Pulse Secure, the provider of Secure Access solutions, announced its designation as a Distinguished Vendor in this year’s ‘2019 TAG Cyber Security Annual’. Pulse Secure recently became a member of the world’s leading cybersecurity vendors as selected by Dr. Edward Amoroso, CEO of TAG Cyber, and added to this year’s report. Each year TAG Cyber publishes its three-volume report to the IT community for download at no cost. Volume Two of the report also includes an inf...
Cathexis is proud to be exhibiting at Security Essen from 25-28 September 2018 at the Messe Essen Exhibition Centre, in the City of Essen, Germany. Cathexis is a globally recognised Video Management Software (VMS) Developer, with over two decades of expertise in providing world-class Video Surveillance Software solutions to the international market. Cathexis will be showcasing CathexisVision 2018 which offers feature-rich functionality and ease of installation and use for a range of vertical ma...
Vanderbilt solutions such as ACT365 and SPC Connect are proving extremely popular choices for security installers due to the simple mantra of the cloud – adaptability and flexibility. Although the cloud is one of the most heavily talked about topics in the industry right now, the concept has existed for many years, decades even. In the early 1960’s, an American computer scientist named John McCarthy developed the notion of time-sharing. This initial thought process ultimately kick-s...
LOCKEN was established in 2003, combining the knowledge and expertise of its three founders, Arnaud Flecchia, Roland de la Chapelle and Stéphane Conreux. Well established within the telecom and IT world, this threesome has transformed the business of access control: thanks to breakthrough technology, based on intelligent keys and user-friendly software, they brought to the market a solution that required no wiring or maintenance. This was a remarkable leap forward that has fully benefited...
GlobalPlatform, the standard for secure digital services and devices, has published two configurations to simplify and expedite the implementation of its Trusted Execution Environment Management Framework (TMF). The configurations offer guidance on the specific parts of the framework that need to be implemented to remotely manage Trusted Execution Environments (TEEs) and their trusted applications (TAs) on particular device types. “The original TMF specification is extensive, covering a w...
In today’s era of globalisation, it is important to have talented and skilled employees in different locations. To significantly improve field operation, managing and analysing your team deployed in the field is a key task. Whether it is logistics, hospitality, construction or retail industries, it is essential to have effective communication with workers to keep up their morale and for better planning of field employees. With the traditional system, it becomes a herculean task to manage r...
Pulse Secure, a provider of Secure Access solutions, announced that EMA, an analyst firm specialising in IT and data management technologies, has honored Pulse Secure as the industry’s leading hybrid IT secure access platform vendor. Pulse Secure was selected by EMA as a “Top Three” vendor in three related product categories and was the only vendor, among more than 60 assessed, to achieve the highest ratings across these Hybrid IT categories. Driven by digital business transformation, the world of securing access to enterprise applications, data and other IT services continues to evolve at a rapid pace. Emerging requirements for workforce mobility, distributed data center, virtual and cloud-based IT environments, and data protection have yielded significant access control complexities. Identifying access security issues The published report identified ten priorities for enabling secure access to enterprise IT servicesEMA conducted research to identify the access security issues facing organisations, including a survey of leaders from over 200 enterprises and an analysis of hundreds of vendor product briefings, case studies and demonstrations. The published report identified ten priorities for enabling secure access to enterprise IT services and offers insight into key challenges, considerations and technologies. The report also supports IT decision makers’ vendor-selection process as it heralds 30 of the most innovative vendor solutions addressing the greatest array of requirements for secure access enablement, highlighting Pulse Secure’s leadership ranking across three categories: Unifying access control across hybrid IT ecosystems Enabling secure remote access to business networks Network Access Control with IoT enablement Hybrid IT Secure Access platform “Increased pressure to enable workforce mobility and scale IT services across a variety of data center, public and private cloud environments have challenged organisations to grant secure and reliable access,” said Steve Brasen, research director at Enterprise Management Associates. “Based on the breadth, depth and interoperability of its solutions, Pulse Secure is distinguished in the market as providing the most comprehensive, integrated and flexible Hybrid IT Secure Access platform.” “EMA’s recognition of Pulse Secure as an industry-leading secure access vendor is testament to our focus on customer needs and our drive to ensure superior user experience while delivering simple, highly manageable and integrated solutions,” said Sudhakar Ramakrishna, CEO at Pulse Secure. “Our Secure Access portfolio enables organisations to improve productivity by addressing a wide variety of business, visibility and compliance requirements as they evolve from data center to hybrid IT environments.” Software-driven access solutions Pulse Secure offers a portfolio of software-driven Secure Access solutions Pulse Secure offers a portfolio of software-driven Secure Access solutions that satisfy usability, contextual intelligence and orchestration to support hybrid IT environments. The EMA comparative vendor research resulted in three Pulse Secure products being awarded as top solutions: Pulse Cloud Secure, Pulse Connect Secure and Pulse Policy Secure. In the “Unifying access control across hybrid IT ecosystems” category, key considerations for solution adoption included: console interface breadth of support, endpoint identity management capabilities, hybrid hosting environment support, connectivity governance and IT service integrations. The report highlights Pulse Secure’s hybrid IT access management solution, Pulse Cloud Secure, as offering: Access to on-premises and public cloud-hosted services enabled through Pulse Connect Secure Broad SSO and MFA support with stringent host checking of endpoints Visibility and policy-enforcement for security compliance by validating endpoints and verifying levels of access before connections Integration directly with identity providers, including Ping Identity, Okta and Microsoft ADFS Secure network connections The Pulse One management platform can be used to automate appliance software updatesIn the “Enabling secure remote access to business networks” category, key considerations for solution adoption included: persistence of secure network connections, context awareness, breadth of supported endpoints, onboarding process and third-party integrations. The report highlights Pulse Secure’s data center and cloud VPN platform, Pulse Connect Secure, as offering: Secure VPN connections may be optionally set as always-on (routing all network traffic), on demand (only when needed) or only when utilising specific applications The Pulse One management platform can be used to automate appliance software updates and policy changes while viewing a dashboard of appliance status Unified client that supports a variety of endpoint types, including Windows, macOS, Linux (CentOS, Debian, Fedora, Red Hat, Ubuntu), iOS, Android and Chrome OS When a user transitions from a remote location to an on-premises location, connectivity is dynamically switched without any interruption to the existing network connections Application certifications that include: Common Criteria (NDcPP), FIPS and JITC UC APL IoT device authentication Designed for scale, Pulse Policy Secure can support up to 20 million endpointsIn the “Network Access Control with IoT enablement” category, key consideration for solution adoption included: scalability, IoT device authentication, contextually-aware policy controls, inclusion of a RADIUS server, dashboarding, reporting and alerting, and third-party integrations. The report highlights Pulse Secure’s NAC solution, Pulse Policy Secure, as offering: Profiles network devices with real-time detection, classification and monitoring of managed, unmanaged and IoT devices to deliver an intuitive user experience via a unified client for both NAC and remote VPN access to the data center and cloud Contextual information for endpoint visibility and policy enforcement are referenced from a wide variety of network protocols, data collection tools and multivendor integrations Automates onboarding, sponsored-based guest and device management, and BYOD enablement Integrates with next-generation firewalls for identity-based admission control and sends user identity information to other 3rd party solutions via API, Syslog and the IF-MAP protocol Built-in, high-performance RADIUS server eliminates proxy latency while simplifying network planning and reducing TCO Centrally managed from the cloud or on-premises with the Pulse One administration console and includes dashboards that provide a high-level snapshot of all managed, unmanaged and IoT devices as well as granular reports delivering inventory, access, security and compliance details Designed for scale, Pulse Policy Secure can support up to 20 million endpoints
Paxton Access, a provider of electronic access control and video intercom solutions, announces the launch of its new app, Paxton Connect Admin to manage its IP access control system, Net2. The app provides easy and flexible site management on a smartphone for Net2 System Engineers and Operators. It contains five features in one smart user interface and enables users to manage multiple sites remotely. Provides advanced functionality The features include: Open Door – Open a door directly from your phone, wherever you are User Administration – Add, delete, and edit users for easy management Roll Call – Quickly establish whether users are marked as safe in an emergency Events and Reports – Real-time updates provide live information on users’ locations Gareth O’Hara, Paxton’s Chief Sales Officer, says: “The way our customers manage their site security is evolving; the ability to administrate remotely is key to flexible site management. We have acted on customer feedback and designed an app that provides advanced functionality in an easily accessible program to ensure the management and administration of sites is as accessible and straightforward as possible.”
ASSA ABLOY Security Solutions, a UK division of ASSA ABLOY, a provider of door opening solutions, has released its latest white paper on key management and control for void properties in the social housing sector. According to the Department for Communities and Local Government, housing associations and local authorities own five million homes in the UK, with 610,000 of these homes empty at any one time between tenancies - approximately an eighth of the total stock. Impact of effective key management The white paper from ASSA ABLOY Security Solutions addresses the impact that effective key management The time spent by local authorities physically handing over keys between different maintenance staff and contractors can cause significant workflow delays, increase the risk of keys being lost or stolen, and result in considerable delays in re-letting properties. All of these issues can potentially lead to large costs for councils and housing associations. The white paper from ASSA ABLOY Security Solutions addresses the impact that effective key management and control can have on improving operational efficiencies for void properties, as well as ensuring budgets are used more efficiently. Finally, the white paper outlines how ASSA CLIQ Remote can make a huge difference to an organisation’s key management and control processes. These include streamlining operations, reducing the risk of lost or copied keys being compromised, cutting costs and improving an organisation’s sustainability credentials. Electro-mechanical locking system ASSA CLIQ Remote is a simple, intelligent electro-mechanical locking system that allows only those with the necessary authority to access a building. It enables owners to have complete control over who can access a property, with members of staff allocated a single key, and entry permissions that can be altered remotely or set for only a certain length of time. The need for an efficient and effective key management process is really important" One organisation to benefit from ASSA CLIQ Remote is Rotherham Metropolitan Borough Council (RMBC). Since its introduction, the system has helped the council save approximately 40 hours of time every week. The reduction in re-let times has allowed RMBC to deliver an additional £60,000 a year in rental income revenue, enabling the council to use its budget and resources more effectively. Social housing sector The guide’s author, Simon Wilson, National Sales Manager for ASSA CLIQ Remote, said: "In the social housing sector, the pressure to re-let houses as quickly as possible and work to tight budgets should not be underestimated. Nevertheless, properties will inevitably stand empty between tenancies, while staff and contractors carry out the necessary repairs and maintenance." He further added, "As a result, the need for an efficient and effective key management process is really important. Our latest guide discusses this in more detail, while demonstrating the benefits of adopting ASSA CLIQ Remote. It has proven to help save local authorities and housing associations considerable amounts of time and money."
As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of security — it’s here. If you’re hesitant to make the move to the cloud, consider these six reasons to embrace this new technology now.Cloud technology has created an opportunity for integrators to offer managed services to their customers Increased RMR Cloud technology has created an opportunity for integrators to offer managed services to their customers, producing a new business model that generates more stable and predictable income streams. By offering managed services on a subscription basis, integrators can build a part of their business to provide recurring monthly revenue (RMR), allowing them to scale faster. This business model is especially beneficial for customers who prefer to pay a fixed monthly or yearly rate for services rather than a large upfront fee, which can help attract new business while growing revenue from current customers. Stickier customers Providing managed services fosters a more involved relationship between integrators and their customers, which can help boost customer retention. This is primarily the result of three factors. Firstly, customers who buy managed services are committed for a specified term, which helps develop an ongoing business relationship between them and the integrator. Secondly, providing managed services creates an opportunity for more customer contact — each interaction is an opportunity to build rapport and monitor customer satisfaction.While the functionalities of each system vary, their potential is evident in the cloud-based services available Third, customers who purchase managed services generally tend to do business longer than customers who purchase products or services individually; with the monthly purchase of their services on autopilot, customers get into the habit of receiving these services, which helps reduce the chance that they’ll cancel their subscription while also building customer loyalty. High gross profit margins Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. On an ongoing basis, cloud service platforms offer a new level of accessibility to integrators, helping to provide better insight on activity trends to identify opportunities to continuously grow their revenue through subscription-based streams. Easier to provide managed services Traditionally, serving more sites required integrators to hire more technicians to meet the needs of their growing customer base, but the cloud has helped overcome this demand. While the functionalities of each system vary, their potential is evident in the cloud-based service platforms that are available today. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue The Avigilon Blue™ platform, for example, is a powerful new cloud service platform that helps integrators address the needs of their customer sites using fewer resources by offering the ability to administer system upgrades, fixes, health checks, and camera or system settings adjustments remotely. The Avigilon Blue platform automatically sends, and stores video analytics highlights in the cloud, which can easily be accessed from any PC browser or mobile device. This data can be used to efficiently manage customer sites and maintain the health of those sites, helping to increase speed of service and expand the capacity to have more sites up and running. Cloud service platforms have the potential to revolutionise the security industry by providing new opportunities for integrators Not only does this help integrators scale their business faster, it creates an opportunity to provide added value to the customer at a lower cost as new upgrades and services come out. Proactively fix problems before they occur In addition to automating notifications and tedious maintenance tasks, cloud service platforms help provide integrators with the information and abilities they need to keep their customer sites running smoothly. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue — possibly before the customer even notices a disruption in service. They can then identify the problem and determine whether it can be resolved remotely or requires a technician to be deployed. By having the capacity to pinpoint service needs and make certain adjustments via the cloud, integrators can streamline their customer service processes and lower their response times to provide better, more efficient service. Increased valuation of business Companies that utilise cloud technologies are experiencing as much as 53 percent higher revenue growth rates The ability of cloud service platforms to help integrators manage more sites remotely and expand their revenue through subscription-based streams offers a competitive business advantage. Security innovators have harnessed the power of the cloud to enhance integrator efficiency so that they can spare their attention, resources and effort for where it’s needed most. As a service that helps offer scalability and a high gross profit margin while requiring fewer resources to maintain customer sites, cloud service platforms have the potential to revolutionise the security industry by providing new opportunities for integrators that may ultimately increase their business valuation. According to a study by Dell, companies that utilise cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Integrators who adopt cloud service platforms can benefit from numerous advantages — cost-saving maintenance capabilities, the potential to generate new monthly recurring revenue, and user-friendly design and data security — which make them a significant development within the industry as well as a potential lucrative new business model. The dream of cloud technology is no longer a distant idea of the future, it can become a present reality — and integrators who harness its power can reap its business benefits now.
Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, provider of residential security, announces the availability of the contemporary versions of the company’s popular traditional deadbolts: the SmartCode 914 Deadbolt Lock and SmartCode 916 Touchscreen Electronic Deadbolt. With their updated, modern designs, these new stylish versions of the industry’s leading wireless, access control locks continue to utilise Kwikset’s Home Connect technology. As a result, they integrate with home security and automation systems to deliver convenience and peace of mind to homeowners with remote locking/unlocking via smartphones and tablets. Wireless security features The new versions of the SmartCode 914 and SmartCode 916 with Home Connect technology incorporate the new Z-Wave 500 Series chip. The new chip provides a number of enhancements, including extended wireless range and wireless security features that reduce the vulnerability of the network during enrollment, as well as increased battery life. Said Keith Brandon, Divisional Vice President of Residential Access Solutions, Spectrum Brands, Inc. – Hardware & Home Improvement Division, “These additions to the SmartCode line exemplify Kwikset’s commitment to not only meeting customer demand for convenience-enhancing technology, security and innovation, but also providing a variety of aesthetic options.” SmartCode 916 also features Kwikset’s unique SecureScreen, which helps mask ‘smudge’ attacks Convenience of features Both the SmartCode 914 with its 10-button keypad and the SmartCode 916 with its responsive capacitive touchscreen offer the convenience of features like keyless entry and dedicated one-touch locking, as well as the security of an all-metal, tamper-resistant interior escutcheon, ensuring top-quality and durability. The SmartCode 916 also features Kwikset’s unique SecureScreen, which helps mask ‘smudge’ attacks in which users codes can be potentially jeopardised by detecting frequently used numbers from the oily residues on the touchscreen surface. Both locks are available in three finishes: Polished Chrome, Satin Nickel, and Venetian Bronze. MSRP for the SmartCode 914 is $199; MSRP for the SmartCode 916 is $229.
ASSA ABLOY Security Solutions, a UK division of ASSA ABLOY, the global door opening solutions’ provider, is launching the new CLIQ Go system for locksmiths looking to future-proof their security expertise. Remote access management To keep operations simple, CLIQ Go allows customers to remotely manage security from a smartphone App. This enables clients to easily manage and change access rights on demand, and instantly revoke authorisation if needed. CLIQ Go offers a major upgrade to traditional mechanical keys. Just one mechanical coding for all systems enables locksmith to keep keys and cylinders in stock, and to programme and configure on demand using the CLIQ Express software. The system combines high electronic and mechanical security and is powered by a battery inside every key. Furthermore, no software installation or maintenance is required at the client’s end, keeping operation simple for locksmiths and customers alike. CLIQ Go is perfect for installers and resellers looking to offer quicker and more efficient services to small and medium-sized businesses" Secure access control “CLIQ Go is perfect for installers and resellers looking to offer quicker and more efficient services to small and medium-sized businesses,” says Simon Wilson, National Sales Manager for ASSA CLIQ Remote at ASSA ABLOY Security Solutions. “Managers don’t want to be wasting time changing all their cylinders because someone lost a key, and with CLIQ Go they don’t need to. Secure access control is at their fingertips.” “It offers high standards of security at a cost-effective price, as well as a recurring revenue stream for savvy locksmiths. CLIQ Go brings old-fashioned locks into the 21st century, and forward-looking business clients will love it.” CLIQ Go master key system CLIQ Go cylinders are quick and easy to install without wiring at the door. Cylinders and keys are built to withstand the elements, so can be used on interior and exterior openings, and work across multiple types of enclosure, including doors, cabinets, cupboards and padlocks. CLIQ Go has the potential to be the last master key system the end user ever needs because of the control on keys they have.
Security is important for any construction project, but the stakes are higher when the tenants are a team of professional athletes, the parking lot is filled with sports cars and luxury vehicles, the property includes a multi-million-dollar turf field, and a professional training facility where exercises held there must be guarded as corporate secrets. To meet these challenges, Vicon recently completed work with a professional national sports team to install an end-to-end, tightly integrated video management and access control solution that relies exclusively on Vicon software, hardware and cameras. Due to sensitive security demands the team remains anonymous in this piece. The professional team’s Security Director says that he needed a system that would capture footage of everything going on, inside and around the perimeter of the facility, and make sure that access was limited to only authorised personnel. At the same time, the technology needed to make it easy for players and employees to get through security. “It doesn’t do anyone any good if a system is so difficult to use that people just prop the doors open. We had to blend those two things together,” he says. VAX access controllers Twenty-six doors, including both exterior exits and interior doors throughout the building, have been secured with VAX access control door controllers. Employee’s permissions are based on their jobs. Administrators can’t enter the locker rooms or training areas and players can’t enter the marketing offices. Many of the players come to the facility wearing athletic apparel and prefer not to carry around a wallet and key card, so Vicon created customised proximity tags embossed with the team’s logo, designed for players and employees to stick on the back of their cell phone cases. This turned out to be a popular solution, as the players always carry their cell phones with them and the tags are attractive and support the team’s branding. VAX door panels The panic buttons are wired to open inputs on the nearest VAX door panels In the world of professional sports, athletes must sometimes be protected from overly aggressive fans. This particular training facility is equipped with panic buttons at several spots within the building that allow anyone who notices a problem to immediately instigate a lock down. The panic buttons are wired to open inputs on the nearest VAX door panels, eliminating the need for long electrical runs back to the server room. The player’s practice field is accessible through an external gate that’s used by the media, and VAX provides the ability to control visitors who enter there. As needed, members of the press are given temporary credentials that can unlock the gate only for a designated time period before expiring. Parking lot video surveillance The players’ parking lot also leverages the VAX system The players’ parking lot also leverages the VAX system. The transmitters that players use to open the parking lot gate from their cars are integrated with VAX, providing a record of each time the gate is activated, and by whom. In addition, a 12MP camera captures very high-resolution video of the vehicle entering and exiting, along with the person driving it, and that video is linked to the respective access control event. “Very expensive cars are left in the lot for extended periods, when the team is traveling, and this makes sure that absolutely nobody gets into that parking lot who shouldn’t be there – not even the office staff,” says the Security Director. The facility’s surveillance system includes close to 50 cameras, inside and outside the building, connected to Vicon’s Video Management System, Valerus. They range from 2MP to 12MP, depending on their use, and all are from Vicon. Any doorway equipped with a VAX controller has a dedicated camera mapped to it, so that video verification can be made of anyone entering a restricted area. Valerus VMS and 360-degree network cameras Special 360° cameras are mounted high on each of the exterior corners of the building Special 360° cameras are mounted high on each of the exterior corners of the building. Valerus VMS software dewarps their fisheye image and breaks it into four separate views from each camera. Those four cameras provide the security team with 16 different camera views from around the building’s perimeter, providing a very cost-effective way to cover such an expansive area. The same type of cameras is used within the team’s equipment room, where warehouse style racking is filled with valuable inventory. The system is managed by the team’s head of security and head of IT. Valerus’ thin-client web-browser interface provides monitoring access to support staff, including the team’s receptionist. The system’s video search capabilities have made it easy for them to conduct investigations. Video has helped to identify vehicles that were improperly driving on the turf field, document a theft on the property, and trouble-shoot when the parking lot gate had mechanical problems. Motion activated cameras Special motion-activated 2MP cameras are positioned at every door that provides access between the players’ area and the field One of the more unusual uses for the system is not related to security at all. The team’s professional athletic league requires team management to retain a full year’s documentation of the time each player spends on the practice field. To do this, special motion-activated 2MP cameras are positioned at every door that provides access between the players’ area and the field. Anyone walking from the field to the building triggers the motion sensor and is recorded in high-definition video. That way, if a player initiates a legal battle saying he practiced too long, there is clear documentation of exactly when he was on and off the field. Vicon’s Valerus delivers powerful, end-to-end security solutions that are easy to manage. Its work with this professional sports team also highlights its ability to deliver convenience to employees and operational efficiencies to management.
Total Ghana, a leading oil and gas company with over 200 service stations in Ghana, is one such business that needs around-the-clock security not only for its premises based in Accra but also for its many service stations. Total is dedicated to delivering quality petroleum products and serving its customers in innovative ways. This means Total’s consumer operations involve a concentration of vehicle and pedestrian activity with people fueling vehicles and moving between the retail outlets. This leads to complex security and safety challenges and keeping track of it all is not possible without an effective security system. Facilities and workers’ security With the continuing growth of its business, Total needed a solution that would strengthen security of its premises and new service stations being opened across the country. The safety of Total’s workers is paramount and, in addition to securing its premises and stations, the company wanted to automate the monitoring of its operations to ensure compliance with safety procedures. Total turned to Steehold, a security solutions provider in Ghana renowned for protecting companies across industries including financial services, mining, petrochemicals, and telecommunications. Steehold was tasked with not only installing a new security system but also ongoing security monitoring and management across Total’s operations in Ghana. Steehold’s video security system From the moment we engaged with Steehold, we knew they understood the security challenges facing our business" “From the moment we engaged with Steehold, we knew they understood the security challenges facing our business. For example, petrol stations operate day and night so video cameras need to provide excellent imagery in variable lighting conditions and we need to monitor areas both inside and outside. If cameras lack certain features, then the images they record may be insufficient for analysis, or for use as evidence, should it be required. Steehold knew how to combat these issues while also providing an effective monitoring tool for operational efficiency and worker safety,” explained Total executive. Steehold needed a video surveillance system that would cover Total’s premises and service stations from all directions and it knew exactly which solution would meet Total’s needs. IP video surveillance solution “We choose Hikvision as we knew its video cameras were grounded in innovation and quality, providing the best video footage in the widest range of conditions to help Total’s business,” said Samuel Tawiah, executive director, Steehold. Following extensive consultation with Total staff, the final design of the surveillance solution at the facility and new services stations consisted of 120 Hikvision IP cameras to enable high quality 24/7 surveillance across the Total’s premises and its new service stations in Ghana. Hikvision Easy IP 3.0 cameras and NVRs Hikvision Easy IP 3.0 cameras feature a wealth of innovative technologies to combat low-light, bright-light, and extreme weather conditions The Hikvision Easy IP 3.0 cameras feature a wealth of innovative technologies to combat low-light, bright-light, and extreme weather conditions, while still providing superlative image quality. The cameras also include capabilities such as object tracking, line crossing, intrusion detection, and motion detection, with the ability to trigger alerts and make security staff immediately aware of any suspicious behaviour. At the heart of the solution lies Hikvision’s NVRs, which store up to 12 terabytes of recorded footage from all cameras. IP cameras, PoE and video encoders While Total wanted to upgrade to an IP system, it had already invested heavily in CCTV cameras and wanted to retain the cameras that were functioning well. Steehold installed Hikvision’s video encoders which convert the existing cameras’ analog signals into digital. These encoders are connected to the NVR, and the system treats them like the other IP cameras. Steehold installed the IP cameras itself as the cameras are PoE (Power over Ethernet) which means that power and data is supplied over a single Ethernet cable, making installation much easier because they don't have to be located next to a plug socket. Hikvision remote video surveillance system Total is already reaping the benefits from the newly installed Hikvision video surveillance system Total is already reaping the benefits from the newly installed Hikvision video surveillance system. It provides the ability for Steehold to monitor Total’s entire facility and new services stations in real-time remotely from its control center located in Accra. “The deployment of Hikvision’s innovative technology into our surveillance solution for Total has proven essential for our security operators to detect intrusion, theft, and damage across Total’s operations. With crystal clear images day and night as well as advanced features that alert security operators of any suspicious behaviour, we are confident we can help Total respond quickly to any breaches,” said Mr. Tawiah. Watchful IP eyes for operational safety Hikvision’s video surveillance system also helps Steehold operators to remotely monitor processes across Total’s premises, enabling supervisors to enhance processes to improve workflow and ensure the safety of workers. “At Total, the safety of employees is of utmost importance. Data from Steehold generated by Hikvision’s video surveillance system plays an integral role in helping us keep our employees safe and our operations compliant with safety policies. It provides a definitive way to ensure safety policies are being followed and that there are no hazards presenting a harmful threat to our employees,” said Total executive. Intrusion detection Hikvision’s security cameras deliver a live and recorded view of the facility which is accessible 24/7 and has helped ensure safety protocols are followed By deploying Steehold’s security solution based on Hikvision’s video surveillance system, Total’s heightened security has kept its facilities and service stations protected against trespassers, theft, and vandalism, and in particular has minimised losses caused by theft in its service stations. In addition, Hikvision’s security cameras deliver a live and recorded view of the facility which is accessible 24/7 and has helped ensure safety protocols are followed. For example, it has significantly increased employee compliance with PPE (Personal Protective Equipment) rules at Total’s sites resulting in a direct and immediate improvement in safety. Easy, seamless integration Easy installation and integration with Total’s existing CCTV-enabled Steehold to deliver a cost effective, efficient, high-end video surveillance solution. Steehold is now planning to use Hikvision’s cutting-edge video monitoring systems as part of its security and emergency response solutions for its other customers, helping them minimise security threats and maximise operational safety and efficiency.
3xLOGIC, Inc., global provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, has announced that, in cooperation with Control Installations of Iowa (Ci3), the two companies have donated a completed video surveillance system for this iconic ball field and movie set located in Dyersville, Iowa. Installations of Iowa collaboration “Several weeks ago, there was an act of senseless vandalism that occurred on this high-profile ball field and a lot of damage was done by someone with a very poor sense of judgement,” recalled Carl Bracken, Technical Security Sales for Ci3. “The president of my company shot me a text before I even knew about the vandalism, suggesting we get involved and try to help.” Field of Dreams, released in 1989, is a movie that has inspired millions and became an Academy Award nominee for Best Picture of the Year Field of Dreams, released in 1989, is a movie that has inspired millions and became an Academy Award nominee for Best Picture of the Year. “Nearly thirty years later, we still get more than 110,000 visitors a year,” said Denise Stillman, Manager of the Field of Dreams movie site. “Most folks come to run the bases or explore the corn field. We’re the only ball park open 365 days a year, and we’re the world’s largest pick-up baseball game.” The vandalism to the field was fairly extensive and, unfortunately, also involved destruction of expensive irrigation equipment. Bracken contacted Denise Stillman to explore installing a video surveillance system for the tourist site. After initial discussions, he visited the site on a Saturday, with demo gear in hand, to show Stillman the possibilities. She was keen on what she saw but there was nothing in the budget for such a system. 3xLOGIC V250 NVR and mini dome cameras Installation comprised of a 3xLOGIC 8-channel V250 NVR; one 3xLOGIC thermal imager, pointed at the bridge leading to the site entrance Working with his company president and reaching out to various vendors, including 3xLOGIC, Bracken came up with a plan to provide the Field of Dreams with the enhanced asset protection and increased security they needed. Recently, Bracken and his team of skilled technicians completed the installation comprised of a 3xLOGIC 8-channel V250 NVR; one 3xLOGIC thermal imager, pointed at the bridge leading to the site entrance; a 3xLOGIC 3 MP mini-dome to cover the retail sales area; and two cameras covering the field itself. The recording equipment is installed on a shelf in the retail store, which is convenient and secure. “We hadn’t really thought much about security, because for 29 years we had no incidents,” said Stillman. “Now that the system is in place, it’s doing a lot of things for us. The gift shop staff feels much more confident now that they have eyes and ears watching over them. For me, I have a sense of comfort that wherever I am in the world I can see what is happening at the field at all times—I can even check if the sod is greening up. I love that, and the 3xLOGIC mobile app, View Lite II, is easy to use and empowering.” This place is important to the fabric of Iowa life and lifestyle" “This place is important to the fabric of Iowa life and lifestyle,” continued Stillman, “and Ci3 really stepped up. Carl (Bracken) was very generous with his time and he gave us a solid comfort level in understanding what we needed, what the system would look like, and how it would function. Other local vendors wanted to help, but no one took the time like Carl and Ci3.” “Along with 3xLOGIC, we were happy to make this donation. We knew Denise didn’t have sufficient budget, and they still needed to find the money to pay for their expensive irrigation system repairs,” said Bracken. “This really gives us piece of mind when no one is on site,” said Stillman, “we now have excellent visibility to areas we must be able to see, and the system provides a great deterrent effect, too.”
STANLEY Security, one of the most trusted names in the world of security, has provided a photography studio in Knowsley, Merseyside, with a top class wireless Ricochet technology-based alarm system financed through STANLEY Assure. Studio Argent is a 5,000 ft. sq. studio that houses and uses state-of-the-art digital equipment to produce creative and commercial photography for numerous large national and international clients, making security of their premises a priority. Ricochet wireless networking technology STANLEY Security installed a modern intruder alarm system based on STANLEY’s Ricochet technology. This next generation wireless networking technology operates by receiving repeated wireless transmissions from devices located throughout the studio building to ensure that even the remotest areas are secured. Furthermore, any weak signals between devices prompt the Ricochet network to self-heal and automatically re-route communication so that the studio is protected at all times. STANLEY Security recommended the studio’s existing aging intruder alarm system be replaced, with the costs covered under STANLEY Assure STANLEY Security recommended the studio’s existing aging intruder alarm system be replaced, with the costs covered under STANLEY Assure. STANLEY Assure is a finance solution for customers wishing to benefit from up to date security technology without the risks of ownership and with evenly spread, manageable payment terms with no hidden extra costs. Additionally, included is a full monitoring package for total peace of mind. STANLEY Intruder alarm system STANLEY Assure removes the need to justify and raise significant capital outlay in a depreciating asset. Instead, STANLEY will buy back and take over an existing security system, upgrade it to incorporate the latest security technology, and then hire it back for usage. It provides an affordable means of upgrading a complete security system. Studio Argent not only benefitted from STANLEY Security’s product technology, but also gained access to STANLEY’s NSI Gold accreditation ProtectionNet Customer Service Centre (PNC) as a part of the contract. As a result, Studio Argent receives 24/7, 365 days a year monitoring and immediate customer care. The ease of usage of the new STANLEY intruder alarm system allows Studio Argent to activate the system in under five minutes Mesh technology and reduced false alarms The ease of usage of the new STANLEY intruder alarm system allows Studio Argent to activate the system in under five minutes, whilst previously the process took approximately 40 minutes. Furthermore, whereas the old system was hypersensitive and would often be set off by mice and moths in the building, the new system, relying on latest mesh technology, ensures no false alarms occur while offering airtight security which is easily scalable, should the studio expand its premises. After repeatedly having to pay additional, hidden costs to the previous security supplier for patch up work to the studio’s 20-year-old alarm system and dealing with subpar service which in one incident breached the national code of conduct for UK Alarm providers, Studio Argent was pleased to make the cut and move to a reliable security provider. John Organ, Owner of Studio Argent, happy with the move to STANLEY’s new alarm system said, “From the knowledgeable and expert representatives who contacted me to the total peace of mind and ease of operation that it offers, I feel that STANLEY Assure has really changed my life. I would not hesitate in recommending STANLEY to anyone.”
ANSecurity, a specialist in advanced network and data security, has announced a successful project with Nottinghamshire Healthcare NHS Foundation Trust to move to the SHA-2 cryptographic standard to help strengthen its security posture. With over 12,000 computing devices and 500 servers under its management, Nottinghamshire Healthcare has maintained an ongoing strategy to continually improve its security controls. Most of its systems are used internally and unconnected to the internet. However, increased use of BYOD and more interconnection has prompted the IT department to instigate a migration of its PKI infrastructure to the newer SHA-2 (Secure Hash Algorithm 2), a set of cryptographic hash functions that is widely used in security applications and protocols, including TLS and SSL, PGP, SSH, S/MIME, and IPsec. ANSecurity helped the Trust to overcome the complexity of its legacy PKI, along with dependencies on existing services including mobile device onboarding and remote access control Overcoming the complexity of legacy PKI “SHA-1 has been depreciated in terms of its security capability, however not all our applications or servers natively supported SHA-2 which meant we needed to consider the upgrade with the context of a wider application server upgrade,” explains Andy Spencer, System Team Leader for Nottinghamshire Healthcare, “It is a significant project that we felt could benefit from dedicated security expertise for which we turned to ANSecurity.” ANSecurity helped the Trust to overcome the complexity of its legacy PKI, along with dependencies on existing services including mobile device onboarding and remote access control. As Jason Parry, Network Security Architect for ANSecurity explains, “We discussed at length with Andy and his team the merits of several deployment scenarios to determine the best course of action. Next, we agreed a process with various business groups who consume PKI and once ratified completed our standard scope of works documentation with pre-requisites to streamline the deployment.” The entire migration project including legacy operating systems migration and remediation of weaknesses within the SHA-1 signatures took just 3 days Improved security posture The actual project was driven by the Nottinghamshire Healthcare’s IT department under guidance from ANSecurity to ensure high levels of knowledge transfer. The entire migration project including legacy operating systems migration and remediation of weaknesses within the SHA-1 signatures took just 3 days, leading to improved security posture without any disruption to its 24/7 operations. “Any organisations with a legacy windows PKI environment need to perform something similar,” Parry explains, “This may not require a wholesale replacement and in many cases, it might be applicable to perform a simpler migration to new servers along with an upgrade that renews existing PKI infrastructure.” ANSecurity have performed dozens of these projects over the last 24 months and has a significant number planned for the next year. “The NHS with its large number of legacy systems is a sector that is rapidly moving to SHA-2,” says Parry. “Busy IT staff that may have overlooked these types of projects due to the complexity of legacy applications servers should not be overly concerned as the process for migration is relatively straightforward and uses a well understood process.”
DUOX, the Fermax 2 Wire digital system using stylish VEO video monitors was the system of choice for DUK Construction LTD responsible for the installation of electrical and security systems in this prestigious new development in South London consisting of 88 apartments and 5 communal entrances together with 13 bike and bin storage areas. DUOX access control system The Fermax system combines the modern innovative 2 wire DUOX access control system with high specification 316 MARINE grade stainless steel door entry panels, laser cut at the Fermax manufacturing facility in Valencia, Spain and specifically designed to meet the needs of the project by integrating a stylish proximity access control reader at each entry point. Networked CCTV also provided by Fermax UK completed the site security and door entry system The system provides ease of access for residents, visitors and trades people as well as offering a host of features for residents using the new DUOX VEO monitor installed in each apartment. As well as its elegant design the VEO monitor complete with handset provides the added PHOTOCALLER feature which enables residents to capture and store images of visitors who have called their apartment from the entrance panel while they were away. Networked CCTV also provided by Fermax UK completed the site security and door entry system. Fermax 2 wire DUOX system System design and onsite technical support by the Fermax engineering and commercial team ensured that the project was completed on time and to specification. DUK Construction project manager commented “The Fermax 2 wire DUOX system was very easy to install and we were given excellent support from Fermax UK in the face of very tight schedules and a number of technical challenges. We are delighted with the system solution provided by Fermax.” If you want to know more about DUOX advantages, download our e-book. Discover the power of digital in 2 wires!