Qualification & Training
Linx International Group, the global provider of security, risk management, consultancy and training services, has announced the appointment of Group Marketing Manager, Jerry Alfandari and Marketing Coordinator, Victoria Carter. Video production experts Fluent in both English and German, Jerry Alfandari has a proven track record managing international marketing campaigns, including social and digital content strategies. He is joined by Victoria Carter, who brings her expertise in social media,...
Openpath, a pioneer in workplace technology and security, unveils at ISC West 2019 its new Elevator Board and Partner Portal to provide channel partners, property managers and tenants with even more comprehensive and convenient office security systems. Elevator Board enables Openpath to connect commercial spaces under a single, streamlined and secure mobile access system. And now, with Partner Portal, integrators can access best-in-class training and education online, enabling them to easily im...
Tavcom Training, part of Linx International Group, has been chosen by leading alarm manufacturer Texecom to assist in providing professional training for installers. Through the Texecom Academy online portal, installers have the opportunity to gain a BTEC Level 3 intruder alarms qualification developed in conjunction with Tavcom Training. BTEC Level 3 Intruder Alarms course Wayne Foster, Technical Services Manager at Texecom states “Texecom Academy benefits our installers by giving them...
Interlogix, global provider of security and life-safety solutions, has re-launched its Interlogix Security Pro program, a premier national channel partner program offering Interlogix dealers a wide array of resources and incentives designed to help them successfully grow their businesses. Interlogix is a part of Carrier, a leading global provider of innovative heating, ventilating and air conditioning (HVAC), refrigeration, fire, security and building automation technologies. “The I...
Aiphone, global international manufacturer of intercom and security communication products, announces its new Elite Dealer program that offers qualified dealers a range of incentives designed to help them grow their businesses. Aiphone Elite Dealer program Effective April 1, 2019, the program offers four award levels – Bronze, Silver, Gold and Platinum with each program tier designed to meet the needs of Aiphone dealers with businesses of various sizes. Aiphone Elite Dealer benefits vary...
India’s foremost shop window and business hub for the security industry, Secutech India, is set to return from 25 – 27 April 2019 against a backdrop of rising government investment in smart city projects. Jointly organised by Asian Business Exhibition and Conferences Ltd (ABEC) and Messe Frankfurt Trade Fairs India Pvt. Ltd, the 2019 edition of the fair will introduce a new smart home zone to accommodate India’s growing home automation sector. Indian security indu...
ONVIF, the global standardisation initiative for IP-based physical security products, announced that it will be a featured speaker at the upcoming PSA TEC 2019, the premier education and networking event for systems integrators, to be held March 11-14, in Denver, Colorado. To highlight the role of access control in the burgeoning smart building market, David Busco of Anixter will present on behalf of ONVIF in the session “Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success” from 1 – 2pm on Tuesday, March 12. The session will explore why interoperability standards and an open platform approach to access control are becoming necessary components of an intelligent building. Education and certification programs Being able to receive and export data in a universal manner is the key to realising the potential of a smart facility"“Common interfaces such as ONVIF are necessary to standardise the communication pathways between different sensors and management platforms for current and future IoT functionality,” said Per Björkdahl, chair of the ONVIF Steering Committee. “Being able to receive and export data in a universal manner is the key to realising the potential of a smart facility.” TEC 2019 features education and certification programs as well as networking opportunities and dedicated exhibit hours designed to advance the skills of industry professionals. TEC 2019 provides invaluable sessions with dedicated learning tracks. Over 100 sessions and workshops are being offered to attendees during the three day event. A security industry veteran of more than 13 years, Busco serves as Director of Marketing for Global Security Solutions at Anixter, a long time ONVIF member company that is active in many areas of the technical development of ONVIF specifications.
Linx International Group, the global provider of security, risk management, consultancy and training services, has announced the promotion of Sarah Hayward-Turton to the role of Director of Sales and Marketing for the group that includes Tavcom Training, PerpetuityARC Training and Linx Consultancy. Joining the Linx International Group in 2014 as a Client Relationship Manager, Sarah was leading the sales team within two years and now takes the lead as Director of Sales and Marketing. Sarah’s dedication to the security industry sees her taking an active role in supporting the work of ASIS UK Young Professionals, an initiative that supports security professionals under the age of 40 and with less than five years’ experience in the industry. She has also successfully completed PerpetuityARC’s Security Coordination & Management (BTEC Level 4). Expanding global presence for training Through our training businesses, we are dedicated to nurturing and developing talent in the security industry"Sarah comments: “This year, not only are we continuing to develop highly relevant courses and pioneering how they are delivered in the classroom and through e-learning, but also expanding our global presence for training and consultancy.” Director of Group Operations at Linx International Group, Ciaran Barry, states: “Through our training businesses, we are dedicated to nurturing and developing talent in the security industry and Sarah’s career trajectory at the Linx International Group is a great example of practising what we preach.” Security professionals interested in developing their careers through world-class training courses are invited to attend The Security Event 2019 and the Linx International Group Education Theatre. Taking place from 9th – 11th April, the free-to-attend theatre will deliver a three-day programme, offering practical training tips and guidance for security installers and integrators.
Securitas UK has been officially recognised as a Top Employer by the Top Employers Institute for its commitment to delivering exceptional people management and HR strategies. Top Employers are organisations of the highest calibre that have worked hard to create, implement and progress people strategies, through innovative and engaging programmes, which empower and develop their employees. In order to be certified as Top Employer, Securitas had to achieve the minimum standard as set out by the Top Employers Institute across ten key topics: Talent Strategy, Workforce Planning, Talent Acquisition, On-boarding, Learning & Development, Performance Management, Leadership Development, Career & Succession Management, Compensation & Benefits and Culture. Security and protective services expert Securitas UK is the only security and protective services company to be accredited by the Top Employer Institute Securitas UK is the only security and protective services company to be accredited by the Top Employer Institute. Brian Riis Nielsen, Country President, Securitas UK spoke about what it means to be a Top Employer: “Securitas is leading the transformation of the security industry from traditional guarding to a much broader spectrum of protective services delivered by better trained and engaged teams. Although technology is an increasingly important part of our operation, our on-site, mobile and remote security officers remain the backbone of our business." He added, "Our people, and how we look after them, lay at the heart of this transformation. Our talented, professional officers excel at keeping our clients’ people, property and assets safe. In return we have made a commitment to provide the very best employee experience, offering a rewarding career pathway which will help shape the next generation of security professionals.” Securitas employee excellence model We will continue to invest in our Securitas employee excellence model and offer our people the very best, industry leading, employee experience"Grainne Kelly, HR and Security Operations Centre Director explained, “We are delighted to be officially recognised as a Top Employer. From our online, end-end recruitment and selection processes, to our in-house City & Guilds accredited Learning and Development Academy, and our focus on talent and career succession planning, we are proud of the collaborative and innovative working practices we are delivering for the benefit of all our employees. "We will continue to invest in, and refine, our Securitas employee excellence model and offer our people the very best, industry leading, employee experience. Our Top Employer certification proves that we are well on our way to achieving this.” David Plink, CEO, Top Employer commented, “We believe that the 2019 Certified organisations demonstrate exceptional employee conditions and encourage the development of these practices by putting their people first. These companies help enrich the world of work with their outstanding dedication to HR excellence and because of this, they are recognised as an employer of choice.”
DHF (Door & Hardware Federation) announces that it has introduced more robust procedures for companies wishing to join its membership following a ‘bumper year’. The Tamworth-based trade association is renowned industry-wide for its tireless and on-going efforts in raising standards and levels of safety across the sector, and this latest pronouncement is further testament to these continuing endeavours. Legally compliant products The new procedures, which started on 1st October following a tremendous boost in membership since 2017, will mean that all companies wishing to apply for membership will, initially, be referred to as affiliate members until, in the case of applicants involved in automated gates, industrial doors and garage doors, at least one ‘responsible’ person (who can implement changes) in the company has completed the relevant DHF two-day Diploma course(s). We are understandably delighted by the swell in membership but determined that ‘quality’ should not be compromised in any way by ‘quantity’" Whilst affiliate members, companies will be unable to use the DHF logo or appear on the DHF website. Furthermore, all companies applying for membership will also undertake a new Company Compliance Assessment (CCA), a checklist of legal and compliancy requirements specific to the product, and usually involves a visit to their premises by a member of DHF’s experienced training and compliance team and/or a visit to a recent installation, to ensure the company is supplying and installing safe and legally compliant products. Rigorous processes Once these requirements have been satisfied, the applicant company will become a full member and be able to use the DHF logo, be displayed on the DHF website and utilise the many benefits available to members. “As an organisation, DHF is renowned for its rigorous processes in allowing new members into the federation, and following a recent surge in membership numbers, we are determined to maintain that positive reputation,” explains Commercial Manager, Patricia Sowsbery-Stevens. “We are understandably delighted by the swell in membership but determined that ‘quality’ should not be compromised in any way by ‘quantity’.” Increase in compliance assessments DHF’s strapline is Raising Standards, Safety Assured, and these new measures demonstrate our continuing commitment to this benchmark" Being a member of DHF means something. Safety, compliance and legal responsibility lie at the very heart of what we do, so it is essential that we continue to retain the very high standards for which we are recognised across the industry. It is vital that both new – and existing – members adhere to the principles and values of the association in meeting these requirements. “So far, the new processes have received the full backing and encouragement of our current members and those wishing to join DHF. Going forward, we will also be increasing the number of company compliance assessments carried out on existing members. DHF’s strapline is Raising Standards, Safety Assured, and these new measures demonstrate our continuing commitment to this benchmark.”
Ivory Egg, specialists in KNX intelligent building technology solutions, have announced the launch of a brand-new training program for 2019 in order to help system integrators develop all the skills they need to sell, specify, commission and maintain KNX projects. New Sales & Specification Course Following the release of the KNX Association’s update to the standardised KNX Basic and Advanced Courses, Ivory Egg have taken the opportunity to refresh their entire training program, including introducing a brand-new course developed specifically for the UK integrator. Developed exclusively by Ivory Egg, the primary aim of this new Sales & Specification Course is to make winning and designing your first project easier and more productive. Residential KNX systems A wide range of topics are covered in this convenient one-day course, including constructive methods for selling KNX systems A wide range of topics are covered in this convenient one-day course, including constructive methods for selling KNX systems, what information is required to know and relay to other parts in the building process, alongside the correct product specifications when facilitating a residential KNX system. The new Sales & Specification Course is designed to be run in parallel with the KNX Basic Course, yet is suitable for anyone looking to sell, quote or design KNX projects quickly and/or autonomously. KNX Basic Course After the success of the split Technician and Partner courses, Ivory Egg have decided to return to the standard format of the KNX Basic Course, following the much-needed changes by the KNX Association. These changes recognise that some of the content was better suited to the advanced course, which means the Basic course is now more focused on key skills and programming. Ivory Egg are running the course over 4 days instead of 5, ensuring as little time is spent away from work as possible. A recognised industry standard, completion of the KNX Basic course allows you to become a KNX Partner and this course is perfectly suited to integrators and electricians looking to develop their KNX skills and market reach. Updates to the KNX Heating Course In addition to the new Sales & Specification course, Ivory Egg has also updated its Heating Course In addition to the new Sales & Specification course, Ivory Egg has also updated its Heating Course. Unlike other KNX heating courses, this training program has been created specifically for the UK market and covers the systems you will typically find on a British project. This course focuses on how a KNX heating system works, which products to specify and most importantly, how to configure them. Ivory Egg’s new Heating Course also encompasses information about the control of cooling systems and more advanced BMS solutions for intelligent building management. Offering a comprehensive understanding of what can be controlled, you will be able to confidently adapt to demanding situations, typical of real word projects. KNX Advanced Course The last step in the program is the Advanced course, suitable for KNX Partners who are looking to further develop their skills. Taking a deeper look at how KNX works, this course includes how to integrate KNX with advanced systems like DALI, BMS and Logic. It also takes a more in-depth look at how KNX works including IP communication and the exciting KNX Secure solution which makes KNX a market leader in encrypted building automation. Completing this course will enable an integrator to join an elite few worldwide who have updated their KNX Partner status to Advanced. Mark Warburton, Technical Director at Ivory Egg, says “We are incredibly excited to launch these new courses for 2019, along with the recently updated KNX Basic and Advanced courses. Finding new ways to share the knowledge and resources we have built up over 15 years is one of our key focuses for the future, so it’s great to be able to integrators new course and content. By supporting integrators with focused courses alongside the standard KNX courses, we believe they will be able to win more projects and deliver them quicker”.
People and vehicle access control specialist, Nortech’s technical training courses have been specially designed to make sure that installers/system integrators are equipped with the skills and knowledge needed to install, maintain and troubleshoot Nortech systems. Real-world security issues Led by highly experienced technical experts, Nortech’s courses combine hands-on practice with theoretical sessions covering real-world security issues and take place at the company’s dedicated training facility in South Wales. Nortech is committed to providing an outstanding customer experience with its products and services. As part of this commitment, it offers a range of in-depth training in access controllers, readers and ID devices, and long-range identification, ideal for those with sound knowledge and experience in people and vehicle access systems. The courses provided include Long range identification training begins with vehicle tagging and ANPR systems Nortech products overview, which focuses on Nortech’s access control products, card readers, ID devices, long range identification, vehicle counting and parking management products. Access Control: The modules cover the access control products, Norpass installation and Nortech Reader Interface installation. The final module progresses into the installation and configuration of NRI products. Long range identification training begins with vehicle tagging and ANPR systems. Other modules in the programme discuss the installation and configuration of the ANPR, uPASS and Transit ranges. Vehicle detection and parking training includes learning about Nortech’s popular Feemaster Smart and the company’s counting and count management products. The installation and configuration of the Feemaster Smart Console, entry and exit stations and an overview of the inductive loop detector operation, applications and set up of Nortech’s parking detectors are all included. Readers and ID devices installation training for each reader and ID device supported by Nortech is also available. Training is free to all existing account customers. In addition, every participant will receive a comprehensive pack of product specifications, application notes and a certificate of completion.
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research programme to provide valuable feedback to the GSA Schedule 84 programme and on to the GSA central office. The director of GSA Region 7 Schedules Program, the Schedule 84 Branch Chief and the Category Manager Subject Matter Expert who manages our suppliers' panel gave us their full attention as we discussed the successes of the programme, hot topics, problems and the future. We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort and renewed enthusiasm Innovative review team We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort, renewed enthusiasm and productive changes building upon the successes of 2017. There was high praise for the accessibility to the Schedule 84 staff. Their consistent quick response to questions and concerns, thinking outside the box and supporting the programme by partnering with their contractors was much appreciated. There has been a renewed spirit of partnering to cooperatively bring the best to agency customers. It seems to be working as per the Centre Director sales are growing for GSA Schedule 84. Advocating for the security industry In my experience, business development starts with the Administrator from Region 7 in Ft. Worth, TX. As the annual Schedule 84 Industry Day at the SSAC begins he is shaking every hand and passing out his cards looking folks right in the eye asking, “how can I help you?” They have the best practices and most organised paperwork. The SSAC director has chosen well in her staff and is hands-on in every endeavour to direct things along when challenges occur or to improve the programme. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry It continues with the centre’s CASE Manager encouraging the contractors at events, visiting agency customers and promoting the GSA Schedules Program by helping coordinate the partnering. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry for adding new technology, meeting with industry associations, understanding the complexity and challenges of Homeland Security Presidential Directive 12 (HSPD12) and advocating for the purchasing Physical Access Control Systems (PACS) utilising the appropriate standards and the GSA Program among other innovations. As far as the supplier panel, we gave our GSA Schedule 84 team and leaders high praise for 2018. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List Changes in the GSA programme Some changes this year in certain GSA programmes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) developed to assist with solution procurements. This new SIN was added to Schedules 03FAC, 56, 70, 71, 00Corp, 738X and 84. Under Schedule 84 it is SIN 84-500. GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex Essentially this SIN allows agencies procuring under the aforementioned GSA Schedules’ programmes to purchase and the contractor to add items and services not known prior to the task as a Contract Line Item Number (CLIN) not to exceed 33% of the order. For more information and FAQs on OLMs go to www.gsa.gov/olm. This is not to take the place of “Open Market” items for adding products only that are not listed on a company’s GSA Contract. Physical access control products Previously, GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex for the agencies. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List according to the standards created under FIPS201. These products appear under SIN 246 35-7 after being tested and approved by GSA. To be qualified to install these products under the GSA Program at least one individual from the GSA Contractor company must complete the class and be CSEIP certified before applying for labour SIN 246 60-5. Additionally, the company must demonstrate certain qualifications and have past performance for this type of work. The Security Technology Alliance offers the training class and certification. Certified individuals and approved products are listed at www.idmanagement.gov. Companies listed with SIN 246-35 7 and SIN 246-60 5 may be found by searching at www.gsaelibrary.gsa.gov. Updates to guidance for procurement Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide. The ordering guide posted at www.gsa.gov/firesecurity is a valuable support tool created to assist agencies with understanding the requirements of FIPS201 and procuring a PACS. The guide includes relevant regulations, FAQs, sample systems designs, sample statements of work, a list of key points of contract for additional help and questions. In partnership with GSA and guided by the GSA Ombudsman group, the Security Industry Association and the Security Technology Alliance members and their contractor companies participated in a GSA Reverse Industry PACS Training Day on September 17, 2018. We presented from an industry perspective important fact on PACS system requirements, procurement planning, providing information on resources and further educating with panel discussions, individual presentations and amusing skits to over 300 Government agency staff and acquisition specialists. You can find some of the unedited recording of the PACS Reverse Industry Day Training on YouTube. Some changes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) GSA Schedules Program A hot topic about the GSA programme for 2018 was also an issue for the prior year. The GSA Schedules Program is a streamlined contracting vehicle incorporating specific Federal Acquisition Regulations for more efficiently purchasing commercial items. Companies may apply per a continuous open season for a 5-year contract with three 5-year options to renew. Contractors are vetted for past performance, corporate experience and financial capability. Products and services are considered for offering to Federal, State and Local customers (for Schedule 84) with pricing that is determined to be fair and reasonable through negotiations with GSA. To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor as well as the competition of identical or similar item pricing. The most vocal complaint of concern from the contractors was regarding the consideration of competitor contractors offering identical items with out-of-date pricing or holding a Letter of Supply not authorised by the manufacturer. GSA pricing tool Since the GSA utilises a pricing tool to determine if the pricing offered is competitive, a rogue competitor can cause a pricing action to possibly be rejected due to out of date information even as the manufacturer offers an update of the product. This is an issue on all GSA Contracts that the supplier panel hopes will be reconsidered by GSA policymakers at the central office. Most of us believe the Letters of Supply should only be issued by the manufacturer or with documented specific permission of the manufacturer to a reseller. Manufacturers may want to have a better understanding of the Letter of Supply, how it is considered by GSA and more carefully choose their Government partners for experience and compliance. Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy Overcoming challenges for the security community Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy. GSA eBuy is an online Request for Quotation (RFQ) programme that is for GSA Contract holders only. Agencies will post their requirements by Special Item Number for at a minimum 48 hours. Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract. GSA Participating Dealers may take orders on behalf of a manufacturer if they are authorised under the manufacturer’s GSA Contract. They may also have an online PO Portal to receive orders. But they have no access to GSA eBuy to response to RFQs. Usually, under these arrangements, the manufacturers do not respond directly, so there is a problem using GSA eBuy for opportunities as their GSA Participating Dealers have no access to respond. GSA Schedule 84 leadership In some instances, a contracting officer may allow an emailed quotation. However, with the use of the electronic ordering system, this has become a common problem we hope to bring to the attention of policymakers. Some changes to the programmes may make the presentation of documentation more effective going forwardThe GSA Schedule 84 leadership has been helpful to explain the challenges to the agencies to try and resolve such issues. So, what’s up for 2019? GSA modernisation is coming. There will be improvements to their tools and more consolidations of SINs and more. There have been discussions of a revival of the GSA Expo. The Expo offered training for contracting staff both Government and private industry. Valuable tools for vendor training Equally important is the networking, meetings and the exhibits of the contractors. Expos have been discontinued since 2012 but smaller events have been growing as well as online webinar training. Webinars are valuable tools for GSA and vendor training, but they do not take the place of being able to meet your customers face-to-face. GSA online eOffer and eMod programme have made processing actions more efficient. Some changes to the programmes may make the presentation of documentation more effective going forward. The GSA online website for viewing the items on the GSA Contract and for purchasing items, GSA Advantage could definitely use an update as it has been basically the same for 20 years. Keep an eye on GSA Interact for the latest happenings with GSA.
Brexit will bring sweeping changes to the way the UK not only interacts internationally, but also internally. With the country standing alone with regards to trade and exports, it is vital for us to be fully prepared. However, there is one area that I think needs much greater scrutiny—the UK technical skills gap. Tellingly, there is a palpable shortage of technical training and skills right across the UK economy. With the country’s economic strength relying heavily on cutting-edge technology and knowledge, the UK security industry has particular reason to be anxious of movement restrictions on internationally sourced expertise and resources, as well as a potential ‘brain-drain’ of domestic talent. There is a lack of quantity and quality of home-grown talent in the pipeline, and there is a greater availability of talent from overseas Need for security education There are two distinct aspects that need to be addressed when you look at the requirements of the UK economy with regards to technical expertise. First of all, there is the quantity and quality of home-grown talent in the pipeline, and secondly, there is the availability and desire of talent from overseas wanting to work in the UK. In my own experience, it can be quite a challenge finding the best technical expertise (in the numbers needed) from the UK alone. Currently, alongside our British employees, our business employs a sizable amount of international security talent, ensuring we can fill key roles with exactly the right people. As well as sourcing expertise from abroad, I passionately believe we need to properly support and educate the next generation of UK security professionals too, ensuring we can also find the right talent closer to home in the future. T-Levels provide valuable business experience which can be lacking in traditional academic courses Technology-level training for modern needs It is frustrating to see the current skills gap—particularly as I felt the UK Government began moving in the right direction when it reintroduced the excellent national apprenticeships scheme a few years ago. There is no doubt we will always need excellent academic qualifications and people trained in research and development, but equally a stint in further education is certainly not for everyone! Undoubtedly apprenticeships are an excellent way of encouraging hungry young talent into any industry with on-the-job training. Importantly, this isn’t just academic training either—it also provides valuable business experience too, which can be lacking in more traditional academic courses. There has also been a lot of interest in ‘T-Levels’ in the UK. These are technology level courses that are designed to offer specific training for modern technology needs. It is very encouraging to see the promotion of technology education in this way, designed to appeal to students that are looking for a solid career in the UK technology sector. Apprenticeships are an excellent way of encouraging hungry young talent into any industry with on-the-job training Focus on engineering and vocational education Unfortunately, it seems the UK is still somewhat behind our European cousins when it comes to technology education and training. Germany, for example, is a country that has traditionally excelled in these areas. The education system in Germany has heavily focussed on engineering and vocational-based training programmes, which has seen noticeable benefits for its technology sector. The Germans have continued to focus on this for decades, meaning the country’s economy has an excellent pipeline of well-trained talent available. Taking this approach would greatly enhance training in the UK too, supporting up-and-coming talent and helping the next generation reach its potential. A healthy influx of highly talented individuals from across Europe has helped to fill the UK skills gap over recent decades Meeting business and technology needs A healthy influx of highly talented individuals from across Europe has helped to fill the UK skills gap over recent decades. Undoubtedly, like many British businesses we have significantly benefited from this open and vibrant skills market. With the fine details of Brexit being negotiated at the moment, I hope this valuable source of skilled professionals won’t be denied to UK businesses. Even if there are more stringent controls moving forward, the UK must continue to open its doors to this expertise—certainly until we can reap future generations of home-grown talent. It’s interesting (and somewhat ironic) that when you look at some UK universities’ engineering faculties, they often have half or over half of their students from other countries. The UK has world-renowned education facilities that we should be proud of, and yet paradoxically, we are still not educating enough UK engineers. There is a keen interest in technology from younger generations that needs to be nurtured Skill-based training for economic growth International trading and people movement will change after Brexit, but I hope there will also be a significant evolution in the education system to close the UK skills gap. The UK has some of the best educational establishments in the world and a long history of innovation and entrepreneurial skills to make our technology highly commercial. Frustratingly, there is a keen interest in technology from younger generations—just look how addicted young people are to their screens. This keen interest needs to be nurtured and career choices in technology encouraged. With the right training opportunities in place (university education, apprenticeships and T-Levels), the UK can easily implement the tools to create the right opportunities. However, what is really needed now is an impetus from political leaders to address training needs and ensure the economy continues to develop and grow to meet the challenges ahead.
What a year it’s been! 2017 has been a monumental period of product innovation and growth for Pivot3. The company experienced a more-than-50-percent increase in bookings from Q2 to Q3 this year, including a record number of million-dollar orders. We also saw deals supporting multiple use cases more than double, and experienced continued growth in the video surveillance market, driven by new product enhancements and contracts worth more than $1 million. We have also invested in building an influential group of surveillance-focused experts internally, and increased our focus on building strong partnerships with major VMS players, key systems integrators and other aligned-technology providers, such as Iron Mountain and Lenovo. A more robust industry It wasn’t only Pivot3 that had a healthy year; the industry, as a whole, is robust. Investment in technology is growing in markets ranging from public sector organisations, municipalities, gaming and transit agencies — all seeking technology solutions that drive value, increase intelligence and reduce risk. It is the drive for data that propels the video surveillance industry forward. A respected industry thought leader said recently that “data is the modern currency,” and video is the most prominent Big Data application in the world (by far). Those vendors and installers that understand how to help organisations capture, analyse and leverage data will be the ones who secure their future in the marketplace. A respected industry thought leader said recently that “data is the modern currency" Honest predictions Last year, I predicted that cybersecurity would become of greater importance to our market and that prediction was on point. Data security has become the number one concern in the industry, widely because users are moving back to more-trusted brands that focus on implementing cybersecurity protocols into network devices. In the coming year, cybersecurity will continue to be a primary focus — and it must be — for all product vendors, integrators and end-users. The adoption of standards and guidelines around data security for physical security technology will be imperative to ensuring data integrity. An era of evolution Over the past year, deep learning and artificial intelligence have become some of the most quoted buzzwords. Organisations see the value in leveraging these trends to analyse data more efficiently, and because of recent market innovations, we see a real impact an analytics effectiveness. Additionally, we have seen more and more large organisations migrate more of their security function to the cloud. Today, private-cloud architecture is no longer novelty; it is expected, and despite some well-publicised breaches, the public cloud is now considered more secure than some traditional on-site solutions. Cloud-based systems will be deployed much more frequently across some market segments, from SMEs to larger enterprises The year to come As 2018 approaches, I expect to see many of these same trends accelerate even further. Cloud-based systems will be deployed much more frequently across some market segments, from SMEs to larger enterprises. AI will become more mainstream, and analytics solutions will become more advanced. Overall, we at Pivot3 look forward to another strong growth period and seeing the continued evolution of the market as we swing into another year.
Cybersecurity talk currently dominates many events in the physical security industry. And it’s about time, given that we are all playing catch-up in a scary cybersecurity environment where threats are constant and constantly evolving. I heard an interesting discussion about cybersecurity recently among consultants attending MercTech4, a conference in Miami hosted by Mercury Security and its OEM partners. The broad-ranging discussion touched on multiple aspects of cybersecurity, including the various roles of end user IT departments, consultants, and integrators. Factors such as training, standardisation and pricing were also addressed as they relate to cybersecurity. Following are some edited excerpts from that discussion. The role of the IT department Pierre Bourgeix of ESI Convergent: Most enterprises usually have the information technology (IT) department at the table [for physical security discussions], and cybersecurity is a component of IT. The main concern for them is how any security product will impact the network environment. The first thing they will say, is “we have to ensure that there is network segmentation to prevent any potential viruses or threats or breaches from coming in.” The main concern for IT departments is how any security product will impact the network environment”They want to make sure that any devices in the environment are secure. Segmentation is good, but it isn’t an end-all. There is no buffer that can be created; these air gaps don’t exist. Cyber is involved in a defensive matter, in terms of what they have to do to protect that environment. IT is more worried about the infrastructure. The role of consultants and specifiers Phil Santore of DVS, division of Ross & Baruzzini: As consultants and engineers, we work with some major banks. They tell us if you bring a new product to the table, it will take two to three months before they will onboard the product, because they will run it through [cybersecurity testing] in their own IT departments. If it’s a large bank, they have an IT team, and there will never be anything we [as consultants] can tell them that they don’t already know. But we all have clients that are not large; they’re museums, or small corporations, or mom-and-pop shops. They may not be as vulnerable from the international threat, but there are still local things they have to be concerned about. It falls on us as consultants to let them know what their problems are. Their IT departments may not be that savvy. We need to at least make them aware and start there. Wael Lahoud of Goldmark Security Consulting: We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels. At the procurement stage, we as consultants must select and specify products that have technology to enable cybersecurity, and not choose products that are outdated or incompatible with cybersecurity controls. We also see, from an access control perspective, a need to address weaknesses in databases. Specifying and having integrators that can harden the databases, not just the network itself, can help. The impact of physical security products on the network environment was a dominant topic at the MercTech4 consultants roundtable discussion The need for standards on cybersecurity Jim Elder of Secured Design: I’d like to know what standards we as specifiers can invoke that will help us ensure that the integrator of record has the credentials, knows what standards apply, and knows how to make sure those standards are maintained in the system. I’m a generalist, and cybersecurity scares the hell out of me.We’re not just talking about access to cameras, we are talking about access to the corporate network and all the bad things that can happen with that. My emphasis would be on standards and compliance with standards in the equipment and technology that is used, and the way it is put in. It can be easier for me, looking at some key points, to be able to determine if the system has been installed in accordance. We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels"I’m taking the position of the enforcement officer, rather than the dictator. It would be much better if there were focused standards that I could put into the specification— I know there are some – that would dictate the processes, not just of manufacturing, but of installation of the product, and the tests you should run accordingly. Pierre Bourgeix: With the Security Industry Association (SIA), we are working right now on a standard that includes analysed scoring on the IT and physical side to identify a technology score, a compliance score, a methodology, and best-of-breed recommendation. Vendor validation would be used to ensure they follow the same process. We have created the model, and we will see what we can do to make it work. Terry Robinette of Sextant: If a standard can be written and it’s a reasonable process, I like the idea of the equipment meeting some standardised format or be able to show that it can withstand the same type of cyber-attack a network switch can withstand. We may not be reinventing the wheel. IT is the most standardised industry you will ever see, and security is the least standardised. But they’re merging. And that will drive standardisation. Jim Elder: I look to Underwriters Laboratory (UL) for a lot of standards. Does the product get that label? I am interested in being able to look at a box on the wall and say, “That meets the standard.” Or some kind of list with check-boxes; if all the boxes are checked I can walk out and know I have good cybersecurity threat management. IT is the most standardised industry you will ever see, and security is the least standardised" The role of training Phil Santore: Before you do any cybersecurity training, you would need to set the level of cybersecurity you are trying to achieve. There are multiple levels from zero to a completely closed network. Wael Lahoud: From an integrator’s perspective, cybersecurity training by the manufacturer of product features would be the place to start – understanding how to partner the database, and the encryption features. We see integrators that know these features are available – they tick the boxes – but they don’t understand what they mean. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation. That would be a good starting point. The role of integrators Wael Lahoud: Integrators like convenience; less time means more money. So, we see some integrators cut corners. I think it is our role (as consultants) to make sure corners are not cut. If you rely solely on integrators, it will always be the weak password, the bypass. We have seen it from small projects to large government installations. It’s the same again and again. Even having an internal standard within an organisation, there may be no one overseeing that and double-checking. Tools will help, but we are not there at this point. I will leave it up to manufacturers to provide the tools to make it easy for consultants to check, and easier for integrators to use the controls. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation - so training is very important The impact of pricing Pierre Bourgeix: The race to the cheapest price is a big problem. We have well-intended designs and assessments that define best-of-breed and evaluate what would be necessary to do what the client needs. But once we get to the final point of that being implemented, the customer typically goes to the lowest price – the lowest bidder. That’s the biggest issue. You get what you pay for at the end of the day. With standards, we are trying to get to the point that people realise that not all products are made the same, not all integrators do the same work. We hope that through education of the end user, they can realise that if they change the design, they have to accept the liability.It’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it" The big picture Wael Lahoud: The Windows platform has a lot of vulnerabilities, but we’re still using it, even in banks. So, it’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it. That’s where the cybersecurity program comes into play. There are many vulnerable products in the market, and it’s up to professionals to properly secure these products and to design systems and reduce the risk. Pierre Bourgeix: The access port to get to data is what hackers are looking for. The weakest link is where they go. They want to penetrate through access control to get to databases. The golden ring is the data source, so they can get credentialing, so they can gain access to your active directory, which then gives them permissions to get into your “admin.” Once we get into “admin,” we get to the source of the information. It has nothing to do with gaining access to a door, it has everything to do with data. And that’s happening all the time.
To succeed in business, one must be brilliant at one thing. In many cases it’s a skill, such as art, coding, engineering or design. Or that one brilliant attribute can also be a personality trait or a business process. No business will be successful unless it is at least adequate, and preferably superb, in product development, sales, and customer engagement - not to mention finance, planning, marketing and recruiting. Too many VMS producers are trying to do all these things themselves when they should be doubling up on what they are best at and leveraging the rest. It is a new mindset. Instead of obsessing about which ‘me-too’ product to supply, software producers could make their first priority finding complementary and compatible partners. Developing a partnership ecosystem One partner might see the opportunity to sell a solution. Another partner might know a better way to distribute a product. A third partner might provide the vertical expertise to get the customer a perfectly tailored solution. By leveraging partners and developing a partner ecosystem, a company will tend to have more unique offerings and the ability to execute faster in an ever-changing world. All this additional partner horsepower is still no guarantee a company will succeed but partnerships will also give a company a feedback channel. Many stand-alone companies plod along, never quite failing, but never getting better either. Partners are less likely to tolerate business limbo. They will be quick to utilise great products, and less wedded to the concept if it doesn’t prove out. Because the partners are in close contact with the market, they are the first responders to changing or developing needs. This is why a company should listen very closely to their partners: They are the feet on the street and the ears to the beat! Open platform matters Producing software takes time, and producing great software takes even longer All of this is not possible, however, if a company produces closed platform software. This is software whose functions can only be changed by the original developers. Producing software takes time, and producing great software takes even longer. This means low agility. The partners might identify great opportunities, but before the closed platform software producer can react, the opportunities might be gone - or worse, be grabbed by competitors. The slow reaction capabilities of closed platform providers will frustrate partners and may lead to the worst of all complications in a partnership: distrust. Add-on modules and intrinsic scripting When the products are based on an open platform, however, they are adaptable. Then the partners have the ability to change the solution through the open software architecture. Not by changing the basic code (that would be open source) but by add-on modules and intrinsic scripting abilities. Total integrated solution Open platform means that the partner can easily extend and enhance the software into a total integrated solution Open platform means that the partner can easily extend and enhance the software into a total integrated solution to fulfill the customer’s needs with the minimum of effort. This gives agility, and agility means fast go-to-market abilities. Just what is needed in this fast-moving world. There are some important things to note here. The ways to extend and enhance the software have to be easy and well documented. The partners must have access to training and knowledge sharing. (It does not help to have a system for extending the capabilities of the software if the partners have to guess at the process and the documentation is rudimentary.) Open access is key It is important that the business philosophy is based on openness, giving the partners full access to all relevant information. And openness is a two-way street: By being open for your partners, you also have to be open about their business. A partner might be able to develop a highly sophisticated solution but be unable to market the solution. By building a catalogue of partner solutions easily accessible to customers, openness extends to ensure open access to the partners. Openness is not something a business can just tack on to their approach. It has to be in the DNA of the business from the start. In a Harvard Business Review article entitled ‘Predators and Prey: A new ecology of competition,’ JF Moore says: “A business ecosystem, like its biological counterpart, gradually moves from a random collection of elements to a more structured community.” Structured business ecosystem Milestone has seen this progression within the company's ecosystem Milestone has seen this progression within the company's ecosystem. They introduced training and certification requirements as part of the partnership success structure, ensuring knowledge is shared and also used in a way that is most mutually beneficial for all involved. Moore also writes: “Every business ecosystem develops in four distinct stages: birth, expansion, leadership and self-renewal.” At present, Milestone and its partners are entering into the ‘leadership’ stage, where video enabling is creating opportunities beyond those offered by a traditional video surveillance system, and into areas that provide additional business benefits to our customers. Video enabling “A leader must emerge in the ecosystem,” Moore says, “to initiate a process of rapid, ongoing improvement that draws the entire community toward a grander future.” This is the role Milestone has played in leading the industry towards the video enabling phase and redefining the industry’s expectations of what a surveillance system is capable of. In the article, Moore underlines that “executives whose horizons are bounded by the traditional industry perspectives will find themselves missing the real challenges and opportunities that face their companies.” Getting connected Connectors are those people with a wide range of contacts across different social circles In his book The Tipping Point, Malcolm Gladwell describes what he calls ‘The Law of the Few,’ which says: "The success of any kind of social epidemic is heavily dependent on the involvement of people with a particular and rare set of social gifts." This is based on the 80/20 principal, “which is the idea that in any situation roughly 80 percent of the 'work' will be done by 20 percent of the participants." He goes on to identify three types of people with these gifts: Salesmen, who are skilled in persuasion and negotiation; Mavens, who collect and disseminate useful information; and Connectors. Connectors are those people with a wide range of contacts across different social circles who can make introductions and create links between otherwise disparate individuals. Milestone, key connector in physical security industry In the wider scheme of things, Milestone effectively acts as a ‘Connector’ in the business ecosystem and in the overall physical security industry. Milestone brings together companies who are brilliant in their respective fields and make it easy for them to work together to create a valuable solution for the customer. The company provides the environment for that to occur and work closely with them to ensure that the end result is useful and effective. At Milestone, partners realised that significant investments in education and training was required to create the demand for the company's products and solutions that the conservative physical security industry required. The value of partnership was learnt and the ‘open’ approach adopted, which was a central part of the thinking behind our software. Adopting the Scandinavian management model Milestone effectively acts as a ‘Connector’ in the business ecosystem and in the overall physical security industry Milestone extended this approach to the entire business model, creating the ecosystem that has been the driving force for success. And while the company embraced the best of the Scandinavian management model, its inclusiveness and encouragement of creativity, they still needed to have the courage to make changes to the business, changes which would ensure the best possible position to take on whatever challenges the future might hold. Milestone partner ecosystem Milestone have always worked in a partner-driven business mode. The company from the start was designed to be open and partner oriented. The Milestone partner ecosystem is a fundamental part of its mindset and daily operations. It is one of the major reasons for getting the company to the position where it is today. To be in a company without the partner component would be like cutting the internet and phone cables while reverting to telex and written paper letters! The company would be developing products in the dark, not knowing the demand. Open business world Today, Milestone's partners are delivering optimal solutions to mutual customers, building a better and open business world with video as a business enhancer. All thanks to the company's open platform and community approach. To have a flourishing partner ecosystem, one must think not as a corporation but in human terms. Because companies don’t think, humans do. In all senses of the word, there is one thing that will contribute more to the success of a partnership than anything else; 'Give before hoping to receive'.
The potential for catastrophic injury in the petrochemical industry makes safety training and credentialing of employees imperative. Coordinating this process for a variety of industries, including many in the petrochemical fields of southern Alabama, is Training Solutions for Construction and Industry (TSCI). The mission of TSCI is to promote and facilitate workforce development ‘by providing industry-recognised training with portable credentials to create a diverse, trained and sustainable workforce’. TSCI provides computer-based and instructor-led training developed by the Association of Reciprocal Safety Councils (ARSC) and based on requirements from the Occupational Safety and Health Act (OSHA) and the U.S. Department of Homeland Security. Within one day, a person can gain all of his or her required training for a year, and it will be accredited. ID cards with encoded results Workers who successfully complete a TSCI safety orientation receive a tamper-proof ID card, encoded with the results of his or her training. “ID cards give students a record of their training and eventual access to a plant,” said Jack Fecas, Operations Manager, TSCI. The card is valid for one year. If other safety or specialised training is completed during that year, the card is encoded with the additional credentials. All member plants of TSCI and ARSC member organisations recognise and accept the ID card. Workers look to TSCI for training in such areas as fire safety, process safety management, confined space entry, respiratory protection, hazardous energy, basic first aid and CPR, scissor lift, scaffolding, excavation and trenching, elevated work surfaces, electrical safety and disaster site safety. The Office of Homeland Security also can set criteria for credentialing, such as asking for drug screen results. Site-specific and fire safety training TSCI provides site-specific training, which might include a focus on fires or explosions at a refinery or dust-particle respiratory safety at a mill In addition to its basic orientation training programs, TSCI provides site-specific training, which might include a focus on fires or explosions at a refinery or dust-particle respiratory safety at a mill. “Some companies using dangerous materials have wind socks to indicate which direction the wind is blowing, telling employees which exit route is safe for use at that time,” said Fecas. “This kind of training needs to be site-specific.” Other site-specific training might include basic alarm system safety, teaching employees what to do when they hear a constant alarm versus what they might do if they hear several short bursts of an alarm. About 1,500 workers take the basic orientation program from TSCI every year, and the numbers are growing. With only one printer, clearly more capacity was needed. Fargo’s DTC550 printer/encoder Fecas knew that his organisation needed more capacity in order to handle the increasing volume, so he began looking for an additional printer – one that was fast, yet reliable. He needed barcode code technology and a printer that could encode new data as workers took additional classes. TSCI found all of the requirements it was seeking in Fargo’s DTC550 Direct-to-Card printer/encoder from ID Wholesaler. Not surprisingly, the security offered by the DTC550 was a primary selling point for Fecas. In addition to being recommended by other ARSC Safety Councils, it just made good business sense. TSCI chose a standard holographic overlaminate available with the DTC550, which improves the card’s durability and reduces the risk of counterfeiting. More than 80 percent of training occurs at the TSCI offices, according to Fecas, but it also can take place at a plant site. With the new DTC550 able to handle the increasing demand at TSCI, the old printer will be used for remote training, thus increasing TSCI’s ability to meet the needs of its customers. Workspace security The common curriculum of our safety training levels the playing field, so when workers leave TSCI they can recognise the hazards in the worksite and protect themselves and their co-workers" “The common curriculum of our safety training levels the playing field, so when workers leave TSCI they can recognise the hazards in the worksite and protect themselves and their co-workers,” Fecas added. “They still have information to learn at the plant, but they are ready to go to work.” “We have had ID cards since we began in 1995,” he said, “but with the early cards, there was much more hand-work. Our operator had to add a photo by hand and then wait for the laminating machine to heat up before the card could be laminated. The evolution has been very interesting. In addition, we have been very pleased with the service provided by the Fargo printer and by ID Wholesaler. I can pick up the phone or send an e-mail, and a representative is available for assistance.” Most secure system “We recommended the DTC550 printer because it is very reliable and has more than one holographic laminate choice,” said Jeff Gunhus, ID Wholesaler Sales Team Leader. “TSCI originally bought just the printer and had to wait until its next budget cycle to purchase the lamination unit. They liked the fact that the Fargo printer had an upgrade path. It is important to listen to our clients’ wants, needs and concerns,” Gunhus added. “Then we simply do our best to help them out.” “If a company is going to do business nowadays, it needs to be secure,” adds Fecas. “Our business relies on plants and regulatory agencies trusting what we do. We need to be on the cutting edge when it comes to information technology. The best system is the most secure system. We made a decision to go with what has been tried and true and working in industry now.”
Government regulations continue to step up security demands at federal agencies, requiring identity cards to support multiple identity assurance factors and be validated at entries into a building or location. Because of the cost and infrastructure that goes along with many security upgrades, federal agencies must wait months or, in many cases, years to implement changes. The Federal Aviation Administration—an operating mode of the U.S. Department of Transportation—is no different. The FAA is tasked with the colossal mission of regulating and overseeing all aspects of civil aviation in the United States. With offices around the world, including its headquarters in Washington, D.C., the FAA has a large number of employees and buildings to oversee. With so many people coming into and out of the buildings each day, it is particularly important that security personnel have reliable tools to validate employee credentials Need of tools for validating employee credentials As part of its security requirements, the FAA must validate Personal Identity Verification (PIV) cards at checkpoints within its facilities. With so many people coming into and out of the buildings each day, it is particularly important that security personnel have reliable tools to validate employee credentials. As recently as a year ago, FAA security personnel were conducting visual inspection of PIV cards at the gates into facilities that did not have PIV card readers. They had no way of telling if the card was authentic, revoked, or if the employee had access rights to a checkpoint at a particular time. At the FAA headquarters, which employs just under 6,000 permanent employees, and another FAA facility, the Minneapolis Air Route Traffic Control Center, which is the organisation’s 11th busiest airport traffic control tower, visual verification just wasn’t enough. Automating the verification process In order to comply with HSPD-12 and the Office of Management and Budget (OMB) Memorandum 11-11, the FAA needed a process beyond visual verification that allowed security personnel to quickly check the authenticity and revocation status of a card, as well as access rights to a particular area of the facility. With as many as 5,000 people coming into the FAA headquarters facility daily, the organisation’s primary goal was to automate the verification process. “The project needed to provide guards the ability to validate PIV cards at FAA facilities where the gates did not have PIV card readers,” said Craig Auguston, HSPD-12 Program Manager at the Federal Aviation Administration. “We also wanted a mobile solution for backup and for roaming guards to be able to validate secure areas, such as parking garages.” Codebench’s OMNICheck Plus software OMNICheck Plus was ultimately decided upon because it is integrated with many physical access control systems including the P2000 The FAA began looking at products that could not only meet its requirements for mobile validation, but also integrate seamlessly with its P2000 security management database from Johnson Controls (JCI), according to Auguston. “This upgrade was important to meet the FAA’s requirement to validate PIV cards at all check points,” Auguston said. The FAA’s former process of visual verification was not allowing security guards to check the status of a PIV card, such as revocation status and specific access rights, both of which the organisation needed to meet its security goals. After testing a couple of mobile software validation programs, the organisation chose OMNICheck Plus software from Codebench, a HID Global Company. OMNICheck Plus was ultimately decided upon because it is integrated with many physical access control systems including the P2000, and it is listed on the GSA’s FIPS 201 Approved Products List as a CAK authentication system when running on an ARM-based mobile device such as the DAP CE3240B, which both FAA facilities use. Giving mobile access to the security guards “They really needed something that was going to allow their security guards to be mobile in certain parts of a facility,” said Botio Mandov of Johnson Controls. Johnson Controls, the integrator for the project, helped the FAA implement a larger security upgrade, which included the security management database and mobile validation software. Together, the FAA’s mobile DAP devices and OMNICheck Plus software enabled roaming security guards to use the mobile handheld devices in FAA parking garages and other entry points that needed to be secured, but do not have stationary PIV card readers. One of the most important aspects of authentication software for the FAA was the ability to check an employee’s access rights directly on the mobile card readers Checking access rights on mobile card readers In addition to mobility, one of the most important aspects of authentication software for the FAA was the ability to check an employee’s access rights directly on the mobile card readers—something only their organisation’s P2000 physical access control system could do previously. With an OMNICheck module called Data Import, certain cardholder information housed in the FAA’s P2000 database, such as access rights, was pushed down into the DAP mobile devices used by security personnel. “Access rights allow FAA security guards to make sure employees’ cards are not only valid, but that they are allowed to be in a certain area at a certain time,” Mandov said. In addition, FAA security administrators can run audit reports that show which cards were checked and when. The implementation took about five months, including testing the interface with the access control system and coming up with a training guide for the security guards, according to Auguston. The FAA is currently using 31 DAP CE3240B mobile readers with OMNICheck Plus. Saving money by eliminating physical parking passes Prior to the OMNICheck Plus installation, FAA security personnel had an unreliable way of authenticating PIV cards and access rights. Now, security personnel are able to verify digital certificates, revocation status and access rights, all while having an audit trail of the cards checked in the system. An additional, unexpected benefit for the FAA has been the cost savings of eliminating physical parking passes at its two facilities. “We are able to positively identify cardholders’ status when they try to enter the facility. We were able to save money by eliminating the physical parking pass by using OMNICheck to validate cardholder’s status for parking in FAA-controlled facilities,” Auguston explained.
The Sinan Erdem Dome is the largest multi-purpose indoor venue in Turkey. Located in Istanbul, the dome has a seating capacity of up to 22,500, and hosts a number of events, including concerts, tennis matches, and basketball games. Strengthening stadium security Upon being chosen to host a number of games during the European Basketball Championships 2017, the chief European men’s international basketball competition held biannually, the Sinan Erdem Dome looked to strengthen their security system. The dome’s large-scale presented high-surveillance requirements such as support for 64 split-screens, hundreds of cameras, and a back-end storage and management infrastructure that could support the entire system. Dahua provided the dome with a complete, high-end monitoring system that included a total of over 600 IP, speed dome, and ANPR cameras on the front-end, and NVRs, video walls, video matrix devices, and related control accessories on the back-end. Smart detection technologies The dome’s surveillance system was constructed with the latest cutting-edge technology To better protect the stadium from a variety of threats, the solution employed a number of smart detection technologies such as intelligent analysis, which includes motion detection, tripwire, intrusion, and smart-tracking functionality. ANPR was also utilised, which recognises licence plates numbers and checks them against a central whitelist and blacklist. Plate records are also stored on NVR devices and can be searched through by security officers. In less than a week, the local team completed installation, testing, and customer training, and the dome was fully ready to securely host international sporting events. Protecting all corners In under a week, the dome’s surveillance system was constructed with the latest cutting-edge technology, increasing its appeal to international events seeking venues. Dahua smart technologies automated a great number of surveillance operations, such as automatic car-barrier operation enabled by ANPR camera integration, thus greatly reducing the strain on security workers. Every corner of the stadium was covered by Dahua cameras providing high definition video, ensuring zero blind spots and optimal detail collection. In addition, Dahua showcased its customer-centric philosophy through supplying high-quality customisation, technical support, operation training, and after-sales service, which guaranteed the expertise of system operators as well as long-term reliability and quick issue resolution.
Round table discussion
Even the most advanced and sophisticated security systems are limited in their effectiveness by a factor that is common to all systems – the human factor. How effectively integrators install systems and how productively users interface with their systems both depend largely on how well individual people are trained. We asked this week’s Expert Panel Roundtable: What is the changing role of training in the security and video surveillance market?
What happens after the sale is complete, after the contracts are all signed and sealed? That’s when an abundance of variables can kick in – variables that can mean the difference between a successful security system or a case of buyer’s remorse. The features and value of equipment involved in a security system are well known before the sale closes, as hopefully are the integrator’s and end-user’s expectations about after-sale service. But what is the reality of after-sale service, and how can manufacturer’s make it better? We asked this week’s Expert Panel Roundtable: How can security system manufacturers improve their after-sale service for integrators and end users?