Qualification & Training
Codelocks, global manufacturer of access control products, has announced its new training programme for locksmiths and installers. The courses on 25 September, 23 October and 20 November 2019 are available to book online. Locksmith training course Codelocks first introduced its locksmith training courses in 2012 and the programme continues to be successful. Held in Codelock’s Newbury head office, the sessions are hands-on and practical – ideal for Trade professionals wanting to exp...
Globally renowned entrance control specialist, Meesons has announced unveiling a range of new service plans to make specifying and maintaining its range of speed gates and security portals even easier. Customers can now choose between three service plan options; Total Service Plan, Next Day Plus Service Plan and Next Day Service Plan. Alternatively, a tailored service plan can be created to meet individual client’s needs. Total Service Plan The Total Service Plan includes AM/ PM on-site...
Ethics is a particularly important subject in an industry such as fire and security because the result of unethical actions might make the difference in life and death. For example, if an employee acts unethically when servicing a fire extinguisher, the result could be to burn down the building. Although ethics is not a common topic of discussion in the fire and security industry, perhaps it should be. Chubb Fire and Security is a company that provides an example of how an emphasis on ethics ca...
Gira, one of the world’s leading full-range suppliers of intelligent system solutions for building management, is pleased to announce its new System Integrator Partner Program [SIPP] has ten verified UK affiliates. The driving force behind the concept of the Partnership Program is to share best practice to enable integrators to bring customers’ visions to life. System integrators benefit from exclusive online training in the latest Gira products, a technical hotline and access to th...
Code Blue Corporation once again will be returning as a sponsor for National Campus Safety Awareness Month (NCSAM) in September. During NCSAM, Clery Center will partner with colleges, universities and other organisations to provide professional development opportunities that address the background of certain campus safety areas and strategies for talking about those areas with campus community members. Raising college campus awareness “For more than 30 years, student safety has been at...
Tyco, the security products division of Johnson Controls, has launched a campaign to encourage more installers to sign up to its partner programs which are designed to help identify new business opportunities and ensure end-users achieve maximum benefit from their investment in an integrated electronic security solution. “Feedback from the marketplace indicates that many small to medium size installers believe that manufacturers’ partner programs are ‘closed shops’ and t...
Legrand | AV Residential Solutions announced its lineup for CEDIA Expo 2019, taking place September 12-14 at the Colorado Convention Center in Denver. In Booth 905, Chief, Da-Lite, Luxul, Middle Atlantic Products, Nuvo, On-Q, QMotion, SANUS, and Vantage will come together with smart home AV systems, networking, and infrastructure solutions designed to help integrators create amazing AV experiences for their clients. "At CEDIA Expo 2019, visitors to our booth will see how all of our brands come together in solutions vignettes making the smart home a reality — from audio, human-centric lighting, and networking systems to mounts and enclosures," said Lauren Theobald, director of marketing at Legrand | AV. "In addition, we'll be presenting new products, services and show specials, and a variety of training courses integrators can attend. It's all happening in Denver, and we can't wait to see you there." Rack-mount Professional Series Players Nuvo's rack-mount Professional Series Players deliver dynamic, high-fidelity sound to three listening zonesAudio solutions on display at CEDIA Expo 2019 will include Nuvo's rack-mount Professional Series Players, which deliver dynamic, high-fidelity sound to three listening zones, provide built-in access to a variety of music options, and can be easily integrated into automation systems. For small, medium, and large home theatres, Nuvo will introduce its new architectural passive subwoofers and subwoofer amplifiers. The three compact single and dual subwoofers deliver a powerful, low-frequency impact, while the wall- and rack-mount amplifiers are packed with convenient features for maximum versatility. Demonstration of human-centric lighting For lighting control, Vantage brings lighting for life with an interactive human-centric lighting (HCL) demonstration. Vantage HCL systems deliver precision dimming, colour control, and tunable lighting to achieve the perfect harmony of natural and artificial light. Vantage will also highlight partnerships with leading manufacturers aimed at creating end-to-end systems that combine its control solutions with tunable light fixtures utilising the Lumenetix araya5 light engine. Additionally, the new EasyTouch Glass Keypad Station will debut featuring powerful functionality with a sleek, contemporary design. Other lighting solutions will include On-Q's RF Smart Lighting Control. This simple, scalable system is available in both the radiant and adorne collections for a coordinated look across traditional electrical devices and smart home controls. It's easy to install, simple to setup and the new pre-written IP drivers allow seamless integration with leading home control systems from Control4, Crestron, ELAN, RTI, and URC. Qbasic+ field-upgradeable solution Qbasic+ can be upgraded from manual to motorised in minutes without needing to change fabricsFor shading, QMotion will display its Qbasic+ field-upgradeable solution. Offering integrators the ultimate in flexibility, Qbasic+ can be upgraded from manual to motorised in minutes without needing to change fabrics or reinstall brackets, and it offers all the exclusive innovations QMotion is known for — including manual override, internal batteries and motors, and a counterbalanced design. In addition, QMotion will showcase its new fabric style, texture, and color options, including decorative light-filtering and matching room-darkening collections. Luxul brings guaranteed network performance to CEDIA Expo 2019 and will introduce a new remote cloud management solution for integrators. This new solution will be a free service to integrators managing customers' systems remotely, freeing them up from rolling a truck to service a client. In addition, its full array of routers, wireless access points, managed Gigabit switches, latest controller, and its Easy Setup App will be demonstrated. Showcasing residential power solutions Highlighted projector mounts will include Chief's new VCT series, which offers a slim design for large projectorsInfrastructure solutions include Middle Atlantic's new Forward family for its BGR Series, which is the No. 1 AV enclosure on the market. Forward is designed around an innovative new rackrail and the brand's patented universal mounting pattern, which allow the family's blank and vent panels, cable management, lighting, and other rack solutions to be quickly installed without tools. Middle Atlantic will also showcase two residential power solutions, the Select Series PDU with Racklink and the High Power DC Power Distribution Series. For home theatre projection, Da-Lite will be showcasing its Parallax Pure family of ambient light rejection (ALR) surfaces featuring a microlayered optical lens system, rejecting up to 96% of ambient light in a variety of gains for standard throw and ultra-short throw projectors. Also on display, the new Parallax Stratos 1.0 ALR surface rejects 80% of ambient light with 1.0 gain for standard throw projectors and scales as high as 16 feet in one seamless sheet of fabric. Highlighted projector mounts will include Chief's new VCT series, which offers a slim design for large projectors. VCT provides unrivaled micro adjustments using Chief's tool-free Microzone adjustment to ensure accurate and reliable image registration. Advanced Full-Motion Premium TV mounts For audio accessories, SANUS will highlight its line of wireless speaker mounts, stands, and basesFeatured TV mounts will include the debut of the new SANUS Advanced Full-Motion Premium TV mounts. Inspired by the sleek look of today's TVs and high-end kitchen appliances, the Premium mounts combine a brushed metal exterior with a solid steel frame, low profile, FluidMotion design, and Steady Set functionality. For audio accessories, SANUS will highlight its line of wireless speaker mounts, stands, and bases. Also on display will be the SANUS exclusive Black Series and Chief's outdoor mounts, in-wall storage and additional mounting accessories. On-Q will be exhibiting its latest enhanced, USA-made, WiFi-ready plastic enclosures, which offer a backbone for the modern connected home by consolidating and distributing foundational wired services for video, voice, and data, while also integrating smart hubs and wireless devices to meet current and future homeowner demands. In addition, On-Q's professional HDMI and AV In-Wall Power Kits, connectivity, and other home theatre solutions will be on display. At CEDIA Expo 2019, Legrand | AV will award a variety of prizes and giveaways to integrators, who can take advantage of 10-minute training sessions covering AV systems, networking, infrastructure, and other partner integration topics.
Globally renowned life-safety systems manufacturer, C-TEC, has announced launching a new series of free CPD certified training programs and events entitled ‘Fire Alarm Systems for Domestic Dwellings’. CPD certified training events These CPD certified training events are ideal for security personnel, fire safety providers and anyone working in the domestic fire sector. This includes consultants, specifiers, housing associations, installers, facilities managers, building developers and landlords, the events will be hosted at six key venues across the UK. The events is slated to run from 9.45 am to 2.30 pm and are designed to: Give a brief overview of how domestic and commercial fire alarm systems have developed over the years. Discuss the legislation and standards that apply to such systems and the impact they are having today. Summarise the key points of and the changes made to BS 5839-6 2019: The code of practice for the design, installation, commissioning and maintenance of domestic fire alarm systems certification program. Explore if 'Stay Put' is still a safe policy to deploy for evacuating a building during a fire. Outline a new approach to fire alarm systems for purpose-built flats and apartments with multiple advantages that can help make strategies such as stay put/defend-in-place safer. Safety policy Upon completion, attendees will receive a CPD certificate worth 3 hours of CPD points. Refreshments and a buffet lunch will be provided to guests. Andy Green, C-TEC’s Marketing Manager stated, “Our new CPD events are suitable for anyone interested in the latest developments in domestic fire detection and alarm technology and the recent changes to BS 5839-6. Demand is expected to be high so we would advise anyone who is interested to register their interest quickly.”
Tavcom Training, part of Linx International Group, is supporting police forces transformation programs, as they work towards the Policing Vision 2025 and adapt to the rise in digital evidence, with its Gathering Video Evidence course. Earlier this year, the CoPaCC National Police ICT User Survey results were published, and topping the list of digital evidence challenges for the 3,500 police professionals in England & Wales that responded were issues relating to CCTV evidence. The main pain points are - the sharing of evidence electronically with prosecutors (52.5%), manually collecting evidence such as CCTV video on site (51.8%) and converting proprietary CCTV video to a playable format (51.2%). Training BTEC Level 3 course The speed with which police officers can obtain video evidence can have a major impact on an investigation" Developed in collaboration with the police and the Home Office, the Gathering Video Evidence BTEC Level 3 course was first launched in 2009 to support the new role of image retrieval officers. "In the past 10 years, CCTV technology and has undergone a transformation, along with the much wider digital evidence revolution," says Andrew Saywell, Sales Manager at Tavcom Training. The three-day classroom-based course blends theory and practice, to help those involved with the retrieval of video evidence to overcome the challenges highlighted in the CoPaCC National Police ICT User Survey. In doing so, it helps to ensure that the police officers have timely access to better quality footage, which can be used for investigation and prosecution. Saywell adds: "The speed with which police officers can obtain video evidence can have a major impact on an investigation, enabling changes to be brought faster." Gathering Video Evidence syllabus: The impact of legislation on the retrieval of CCTV The range of national guidelines associated with image retrieval by law enforcement Customer relations when dealing with CCTV system owners Risk assessment approaches when carrying out their duties Evidence and exhibit management Audit trail Equipment required for the role How CCTV systems work Export methods and media used Practical application of theory using DVRs and NVRs and appropriate paperwork Making a network connection between laptop and NVR to enable image retrieval The Gathering Video Evidence course runs from 25th – 27th November 2019 and 10th – 12th February 2020, at Tavcom's training center in Hampshire. Successful completion of the course will result in the award of a BTEC Level 3 Certificate.
Team Valley-based Access Training has added to its training team with the appointment of a senior trainer and industry expert in response to the increasing demand for fire, security and emergency systems apprenticeships in the region. Fire and Security training Access currently has 50 apprentices on the fire, security and emergency systems Apprenticeship, working toward their professional qualification whilst gaining excellent paid work experience as young engineers and technicians at firms from across the North East. The fire and security sector is a growing industry that plays a vital role in the economy" Malcolm Armstrong managing director of Access Training said, “The fire and security sector is a growing industry that plays a vital role in the economy and as a result we are experiencing the highest demand we have ever seen for this course. Adding Dave to our team of trainers means that we can respond to this increased demand and I’m sure the experience he brings will be a great benefit to our apprentices.” Security alarm sector expert Engineer Dave Cash brings with him 30 years’ experience working within the security and alarms sector with employers including ADT Fire and Security plc, most recently as a field line manager. Dave Cash, now a security and alarms sector specialist trainer at Access Training, said, “I’m really pleased to have joined the team and it’s great working with the young people at Access Training. We have around 50 apprentices on board this year and each apprentice attends our Team Valley training centre one day per week over the three-year duration of the course. The apprentices come from a variety of employers large and small, right across the region, from Teesside to Northumberland and across to Cumbria. The Protector Group 18-year-old Kieran Campbell from Chester-Le-Street in County Durham is a former pupil of St Leonards in Durham where he achieved five GCSEs and a BTEC in engineering. He now works as a trainee fire and security engineer with The Protector Group, a Team Valley security systems business with offices across the UK. He said, “I always wanted to get a trade and at The Protector Group I have the opportunity to work on projects including the Metro Centre, healthcare business GSK, Newcastle Central Station and many others. All this at the same time as working toward my Level 3 Apprenticeship and receiving classroom and workshop training from Access Training who provide ongoing help. I love it, I’m able to afford to run a car and relax at the weekend with my mates, sometimes playing golf and know I’m working toward a qualification that has already given me a career.” Fire and Security Apprenticeship The Fire, Security and Emergency Systems Apprenticeship, Level 3 is for those wanting a career in engineering The Fire, Security and Emergency Systems Apprenticeship, Level 3 is aimed at those wanting a sustainable career in engineering. It provides the opportunity to develop the skills to install and carry out maintenance on a range of security systems including intruder alarms, CCTV systems, access control systems, fire detection systems and emergency pull cords. Louis Armstrong, also a trainee engineer who works for established SME HN Storey an access control engineering firm based on the Team Valley. Louis passed all six GCSEs at Whickham School, Newcastle upon Tyne before being brought on board by HN Storey as an apprentice engineer in October 2018 working in partnership with Access Training. He said, “I’ve been coming to Access Training once a week since being employed by HN Storey and it’s been great to get work experience alongside support from a training provider to get my Level 3 apprenticeship in fire, security and emergency systems. HN Storey values me enough to work with Access Training supporting me to gain an industry and nationally recognised qualification. I get mentored at work and shadow qualified engineers on site.” Access Training Academy “Alongside this I’m learning all about health and safety best practice and will go on to learn more technical and practical engineering skills in a classroom environment at the Access Training Academy. With industry experts like Dave Cash developing me I’m really loving my job and really grateful for the career opportunity.” Dave Cash said, “There is definitely a demand for engineering skills in the fire and security sector and with our specially equipped facilities we provide practical as well as theoretical training which complements the invaluable workplace experience these apprentices are getting. We have a new group due to start this month, and again in the autumn of 2019.”
ASIS International, globally renowned membership organisation for security management professionals, has announced its lineup of new Game Changer sessions for Global Security Exchange (GSX) 2019, slated to be held from September 8 to September 12, 2019 at Chicago’s McCormick Place. Global Security Exchange 2019 will offer valuable insights and in-depth information on the latest security technologies and products that are rapidly changing today’s paradigm for security professionals. Global Security Exchange 2019 “The ever-changing landscape for security professionals around the globe remains complex,” said Christina Duffey, CPP, President, ASIS International. “As part of an on-going effort to continually enhance the value GSX provides for all attendees, our new Game Changers education track will provide multiple perspectives from thought leaders to not only help our audience stay informed about new and disruptive technologies, but also maintain a competitive edge and elevate expertise across their organisations.” The GSX 2019 Game Changer lineup features five thought-provoking sessions: Experts from the federal agency perspective, including Angela Stubblefield, Deputy Associate Administrator for Security and Hazardous Materials Safety at Federal Aviation Administration and Joseph Rios, Chief Engineer for NASA’s UAS Traffic Management (UTM) project, will deliver a state-of-the-industry update on drones and how their use is expanding and changing. ‘The Ever-Changing Drone Landscape: What You Need to Know’, will cover upcoming regulatory issues along with expert predictions on the future of drones. Monday, 9 September 10:30 – 11:45 am CT. Digital transformation is now affecting every aspect of our home and work lives. In ‘Accelerating Digital Transformation: Insights and Applications’, attendees will learn how successful organisations are changing the fundamentals of business to keep ahead of the competition in today’s digital economy—and how this impacts a company's security programs. This session will be delivered by Brian Tuskan, Chief Security Officer at Microsoft Corporation, Phil Halpin, Senior Vice President & Head of Global Security at Brown Brothers Harriman & Co., as well as panelists from other industry sectors to be announced. Monday, 9 September 1:15 – 2:30 pm CT. Cannabis is one of the hottest topics in the news right now, and its legalisation carries many implications for the security industry. GSX attendees won’t want to miss ‘The Current and Changing Cannabis Landscape: An Industry Overview’, in which Co-Founder and CEO of Marijuana Business Daily, Cassandra Farrington, will share current trends, state-by-state policy developments and changes in the U.S. and international marketplace. This objective and apolitical perspective will aid in understanding current challenges and what’s ahead for this fast-evolving industry. Tuesday, 10 September 2:00 – 3:00 pm CT. Helping professionals deliver strong leadership in today’s volatile security environment is the topic of ‘Using High Beam Leadership to Navigate Disruption and Change’, delivered by Scott Klososky, Founder and Principal at TriCorps Technologies. Attendees will discover which skills they need to grow, and how to apply them successfully in order to emerge stronger and more resilient. Wednesday, 11 September 3:45 – 4:45 pm CT. Deviant Ollam, Physical Penetration Specialist and Founding Partner/Lead Instructor at The CORE Group, will provide security practitioners with practical guidance for all aspects of penetration testing. In his session, ‘Finding Chinks in the Armor: Getting More Value from Your Penetration Testing’, Ollam—who literally wrote the book on practical lock picking—will offer his insights along with real-world examples of the kinds of vulnerabilities that are present and growing all around us. Thursday, 12 September 10:30 – 11:15 am CT. Entering its 65th year, Global Security Exchange (formerly the ASIS International Annual Seminar & Exhibits) is an extensive and comprehensive event for security professionals worldwide, dedicated to addressing fast-paced changes across the industry with a focus on immersive learning, revitalised networking, and a reimagined exhibit floor.
Reliance High-Tech announces a new apprenticeship scheme that will provide several people the chance to carve out a bright new future for themselves. For over 40 years Reliance High-Tech has worked with public and private sector organisations to design, maintain and improve their security systems. Using cutting edge technology the company develops innovative solutions across a wide range of demanding environments. As such, it has gained an enviable reputation for providing customers with the assurance that it has the knowledge and expertise to take on any assignment. With a growing portfolio of clients Reliance High-Tech now has 33 service engineers located across the UK, whose job it is to ensure that all of its customers’ needs are met. Troubleshooting security installations Carl Smith, the company’s head of service explained, “As a result of our success we need to add personnel to our servicing department. We decided that a great way to do this would be to introduce an apprenticeship programme and recruit three people from different areas of the country to join us.” Candidates must have a keen interest in electronics and security technology, and be IT literate “Reliance High-Tech is committed to improving the security sector and our apprenticeship programme will provide the knowledge required to configure, install, maintain and troubleshoot security installations in line with current and future practices. It’s the first time for a few years that we have been in a position to take on apprentices, so this is a really exciting time for us.” Candidates must have a keen interest in electronics and security technology, and be IT literate. The apprenticeship will last for approximately 3 years and individuals will work towards a Level 3 Diploma in Electronic, Security and Emergency Systems. Gaining relevant experience Applicants should also have a full driving licence, as they will be provided with a company vehicle. The apprentice will be mentored by one of Reliance High-Tech’s senior service engineers, who will be able to offer on the job training to the highest standards, while ensuring that they gain relevant experience across a range of vertical sectors. Carl Smith concluded, “Apprenticeships make organisations more effective, productive and competitive, and they are a proven way to train the workforce of the future. I firmly believe that there is a huge amount of talent out there, so we want to hear from young men and women living in Bolton and the surrounding areas, London and the surrounding areas, or along the M4 corridor between Swindon and Bristol, who have the drive and determination to succeed.”
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research programme to provide valuable feedback to the GSA Schedule 84 programme and on to the GSA central office. The director of GSA Region 7 Schedules Program, the Schedule 84 Branch Chief and the Category Manager Subject Matter Expert who manages our suppliers' panel gave us their full attention as we discussed the successes of the programme, hot topics, problems and the future. We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort and renewed enthusiasm Innovative review team We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort, renewed enthusiasm and productive changes building upon the successes of 2017. There was high praise for the accessibility to the Schedule 84 staff. Their consistent quick response to questions and concerns, thinking outside the box and supporting the programme by partnering with their contractors was much appreciated. There has been a renewed spirit of partnering to cooperatively bring the best to agency customers. It seems to be working as per the Centre Director sales are growing for GSA Schedule 84. Advocating for the security industry In my experience, business development starts with the Administrator from Region 7 in Ft. Worth, TX. As the annual Schedule 84 Industry Day at the SSAC begins he is shaking every hand and passing out his cards looking folks right in the eye asking, “how can I help you?” They have the best practices and most organised paperwork. The SSAC director has chosen well in her staff and is hands-on in every endeavour to direct things along when challenges occur or to improve the programme. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry It continues with the centre’s CASE Manager encouraging the contractors at events, visiting agency customers and promoting the GSA Schedules Program by helping coordinate the partnering. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry for adding new technology, meeting with industry associations, understanding the complexity and challenges of Homeland Security Presidential Directive 12 (HSPD12) and advocating for the purchasing Physical Access Control Systems (PACS) utilising the appropriate standards and the GSA Program among other innovations. As far as the supplier panel, we gave our GSA Schedule 84 team and leaders high praise for 2018. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List Changes in the GSA programme Some changes this year in certain GSA programmes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) developed to assist with solution procurements. This new SIN was added to Schedules 03FAC, 56, 70, 71, 00Corp, 738X and 84. Under Schedule 84 it is SIN 84-500. GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex Essentially this SIN allows agencies procuring under the aforementioned GSA Schedules’ programmes to purchase and the contractor to add items and services not known prior to the task as a Contract Line Item Number (CLIN) not to exceed 33% of the order. For more information and FAQs on OLMs go to www.gsa.gov/olm. This is not to take the place of “Open Market” items for adding products only that are not listed on a company’s GSA Contract. Physical access control products Previously, GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex for the agencies. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List according to the standards created under FIPS201. These products appear under SIN 246 35-7 after being tested and approved by GSA. To be qualified to install these products under the GSA Program at least one individual from the GSA Contractor company must complete the class and be CSEIP certified before applying for labour SIN 246 60-5. Additionally, the company must demonstrate certain qualifications and have past performance for this type of work. The Security Technology Alliance offers the training class and certification. Certified individuals and approved products are listed at www.idmanagement.gov. Companies listed with SIN 246-35 7 and SIN 246-60 5 may be found by searching at www.gsaelibrary.gsa.gov. Updates to guidance for procurement Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide. The ordering guide posted at www.gsa.gov/firesecurity is a valuable support tool created to assist agencies with understanding the requirements of FIPS201 and procuring a PACS. The guide includes relevant regulations, FAQs, sample systems designs, sample statements of work, a list of key points of contract for additional help and questions. In partnership with GSA and guided by the GSA Ombudsman group, the Security Industry Association and the Security Technology Alliance members and their contractor companies participated in a GSA Reverse Industry PACS Training Day on September 17, 2018. We presented from an industry perspective important fact on PACS system requirements, procurement planning, providing information on resources and further educating with panel discussions, individual presentations and amusing skits to over 300 Government agency staff and acquisition specialists. You can find some of the unedited recording of the PACS Reverse Industry Day Training on YouTube. Some changes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) GSA Schedules Program A hot topic about the GSA programme for 2018 was also an issue for the prior year. The GSA Schedules Program is a streamlined contracting vehicle incorporating specific Federal Acquisition Regulations for more efficiently purchasing commercial items. Companies may apply per a continuous open season for a 5-year contract with three 5-year options to renew. Contractors are vetted for past performance, corporate experience and financial capability. Products and services are considered for offering to Federal, State and Local customers (for Schedule 84) with pricing that is determined to be fair and reasonable through negotiations with GSA. To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor as well as the competition of identical or similar item pricing. The most vocal complaint of concern from the contractors was regarding the consideration of competitor contractors offering identical items with out-of-date pricing or holding a Letter of Supply not authorised by the manufacturer. GSA pricing tool Since the GSA utilises a pricing tool to determine if the pricing offered is competitive, a rogue competitor can cause a pricing action to possibly be rejected due to out of date information even as the manufacturer offers an update of the product. This is an issue on all GSA Contracts that the supplier panel hopes will be reconsidered by GSA policymakers at the central office. Most of us believe the Letters of Supply should only be issued by the manufacturer or with documented specific permission of the manufacturer to a reseller. Manufacturers may want to have a better understanding of the Letter of Supply, how it is considered by GSA and more carefully choose their Government partners for experience and compliance. Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy Overcoming challenges for the security community Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy. GSA eBuy is an online Request for Quotation (RFQ) programme that is for GSA Contract holders only. Agencies will post their requirements by Special Item Number for at a minimum 48 hours. Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract. GSA Participating Dealers may take orders on behalf of a manufacturer if they are authorised under the manufacturer’s GSA Contract. They may also have an online PO Portal to receive orders. But they have no access to GSA eBuy to response to RFQs. Usually, under these arrangements, the manufacturers do not respond directly, so there is a problem using GSA eBuy for opportunities as their GSA Participating Dealers have no access to respond. GSA Schedule 84 leadership In some instances, a contracting officer may allow an emailed quotation. However, with the use of the electronic ordering system, this has become a common problem we hope to bring to the attention of policymakers. Some changes to the programmes may make the presentation of documentation more effective going forwardThe GSA Schedule 84 leadership has been helpful to explain the challenges to the agencies to try and resolve such issues. So, what’s up for 2019? GSA modernisation is coming. There will be improvements to their tools and more consolidations of SINs and more. There have been discussions of a revival of the GSA Expo. The Expo offered training for contracting staff both Government and private industry. Valuable tools for vendor training Equally important is the networking, meetings and the exhibits of the contractors. Expos have been discontinued since 2012 but smaller events have been growing as well as online webinar training. Webinars are valuable tools for GSA and vendor training, but they do not take the place of being able to meet your customers face-to-face. GSA online eOffer and eMod programme have made processing actions more efficient. Some changes to the programmes may make the presentation of documentation more effective going forward. The GSA online website for viewing the items on the GSA Contract and for purchasing items, GSA Advantage could definitely use an update as it has been basically the same for 20 years. Keep an eye on GSA Interact for the latest happenings with GSA.
Brexit will bring sweeping changes to the way the UK not only interacts internationally, but also internally. With the country standing alone with regards to trade and exports, it is vital for us to be fully prepared. However, there is one area that I think needs much greater scrutiny—the UK technical skills gap. Tellingly, there is a palpable shortage of technical training and skills right across the UK economy. With the country’s economic strength relying heavily on cutting-edge technology and knowledge, the UK security industry has particular reason to be anxious of movement restrictions on internationally sourced expertise and resources, as well as a potential ‘brain-drain’ of domestic talent. There is a lack of quantity and quality of home-grown talent in the pipeline, and there is a greater availability of talent from overseas Need for security education There are two distinct aspects that need to be addressed when you look at the requirements of the UK economy with regards to technical expertise. First of all, there is the quantity and quality of home-grown talent in the pipeline, and secondly, there is the availability and desire of talent from overseas wanting to work in the UK. In my own experience, it can be quite a challenge finding the best technical expertise (in the numbers needed) from the UK alone. Currently, alongside our British employees, our business employs a sizable amount of international security talent, ensuring we can fill key roles with exactly the right people. As well as sourcing expertise from abroad, I passionately believe we need to properly support and educate the next generation of UK security professionals too, ensuring we can also find the right talent closer to home in the future. T-Levels provide valuable business experience which can be lacking in traditional academic courses Technology-level training for modern needs It is frustrating to see the current skills gap—particularly as I felt the UK Government began moving in the right direction when it reintroduced the excellent national apprenticeships scheme a few years ago. There is no doubt we will always need excellent academic qualifications and people trained in research and development, but equally a stint in further education is certainly not for everyone! Undoubtedly apprenticeships are an excellent way of encouraging hungry young talent into any industry with on-the-job training. Importantly, this isn’t just academic training either—it also provides valuable business experience too, which can be lacking in more traditional academic courses. There has also been a lot of interest in ‘T-Levels’ in the UK. These are technology level courses that are designed to offer specific training for modern technology needs. It is very encouraging to see the promotion of technology education in this way, designed to appeal to students that are looking for a solid career in the UK technology sector. Apprenticeships are an excellent way of encouraging hungry young talent into any industry with on-the-job training Focus on engineering and vocational education Unfortunately, it seems the UK is still somewhat behind our European cousins when it comes to technology education and training. Germany, for example, is a country that has traditionally excelled in these areas. The education system in Germany has heavily focussed on engineering and vocational-based training programmes, which has seen noticeable benefits for its technology sector. The Germans have continued to focus on this for decades, meaning the country’s economy has an excellent pipeline of well-trained talent available. Taking this approach would greatly enhance training in the UK too, supporting up-and-coming talent and helping the next generation reach its potential. A healthy influx of highly talented individuals from across Europe has helped to fill the UK skills gap over recent decades Meeting business and technology needs A healthy influx of highly talented individuals from across Europe has helped to fill the UK skills gap over recent decades. Undoubtedly, like many British businesses we have significantly benefited from this open and vibrant skills market. With the fine details of Brexit being negotiated at the moment, I hope this valuable source of skilled professionals won’t be denied to UK businesses. Even if there are more stringent controls moving forward, the UK must continue to open its doors to this expertise—certainly until we can reap future generations of home-grown talent. It’s interesting (and somewhat ironic) that when you look at some UK universities’ engineering faculties, they often have half or over half of their students from other countries. The UK has world-renowned education facilities that we should be proud of, and yet paradoxically, we are still not educating enough UK engineers. There is a keen interest in technology from younger generations that needs to be nurtured Skill-based training for economic growth International trading and people movement will change after Brexit, but I hope there will also be a significant evolution in the education system to close the UK skills gap. The UK has some of the best educational establishments in the world and a long history of innovation and entrepreneurial skills to make our technology highly commercial. Frustratingly, there is a keen interest in technology from younger generations—just look how addicted young people are to their screens. This keen interest needs to be nurtured and career choices in technology encouraged. With the right training opportunities in place (university education, apprenticeships and T-Levels), the UK can easily implement the tools to create the right opportunities. However, what is really needed now is an impetus from political leaders to address training needs and ensure the economy continues to develop and grow to meet the challenges ahead.
What a year it’s been! 2017 has been a monumental period of product innovation and growth for Pivot3. The company experienced a more-than-50-percent increase in bookings from Q2 to Q3 this year, including a record number of million-dollar orders. We also saw deals supporting multiple use cases more than double, and experienced continued growth in the video surveillance market, driven by new product enhancements and contracts worth more than $1 million. We have also invested in building an influential group of surveillance-focused experts internally, and increased our focus on building strong partnerships with major VMS players, key systems integrators and other aligned-technology providers, such as Iron Mountain and Lenovo. A more robust industry It wasn’t only Pivot3 that had a healthy year; the industry, as a whole, is robust. Investment in technology is growing in markets ranging from public sector organisations, municipalities, gaming and transit agencies — all seeking technology solutions that drive value, increase intelligence and reduce risk. It is the drive for data that propels the video surveillance industry forward. A respected industry thought leader said recently that “data is the modern currency,” and video is the most prominent Big Data application in the world (by far). Those vendors and installers that understand how to help organisations capture, analyse and leverage data will be the ones who secure their future in the marketplace. A respected industry thought leader said recently that “data is the modern currency" Honest predictions Last year, I predicted that cybersecurity would become of greater importance to our market and that prediction was on point. Data security has become the number one concern in the industry, widely because users are moving back to more-trusted brands that focus on implementing cybersecurity protocols into network devices. In the coming year, cybersecurity will continue to be a primary focus — and it must be — for all product vendors, integrators and end-users. The adoption of standards and guidelines around data security for physical security technology will be imperative to ensuring data integrity. An era of evolution Over the past year, deep learning and artificial intelligence have become some of the most quoted buzzwords. Organisations see the value in leveraging these trends to analyse data more efficiently, and because of recent market innovations, we see a real impact an analytics effectiveness. Additionally, we have seen more and more large organisations migrate more of their security function to the cloud. Today, private-cloud architecture is no longer novelty; it is expected, and despite some well-publicised breaches, the public cloud is now considered more secure than some traditional on-site solutions. Cloud-based systems will be deployed much more frequently across some market segments, from SMEs to larger enterprises The year to come As 2018 approaches, I expect to see many of these same trends accelerate even further. Cloud-based systems will be deployed much more frequently across some market segments, from SMEs to larger enterprises. AI will become more mainstream, and analytics solutions will become more advanced. Overall, we at Pivot3 look forward to another strong growth period and seeing the continued evolution of the market as we swing into another year.
Cybersecurity talk currently dominates many events in the physical security industry. And it’s about time, given that we are all playing catch-up in a scary cybersecurity environment where threats are constant and constantly evolving. I heard an interesting discussion about cybersecurity recently among consultants attending MercTech4, a conference in Miami hosted by Mercury Security and its OEM partners. The broad-ranging discussion touched on multiple aspects of cybersecurity, including the various roles of end user IT departments, consultants, and integrators. Factors such as training, standardisation and pricing were also addressed as they relate to cybersecurity. Following are some edited excerpts from that discussion. The role of the IT department Pierre Bourgeix of ESI Convergent: Most enterprises usually have the information technology (IT) department at the table [for physical security discussions], and cybersecurity is a component of IT. The main concern for them is how any security product will impact the network environment. The first thing they will say, is “we have to ensure that there is network segmentation to prevent any potential viruses or threats or breaches from coming in.” The main concern for IT departments is how any security product will impact the network environment”They want to make sure that any devices in the environment are secure. Segmentation is good, but it isn’t an end-all. There is no buffer that can be created; these air gaps don’t exist. Cyber is involved in a defensive matter, in terms of what they have to do to protect that environment. IT is more worried about the infrastructure. The role of consultants and specifiers Phil Santore of DVS, division of Ross & Baruzzini: As consultants and engineers, we work with some major banks. They tell us if you bring a new product to the table, it will take two to three months before they will onboard the product, because they will run it through [cybersecurity testing] in their own IT departments. If it’s a large bank, they have an IT team, and there will never be anything we [as consultants] can tell them that they don’t already know. But we all have clients that are not large; they’re museums, or small corporations, or mom-and-pop shops. They may not be as vulnerable from the international threat, but there are still local things they have to be concerned about. It falls on us as consultants to let them know what their problems are. Their IT departments may not be that savvy. We need to at least make them aware and start there. Wael Lahoud of Goldmark Security Consulting: We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels. At the procurement stage, we as consultants must select and specify products that have technology to enable cybersecurity, and not choose products that are outdated or incompatible with cybersecurity controls. We also see, from an access control perspective, a need to address weaknesses in databases. Specifying and having integrators that can harden the databases, not just the network itself, can help. The impact of physical security products on the network environment was a dominant topic at the MercTech4 consultants roundtable discussion The need for standards on cybersecurity Jim Elder of Secured Design: I’d like to know what standards we as specifiers can invoke that will help us ensure that the integrator of record has the credentials, knows what standards apply, and knows how to make sure those standards are maintained in the system. I’m a generalist, and cybersecurity scares the hell out of me.We’re not just talking about access to cameras, we are talking about access to the corporate network and all the bad things that can happen with that. My emphasis would be on standards and compliance with standards in the equipment and technology that is used, and the way it is put in. It can be easier for me, looking at some key points, to be able to determine if the system has been installed in accordance. We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels"I’m taking the position of the enforcement officer, rather than the dictator. It would be much better if there were focused standards that I could put into the specification— I know there are some – that would dictate the processes, not just of manufacturing, but of installation of the product, and the tests you should run accordingly. Pierre Bourgeix: With the Security Industry Association (SIA), we are working right now on a standard that includes analysed scoring on the IT and physical side to identify a technology score, a compliance score, a methodology, and best-of-breed recommendation. Vendor validation would be used to ensure they follow the same process. We have created the model, and we will see what we can do to make it work. Terry Robinette of Sextant: If a standard can be written and it’s a reasonable process, I like the idea of the equipment meeting some standardised format or be able to show that it can withstand the same type of cyber-attack a network switch can withstand. We may not be reinventing the wheel. IT is the most standardised industry you will ever see, and security is the least standardised. But they’re merging. And that will drive standardisation. Jim Elder: I look to Underwriters Laboratory (UL) for a lot of standards. Does the product get that label? I am interested in being able to look at a box on the wall and say, “That meets the standard.” Or some kind of list with check-boxes; if all the boxes are checked I can walk out and know I have good cybersecurity threat management. IT is the most standardised industry you will ever see, and security is the least standardised" The role of training Phil Santore: Before you do any cybersecurity training, you would need to set the level of cybersecurity you are trying to achieve. There are multiple levels from zero to a completely closed network. Wael Lahoud: From an integrator’s perspective, cybersecurity training by the manufacturer of product features would be the place to start – understanding how to partner the database, and the encryption features. We see integrators that know these features are available – they tick the boxes – but they don’t understand what they mean. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation. That would be a good starting point. The role of integrators Wael Lahoud: Integrators like convenience; less time means more money. So, we see some integrators cut corners. I think it is our role (as consultants) to make sure corners are not cut. If you rely solely on integrators, it will always be the weak password, the bypass. We have seen it from small projects to large government installations. It’s the same again and again. Even having an internal standard within an organisation, there may be no one overseeing that and double-checking. Tools will help, but we are not there at this point. I will leave it up to manufacturers to provide the tools to make it easy for consultants to check, and easier for integrators to use the controls. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation - so training is very important The impact of pricing Pierre Bourgeix: The race to the cheapest price is a big problem. We have well-intended designs and assessments that define best-of-breed and evaluate what would be necessary to do what the client needs. But once we get to the final point of that being implemented, the customer typically goes to the lowest price – the lowest bidder. That’s the biggest issue. You get what you pay for at the end of the day. With standards, we are trying to get to the point that people realise that not all products are made the same, not all integrators do the same work. We hope that through education of the end user, they can realise that if they change the design, they have to accept the liability.It’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it" The big picture Wael Lahoud: The Windows platform has a lot of vulnerabilities, but we’re still using it, even in banks. So, it’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it. That’s where the cybersecurity program comes into play. There are many vulnerable products in the market, and it’s up to professionals to properly secure these products and to design systems and reduce the risk. Pierre Bourgeix: The access port to get to data is what hackers are looking for. The weakest link is where they go. They want to penetrate through access control to get to databases. The golden ring is the data source, so they can get credentialing, so they can gain access to your active directory, which then gives them permissions to get into your “admin.” Once we get into “admin,” we get to the source of the information. It has nothing to do with gaining access to a door, it has everything to do with data. And that’s happening all the time.
PerpetuityARC Training, part of the Linx International Group recently delivers a risk and crisis management workshop for Lafarge Egypt (part of the LafargeHolcim Group) in Cairo. The training provided senior managers from across the organisation with the knowledge and skills needed to manage resources during a crisis and operate within the organisation’s crisis management and compliance framework. The intensive programme was built collaboratively between PerpetuityARC Training and Lafarge Egypt and specifically tailored to its operating environment in the construction materials industry. Achieve successful resolution It was great to see them solving problems in a pressured, but safe environment" In a series of practical and theoretical exercises, Linx International Group Director, Angus Darroch-Warren, assessed and enhanced the ability and confidence of participants to apply their new skills to manage complex and evolving crisis scenarios, each requiring close collaboration between team members, in order to achieve a successful resolution. Security Director at Lafarge, Magdy Khorshid, stated: “The course was amazing, very practical and interesting to all and I received much positive feedback from all learners.” Angus commented: “The Lafarge teams engaged fully with the workshop scenarios. It was great to see them solving problems in a pressured, but safe environment, that allowed them to think through issues and respond using identified resources and procedures.” The workshop is the latest collaboration in a five year relationship between Lafarge Egypt and PerpetuityARC Training. During this time PerpetuityARC Training has delivered its security and risk related courses to employees and stakeholders in Egpyt and the UK.
To succeed in business, one must be brilliant at one thing. In many cases it’s a skill, such as art, coding, engineering or design. Or that one brilliant attribute can also be a personality trait or a business process. No business will be successful unless it is at least adequate, and preferably superb, in product development, sales, and customer engagement - not to mention finance, planning, marketing and recruiting. Too many VMS producers are trying to do all these things themselves when they should be doubling up on what they are best at and leveraging the rest. It is a new mindset. Instead of obsessing about which ‘me-too’ product to supply, software producers could make their first priority finding complementary and compatible partners. Developing a partnership ecosystem One partner might see the opportunity to sell a solution. Another partner might know a better way to distribute a product. A third partner might provide the vertical expertise to get the customer a perfectly tailored solution. By leveraging partners and developing a partner ecosystem, a company will tend to have more unique offerings and the ability to execute faster in an ever-changing world. All this additional partner horsepower is still no guarantee a company will succeed but partnerships will also give a company a feedback channel. Many stand-alone companies plod along, never quite failing, but never getting better either. Partners are less likely to tolerate business limbo. They will be quick to utilise great products, and less wedded to the concept if it doesn’t prove out. Because the partners are in close contact with the market, they are the first responders to changing or developing needs. This is why a company should listen very closely to their partners: They are the feet on the street and the ears to the beat! Open platform matters Producing software takes time, and producing great software takes even longer All of this is not possible, however, if a company produces closed platform software. This is software whose functions can only be changed by the original developers. Producing software takes time, and producing great software takes even longer. This means low agility. The partners might identify great opportunities, but before the closed platform software producer can react, the opportunities might be gone - or worse, be grabbed by competitors. The slow reaction capabilities of closed platform providers will frustrate partners and may lead to the worst of all complications in a partnership: distrust. Add-on modules and intrinsic scripting When the products are based on an open platform, however, they are adaptable. Then the partners have the ability to change the solution through the open software architecture. Not by changing the basic code (that would be open source) but by add-on modules and intrinsic scripting abilities. Total integrated solution Open platform means that the partner can easily extend and enhance the software into a total integrated solution Open platform means that the partner can easily extend and enhance the software into a total integrated solution to fulfill the customer’s needs with the minimum of effort. This gives agility, and agility means fast go-to-market abilities. Just what is needed in this fast-moving world. There are some important things to note here. The ways to extend and enhance the software have to be easy and well documented. The partners must have access to training and knowledge sharing. (It does not help to have a system for extending the capabilities of the software if the partners have to guess at the process and the documentation is rudimentary.) Open access is key It is important that the business philosophy is based on openness, giving the partners full access to all relevant information. And openness is a two-way street: By being open for your partners, you also have to be open about their business. A partner might be able to develop a highly sophisticated solution but be unable to market the solution. By building a catalogue of partner solutions easily accessible to customers, openness extends to ensure open access to the partners. Openness is not something a business can just tack on to their approach. It has to be in the DNA of the business from the start. In a Harvard Business Review article entitled ‘Predators and Prey: A new ecology of competition,’ JF Moore says: “A business ecosystem, like its biological counterpart, gradually moves from a random collection of elements to a more structured community.” Structured business ecosystem Milestone has seen this progression within the company's ecosystem Milestone has seen this progression within the company's ecosystem. They introduced training and certification requirements as part of the partnership success structure, ensuring knowledge is shared and also used in a way that is most mutually beneficial for all involved. Moore also writes: “Every business ecosystem develops in four distinct stages: birth, expansion, leadership and self-renewal.” At present, Milestone and its partners are entering into the ‘leadership’ stage, where video enabling is creating opportunities beyond those offered by a traditional video surveillance system, and into areas that provide additional business benefits to our customers. Video enabling “A leader must emerge in the ecosystem,” Moore says, “to initiate a process of rapid, ongoing improvement that draws the entire community toward a grander future.” This is the role Milestone has played in leading the industry towards the video enabling phase and redefining the industry’s expectations of what a surveillance system is capable of. In the article, Moore underlines that “executives whose horizons are bounded by the traditional industry perspectives will find themselves missing the real challenges and opportunities that face their companies.” Getting connected Connectors are those people with a wide range of contacts across different social circles In his book The Tipping Point, Malcolm Gladwell describes what he calls ‘The Law of the Few,’ which says: "The success of any kind of social epidemic is heavily dependent on the involvement of people with a particular and rare set of social gifts." This is based on the 80/20 principal, “which is the idea that in any situation roughly 80 percent of the 'work' will be done by 20 percent of the participants." He goes on to identify three types of people with these gifts: Salesmen, who are skilled in persuasion and negotiation; Mavens, who collect and disseminate useful information; and Connectors. Connectors are those people with a wide range of contacts across different social circles who can make introductions and create links between otherwise disparate individuals. Milestone, key connector in physical security industry In the wider scheme of things, Milestone effectively acts as a ‘Connector’ in the business ecosystem and in the overall physical security industry. Milestone brings together companies who are brilliant in their respective fields and make it easy for them to work together to create a valuable solution for the customer. The company provides the environment for that to occur and work closely with them to ensure that the end result is useful and effective. At Milestone, partners realised that significant investments in education and training was required to create the demand for the company's products and solutions that the conservative physical security industry required. The value of partnership was learnt and the ‘open’ approach adopted, which was a central part of the thinking behind our software. Adopting the Scandinavian management model Milestone effectively acts as a ‘Connector’ in the business ecosystem and in the overall physical security industry Milestone extended this approach to the entire business model, creating the ecosystem that has been the driving force for success. And while the company embraced the best of the Scandinavian management model, its inclusiveness and encouragement of creativity, they still needed to have the courage to make changes to the business, changes which would ensure the best possible position to take on whatever challenges the future might hold. Milestone partner ecosystem Milestone have always worked in a partner-driven business mode. The company from the start was designed to be open and partner oriented. The Milestone partner ecosystem is a fundamental part of its mindset and daily operations. It is one of the major reasons for getting the company to the position where it is today. To be in a company without the partner component would be like cutting the internet and phone cables while reverting to telex and written paper letters! The company would be developing products in the dark, not knowing the demand. Open business world Today, Milestone's partners are delivering optimal solutions to mutual customers, building a better and open business world with video as a business enhancer. All thanks to the company's open platform and community approach. To have a flourishing partner ecosystem, one must think not as a corporation but in human terms. Because companies don’t think, humans do. In all senses of the word, there is one thing that will contribute more to the success of a partnership than anything else; 'Give before hoping to receive'.
The potential for catastrophic injury in the petrochemical industry makes safety training and credentialing of employees imperative. Coordinating this process for a variety of industries, including many in the petrochemical fields of southern Alabama, is Training Solutions for Construction and Industry (TSCI). The mission of TSCI is to promote and facilitate workforce development ‘by providing industry-recognised training with portable credentials to create a diverse, trained and sustainable workforce’. TSCI provides computer-based and instructor-led training developed by the Association of Reciprocal Safety Councils (ARSC) and based on requirements from the Occupational Safety and Health Act (OSHA) and the U.S. Department of Homeland Security. Within one day, a person can gain all of his or her required training for a year, and it will be accredited. ID cards with encoded results Workers who successfully complete a TSCI safety orientation receive a tamper-proof ID card, encoded with the results of his or her training. “ID cards give students a record of their training and eventual access to a plant,” said Jack Fecas, Operations Manager, TSCI. The card is valid for one year. If other safety or specialised training is completed during that year, the card is encoded with the additional credentials. All member plants of TSCI and ARSC member organisations recognise and accept the ID card. Workers look to TSCI for training in such areas as fire safety, process safety management, confined space entry, respiratory protection, hazardous energy, basic first aid and CPR, scissor lift, scaffolding, excavation and trenching, elevated work surfaces, electrical safety and disaster site safety. The Office of Homeland Security also can set criteria for credentialing, such as asking for drug screen results. Site-specific and fire safety training TSCI provides site-specific training, which might include a focus on fires or explosions at a refinery or dust-particle respiratory safety at a mill In addition to its basic orientation training programs, TSCI provides site-specific training, which might include a focus on fires or explosions at a refinery or dust-particle respiratory safety at a mill. “Some companies using dangerous materials have wind socks to indicate which direction the wind is blowing, telling employees which exit route is safe for use at that time,” said Fecas. “This kind of training needs to be site-specific.” Other site-specific training might include basic alarm system safety, teaching employees what to do when they hear a constant alarm versus what they might do if they hear several short bursts of an alarm. About 1,500 workers take the basic orientation program from TSCI every year, and the numbers are growing. With only one printer, clearly more capacity was needed. Fargo’s DTC550 printer/encoder Fecas knew that his organisation needed more capacity in order to handle the increasing volume, so he began looking for an additional printer – one that was fast, yet reliable. He needed barcode code technology and a printer that could encode new data as workers took additional classes. TSCI found all of the requirements it was seeking in Fargo’s DTC550 Direct-to-Card printer/encoder from ID Wholesaler. Not surprisingly, the security offered by the DTC550 was a primary selling point for Fecas. In addition to being recommended by other ARSC Safety Councils, it just made good business sense. TSCI chose a standard holographic overlaminate available with the DTC550, which improves the card’s durability and reduces the risk of counterfeiting. More than 80 percent of training occurs at the TSCI offices, according to Fecas, but it also can take place at a plant site. With the new DTC550 able to handle the increasing demand at TSCI, the old printer will be used for remote training, thus increasing TSCI’s ability to meet the needs of its customers. Workspace security The common curriculum of our safety training levels the playing field, so when workers leave TSCI they can recognise the hazards in the worksite and protect themselves and their co-workers" “The common curriculum of our safety training levels the playing field, so when workers leave TSCI they can recognise the hazards in the worksite and protect themselves and their co-workers,” Fecas added. “They still have information to learn at the plant, but they are ready to go to work.” “We have had ID cards since we began in 1995,” he said, “but with the early cards, there was much more hand-work. Our operator had to add a photo by hand and then wait for the laminating machine to heat up before the card could be laminated. The evolution has been very interesting. In addition, we have been very pleased with the service provided by the Fargo printer and by ID Wholesaler. I can pick up the phone or send an e-mail, and a representative is available for assistance.” Most secure system “We recommended the DTC550 printer because it is very reliable and has more than one holographic laminate choice,” said Jeff Gunhus, ID Wholesaler Sales Team Leader. “TSCI originally bought just the printer and had to wait until its next budget cycle to purchase the lamination unit. They liked the fact that the Fargo printer had an upgrade path. It is important to listen to our clients’ wants, needs and concerns,” Gunhus added. “Then we simply do our best to help them out.” “If a company is going to do business nowadays, it needs to be secure,” adds Fecas. “Our business relies on plants and regulatory agencies trusting what we do. We need to be on the cutting edge when it comes to information technology. The best system is the most secure system. We made a decision to go with what has been tried and true and working in industry now.”
Government regulations continue to step up security demands at federal agencies, requiring identity cards to support multiple identity assurance factors and be validated at entries into a building or location. Because of the cost and infrastructure that goes along with many security upgrades, federal agencies must wait months or, in many cases, years to implement changes. The Federal Aviation Administration—an operating mode of the U.S. Department of Transportation—is no different. The FAA is tasked with the colossal mission of regulating and overseeing all aspects of civil aviation in the United States. With offices around the world, including its headquarters in Washington, D.C., the FAA has a large number of employees and buildings to oversee. With so many people coming into and out of the buildings each day, it is particularly important that security personnel have reliable tools to validate employee credentials Need of tools for validating employee credentials As part of its security requirements, the FAA must validate Personal Identity Verification (PIV) cards at checkpoints within its facilities. With so many people coming into and out of the buildings each day, it is particularly important that security personnel have reliable tools to validate employee credentials. As recently as a year ago, FAA security personnel were conducting visual inspection of PIV cards at the gates into facilities that did not have PIV card readers. They had no way of telling if the card was authentic, revoked, or if the employee had access rights to a checkpoint at a particular time. At the FAA headquarters, which employs just under 6,000 permanent employees, and another FAA facility, the Minneapolis Air Route Traffic Control Center, which is the organisation’s 11th busiest airport traffic control tower, visual verification just wasn’t enough. Automating the verification process In order to comply with HSPD-12 and the Office of Management and Budget (OMB) Memorandum 11-11, the FAA needed a process beyond visual verification that allowed security personnel to quickly check the authenticity and revocation status of a card, as well as access rights to a particular area of the facility. With as many as 5,000 people coming into the FAA headquarters facility daily, the organisation’s primary goal was to automate the verification process. “The project needed to provide guards the ability to validate PIV cards at FAA facilities where the gates did not have PIV card readers,” said Craig Auguston, HSPD-12 Program Manager at the Federal Aviation Administration. “We also wanted a mobile solution for backup and for roaming guards to be able to validate secure areas, such as parking garages.” Codebench’s OMNICheck Plus software OMNICheck Plus was ultimately decided upon because it is integrated with many physical access control systems including the P2000 The FAA began looking at products that could not only meet its requirements for mobile validation, but also integrate seamlessly with its P2000 security management database from Johnson Controls (JCI), according to Auguston. “This upgrade was important to meet the FAA’s requirement to validate PIV cards at all check points,” Auguston said. The FAA’s former process of visual verification was not allowing security guards to check the status of a PIV card, such as revocation status and specific access rights, both of which the organisation needed to meet its security goals. After testing a couple of mobile software validation programs, the organisation chose OMNICheck Plus software from Codebench, a HID Global Company. OMNICheck Plus was ultimately decided upon because it is integrated with many physical access control systems including the P2000, and it is listed on the GSA’s FIPS 201 Approved Products List as a CAK authentication system when running on an ARM-based mobile device such as the DAP CE3240B, which both FAA facilities use. Giving mobile access to the security guards “They really needed something that was going to allow their security guards to be mobile in certain parts of a facility,” said Botio Mandov of Johnson Controls. Johnson Controls, the integrator for the project, helped the FAA implement a larger security upgrade, which included the security management database and mobile validation software. Together, the FAA’s mobile DAP devices and OMNICheck Plus software enabled roaming security guards to use the mobile handheld devices in FAA parking garages and other entry points that needed to be secured, but do not have stationary PIV card readers. One of the most important aspects of authentication software for the FAA was the ability to check an employee’s access rights directly on the mobile card readers Checking access rights on mobile card readers In addition to mobility, one of the most important aspects of authentication software for the FAA was the ability to check an employee’s access rights directly on the mobile card readers—something only their organisation’s P2000 physical access control system could do previously. With an OMNICheck module called Data Import, certain cardholder information housed in the FAA’s P2000 database, such as access rights, was pushed down into the DAP mobile devices used by security personnel. “Access rights allow FAA security guards to make sure employees’ cards are not only valid, but that they are allowed to be in a certain area at a certain time,” Mandov said. In addition, FAA security administrators can run audit reports that show which cards were checked and when. The implementation took about five months, including testing the interface with the access control system and coming up with a training guide for the security guards, according to Auguston. The FAA is currently using 31 DAP CE3240B mobile readers with OMNICheck Plus. Saving money by eliminating physical parking passes Prior to the OMNICheck Plus installation, FAA security personnel had an unreliable way of authenticating PIV cards and access rights. Now, security personnel are able to verify digital certificates, revocation status and access rights, all while having an audit trail of the cards checked in the system. An additional, unexpected benefit for the FAA has been the cost savings of eliminating physical parking passes at its two facilities. “We are able to positively identify cardholders’ status when they try to enter the facility. We were able to save money by eliminating the physical parking pass by using OMNICheck to validate cardholder’s status for parking in FAA-controlled facilities,” Auguston explained.
The Sinan Erdem Dome is the largest multi-purpose indoor venue in Turkey. Located in Istanbul, the dome has a seating capacity of up to 22,500, and hosts a number of events, including concerts, tennis matches, and basketball games. Strengthening stadium security Upon being chosen to host a number of games during the European Basketball Championships 2017, the chief European men’s international basketball competition held biannually, the Sinan Erdem Dome looked to strengthen their security system. The dome’s large-scale presented high-surveillance requirements such as support for 64 split-screens, hundreds of cameras, and a back-end storage and management infrastructure that could support the entire system. Dahua provided the dome with a complete, high-end monitoring system that included a total of over 600 IP, speed dome, and ANPR cameras on the front-end, and NVRs, video walls, video matrix devices, and related control accessories on the back-end. Smart detection technologies The dome’s surveillance system was constructed with the latest cutting-edge technology To better protect the stadium from a variety of threats, the solution employed a number of smart detection technologies such as intelligent analysis, which includes motion detection, tripwire, intrusion, and smart-tracking functionality. ANPR was also utilised, which recognises licence plates numbers and checks them against a central whitelist and blacklist. Plate records are also stored on NVR devices and can be searched through by security officers. In less than a week, the local team completed installation, testing, and customer training, and the dome was fully ready to securely host international sporting events. Protecting all corners In under a week, the dome’s surveillance system was constructed with the latest cutting-edge technology, increasing its appeal to international events seeking venues. Dahua smart technologies automated a great number of surveillance operations, such as automatic car-barrier operation enabled by ANPR camera integration, thus greatly reducing the strain on security workers. Every corner of the stadium was covered by Dahua cameras providing high definition video, ensuring zero blind spots and optimal detail collection. In addition, Dahua showcased its customer-centric philosophy through supplying high-quality customisation, technical support, operation training, and after-sales service, which guaranteed the expertise of system operators as well as long-term reliability and quick issue resolution.
Round table discussion
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?
Even the most advanced and sophisticated security systems are limited in their effectiveness by a factor that is common to all systems – the human factor. How effectively integrators install systems and how productively users interface with their systems both depend largely on how well individual people are trained. We asked this week’s Expert Panel Roundtable: What is the changing role of training in the security and video surveillance market?
What happens after the sale is complete, after the contracts are all signed and sealed? That’s when an abundance of variables can kick in – variables that can mean the difference between a successful security system or a case of buyer’s remorse. The features and value of equipment involved in a security system are well known before the sale closes, as hopefully are the integrator’s and end-user’s expectations about after-sale service. But what is the reality of after-sale service, and how can manufacturer’s make it better? We asked this week’s Expert Panel Roundtable: How can security system manufacturers improve their after-sale service for integrators and end users?