionally, Bhutan has undergone significant economic development and modernisation that has led to an increase in new drivers, and the RSTA’s previous printing process was inefficient and created a backlog of printing requests. The RSTA was also dependent on a system that required different vendors for replacing cards, overlaminates and other printer consumables. "Ensuring citizens carryauthentic identification isone of the most fundamentalpublic security measures acountry can have" Improved tamper-proof licence quality HID Global’s FARGO HDP5000 produces Bhutan driver’s licences that are now resistant to wear, tear and tampering, offering greater security using its High Definition Printing™ (HDP) and reverse transfer capabilities. By printing a reverse image on the underside of HDP Film and fusing the film to the card surface, the HDP5000 creates an image that looks like a sharp glossy photo versus an ordinary ID badge to improve the quality and lifespan of the card image. Additionally, the new driver’s licences feature 3-D backgrounds and hidden images, which have resulted in a decline of incidents involving counterfeit IDs according to local law enforcement. “Ensuring citizens carry authentic identification is one of the most fundamental public security measures a country can have,” said Weijin Lee, Regional Director of Secure Issuance, Asia Pacific with HID Global. “HID Global’s world-class card personalisation solutions are designed to meet the need for secure, fraud-resistant IDs that help customers combat counterfeit identification cards, while also addressing the high-volume issuance requirements of RSTA and other government agencies around the world.” Streamlined resupplying process The RSTA deployed 22 printers in total, five printers/encoders in their regional offices and 17 in their district offices across the country to streamline and improve its licence issuance operations. Since the initial deployment, the RSTA has issued approximately 40,000 driver’s licences contributing to reduced wait times for new or replacement driver licences. Using HID Global’s printing solution allows the RSTA to now procure all printing consumables from one single source for a more streamlined resupplying process instead of relying on multiple vendors to produce driver’s licences. Save Save
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
Some Expert Panel Roundtable topics are more challenging than others. Occasionally a question will “stump” the panel – i.e., no one will choose to answer it. Other times, only one or two panellists will step forward to answer a question. One comment does not a “panel” make. Taken together, however, these varied comments offer their own range of insights into the evolving physical security market. Let’s look at some of these assorted Expert Panel comments over the last several months. Better to post them here than have them lost to posterity!