Qualification & Training
The six free CEU courses that the Electronic Security Association (ESA) offered for free through the month of March 2020 will remain available free of charge through April 2020, ESA has announced. The Electronic Security Association took the price tag off these online CEU courses to support electronic security and life safety companies during the on-going coronavirus (COVID19) outbreak. ESA’s free CEU online courses As the situation has progressed and guidelines for social distancing hav...
SureCloud, the provider of Gartner-recognised Integrated Risk Management solutions and cybersecurity services, has partnered with Secure Controls Framework (SCF), granting all its customers access to SCF’s control set through its cloud-based Compliance solution. SCF aims to provide cybersecurity and privacy control guidelines to organisations of any size and across any sector, helping them to implement best-practice controls to protect their data and processes, and respond to evolvi...
Linx International Group, a globally renowned provider of security training, has announced that it has reduced the cost of all online courses provided by Tavcom Training and PerpetuityARC Training by 25%, for three months, including BTEC and IQ accredited courses. Last week, the company reported a surge in demand for its online courses from security professionals and employers around the world, as they look at ways to continue to support learners whilst in lockdown. Director of Sales and Market...
Focused on Revenue, Knowledge and Branding, whether its profitable new cloud services, specialist ‘how to’ training or simply making a company stand out from the competition, GAP has what a business needs for success. Pyronix has launched their ‘GAP’ initiative, in an effort to help installers and their businesses grow, by working smarter and building their brand. Key areas Providing free tools to make an installer’s business grow faster, GAP focuses...
Tavcom Training, globally renowned provider of accredited security systems training courses and part of the Linx International Group - is celebrating its 25-year anniversary with the opening of a state-of-the-art training centre of excellence. Developed in partnership with CrossConnect Training, the centre in Shipley, West Yorkshire is ideally located to meet all the training needs of the many security professionals in the North of England. Security systems training courses Expansion of Tavcom...
Alertus Technologies, a pioneer in mass notification enterprise solutions, is pleased to announce that it has received its Underwriters Laboratories (UL) 2572 certification. The UL 2572 certification was specifically developed in 2011 to evaluate the performance of a Mass Notification System (MNS). UL’s industry standards To qualify for a UL 2572 certification, the MNS is required to pass a series of rigorous tests based on UL’s industry standards for electronic devices and compone...
MOBOTIX, the provider of premium-quality secure IP video systems, will showcase its newly launched, award-winning M73 and MOBOTIX 7 Universal app platform at ISC West 2020 from March 18-20 at the Sands Expo and Convention Centre in Las Vegas (booth #18117). MOBOTIX will also be announcing their new MOBOTIX Cloud platform at the show as well. MOBOTIX solutions are quality engineered for high-performance and reliability with a multi-layer approach to cybersecurity safeguards. Attendees will be able to meet with key members of the MOBOTIX leadership team, including CEO, Thomas Lausten, and CFO, Klaus Kiener. MOBOTIX M73 Camera The new generation of M73s features three separate environmental sensors, the M73 can be fully customised to any applications’ needs with the ability to utilise optical, thermal, infrared, day/night, or audio functionalities simultaneously. The open platform incorporates applications based on AI and deep learning The intelligent modular design of this system is a clear commitment to flexibility that takes versatility and customisation to extremes rarely seen. The open platform incorporates applications based on artificial intelligence (AI) and deep learning. Booth #18117 will also demo some of the most powerful AI apps available in the MOBOTIX 7 platform. Cybersecurity is another foundation of this new release. MOBOTIX has recently obtained the international certification, "Secure by Default,” for complying with the 12 pre-established security guarantee guidelines. Smart IoT devices MOBOTIX will be launching the new MOBOTIX Cloud, which provides the ability to remotely manage MOBOTIX and external ONVIF camera systems from any location, using smartphone, tablet, or PC. This solution will make the powerful MOBOTIX technologies even more accessible for users. MOBOTIX will also highlight its flagship lineup of smart IoT devices, the Mx6 series, for a range of vertical applications, including Thermal. These Programmable Logic Devices (PLDs) reach beyond security to create more efficient operations for businesses in many verticals, from predictive militances in industrial applications to data-based merchandising strategy in retail. MOBOTIX MOVE line We look forward to debuting the MOBOTIX Cloud and our new MOBOTIX 7 platform and M73 camera" Additionally, the booth will also showcase the MOBOTIX MOVE line, featuring enhanced infrared technology and a pan-tilt-zoom functionality, and its thermal imaging line in which the M16 thermal camera won a SIA New Product Showcase Award in 2018. Both product lines are embedded with MOBOTIX’s layered cybersecurity protocols and support ONVIF standards to enable seamless integration into third-party systems. “We are excited to introduce our latest innovations in intelligent video solutions at this year’s ISC West,” said Joe Byron, Vice President: America’s MOBOTIX. “We look forward to debuting the MOBOTIX Cloud and our new MOBOTIX 7 platform and M73 camera, highlighting the nearly endless customisable solutions this new system can offer our customers.” The MOBOTIX booth will also include notable solutions from technology partners Eagle Eye Networks, Herta, Intelligent Security Systems (ISS), IP TechView, SeSys, SFC Energy, and Vorp Energy.
Pelco Learning Centre (PLC) is an online platform that gives clients access to training content 24 hours a day, seven days a week. Users can smoothly manage their organisation’s required certifications for key Pelco products, while increasing their knowledge of Pelco’s solutions to ensure their company is fully leveraging all that they have to offer. Other key benefits include: Organised eLearning content in a single location Tracked progress and performance More efficient learning and development time Reduced support time and cost during troubleshooting Improved buying experience for end users and resellers Access the PLC Portal to gain access to a wide range of practically beneficial training content and certification courses to maintain the competitive edge in the industry by harnessing all that Pelco has to offer.
Global technical body EMVCo has confirmed its security evaluation methodologies and processes support IoT payment use cases, enabling emerging solutions and devices to be evaluated quickly and efficiently. Device hardware evaluations are playing an increasingly important role in IoT assessments across various IoT payment use cases, security frameworks and emerging compliance models. EMVCo, in collaboration with globally recognised independent laboratories, has worked since 2005 to evaluate the security of various EMV hardware form factors and acts as a security certification entity. Software security assessments This function is now extended to IoT products and solutions. In addition to hardware product certification, EMVCo also delivers software security assessments of various interfaces and payment security functional requirements of IoT products. “The IoT is creating new ways to pay, with payment functionality enabled across various industries globally,” comments Bruce Rutherford, Chair of the EMVCo Executive Committee. “This innovation needs to be balanced with functionality, usability and security. By optimising existing processes to support new IoT payment use cases, EMVCo brings efficiencies and confidence to the IoT payment ecosystem, and an established framework of payment expertise.”
Check Point announced that its SecureAcademy education initiative reached a major milestone with the 100th academic institution joining the program to provide a comprehensive cyber security curriculum to students. SecureAcademy offers an in-depth academic program to higher learning institutions worldwide, promoting educational and career opportunities in cyber security for students. SecureAcademy courses are now available at 100 universities in 40 countries, helping to shape the cyber-experts of the future and narrowing the cyber skills gap. Recent research shows the number of unfilled cyber security roles now stands at 4.07 million professionals globally, up from 2.93 million last year. Identifying and resolving security threats Check Point works with recognised national and international universities, colleges and accredited higher education institutions to deliver the SecureAcademy program’s courses. These introduce students to cyber security concepts such as identifying and resolving security threats, and give hands-on experience with security solutions. Completing the course gives students industry-recognised certifications in cyber security skills. Check Point offers the SecureAcademy instructor training courseware, instructor certification, software licenses and marketing support completely free of charge. Students who pass the certification exam upon completion will be extended an interview opportunity for employment at Check Point global offices or its network of more than 5000 affiliate organisations. Cybersecurity skills gap We can give students a deeper understanding of the sector, and a fast-track route to employment" “This milestone clearly shows the value that both students and leading education institutions place on the SecureAcademy program, which is helping to equip the next generation of cyber-warriors with the skills they need to succeed in the industry,” said Shay Solomon, director for education services, Check Point Software Technologies. “The cybersecurity skills gap is large and still growing, so initiatives such as SecureAcademy and our innovative Knowledge Programs will be key to attracting and engaging students to help bridge that gap. By offering range of opportunities for formal learning and professional development, we can give students a deeper understanding of the sector, and a fast-track route to employment.” IoT security As part of Check Point’s commitment to develop the next generation of cyber security professionals, it is also offering a new, free 4.5 hour online technical training course via Cybrary.it, the Massive Open Online Course (MOOC) provider which delivers IT and cyber security training to anyone, anywhere, and every skill level. The Check Point course covers cyber security threats and security management. Further, free training modules will be available in 2020 covering cloud security, IoT security, mobile security and threat prevention. Check Point also offers CloudGuard Cyber-Range training. These courses deliver immersive cyber security training in simulated environments via the flexible Cyber Range cloud platform, offering an engaging, gamified learning environment. Training is fully adaptive to users’ needs with built-in debriefing and progression tracking.
Wilson James, the provider of specialist security services, announces that its Aviation Services division is set to build on the success of its training and skills development provision in order to meet the growing needs of personnel working in the sector. This follows the company’s designation as a Civil Aviation Authority (CAA) accredited training provider, after an external audit, where it scored ‘outstanding,’ the highest rating possible, which has rubberstamped Wilson James’ credentials in this important area. For over 25 years Wilson James has been delivering a wide range of security services to customers such as Heathrow, Gatwick, Belfast and Liverpool Airports. With a focus on providing excellent levels of customer service and risk management, while also improving the passenger experience through the deployment of friendly and professional security operatives, the company has developed an enviable reputation for its unique approach. CAA Quality Assurance Framework Training providers now have to achieve and maintain a minimum quality baseline" “The last few years have witnessed a step-change in attitudes towards aviation security training, with the introduction of the Civil Aviation Authority’s (CAA) Quality Assurance Framework,” commented Maria Harnett, head of training for aviation services at Wilson James. “In recognising the importance of correctly trained personnel in creating welcoming, secure and efficient airports, the CAA has sought to drive up standards across the aviation sector.” “Following the development of its Quality Assurance Framework, training providers now have to achieve and maintain a minimum quality baseline, which is assessed after a rigorous external audit. We had to meet certain criteria set by the CAA and we will undergo regular assessment to ensure that our standards are maintained.” CAA-approved courses Wilson James delivers tailored training packages both internally and externally. Its CAA-approved courses include aviation ground security operative (GSO), aviation ground security supervisor (GSS), and aviation security manager (ASM), as well as threat assessor training, airport supplies and general security awareness training. Through a mix of classroom based theory and practical on-site experience, trainees are taught about relevant regulations and best practice techniques. The company also provides specialist passenger assistance training, which identifies ways to address the needs of those that have disabilities. Wilson James offers individuals the highest level of training and skills development Trainees are advised how to assist these individuals by giving them more time to prepare at check-in, allowing them to remain with friends and family, and briefing them on what to expect as they travel through an airport. Flexible courses With its people-focused vision, Wilson James offers individuals the highest level of training and skills development. All of its instructors come predominantly from an aviation background, and have vast operational experience to draw on, something that provides an unrivalled level of insight and which course attendees find invaluable. It is also flexible about where and when it delivers courses, working with customers to configure the most suitable location and content, based on need and delegate profile. Maria Harnett concluded, “Receiving an “outstanding” rating by the CAA rubberstamps our credentials as an innovative aviation security training provider. We are delighted to have received such an accolade and it makes us even more determined to further develop our presence in the aviation sector and train security personnel who have customer service, attentiveness and scrutiny as their guiding principles. We look forward to building on our success in achieving this accreditation throughout 2020 and beyond.”
DigiCert, Inc., a provider of TLS/SSL, IoT and PKI solutions, is upgrading channel partners to DigiCert CertCentral® Partner, a comprehensive TLS certificate management solution for cloud and hosted environments. CertCentral helps partners customise and automate all stages of lifecycle management for their end customers, as well as easily deliver new features and solutions, while simplifying business management. Management of customer accounts CertCentral Partner offers an updated API that lets partners easily integrate key features into their own offerings for their customers. Pre-validation capabilities, as well as support for change orders during order processing, help improve business agility. Using CertCentral, partners can support multiple sub-accounts under a main account, simplifying management of customer accounts, ordering, payments and other processes. CertCentral Partner helps partners simplify and expedite their selling processes" “DigiCert CertCentral Partner is part of our comprehensive strategy to support our partners with world-class technology and services to help them succeed,” says Philip Antoniadis, executive vice president of worldwide sales at DigiCert. “Many of our partners are already experiencing compelling business outcomes, including new growth and organisational efficiencies.” DigiCert CertCentral Partner “Partners have distinct requirements for managing customers’ digital certificates, and DigiCert CertCentral Partner helps them better address each customer’s specific needs,” says Tobias Zatti, product manager at DigiCert. “CertCentral Partner helps partners simplify and expedite their selling processes while delivering a superior experience to end customers to set the stage for growth, new revenue and upsell opportunities.” CertCentral Partner provides an advanced set of account management tools for better TLS certificate deployment to end customers. Leading features allow partners to: Access all certificate types from one place, through an advanced API, to better address end customer requirements and easily build new solutions that help drive growth; Take advantage of flexible ordering processes, including order changes, for improved efficiency, enhanced agility and an improved experience for end customers; Gain 360-degree visibility through an easy-to-use UI that provides fast access to everything they require in just a few clicks; View and use a comprehensive library of documentation with API details, technical support and more. Support certificate management It’s intuitive UI gives you quick access to all the features you need in just a few clicks" DigiCert has received an enthusiastic response from partners who have deployed CertCentral Partner to support certificate management for their end customers. “DigiCert CertCentral Partner is a fantastic, progressive upgrade for us,” says Einar Ágúst Baldvinsson, system administrator at Sensa ehf. “It’s intuitive UI gives you quick access to all the features you need in just a few clicks. Ordering certificates in CertCentral takes far less time than before. It is feature-rich and greatly improves the service level that we are able to provide to our customers.” Flexible domain validation “The streamlined API gives us access to more products than before,” says Marco Hoffmann, head of product management & domain registrar services at InterNetX. “With enhanced features like pre-validation and the detailed document library, DigiCert CertCentral Partner makes our daily tasks a lot easier.” “DigiCert CertCentral Partner simplifies our reselling processes,” says Kenta Shinoda, sales manager, and Furuki Ikko, president, at Sophia Research Institute. “Flexible domain validation, certificate issuing format and authentication status tracker are so great.” Lifecycle management solution “At Secure128, we’ve found the DigiCert CertCentral Partner and API to be a breath of fresh air,” says John Monnett, managing partner, operations, at Secure128. “The level of tools, reporting, automation options, sub-account functionalities, and ease of use are professional-grade and second to none. We believe CertCentral to be the most comprehensive certificate lifecycle management solution we’ve ever used.” With DigiCert CertCentral Partner, we have achieved much improved certificate lifecycle management" “With DigiCert CertCentral Partner, our customers and our organization have saved so much time,” says Marcus Wessberg, head of IT at Ports Group. “The pre-validation of organisations and domains make it really easy.” “Through the API and ACME, DigiCert CertCentral Partner gives us the ability to issue certificates instantly and automatically for all our customers,” says Rollin Yu, technical director at TrustAsia. “The product is highly flexible: the certificate chain, the algorithm, the validity period and other extensions can be customised accordingly.” Manage all TLS certificates “With DigiCert CertCentral Partner, we, as well as our customers, have achieved much improved certificate lifecycle management, which is now more visible and intuitive,” says Roger Werner, CEO of CertSuperior. “And we can manage all TLS certificates in one location.” Partners can get details about upgrading to CertCentral Partner by speaking with their account representative.
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research programme to provide valuable feedback to the GSA Schedule 84 programme and on to the GSA central office. The director of GSA Region 7 Schedules Program, the Schedule 84 Branch Chief and the Category Manager Subject Matter Expert who manages our suppliers' panel gave us their full attention as we discussed the successes of the programme, hot topics, problems and the future. We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort and renewed enthusiasm Innovative review team We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort, renewed enthusiasm and productive changes building upon the successes of 2017. There was high praise for the accessibility to the Schedule 84 staff. Their consistent quick response to questions and concerns, thinking outside the box and supporting the programme by partnering with their contractors was much appreciated. There has been a renewed spirit of partnering to cooperatively bring the best to agency customers. It seems to be working as per the Centre Director sales are growing for GSA Schedule 84. Advocating for the security industry In my experience, business development starts with the Administrator from Region 7 in Ft. Worth, TX. As the annual Schedule 84 Industry Day at the SSAC begins he is shaking every hand and passing out his cards looking folks right in the eye asking, “how can I help you?” They have the best practices and most organised paperwork. The SSAC director has chosen well in her staff and is hands-on in every endeavour to direct things along when challenges occur or to improve the programme. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry It continues with the centre’s CASE Manager encouraging the contractors at events, visiting agency customers and promoting the GSA Schedules Program by helping coordinate the partnering. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry for adding new technology, meeting with industry associations, understanding the complexity and challenges of Homeland Security Presidential Directive 12 (HSPD12) and advocating for the purchasing Physical Access Control Systems (PACS) utilising the appropriate standards and the GSA Program among other innovations. As far as the supplier panel, we gave our GSA Schedule 84 team and leaders high praise for 2018. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List Changes in the GSA programme Some changes this year in certain GSA programmes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) developed to assist with solution procurements. This new SIN was added to Schedules 03FAC, 56, 70, 71, 00Corp, 738X and 84. Under Schedule 84 it is SIN 84-500. GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex Essentially this SIN allows agencies procuring under the aforementioned GSA Schedules’ programmes to purchase and the contractor to add items and services not known prior to the task as a Contract Line Item Number (CLIN) not to exceed 33% of the order. For more information and FAQs on OLMs go to www.gsa.gov/olm. This is not to take the place of “Open Market” items for adding products only that are not listed on a company’s GSA Contract. Physical access control products Previously, GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex for the agencies. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List according to the standards created under FIPS201. These products appear under SIN 246 35-7 after being tested and approved by GSA. To be qualified to install these products under the GSA Program at least one individual from the GSA Contractor company must complete the class and be CSEIP certified before applying for labour SIN 246 60-5. Additionally, the company must demonstrate certain qualifications and have past performance for this type of work. The Security Technology Alliance offers the training class and certification. Certified individuals and approved products are listed at www.idmanagement.gov. Companies listed with SIN 246-35 7 and SIN 246-60 5 may be found by searching at www.gsaelibrary.gsa.gov. Updates to guidance for procurement Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide. The ordering guide posted at www.gsa.gov/firesecurity is a valuable support tool created to assist agencies with understanding the requirements of FIPS201 and procuring a PACS. The guide includes relevant regulations, FAQs, sample systems designs, sample statements of work, a list of key points of contract for additional help and questions. In partnership with GSA and guided by the GSA Ombudsman group, the Security Industry Association and the Security Technology Alliance members and their contractor companies participated in a GSA Reverse Industry PACS Training Day on September 17, 2018. We presented from an industry perspective important fact on PACS system requirements, procurement planning, providing information on resources and further educating with panel discussions, individual presentations and amusing skits to over 300 Government agency staff and acquisition specialists. You can find some of the unedited recording of the PACS Reverse Industry Day Training on YouTube. Some changes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) GSA Schedules Program A hot topic about the GSA programme for 2018 was also an issue for the prior year. The GSA Schedules Program is a streamlined contracting vehicle incorporating specific Federal Acquisition Regulations for more efficiently purchasing commercial items. Companies may apply per a continuous open season for a 5-year contract with three 5-year options to renew. Contractors are vetted for past performance, corporate experience and financial capability. Products and services are considered for offering to Federal, State and Local customers (for Schedule 84) with pricing that is determined to be fair and reasonable through negotiations with GSA. To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor as well as the competition of identical or similar item pricing. The most vocal complaint of concern from the contractors was regarding the consideration of competitor contractors offering identical items with out-of-date pricing or holding a Letter of Supply not authorised by the manufacturer. GSA pricing tool Since the GSA utilises a pricing tool to determine if the pricing offered is competitive, a rogue competitor can cause a pricing action to possibly be rejected due to out of date information even as the manufacturer offers an update of the product. This is an issue on all GSA Contracts that the supplier panel hopes will be reconsidered by GSA policymakers at the central office. Most of us believe the Letters of Supply should only be issued by the manufacturer or with documented specific permission of the manufacturer to a reseller. Manufacturers may want to have a better understanding of the Letter of Supply, how it is considered by GSA and more carefully choose their Government partners for experience and compliance. Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy Overcoming challenges for the security community Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy. GSA eBuy is an online Request for Quotation (RFQ) programme that is for GSA Contract holders only. Agencies will post their requirements by Special Item Number for at a minimum 48 hours. Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract. GSA Participating Dealers may take orders on behalf of a manufacturer if they are authorised under the manufacturer’s GSA Contract. They may also have an online PO Portal to receive orders. But they have no access to GSA eBuy to response to RFQs. Usually, under these arrangements, the manufacturers do not respond directly, so there is a problem using GSA eBuy for opportunities as their GSA Participating Dealers have no access to respond. GSA Schedule 84 leadership In some instances, a contracting officer may allow an emailed quotation. However, with the use of the electronic ordering system, this has become a common problem we hope to bring to the attention of policymakers. Some changes to the programmes may make the presentation of documentation more effective going forwardThe GSA Schedule 84 leadership has been helpful to explain the challenges to the agencies to try and resolve such issues. So, what’s up for 2019? GSA modernisation is coming. There will be improvements to their tools and more consolidations of SINs and more. There have been discussions of a revival of the GSA Expo. The Expo offered training for contracting staff both Government and private industry. Valuable tools for vendor training Equally important is the networking, meetings and the exhibits of the contractors. Expos have been discontinued since 2012 but smaller events have been growing as well as online webinar training. Webinars are valuable tools for GSA and vendor training, but they do not take the place of being able to meet your customers face-to-face. GSA online eOffer and eMod programme have made processing actions more efficient. Some changes to the programmes may make the presentation of documentation more effective going forward. The GSA online website for viewing the items on the GSA Contract and for purchasing items, GSA Advantage could definitely use an update as it has been basically the same for 20 years. Keep an eye on GSA Interact for the latest happenings with GSA.
Brexit will bring sweeping changes to the way the UK not only interacts internationally, but also internally. With the country standing alone with regards to trade and exports, it is vital for us to be fully prepared. However, there is one area that I think needs much greater scrutiny—the UK technical skills gap. Tellingly, there is a palpable shortage of technical training and skills right across the UK economy. With the country’s economic strength relying heavily on cutting-edge technology and knowledge, the UK security industry has particular reason to be anxious of movement restrictions on internationally sourced expertise and resources, as well as a potential ‘brain-drain’ of domestic talent. There is a lack of quantity and quality of home-grown talent in the pipeline, and there is a greater availability of talent from overseas Need for security education There are two distinct aspects that need to be addressed when you look at the requirements of the UK economy with regards to technical expertise. First of all, there is the quantity and quality of home-grown talent in the pipeline, and secondly, there is the availability and desire of talent from overseas wanting to work in the UK. In my own experience, it can be quite a challenge finding the best technical expertise (in the numbers needed) from the UK alone. Currently, alongside our British employees, our business employs a sizable amount of international security talent, ensuring we can fill key roles with exactly the right people. As well as sourcing expertise from abroad, I passionately believe we need to properly support and educate the next generation of UK security professionals too, ensuring we can also find the right talent closer to home in the future. T-Levels provide valuable business experience which can be lacking in traditional academic courses Technology-level training for modern needs It is frustrating to see the current skills gap—particularly as I felt the UK Government began moving in the right direction when it reintroduced the excellent national apprenticeships scheme a few years ago. There is no doubt we will always need excellent academic qualifications and people trained in research and development, but equally a stint in further education is certainly not for everyone! Undoubtedly apprenticeships are an excellent way of encouraging hungry young talent into any industry with on-the-job training. Importantly, this isn’t just academic training either—it also provides valuable business experience too, which can be lacking in more traditional academic courses. There has also been a lot of interest in ‘T-Levels’ in the UK. These are technology level courses that are designed to offer specific training for modern technology needs. It is very encouraging to see the promotion of technology education in this way, designed to appeal to students that are looking for a solid career in the UK technology sector. Apprenticeships are an excellent way of encouraging hungry young talent into any industry with on-the-job training Focus on engineering and vocational education Unfortunately, it seems the UK is still somewhat behind our European cousins when it comes to technology education and training. Germany, for example, is a country that has traditionally excelled in these areas. The education system in Germany has heavily focussed on engineering and vocational-based training programmes, which has seen noticeable benefits for its technology sector. The Germans have continued to focus on this for decades, meaning the country’s economy has an excellent pipeline of well-trained talent available. Taking this approach would greatly enhance training in the UK too, supporting up-and-coming talent and helping the next generation reach its potential. A healthy influx of highly talented individuals from across Europe has helped to fill the UK skills gap over recent decades Meeting business and technology needs A healthy influx of highly talented individuals from across Europe has helped to fill the UK skills gap over recent decades. Undoubtedly, like many British businesses we have significantly benefited from this open and vibrant skills market. With the fine details of Brexit being negotiated at the moment, I hope this valuable source of skilled professionals won’t be denied to UK businesses. Even if there are more stringent controls moving forward, the UK must continue to open its doors to this expertise—certainly until we can reap future generations of home-grown talent. It’s interesting (and somewhat ironic) that when you look at some UK universities’ engineering faculties, they often have half or over half of their students from other countries. The UK has world-renowned education facilities that we should be proud of, and yet paradoxically, we are still not educating enough UK engineers. There is a keen interest in technology from younger generations that needs to be nurtured Skill-based training for economic growth International trading and people movement will change after Brexit, but I hope there will also be a significant evolution in the education system to close the UK skills gap. The UK has some of the best educational establishments in the world and a long history of innovation and entrepreneurial skills to make our technology highly commercial. Frustratingly, there is a keen interest in technology from younger generations—just look how addicted young people are to their screens. This keen interest needs to be nurtured and career choices in technology encouraged. With the right training opportunities in place (university education, apprenticeships and T-Levels), the UK can easily implement the tools to create the right opportunities. However, what is really needed now is an impetus from political leaders to address training needs and ensure the economy continues to develop and grow to meet the challenges ahead.
What a year it’s been! 2017 has been a monumental period of product innovation and growth for Pivot3. The company experienced a more-than-50-percent increase in bookings from Q2 to Q3 this year, including a record number of million-dollar orders. We also saw deals supporting multiple use cases more than double, and experienced continued growth in the video surveillance market, driven by new product enhancements and contracts worth more than $1 million. We have also invested in building an influential group of surveillance-focused experts internally, and increased our focus on building strong partnerships with major VMS players, key systems integrators and other aligned-technology providers, such as Iron Mountain and Lenovo. A more robust industry It wasn’t only Pivot3 that had a healthy year; the industry, as a whole, is robust. Investment in technology is growing in markets ranging from public sector organisations, municipalities, gaming and transit agencies — all seeking technology solutions that drive value, increase intelligence and reduce risk. It is the drive for data that propels the video surveillance industry forward. A respected industry thought leader said recently that “data is the modern currency,” and video is the most prominent Big Data application in the world (by far). Those vendors and installers that understand how to help organisations capture, analyse and leverage data will be the ones who secure their future in the marketplace. A respected industry thought leader said recently that “data is the modern currency" Honest predictions Last year, I predicted that cybersecurity would become of greater importance to our market and that prediction was on point. Data security has become the number one concern in the industry, widely because users are moving back to more-trusted brands that focus on implementing cybersecurity protocols into network devices. In the coming year, cybersecurity will continue to be a primary focus — and it must be — for all product vendors, integrators and end-users. The adoption of standards and guidelines around data security for physical security technology will be imperative to ensuring data integrity. An era of evolution Over the past year, deep learning and artificial intelligence have become some of the most quoted buzzwords. Organisations see the value in leveraging these trends to analyse data more efficiently, and because of recent market innovations, we see a real impact an analytics effectiveness. Additionally, we have seen more and more large organisations migrate more of their security function to the cloud. Today, private-cloud architecture is no longer novelty; it is expected, and despite some well-publicised breaches, the public cloud is now considered more secure than some traditional on-site solutions. Cloud-based systems will be deployed much more frequently across some market segments, from SMEs to larger enterprises The year to come As 2018 approaches, I expect to see many of these same trends accelerate even further. Cloud-based systems will be deployed much more frequently across some market segments, from SMEs to larger enterprises. AI will become more mainstream, and analytics solutions will become more advanced. Overall, we at Pivot3 look forward to another strong growth period and seeing the continued evolution of the market as we swing into another year.
The next chapter of the Pelco saga began in May when Pelco Inc. was acquired by Transom Capital Group, a private equity firm, from Schneider Electric. Since the acquisition, Transom Capital has been working with Pelco’s management and employees to define and direct that next chapter. “The more time we spend with the company, the more excited we are about the opportunity,” says Brendan Hart, Vice President, Operations, Transom Capital Group. In addition to his position with Transom, Hart has taken on an interim line role at Pelco as Vice President of Product and Strategy. After helping to oversee Pelco’s rebuilding phase, he expects to step away from daily involvement over time. “We have gained an appreciation for nuance [since the acquisition closed],” he said. “The channels, the relations, how people buy in this industry are very nuanced. Who’s gone where and who’s done what? The interplay of hardware and software. We have gained appreciation for the nuance. And we need to be surrounding ourselves with people who know the industry, who know the multi-dimensional areas.” Transition from analog to IP systems We have to focus on who our customers are specifically and understand their needs” It’s a “transformative moment in the industry,” says Hart, given industry changes such as price erosion and the transition from analogue to IP systems. “We are about to go into the world of added intelligence. It’s an interesting time to buy a security company.” Hart says the Pelco brand still has value: “The market is rooting for us.” There is also a strong portfolio of people and products to build from. Pelco maintains its headquarters in Fresno, Calif., and has a presence in Fort Collins, Colo., near Denver, and a sales office in the New York area, not to mention many global employees who work remotely. A new CEO is being recruited; otherwise, “we have a great executive team” in place, including Brian McClain, COO and President, says Hart. “In defining the new company, we have to decide first and foremost what we want to be,” says Hart. “What can we provide customers? We have to focus on who our customers are specifically and understand their needs and use cases.” Part of defining the new company is to become more aligned with a specific set of verticals that fit with Pelco’s capabilities (although they are not saying which verticals those are yet). However, “we can’t ignore what we are today as we make the transition,” says Hart. Innovation in products We want customers to see innovation in products to a point when people will say ‘this is Pelco’" “We have to let the products and experience speak for themselves. We’re focused on getting our ducks in a row and going in a new direction, but actions speak louder than words,” he says. The changes will be “more organic;” don’t expect to see a big announcement. “We want customers to see innovation in products and customer support and get those things to a point when people will say ‘this is Pelco,’” says Hart. Although not exhibiting at GSX, I found Pelco occupying a meeting room near the show floor. The room gave the company a chance to respond to integrators and consultants at GSX who had questions about what was going on with the acquisition. “Everybody is rooting for us, and we wanted the ability to get out and say ‘we’re here, we’re doing things, and we’re excited about the future,’” said Stuart Rawling, Pelco’s Vice President, Market Strategy. “This is a time for people to come and see us who maybe haven’t seen us in a while.” By ISC West in the spring, Pelco expects to have a clear message of who they are and where they’re going, he says. Aligning needs of end user “We are excited about the work we are seeing internally,” which includes “aligning resources in the right way,” says Rawling. “The fruits of the labour are being seen internally now. We will be launching new products in the next eight months, although there will not be a defined moment in time when we say ‘this is it.’ It will just be happening. Next year will be an exciting time industry-wide, and product-wise, and Pelco will have a strong voice. Brendan and team have kept us extremely busy,” says Rawling, who also was part of Pelco in the “glory days” before the acquisition by Schneider Electric. We’re so optimistic, when you combine the people and the brand and what’s happening the market” “The work product has been so transformative mindset-wise for the employees. Everybody has had the opportunity to talk to the [new] owners about what type of company we are. We can set our own vision and get reenergised and get back to the core belief of what Pelco was and what it should be. We are the master of our own destiny, aligning needs of end user with the products we can deliver. We are putting the right processes in place that work for this market. It is an exciting prospect.” In the new era, Rawling expects to target marketing more toward end-users, because they have more influence on product selection than ever before, he says. End users often learn about new products online, so Pelco will be looking to target its marketing toward educating various vertical markets about available technologies and their use cases. “We’re so optimistic, when you combine the people and the brand and what’s happening the market,” says Hart. “We have to do the work. We’re excited about what we are seeing internally.”
Ethics is a particularly important subject in an industry such as fire and security because the result of unethical actions might make the difference in life and death. For example, if an employee acts unethically when servicing a fire extinguisher, the result could be to burn down the building. Although ethics is not a common topic of discussion in the fire and security industry, perhaps it should be. Chubb Fire and Security is a company that provides an example of how an emphasis on ethics can benefit a company, their employees, their customers and the whole world. Fire safety and security risks “The fire and security industry is different than others because lives and people’s safety are on the line,” says Harv Dulay, Director of Ethics and Compliance at Chubb Fire and Security. “Our purpose is to protect clients from fire safety and security risks. This is a business where no one should take short cuts. It is important to do the right thing all the time, every time, and it’s about protecting lives and property.” At Chubb, we have a code of ethics, our ‘bible,’ that is issued to employees when they start" “At Chubb, we have a code of ethics, our ‘bible,’ that is issued to employees when they start,” says Dulay. “Within the bible are core fundamental rules about what’s acceptable and not acceptable. We lay it out for employees very specifically. They understand and embrace the code of ethics, which is based on trust, integrity, respect, innovation and excellence.” “If you get those right, the business moves in the right direction. A key piece of our ethics policy is based on trust. We relate to others with openness, transparency, and empathy. It makes Chubb a better place to work and enables us to provide better service to customers.” Fire audit For Chubb, ethics is not just theoretical, but ethical concepts play out every day in practical ways. An example might be an engineer who goes to a customer’s site and is asked to do a task that is outside his or her duties and/or not allowed under the ethics policy. The pressure might be even greater if the employee is struggling to meet a sales figure. The code of ethics addresses specific situations and outlines the behaviour that is expected. In another example, a customer asked a Chubb technician to forge a certificate saying the customer had previously passed a fire audit in order to validate his previous year’s insurance. Showing ethical integrity, the technician was able to cite the company’s Code of Ethics and refuse to do it. The technician also reported the situation to his Ethics and Compliance Officer. Customers benefit, too. Delivering ethics excellence It’s a message heard from the top down, from everyone in the company" One of Chubb’s sales associates immediately reporting a situation in which all the tenders and competitors’ prices were visible as they prepared a tender for upload to a customer portal. Not only did the sales associate deliver ethics excellence by reporting the issue, he also helped a grateful customer who thereby avoided anti-trust issues, says Dulay. “Ethics is not just a current issue,” says Dulay. “It’s embedded in our values and has been since the beginning. Ethics is making sure people do the right things.” Ethics is integrated into the Chubb business model, and everyone knows what is expected of them. “It’s a message heard from the top down, from everyone in the company.” On-line training modules Ethics discussions begin for employees at Chubb when they join the company; clear instructions about ethics are included as part of employee induction. There are nine modules of ethics training during employee orientation, and a discussion with an Ethics and Compliance Officer is part of the onboarding process. The training program includes information about ethics, company expectations around ethics, where to go for questions about ethical issues, and details of the anonymous ombudsman program. Additionally, field staff are trained by their supervisors via regular face-to-face ethics toolbox talks. Office staff complete a series of on-line ethics training modules regularly. A series of supervisor-led trainings encourage managers to deliver face-to-face ethics training to their team, citing real-life examples. Healthy discussions are encouraged to deal with any ‘gray areas.’ Worldwide implementation of data security Some 14,000 employees globally have multiple options when it comes to reporting an issue Dulay estimates that ethics and compliance officers spend about half their time answering questions and clarifying for employees what’s expected in the code of ethics. Some 14,000 employees globally have multiple options when it comes to reporting an issue, and there are full-time Ethics and Compliances Officers in every country where Chubb does business. A reflection of Chubb’s global approach to compliance is their worldwide implementation of data security requirements of Europe’s General Data Protection Regulation (GDPR); the company saw the benefits of the program for any jurisdiction. Training and education are part of Chubb’s investment in ethics. For example, a recent module on ‘respect in the workplace’ covered the need to create a company culture in which everyone feels respected. “Training and continuous communication are embedded in the organisation,” says Dulay. Managing potential conflicts proactively “We invest in the process,” says Dulay. “We have had employees who left the company and then come back. They realised the importance of ethics and rejoined us. We start with the foundation that we would rather lose business than give up our ethical standards,” says Dulay. Some business is not worth getting if you don’t adhere to your values" “We won’t abandon our policies even if there is money at stake. Some business is not worth getting if you don’t adhere to your values. We manage potential conflicts proactively by creating and instituting methods in which employees have access to tools they can use to be successful and adaptable in times of change,” says Dulay. “Also, we will not tolerate retaliation against any employee who reports wrongdoing – regardless of the outcome of the investigation.” Forming good ethics behaviour And while there is no specific monetary value assigned to good ethical practices, success can be measured. “We measure it by people’s conduct, the number of cases we have, and awareness,” says Dulay. “It’s good for employee morale, and it’s good for customers and our business. It’s not measurable, but it is fundamental for business and customers.” “The work we do as a company can impact people’s lives so it is important that everyone has an understanding of the importance of their role,” says Dulay. A common misconception about ethics is: “If no one is watching, it must be ok.” However, Dulay says it is the things employees do when no one is watching or checking in on them that form good ethics behaviour. During training, Chubb emphasises that ethics is about doing the right thing, all the time even if no one is watching.
Cybersecurity talk currently dominates many events in the physical security industry. And it’s about time, given that we are all playing catch-up in a scary cybersecurity environment where threats are constant and constantly evolving. I heard an interesting discussion about cybersecurity recently among consultants attending MercTech4, a conference in Miami hosted by Mercury Security and its OEM partners. The broad-ranging discussion touched on multiple aspects of cybersecurity, including the various roles of end user IT departments, consultants, and integrators. Factors such as training, standardisation and pricing were also addressed as they relate to cybersecurity. Following are some edited excerpts from that discussion. The role of the IT department Pierre Bourgeix of ESI Convergent: Most enterprises usually have the information technology (IT) department at the table [for physical security discussions], and cybersecurity is a component of IT. The main concern for them is how any security product will impact the network environment. The first thing they will say, is “we have to ensure that there is network segmentation to prevent any potential viruses or threats or breaches from coming in.” The main concern for IT departments is how any security product will impact the network environment”They want to make sure that any devices in the environment are secure. Segmentation is good, but it isn’t an end-all. There is no buffer that can be created; these air gaps don’t exist. Cyber is involved in a defensive matter, in terms of what they have to do to protect that environment. IT is more worried about the infrastructure. The role of consultants and specifiers Phil Santore of DVS, division of Ross & Baruzzini: As consultants and engineers, we work with some major banks. They tell us if you bring a new product to the table, it will take two to three months before they will onboard the product, because they will run it through [cybersecurity testing] in their own IT departments. If it’s a large bank, they have an IT team, and there will never be anything we [as consultants] can tell them that they don’t already know. But we all have clients that are not large; they’re museums, or small corporations, or mom-and-pop shops. They may not be as vulnerable from the international threat, but there are still local things they have to be concerned about. It falls on us as consultants to let them know what their problems are. Their IT departments may not be that savvy. We need to at least make them aware and start there. Wael Lahoud of Goldmark Security Consulting: We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels. At the procurement stage, we as consultants must select and specify products that have technology to enable cybersecurity, and not choose products that are outdated or incompatible with cybersecurity controls. We also see, from an access control perspective, a need to address weaknesses in databases. Specifying and having integrators that can harden the databases, not just the network itself, can help. The impact of physical security products on the network environment was a dominant topic at the MercTech4 consultants roundtable discussion The need for standards on cybersecurity Jim Elder of Secured Design: I’d like to know what standards we as specifiers can invoke that will help us ensure that the integrator of record has the credentials, knows what standards apply, and knows how to make sure those standards are maintained in the system. I’m a generalist, and cybersecurity scares the hell out of me.We’re not just talking about access to cameras, we are talking about access to the corporate network and all the bad things that can happen with that. My emphasis would be on standards and compliance with standards in the equipment and technology that is used, and the way it is put in. It can be easier for me, looking at some key points, to be able to determine if the system has been installed in accordance. We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels"I’m taking the position of the enforcement officer, rather than the dictator. It would be much better if there were focused standards that I could put into the specification— I know there are some – that would dictate the processes, not just of manufacturing, but of installation of the product, and the tests you should run accordingly. Pierre Bourgeix: With the Security Industry Association (SIA), we are working right now on a standard that includes analysed scoring on the IT and physical side to identify a technology score, a compliance score, a methodology, and best-of-breed recommendation. Vendor validation would be used to ensure they follow the same process. We have created the model, and we will see what we can do to make it work. Terry Robinette of Sextant: If a standard can be written and it’s a reasonable process, I like the idea of the equipment meeting some standardised format or be able to show that it can withstand the same type of cyber-attack a network switch can withstand. We may not be reinventing the wheel. IT is the most standardised industry you will ever see, and security is the least standardised. But they’re merging. And that will drive standardisation. Jim Elder: I look to Underwriters Laboratory (UL) for a lot of standards. Does the product get that label? I am interested in being able to look at a box on the wall and say, “That meets the standard.” Or some kind of list with check-boxes; if all the boxes are checked I can walk out and know I have good cybersecurity threat management. IT is the most standardised industry you will ever see, and security is the least standardised" The role of training Phil Santore: Before you do any cybersecurity training, you would need to set the level of cybersecurity you are trying to achieve. There are multiple levels from zero to a completely closed network. Wael Lahoud: From an integrator’s perspective, cybersecurity training by the manufacturer of product features would be the place to start – understanding how to partner the database, and the encryption features. We see integrators that know these features are available – they tick the boxes – but they don’t understand what they mean. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation. That would be a good starting point. The role of integrators Wael Lahoud: Integrators like convenience; less time means more money. So, we see some integrators cut corners. I think it is our role (as consultants) to make sure corners are not cut. If you rely solely on integrators, it will always be the weak password, the bypass. We have seen it from small projects to large government installations. It’s the same again and again. Even having an internal standard within an organisation, there may be no one overseeing that and double-checking. Tools will help, but we are not there at this point. I will leave it up to manufacturers to provide the tools to make it easy for consultants to check, and easier for integrators to use the controls. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation - so training is very important The impact of pricing Pierre Bourgeix: The race to the cheapest price is a big problem. We have well-intended designs and assessments that define best-of-breed and evaluate what would be necessary to do what the client needs. But once we get to the final point of that being implemented, the customer typically goes to the lowest price – the lowest bidder. That’s the biggest issue. You get what you pay for at the end of the day. With standards, we are trying to get to the point that people realise that not all products are made the same, not all integrators do the same work. We hope that through education of the end user, they can realise that if they change the design, they have to accept the liability.It’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it" The big picture Wael Lahoud: The Windows platform has a lot of vulnerabilities, but we’re still using it, even in banks. So, it’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it. That’s where the cybersecurity program comes into play. There are many vulnerable products in the market, and it’s up to professionals to properly secure these products and to design systems and reduce the risk. Pierre Bourgeix: The access port to get to data is what hackers are looking for. The weakest link is where they go. They want to penetrate through access control to get to databases. The golden ring is the data source, so they can get credentialing, so they can gain access to your active directory, which then gives them permissions to get into your “admin.” Once we get into “admin,” we get to the source of the information. It has nothing to do with gaining access to a door, it has everything to do with data. And that’s happening all the time.
Body Worn Cameras (BWCs) are transforming policing and security around the globe, helping to create new connected officers who can stream video, access information and collaborate in real-time enabling them to operate safely and more efficiently in the field. Richie McBride, Managing Director of BWC experts Edesix, says "BWCs are now built for a connected world and are being used by officers on the front line to help prevent both criminal and anti-social behaviour when out on patrol.” Importance of body worn cameras in policing Innovative solutions driving creation of connected officers who can stream and access information in real-time He adds, "Technology has transformed policing and security in recent years. New innovative solutions have driven the creation of new connected officers who can stream, access information and collaborate in real-time. BWC captured footage not only provides greater transparency of interactions with the public, but also significantly increases early guilty pleas and saves officers valuable time as they often do not need to attend court”. Richie further said, "Police officers have always been connected, either to the public and communities they serve, or with their colleagues on the street and in the control room. They have shared information and generated insights to help address common problems and protect those with common vulnerabilities. However, digital technology has now enhanced these connections, enabling officers to feel more empowered, supported and secure." VideoBadges enhance police personnel VideoBadges have been utilised by police forces across the UK for some time now. Police forces, such as the Police Service of Northern Ireland (PSNI), have utilised our BWCs since 2016 to enhance the security of both officers and the general public, and to improve training and best practice. There are now 2,500 cameras being used by over 7,000 officers covering approximately 173,000 incidents each year in Northern Ireland. The BWCs are being utilised by Local Policing Teams, Neighbourhood Policing Teams, Tactical Support Groups, Roads Policing Units, Dog Section, District Support Teams and Armed Response Units. Importance of good video evidence Body Worn Video has the potential to improve the quality of evidence provided by police officers" PSNI Superintendent David Moore adds, "Video evidence puts the victims of crime first. The pilot of this technology in Foyle district demonstrated how Body Worn Video has the potential to improve the quality of evidence provided by police officers and thereby increase the number of offenders brought to justice. Video evidence provides a compelling account of events and enables the raw emotion and action from a scene to be replayed in the courts in a manner that could never be captured in a witness statement.” He adds, "It also supports accountability and transparency, both of which are key elements in increasing public confidence in policing. The introduction of this new technology is the latest example of our commitment to these principles as we continue to work together with the community to keep people safe." Head-mounted cameras Armed response and firearms teams are also being equipped with head-mounted cameras due to the fact that chest-mounted cameras could potentially obstruct an officer's view during firearms use. The Metropolitan Police recently began rolling-out 1000 head-mounted cameras, with West Yorkshire Police and North Wales Police following suit.
H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. Its most recent transformation project involved an access control system — for its own offices. H-Farm needed a solution to streamline access management for lots of people at a growing portfolio of sites and buildings. H-Farm experiences rapid turnover of users, both because new businesses join regularly and because they organise up to 300 events every year. Battery-powered locks Any new locks would need to extend an existing Axis system, but without adding complexity for day-to-day administration. To meet their needs, H-Farm selected a combination of Aperio® handles, security locks and escutcheons, each easy to retrofit, so day-to-day work at their busy offices would not be disrupted by intrusive installation. So far, 40 Aperio® Online H100 wireless door handles, 6 Aperio® Online L100 wireless locks and 4 Aperio® Online E100 wireless escutcheons have been fitted across multiple H-Farm locations in northern Italy. All Aperio® battery-powered locks are wireless, so no ugly cabling runs to H-Farm’s doors. Because Aperio® offers wide range of battery-powered devices, H-Farm can choose the precise wireless lock for every application: the L100 lock protects doors with high security demands; robust H100 handles suit interior doors with high traffic. Wireless access control Aperio® H100 enables customers to add doors to their access control solution because cost per door is lower H-Farm interior doors are mostly secured with the new Aperio® H100 wireless handle — Intersec’s Access Control Product of the Year in 2018. The Aperio® H100 packs the flexibility and affordability of Aperio® wireless access control into a slim, cleverly designed door handle. Its standard battery slots inside the handle, ensuring a minimal footprint. ASSA ABLOY’s device design team incorporated electronics into the handle lever on the outside of the door, without jeopardising security. Design has become a major feature of the H100’s appeal. H-Farm wanted devices to blend with the contemporary architecture of their new €101m H-Campus development. “Aperio® wireless access control hardware is solid, nice looking and perfectly fits our environment — solving our access problem,” says Alberto Aldrigo at H-Farm. The H100 and other Aperio® devices are easy to install; for the H100, basically two screws complete the job. Going forward, this will enable H-Farm to quickly bring new buildings into the same access system as they expand to fresh locations. The H100 fits around 90% of target doors with two main models: one for left-handled doors, the other right-handed. “The Aperio® H100 also enables customers to add more doors to their access control solution because the cost per door is lower,” says Tania Amico, Aperio® Sales Manager at ASSA ABLOY Italy. Seamless integration H-Farm managers want to control access to site doors, or bring entirely new premises into their access system The open architecture underpinning Aperio® devices enabled easy online integration with their existing Axis system via PRYSM AppControl. Remote operation from a single, central software interface is seamless, which makes administering the system easy. “The PRYSM AppControl software utilizes the integration Axis completed with Aperio®,” says Piergianni Marana, Key Account Manager at Axis. “And the AXIS A1001 Door Controller is based on open hardware, which makes installing and configuring an Aperio® wireless lock easy and seamless.” An Aperio® RS-485 Hub coordinates up to 8 Aperio® locks within a typical range of 15 to 25 meters, communicating with the admin system via the powerful AXIS A1001 IP Network Controller. One AXIS A1001 Door Controller can manage one wired door and one Aperio® hub, up to 9 doors per hub. AES 128-bit encryption ensures communication between lock and system is secure. Online Aperio® integration gives facility managers real-time status information about their premises. Aperio® locks are wireless, so there was no expensive or time-consuming cabling. The AXIS A1001 uses Power over Ethernet (PoE), which eliminates the need for power cables to the controllers, too. If needs change at a facility — perhaps H-Farm managers want to control access to more site doors, or bring entirely new premises into their access system — it’s quick, efficient and easy for an installer to fit Aperio® locks and integrate the doors with the AXIS Entry Manager control panel. To discover whether your existing security system is ready for wireless Aperio® locks, download a free, fast Compatibility Checker at https://campaigns.assaabloyopeningsolutions.eu/aperio-upgrade
PerpetuityARC Training, part of the Linx International Group recently delivers a risk and crisis management workshop for Lafarge Egypt (part of the LafargeHolcim Group) in Cairo. The training provided senior managers from across the organisation with the knowledge and skills needed to manage resources during a crisis and operate within the organisation’s crisis management and compliance framework. The intensive programme was built collaboratively between PerpetuityARC Training and Lafarge Egypt and specifically tailored to its operating environment in the construction materials industry. Achieve successful resolution It was great to see them solving problems in a pressured, but safe environment" In a series of practical and theoretical exercises, Linx International Group Director, Angus Darroch-Warren, assessed and enhanced the ability and confidence of participants to apply their new skills to manage complex and evolving crisis scenarios, each requiring close collaboration between team members, in order to achieve a successful resolution. Security Director at Lafarge, Magdy Khorshid, stated: “The course was amazing, very practical and interesting to all and I received much positive feedback from all learners.” Angus commented: “The Lafarge teams engaged fully with the workshop scenarios. It was great to see them solving problems in a pressured, but safe environment, that allowed them to think through issues and respond using identified resources and procedures.” The workshop is the latest collaboration in a five year relationship between Lafarge Egypt and PerpetuityARC Training. During this time PerpetuityARC Training has delivered its security and risk related courses to employees and stakeholders in Egpyt and the UK.
To succeed in business, one must be brilliant at one thing. In many cases it’s a skill, such as art, coding, engineering or design. Or that one brilliant attribute can also be a personality trait or a business process. No business will be successful unless it is at least adequate, and preferably superb, in product development, sales, and customer engagement - not to mention finance, planning, marketing and recruiting. Too many VMS producers are trying to do all these things themselves when they should be doubling up on what they are best at and leveraging the rest. It is a new mindset. Instead of obsessing about which ‘me-too’ product to supply, software producers could make their first priority finding complementary and compatible partners. Developing a partnership ecosystem One partner might see the opportunity to sell a solution. Another partner might know a better way to distribute a product. A third partner might provide the vertical expertise to get the customer a perfectly tailored solution. By leveraging partners and developing a partner ecosystem, a company will tend to have more unique offerings and the ability to execute faster in an ever-changing world. All this additional partner horsepower is still no guarantee a company will succeed but partnerships will also give a company a feedback channel. Many stand-alone companies plod along, never quite failing, but never getting better either. Partners are less likely to tolerate business limbo. They will be quick to utilise great products, and less wedded to the concept if it doesn’t prove out. Because the partners are in close contact with the market, they are the first responders to changing or developing needs. This is why a company should listen very closely to their partners: They are the feet on the street and the ears to the beat! Open platform matters Producing software takes time, and producing great software takes even longer All of this is not possible, however, if a company produces closed platform software. This is software whose functions can only be changed by the original developers. Producing software takes time, and producing great software takes even longer. This means low agility. The partners might identify great opportunities, but before the closed platform software producer can react, the opportunities might be gone - or worse, be grabbed by competitors. The slow reaction capabilities of closed platform providers will frustrate partners and may lead to the worst of all complications in a partnership: distrust. Add-on modules and intrinsic scripting When the products are based on an open platform, however, they are adaptable. Then the partners have the ability to change the solution through the open software architecture. Not by changing the basic code (that would be open source) but by add-on modules and intrinsic scripting abilities. Total integrated solution Open platform means that the partner can easily extend and enhance the software into a total integrated solution Open platform means that the partner can easily extend and enhance the software into a total integrated solution to fulfill the customer’s needs with the minimum of effort. This gives agility, and agility means fast go-to-market abilities. Just what is needed in this fast-moving world. There are some important things to note here. The ways to extend and enhance the software have to be easy and well documented. The partners must have access to training and knowledge sharing. (It does not help to have a system for extending the capabilities of the software if the partners have to guess at the process and the documentation is rudimentary.) Open access is key It is important that the business philosophy is based on openness, giving the partners full access to all relevant information. And openness is a two-way street: By being open for your partners, you also have to be open about their business. A partner might be able to develop a highly sophisticated solution but be unable to market the solution. By building a catalogue of partner solutions easily accessible to customers, openness extends to ensure open access to the partners. Openness is not something a business can just tack on to their approach. It has to be in the DNA of the business from the start. In a Harvard Business Review article entitled ‘Predators and Prey: A new ecology of competition,’ JF Moore says: “A business ecosystem, like its biological counterpart, gradually moves from a random collection of elements to a more structured community.” Structured business ecosystem Milestone has seen this progression within the company's ecosystem Milestone has seen this progression within the company's ecosystem. They introduced training and certification requirements as part of the partnership success structure, ensuring knowledge is shared and also used in a way that is most mutually beneficial for all involved. Moore also writes: “Every business ecosystem develops in four distinct stages: birth, expansion, leadership and self-renewal.” At present, Milestone and its partners are entering into the ‘leadership’ stage, where video enabling is creating opportunities beyond those offered by a traditional video surveillance system, and into areas that provide additional business benefits to our customers. Video enabling “A leader must emerge in the ecosystem,” Moore says, “to initiate a process of rapid, ongoing improvement that draws the entire community toward a grander future.” This is the role Milestone has played in leading the industry towards the video enabling phase and redefining the industry’s expectations of what a surveillance system is capable of. In the article, Moore underlines that “executives whose horizons are bounded by the traditional industry perspectives will find themselves missing the real challenges and opportunities that face their companies.” Getting connected Connectors are those people with a wide range of contacts across different social circles In his book The Tipping Point, Malcolm Gladwell describes what he calls ‘The Law of the Few,’ which says: "The success of any kind of social epidemic is heavily dependent on the involvement of people with a particular and rare set of social gifts." This is based on the 80/20 principal, “which is the idea that in any situation roughly 80 percent of the 'work' will be done by 20 percent of the participants." He goes on to identify three types of people with these gifts: Salesmen, who are skilled in persuasion and negotiation; Mavens, who collect and disseminate useful information; and Connectors. Connectors are those people with a wide range of contacts across different social circles who can make introductions and create links between otherwise disparate individuals. Milestone, key connector in physical security industry In the wider scheme of things, Milestone effectively acts as a ‘Connector’ in the business ecosystem and in the overall physical security industry. Milestone brings together companies who are brilliant in their respective fields and make it easy for them to work together to create a valuable solution for the customer. The company provides the environment for that to occur and work closely with them to ensure that the end result is useful and effective. At Milestone, partners realised that significant investments in education and training was required to create the demand for the company's products and solutions that the conservative physical security industry required. The value of partnership was learnt and the ‘open’ approach adopted, which was a central part of the thinking behind our software. Adopting the Scandinavian management model Milestone effectively acts as a ‘Connector’ in the business ecosystem and in the overall physical security industry Milestone extended this approach to the entire business model, creating the ecosystem that has been the driving force for success. And while the company embraced the best of the Scandinavian management model, its inclusiveness and encouragement of creativity, they still needed to have the courage to make changes to the business, changes which would ensure the best possible position to take on whatever challenges the future might hold. Milestone partner ecosystem Milestone have always worked in a partner-driven business mode. The company from the start was designed to be open and partner oriented. The Milestone partner ecosystem is a fundamental part of its mindset and daily operations. It is one of the major reasons for getting the company to the position where it is today. To be in a company without the partner component would be like cutting the internet and phone cables while reverting to telex and written paper letters! The company would be developing products in the dark, not knowing the demand. Open business world Today, Milestone's partners are delivering optimal solutions to mutual customers, building a better and open business world with video as a business enhancer. All thanks to the company's open platform and community approach. To have a flourishing partner ecosystem, one must think not as a corporation but in human terms. Because companies don’t think, humans do. In all senses of the word, there is one thing that will contribute more to the success of a partnership than anything else; 'Give before hoping to receive'.
The potential for catastrophic injury in the petrochemical industry makes safety training and credentialing of employees imperative. Coordinating this process for a variety of industries, including many in the petrochemical fields of southern Alabama, is Training Solutions for Construction and Industry (TSCI). The mission of TSCI is to promote and facilitate workforce development ‘by providing industry-recognised training with portable credentials to create a diverse, trained and sustainable workforce’. TSCI provides computer-based and instructor-led training developed by the Association of Reciprocal Safety Councils (ARSC) and based on requirements from the Occupational Safety and Health Act (OSHA) and the U.S. Department of Homeland Security. Within one day, a person can gain all of his or her required training for a year, and it will be accredited. ID cards with encoded results Workers who successfully complete a TSCI safety orientation receive a tamper-proof ID card, encoded with the results of his or her training. “ID cards give students a record of their training and eventual access to a plant,” said Jack Fecas, Operations Manager, TSCI. The card is valid for one year. If other safety or specialised training is completed during that year, the card is encoded with the additional credentials. All member plants of TSCI and ARSC member organisations recognise and accept the ID card. Workers look to TSCI for training in such areas as fire safety, process safety management, confined space entry, respiratory protection, hazardous energy, basic first aid and CPR, scissor lift, scaffolding, excavation and trenching, elevated work surfaces, electrical safety and disaster site safety. The Office of Homeland Security also can set criteria for credentialing, such as asking for drug screen results. Site-specific and fire safety training TSCI provides site-specific training, which might include a focus on fires or explosions at a refinery or dust-particle respiratory safety at a mill In addition to its basic orientation training programs, TSCI provides site-specific training, which might include a focus on fires or explosions at a refinery or dust-particle respiratory safety at a mill. “Some companies using dangerous materials have wind socks to indicate which direction the wind is blowing, telling employees which exit route is safe for use at that time,” said Fecas. “This kind of training needs to be site-specific.” Other site-specific training might include basic alarm system safety, teaching employees what to do when they hear a constant alarm versus what they might do if they hear several short bursts of an alarm. About 1,500 workers take the basic orientation program from TSCI every year, and the numbers are growing. With only one printer, clearly more capacity was needed. Fargo’s DTC550 printer/encoder Fecas knew that his organisation needed more capacity in order to handle the increasing volume, so he began looking for an additional printer – one that was fast, yet reliable. He needed barcode code technology and a printer that could encode new data as workers took additional classes. TSCI found all of the requirements it was seeking in Fargo’s DTC550 Direct-to-Card printer/encoder from ID Wholesaler. Not surprisingly, the security offered by the DTC550 was a primary selling point for Fecas. In addition to being recommended by other ARSC Safety Councils, it just made good business sense. TSCI chose a standard holographic overlaminate available with the DTC550, which improves the card’s durability and reduces the risk of counterfeiting. More than 80 percent of training occurs at the TSCI offices, according to Fecas, but it also can take place at a plant site. With the new DTC550 able to handle the increasing demand at TSCI, the old printer will be used for remote training, thus increasing TSCI’s ability to meet the needs of its customers. Workspace security The common curriculum of our safety training levels the playing field, so when workers leave TSCI they can recognise the hazards in the worksite and protect themselves and their co-workers" “The common curriculum of our safety training levels the playing field, so when workers leave TSCI they can recognise the hazards in the worksite and protect themselves and their co-workers,” Fecas added. “They still have information to learn at the plant, but they are ready to go to work.” “We have had ID cards since we began in 1995,” he said, “but with the early cards, there was much more hand-work. Our operator had to add a photo by hand and then wait for the laminating machine to heat up before the card could be laminated. The evolution has been very interesting. In addition, we have been very pleased with the service provided by the Fargo printer and by ID Wholesaler. I can pick up the phone or send an e-mail, and a representative is available for assistance.” Most secure system “We recommended the DTC550 printer because it is very reliable and has more than one holographic laminate choice,” said Jeff Gunhus, ID Wholesaler Sales Team Leader. “TSCI originally bought just the printer and had to wait until its next budget cycle to purchase the lamination unit. They liked the fact that the Fargo printer had an upgrade path. It is important to listen to our clients’ wants, needs and concerns,” Gunhus added. “Then we simply do our best to help them out.” “If a company is going to do business nowadays, it needs to be secure,” adds Fecas. “Our business relies on plants and regulatory agencies trusting what we do. We need to be on the cutting edge when it comes to information technology. The best system is the most secure system. We made a decision to go with what has been tried and true and working in industry now.”
Government regulations continue to step up security demands at federal agencies, requiring identity cards to support multiple identity assurance factors and be validated at entries into a building or location. Because of the cost and infrastructure that goes along with many security upgrades, federal agencies must wait months or, in many cases, years to implement changes. The Federal Aviation Administration—an operating mode of the U.S. Department of Transportation—is no different. The FAA is tasked with the colossal mission of regulating and overseeing all aspects of civil aviation in the United States. With offices around the world, including its headquarters in Washington, D.C., the FAA has a large number of employees and buildings to oversee. With so many people coming into and out of the buildings each day, it is particularly important that security personnel have reliable tools to validate employee credentials Need of tools for validating employee credentials As part of its security requirements, the FAA must validate Personal Identity Verification (PIV) cards at checkpoints within its facilities. With so many people coming into and out of the buildings each day, it is particularly important that security personnel have reliable tools to validate employee credentials. As recently as a year ago, FAA security personnel were conducting visual inspection of PIV cards at the gates into facilities that did not have PIV card readers. They had no way of telling if the card was authentic, revoked, or if the employee had access rights to a checkpoint at a particular time. At the FAA headquarters, which employs just under 6,000 permanent employees, and another FAA facility, the Minneapolis Air Route Traffic Control Center, which is the organisation’s 11th busiest airport traffic control tower, visual verification just wasn’t enough. Automating the verification process In order to comply with HSPD-12 and the Office of Management and Budget (OMB) Memorandum 11-11, the FAA needed a process beyond visual verification that allowed security personnel to quickly check the authenticity and revocation status of a card, as well as access rights to a particular area of the facility. With as many as 5,000 people coming into the FAA headquarters facility daily, the organisation’s primary goal was to automate the verification process. “The project needed to provide guards the ability to validate PIV cards at FAA facilities where the gates did not have PIV card readers,” said Craig Auguston, HSPD-12 Program Manager at the Federal Aviation Administration. “We also wanted a mobile solution for backup and for roaming guards to be able to validate secure areas, such as parking garages.” Codebench’s OMNICheck Plus software OMNICheck Plus was ultimately decided upon because it is integrated with many physical access control systems including the P2000 The FAA began looking at products that could not only meet its requirements for mobile validation, but also integrate seamlessly with its P2000 security management database from Johnson Controls (JCI), according to Auguston. “This upgrade was important to meet the FAA’s requirement to validate PIV cards at all check points,” Auguston said. The FAA’s former process of visual verification was not allowing security guards to check the status of a PIV card, such as revocation status and specific access rights, both of which the organisation needed to meet its security goals. After testing a couple of mobile software validation programs, the organisation chose OMNICheck Plus software from Codebench, a HID Global Company. OMNICheck Plus was ultimately decided upon because it is integrated with many physical access control systems including the P2000, and it is listed on the GSA’s FIPS 201 Approved Products List as a CAK authentication system when running on an ARM-based mobile device such as the DAP CE3240B, which both FAA facilities use. Giving mobile access to the security guards “They really needed something that was going to allow their security guards to be mobile in certain parts of a facility,” said Botio Mandov of Johnson Controls. Johnson Controls, the integrator for the project, helped the FAA implement a larger security upgrade, which included the security management database and mobile validation software. Together, the FAA’s mobile DAP devices and OMNICheck Plus software enabled roaming security guards to use the mobile handheld devices in FAA parking garages and other entry points that needed to be secured, but do not have stationary PIV card readers. One of the most important aspects of authentication software for the FAA was the ability to check an employee’s access rights directly on the mobile card readers Checking access rights on mobile card readers In addition to mobility, one of the most important aspects of authentication software for the FAA was the ability to check an employee’s access rights directly on the mobile card readers—something only their organisation’s P2000 physical access control system could do previously. With an OMNICheck module called Data Import, certain cardholder information housed in the FAA’s P2000 database, such as access rights, was pushed down into the DAP mobile devices used by security personnel. “Access rights allow FAA security guards to make sure employees’ cards are not only valid, but that they are allowed to be in a certain area at a certain time,” Mandov said. In addition, FAA security administrators can run audit reports that show which cards were checked and when. The implementation took about five months, including testing the interface with the access control system and coming up with a training guide for the security guards, according to Auguston. The FAA is currently using 31 DAP CE3240B mobile readers with OMNICheck Plus. Saving money by eliminating physical parking passes Prior to the OMNICheck Plus installation, FAA security personnel had an unreliable way of authenticating PIV cards and access rights. Now, security personnel are able to verify digital certificates, revocation status and access rights, all while having an audit trail of the cards checked in the system. An additional, unexpected benefit for the FAA has been the cost savings of eliminating physical parking passes at its two facilities. “We are able to positively identify cardholders’ status when they try to enter the facility. We were able to save money by eliminating the physical parking pass by using OMNICheck to validate cardholder’s status for parking in FAA-controlled facilities,” Auguston explained.
Round table discussion
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?
Even the most advanced and sophisticated security systems are limited in their effectiveness by a factor that is common to all systems – the human factor. How effectively integrators install systems and how productively users interface with their systems both depend largely on how well individual people are trained. We asked this week’s Expert Panel Roundtable: What is the changing role of training in the security and video surveillance market?
Reducing the cost of video surveillance system deployment and operationDownload
RFID and smartphone readers in physical access controlDownload
Access control & intelligent vehicle screeningDownload
Genetec to host its first virtual tradeshow Connect’DX 2020 to connect with physical security professionals