PerpetuityARC Training, part of Linx International Group, is proud to announce its new interactive and virtual online learning platform - Linxville. Visually reminiscent of classic computer games such as The Sims and Sim City, Linxville’s first bitesize course to launch is Perimeter Security. It presents the student with a simulated environment containing a number of commercial buildings surrounded by roads, gates, fencing, lighting and security guards, which link back to the topic. Info...
It seems like every day there is another school or public shooting incident in the US. It dominates the news and has become a point of stress and fear for many Americans. According to the US Department of Justice Federal Bureau of Investigation, in 2018 alone, there were 27 incidents across 16 states resulting in 213 casualties. There is a great deal the security industry can do to prevent such violent incidents and preserve life. Protection layers In general, protection should be built in la...
Boon Edam Inc., a pioneer in security entrances and architectural revolving doors, announces they are emphasising the theme of tailgating mitigation and integration in booth #1103 at the GSX (formerly ASIS) exhibition in Chicago, Illinois from September 10-12. GSX is an annual event that brings together over 20,000 participants from across the security profession for a week of networking, educational opportunities and discovering the latest security solutions. Boon Edam is also the official tur...
The Security Industry Association (SIA) has announced the addition of the Twin Cities in Motion (TCM) race management team to the speaker lineup for AcceleRISE – a new conference for tomorrow’s security leaders featuring top-quality idea sharing, coaching, business skills development, networking and inspiration. In a dynamic panel session, TCM will shed light on the changes that took place in the U.S. running community after the Boston Marathon bombings and provide insights on the co...
Digital Defense, Inc. and The University of Texas at San Antonio (UTSA) Department of Computer Science jointly announced a partnership that will provide students and faculty with access to an award-winning cloud-based information security platform to further enrich the students’ cybersecurity education. UTSA students and faculty will be able to utilise Digital Defense’s flagship Frontline.Cloud platform to evaluate the security posture of applications, systems and networks in classr...
Open Options, global provider of access control solutions, has announced the launch of a new Learning Management System (LMS), “ConnectEd” for integrators, installers and system users to easily obtain certification in DNA Fusion. ConnectEd LMS platform The ConnectEd platform will be a new tool for Open Options customers to view course calendars and class status as well as register for upcoming classes. The Open Options training team currently offers classroom learning at their head...
Created for marketing professionals working in the security industry, Security Sessions is a new forum for peers to share knowledge, skills and best practice. The group meets quarterly and aims to provide participants with actionable tips to implement in their own marketing strategies. With representatives attending from manufacturers, suppliers, installers, integrators and consultants, discussions cover the challenges being faced by the security industry and the opportunities presented by the constantly evolving marketing landscape. Participants also have the opportunity to extend their understanding of specialist areas - such as SEO, creativity and lateral thinking, optimising video for social, content marketing and much more – with an expert guest speaker invited to each session to share insight into their particular specialism. Topics include on-page SEO, site security The Security Sessions event is taking place on 10th September in London covering the topics of on-page SEO, site securitySet up by Charlotte Waters and Michelle Morton - founders of Morton Waters Communications Ltd - in early 2019, the next Security Sessions event is taking place on 10th September in London covering the topics of on-page SEO, site security and speed optimisation. Commenting on the launch of Security Sessions, Michelle said: “Having worked in marketing in the security industry, and other B2B sectors, for longer than we care to declare, the idea for Security Sessions started when we noticed that there was no specific forum in the security industry to recognise and support the sector’s marketing professionals. We thought it was about time that changed.” “At the beginning of the year, we reached out to our existing network to float the idea and it was received so well that the first meeting took place in April,” adds Michelle. “We’re now busy organising the next one, which will take place in London on 10 September.”
SnapAV, a provider of A/V, surveillance, networking and remote management products for professionals, and Control4 Corporation, a provider of smart home solutions, announce the successful completion of their merger. Unified into a single organisation, Control4® becomes a professional smart home brand in the company portfolio, SnapAV continues to bring technology professionals a trusted, end-to-end partner that invests relentlessly in growing the industry and helping their businesses succeed. Delivering fantastic experiences Our team shares a passion to deliver fantastic experiences to homeowners and businesses" "The smart home industry is poised for massive growth, and much of that growth will be driven and satisfied by professionals. Our team shares a passion to deliver fantastic experiences to homeowners and businesses,” said John Heyman, chief executive officer of SnapAV. "Through this combination of industry leaders, we have organised ourselves around delivering a unified and integrated company that gives dealers one place to go for the best and broadest selection of products, greatest technical support, most rewarding sales programs, robust training resources, and more.” The combination of these two companies brings together a robust product catalogue of in-house brands and third-party products, backed by highly-experienced product engineering teams, award-winning customer service, education and training programs, and in-field technical support. Together they have the resources and logistics infrastructure to be a one-stop shop that drives value added services for technology professionals across the industries they serve. Great living experiences The SnapAV product development team led by Charlie Kindel as chief product & technology officer envisions a roadmap that blends deep innovation with simplicity, interoperability, and quality. “We know this to be true: the number of connected devices in the home will continue to increase. Homeowners want help removing complexity so they can enjoy life at home more and manage technology less,” says Charlie. “We’re focused on the vision of making end-customers rave about our fantastic products and the great living experiences our dealers create with those products. Through this merger, we will fulfil the true promise of the smart home.” Together the combined company offers a broad product portfolio. Adding the award-winning Control4 Smart Home OS, an operating system specifically designed for the modern, pro-installed smart home, gives SnapAV one of the most connected product portfolios with interoperability across nearly 14,000 devices from hundreds of manufacturers. International expansion The merger feels like a game-changer for my company, and for the industry" Control4 will continue to be available only through Control4 Authorised Dealers, and the high standards required for dealer certification will not change. All brands in the combined product portfolio – including Pakedge® and Araknis®, OvrC® and BakPak®, Triad® and Episode® – continue to be supported today, and dealers can use the solution that best fits their business needs. Bryan Naquin, owner of Acadian Home Theater and Automation in Baton Rouge, Louisiana is enthusiastic about the merger. “The merger feels like a game-changer for my company, and for the industry. As one company, it means more help with all my installation needs which would simplify my business, and make it much easier to support my customers,” Naquin said. “I’m looking forward to seeing how the combined company will evolve.” Dealers can expect to see continued investment in both local and international expansion. Broad industry growth Ordering products will remain the same for now, but over time, the combined portfolios will be made available through easy and convenient online ordering, shipping, and local pickup. SnapAV intends to invest further into the international markets Control4 has established including the UK, Ireland, China, Germany, Australia, New Zealand, and Switzerland. SnapAV is committed to investing relentlessly in the success of its dealers" “Today is day one of this journey, and we are just getting started. SnapAV is committed to investing relentlessly in the success of its dealers and fuelling broad industry growth to better serve our shared customers. We believe in the importance of professionally installed systems, and we are laying the groundwork to ensure those businesses succeed long into the future,” concluded Heyman. Additional executives With a combined 1,200 employees, SnapAV CEO John Heyman will lead the merged teams as chief executive officer, while former Control4 CEO Martin Plaehn joins the board of directors of SnapAV’s parent company. Jeff Hindman joins the executive team as chief revenue officer, while former Amazon Alexa executive and Control4 SVP of products & services Charlie Kindel is named chief product & technology officer. Mike Carlet will serve as the chief financial officer. Additional executives of the combined company include Jeff Dungan, G Paul Hess, JD Ellis, Barrett Schiwitz, Bryce Judd, Carmen Thiede, Graham Jaenicke, and Wally Whinna. The company will have headquarters in Charlotte, North Carolina, and Salt Lake City, Utah, with offices and local facilities around the world.
Videonetics, the visual computing platform development company, announces that it ranked amongst top 5 Video Management Software providers in Asia market with the market share of 5.4%, according to a recently released report released by IHS Markit. IHS Markit is a provider of critical information, analytics and expertise to forge solutions for the major industries and markets that drive economies worldwide. Rankings are adjudged using a robust rating scale and evaluated on based on percentage revenue growth, competitive advantage, size and innovation capabilities over the year. Achieve widespread adoption Commenting on the achievement, Dr. Tinku Acharya, Fellow IEEE, Founder & MD, Videonetics, “It is a prestigious honour to be recognised as an industry leader in VMS by IHS Markit. This recognition validates our drive for high performance, innovation, differentiation and global scalability.” We’ve always strived to bring more value to our partners, integrators and customers" “Building upon our award winning and patented AI & deep learning framework, we continue to achieve widespread adoption of our Unified Video Computing Platform (UVCP™), in smart & safe cities, aviation, industrial, education, BFSI, retail, healthcare sectors”, he further added. Mr. Avinash Trivedi, VP – Business Development, Videonetics expressed, “We’ve always strived to bring more value to our partners, integrators and customers. I would like to dedicate this achievement to them for their continued support, commitment and excellent contribution to Videonetics growth”. Unique forensic investigation Videonetics Intelligent Video Management Software (IVMS) is an open architecture, agnostic, scalable and modular video management and analytics software. IVMS provides enterprise-class features without discriminating on the size of the project and manages the video effectively, optimally and securely. IVMS offers flexible deployment environments to suit your preferences, needs and budget. Powered with DeeperLook™ - Videonetics’ AI & DL platform offering unique forensic investigation and video evidence features, IVMS is an ideal software solution for challenging security needs of an organisation. IVMS is a part of Videonetics’ patented Unified Video Computing Platform (UVCP™) which brings together other applications such as deep learning based video analytics, intelligent traffic management and face recognition to address all of the video computing requirements. IVMS offers true open architecture to enable easy 3rd party integrations with various sub systems such as access control, fire alarm systems, SCADA, intrusion detection, ICCC, C4I and IBMS systems.
Security-Net, Inc., a network of security system integrators, is welcoming two new members, providing the organisation with important geographic reach in the New York, New Jersey and Illinois areas. These two new additions increase Security-Net’s membership to twenty. New members include FE Moran Security Solutions, headquartered in Champaign, Illinois and Care Security Systems, based out of New York City. Their addition to Security-Net will bring extensive expertise in a diverse array of markets including government, education, residential and commercial. Service-oriented relationships We are very service centric and we look to identify that in each new member" Dominic Burns, chief executive officer of A.C. Technical Systems and Security-Net member, said both companies participated in a rigorous review process before being accepted as members. Part of the Security-Net membership process is ensuring potential members are focused on developing and maintaining strong service-oriented relationships with their customers. “We are very service centric and we look to identify that in each new member,” Burns said. “A customer is not just a number.” The addition of FE Moran Security Solutions as a new member of Security-Net follows its April 2019 acquisition of MidCo, which has been a long-time active member of the organisation. Providing alarm monitoring Adam Kimball, senior vice president, operations for FE Moran Security Solutions, said it was very important to FE Moran and MidCo that they continue the relationship with Security-Net. “We’re very excited to have a group of peers that trust each other to be able to speak about best practices, industry changes and challenges,” Kimball said. FE Moran is based in the Midwest, with locations serving Illinois, Indiana, Michigan, Kansas and National Clients coast to coast, Canada and Puerto Rico. Since its founding in 2003, they have grown to one of the largest security companies in their region, providing alarm monitoring and life safety and security services to its clients. The company is recognised by SDM Magazine as one of the top 50 security companies in the nation. It’s 250 employees serve about 30,000 clients, which includes a mix of both residential and commercial customers. Integrated security systems FE Moran specialises in providing customers with innovative life safety and security solutions, high quality equipment, as well as installation and monitoring. They are dedicated to a great customer experience and its UL-Listed Central Station is one of the few to receive the Five Diamond Certification. CSS has served some of the largest state, federal and corporate organisations Care Security Systems (CSS) is a certified woman-owned company with offices located in New York City and Montebello, N.Y. In the past 30 years, CSS has served some of the largest state, federal and corporate organisations in the United States on a national level, delivering integrated security systems with a commitment to building strong relationships with customers and within communities. City-wide surveillance With a wide range of expertise, CSS specialises in a variety of industries, from city-wide surveillance, government and utilities to transportation, manufacturing, education and retail. Core services include video surveillance, security training, access control systems and visitor management. Abe Schwab, vice president of CSS, said the team is looking forward to working with Security-Net. “We are excited to be part of a group of specialists and to collaborate with others on best practices and to provide the highest level of security in the industry,” Schwab said. With these new additions, Security-Net expands its geographic footprint to serve customers in the New York and New Jersey markets, as well as Kansas, Illinois, Michigan and Indiana.
The ASSA ABLOY Door Hardware & Access Control Group is encouraging installers to sign-up to one of its upcoming training courses on its innovative wireless access control system, SMARTair. The course is free to attend and offers installers everything they need to know to help sell and install SMARTair, while also providing an informative overview of the wireless access control system’s capabilities and benefits. SMARTair system SMARTair delivers real-time access control, so organisations can stay in control of who has entered a building, where and when Taking place at the ASSA ABLOY Academy in Willenhall, the course will cover the technical aspects of how to install, set up and commission a SMARTair system. It also provides guidance on site surveys and how to identify and resolve common faults, meaning security professionals can offer a complete solution to their customers. SMARTair delivers real-time access control, so organisations can stay in control of who has entered a building, where and when. Multiple user groups can be easily managed with minimum fuss, with features such as time schedules and permissions calendars ensuring access rights are only allowed when needed. Wireless access control system The wireless access control system is offered with a robust range of devices – covering electronic locks, cylinders, escutcheons, wall readers and products for cabinets, lifts, vending machines and lockers – in an award-winning design. Finally, ASSA ABLOY’s new OpenowTM app also gives security administrators the ability to open electronic door locks remotely, so access control for SMARTair can be managed at any time and from any place. OpenowTM essentially transforms a smartphone into a secure virtual key, with users able to send, revoke and update virtual keys in seconds. SMARTair training course Suitable for an extensive range of sectors, installers can fit SMARTair in varied environments" Richard Hall, Technical Sales Support Manager at the ASSA ABLOY Door Hardware & Access Control Group, explains: “We have designed this course for professional security installers, system integrators and those responsible for installing and managing their own access control systems.” “Suitable for an extensive range of sectors, installers can fit SMARTair in environments such as hospitals, universities, offices, national parks, laboratories, libraries and many other settings. We would invite any installers or individuals responsible for their site’s security to attend this free course at our dedicated training academy in Willenhall, to find out more about the opportunities that SMARTair can help deliver to their business.” The available SMARTair training course dates for the second half of 2019 are: Wednesday 21 August Tuesday 17 September Tuesday 22 October Tuesday 19 November Thursday 12 December Refreshments are provided throughout the day, as well as lunch. Larger companies wishing to book onto the SMARTair training course may be able to specify a separate training date.
Arecont Vision Costar, the provider of network-based video surveillance solutions, announces the addition of Desjardins Technologies to its Authorised Manufacturer’s Representative Program to increase coverage for customers in Canada. Desjardins Technologies will deliver French and English pre-sales support in much of Eastern Canada, including the National Capital Region and the provinces of Quebec and New Brunswick. “Desjardins Technologies brings a wealth of experience in both the Ottawa area and throughout the provinces of Quebec and New Brunswick,” said Kyle Parker, Vice President, Americas, Arecont Vision Costar. “They offer expertise in both security and home automation systems that will be of benefit to our customers in this part of Canada, including for training and design assistance in both English and French.” Video surveillance products I look forward to the opportunity to bring the company’s solutions to customers throughout the Ottawa area" Based in Blainville, Quebec, CEO and Founder Jean Pierre Desjardins brings twenty-five years of experience providing outstanding pre-sales support and assistance to customers across the region. “Arecont Vision Costar and its web-enabled Total Video Solution are an ideal fit for those in the region who are looking for proven video surveillance products combined with an easy to deploy and manage offering,” stated Mr. Desjardins. “I look forward to the opportunity to bring the company’s solutions to customers throughout the Ottawa area and across both Quebec and New Brunswick.” Cloud-enabled offering “Jean Pierre and his team will enable Arecont Vision Costar to reach many new customers in this region for the first time,” stated John Bujarski, Senior Regional Sales Director, Arecont Vision Costar. “Our Total Video Solution is proven, simple to deploy, and a truly modern cloud-enabled offering that will benefit those in this part of Eastern Canada, just as it has across the United States and around the world.” Desjardins Technologies and the other members of Arecont Vision Costar’s Manufacturer’s Representative Partner Program are focused on bringing the industry’s best, cyber-secure video surveillance offerings to their assigned regions. Participants in the program extend the reach of Arecont Vision Costar by providing expert pre-sales assistance while interfacing with and educating customers, system integrators, and distributors on available solutions for even the most challenging video surveillance requirements.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organisations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anything like the 5.4 billion user IDs on haveibeenpwned.com, their login has already been compromised. If it's not listed, it could be soon. Recent estimates state that 8 million more credentials are compromised every day. Ensuring safe access Data breaches, ransomware and phishing campaigns are increasingly easy to pull off. Cyber criminals can easily find the tools they need on Google with little to no technical knowledge. Breached passwords are readily available to cyber criminals on the internet. Those that haven’t been breached can also be guessed, phished or cracked using one of the many “brute-force” tools available on the internet. It's becoming clear that login credentials are no longer enough to secure your users' accounts. Meanwhile, organisations have a responsibility and an ever-stricter legal obligation to protect their users’ sensitive data. This makes ensuring safe access to the services they need challenging, particularly when trying to provide a user experience that won’t cause frustration – or worse, lose your customers’ interest. After GDPR was implemented across the European Union, organisations could face a fine of up to €20 million, or 4% annual global turnover Importance of data protection So how can businesses ensure their users can safely and simply access the services they need while keeping intruders out, and why is it so important to strike that balance? After GDPR was implemented across the European Union, organisations could face a fine of up to €20 million, or 4% annual global turnover – whichever is higher, should they seriously fail to comply with their data protection obligations. This alone was enough to prompt many organisations to get serious about their user’s security. Still, not every business followed suit. Cloud security risks Breaches were most commonly identified in organisations using cloud computing or where staff use personal devices According to a recent survey conducted at Infosecurity Europe, more than a quarter of organisations did not feel ready to comply with GDPR in August 2018 – three months after the compliance deadline. Meanwhile, according to the UK Government’s 2018 Cyber Security Breaches survey, 45% of businesses reported breaches or attacks in the last 12 months. According to the report, logins are less secure when accessing services in the cloud where they aren't protected by enterprise firewalls and security systems. Moreover, breaches were most commonly identified in organisations using cloud computing or where staff use personal devices (known as BYOD). According to the survey, 61% of UK organisations use cloud-based services. The figure is higher in banking and finance (74%), IT and communications (81%) and education (75%). Additionally, 45% of businesses have BYOD. This indicates a precarious situation. The majority of businesses hold personal data on users electronically and may be placing users at risk if their IT environments are not adequately protected. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine Hacking methodology In a recent exposé on LifeHacker, Internet standards expert John Pozadzides revealed multiple methods hackers use to bypass even the most secure passwords. According to John’s revelations, 20% of passwords are simple enough to guess using easily accessible information. But that doesn’t leave the remaining 80% safe. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine. Brute force attacks are one of the easiest methods, but criminals also use increasingly sophisticated phishing campaigns to fool users into handing over their passwords. Users expect organisations to protect their passwords and keep intruders out of their accounts Once a threat actor has access to one password, they can easily gain access to multiple accounts. This is because, according to Mashable, 87% of users aged 18-30 and 81% of users aged 31+ reuse the same passwords across multiple accounts. It’s becoming clear that passwords are no longer enough to keep online accounts secure. Securing data with simplicity Users expect organisations to protect their passwords and keep intruders out of their accounts. As a result of a data breach, companies will of course suffer financial losses through fines and remediation costs. Beyond the immediate financial repercussions, however, the reputational damage can be seriously costly. A recent Gemalto study showed that 44% of consumers would leave their bank in the event of a security breach, and 38% would switch to a competitor offering a better service. Simplicity is equally important, however. For example, if it’s not delivered in ecommerce, one in three customers will abandon their purchase – as a recent report by Magnetic North revealed. If a login process is confusing, staff may be tempted to help themselves access the information they need by slipping out of secure habits. They may write their passwords down, share them with other members of staff, and may be more susceptible to social engineering attacks. So how do organisations strike the right balance? For many, Identity and Access Management solutions help to deliver secure access across the entire estate. It’s important though that these enable simplicity for the organisation, as well as users. Organisations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so Flexible IAM While IAM is highly recommended, organisations should seek solutions that offer the flexibility to define their own balance between a seamless end-user journey and the need for a high level of identity assurance. Organisations’ identity management requirements will change over time. So too will their IT environments. Organisations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so. Importantly, the best solutions will be those that enable this flexibility without spending significant time and resource each time adaptations need to be made. Those that do will provide the best return on investment for organisations looking to keep intruders at bay, while enabling users to log in safely and simply.
Thousands of security professionals gathered Nov. 14-15 at the Javits Center in New York City to explore new products, solutions and technologies, network with security luminaries and obtain high-quality industry education. ISC East, sponsored by the Security Industry Association (SIA), is the Northeast’s largest security industry event; more than 7,000 security professionals attended or exhibited at this year’s conference. Following day 1 of ISC East, SIA gathered industry luminaries and experts for SIA Honors Night, an annual event featuring a cocktail reception, a gala dinner benefiting Mission 500, engaging entertainment and an awards ceremony recognising industry leaders. Sold-out event SIA Honors Night 2018 was a sold-out event held at the Current at Chelsea Piers. The awards presented at SIA Honors Night 2018 were: SIA Progress Award (presented by SIA’s Women in Security Forum) – Eddie Reynolds, president and CEO, iluminar Inc. Women in Biometrics Awards (co-founded by SIA and SecureIDNews and co-presented with sponsors FindBiometrics, IDEMIA and SIA’s Women in Security Forum) – Kelly Gallagher, senior account manager at NEC Corporation of America; Lisa MacDonald, director of the Identity Management Division in the Office of Biometric identity Management at the U.S. Department of Homeland Security; Colleen Manaher, executive director of U.S. Customs and Border Protection; Lora Sims, senior biometric examiner at Ideal Innovations, Inc.; and Anne Wang, director of biometric technology research and development at Gemalto Cogent SIA Insightful Practitioner Award – Guy M. Grace, Jr., chair of the Partner Alliance for Safer Schools Steering Committee and director of security and emergency planning for Littleton Public Schools in the Denver suburb of Littleton, Colorado Jay Hauhn Excellence in Partnerships Award – Larry Folsom, co-founder and president, I-View Now George R. Lippert Memorial Award – Pat Comunale, retired security industry veteran, former member of the SIA Board of Directors and former CEO and president for Tri-Ed Distribution, an Anixter company Standout keynotes SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States Honors Night guests enjoyed keynote remarks from Bonnie St. John, a Paralympic ski medalist, Fortune 500 business consultant, Rhodes scholar, former White House official and best-selling author. St. John discussed her journey to become the first African-American ever to win medals in Winter Olympic competition despite having her right leg amputated at age five and shared her top lessons from mentors and her advice for cultivating resilience. SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States; each year, SIA Honors Night raises funds for Mission 500. SIA presented 26 engaging education sessions through the SIA Education @ ISC East program, including two standout keynotes and four hands-on workshops. Hundreds of conference attendees participated in these sessions, with impressive speakers like Valerie Thomas, ethical hacker and executive consultant at Securicon; Pierre Bourgeix, president at ESI Convergent; Scott Swann, president and CEO of IDEMIA National Security Solutions; and Jumbi Edulbehram, regional president – Americas, Oncam. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event Confronting emerging threats Highlighted education sessions at this year’s conference included: Friend or Foe? Technology Disruption and the Physical Security Industry, a keynote address by Philip Halpin, senior vice president and head of global security at Brown Brothers Harriman, one of the country’s oldest and largest privately held financial firms 21st Century Best Practices: Reporting From the Front Lines on How Law Enforcement and the Security Industry Are Confronting Emerging Threats, a keynote address by James A. Gagliano, a retired FBI supervisory special agent, CNN law enforcement analyst and adjunct assistant professor at St. John’s University Cybersecurity professionals ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo Additional cutting-edge topics covered in the education sessions included the move to smart cities, convergence in the security industry and the use of artificial intelligence in video analytics. ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event, which featured a presentation from world-famous hacker Kevin Mitnick, insights from Dave Hogue of the National Security Agency’s Cybersecurity Threat Operations Center, a discussion on the cyber skills shortage gap and ways to attract, develop and retain talented cybersecurity professionals and more. Handle sensitive data Additional events at ISC East 2018 included: A breakfast presented by ISC Security Events and SIA’s Women in Security Forum featuring a panel discussion celebrating women in security and supporting the participation and advancement of women in the industry Paid hands-on workshops providing cutting-edge information and valuable insights on the most current business trends, technologies and new developments in security Free exhibitor product training sessions sharing live, in-depth demonstrations A meeting with SIA’s Data Privacy Advisory Board, which provides information and best practices to help SIA members handle sensitive data in a safe and secure manner to protect the personally identifiable information of their employees, partners and customers from potential breaches
Global Security Exchange (GSX) 2019 will blow into the Windy City this fall, combining a tradeshow, a full schedule of professional education sessions, plenty of industry networking opportunities, and an annual reunion of the top professionals from around the world tasked with protecting people, property and assets. GSX – the trade show and industry event 'formerly known as' the ASIS Annual Seminar and Exhibits – will be Sept. 8-12 at Chicago’s McCormick Place. The show promises to 'elevate the event experience with modern education learning experiences, revitalised networking opportunities, and a reimagined trade show floor.' More than 550 exhibitors will be featured in the expo hall (open Sept. 10-12), according to ASIS International. Chicago is a great location for GSX, as evidenced by the successful 2013 ASIS show. Cutting-edge solutions X1 Stage sessions are designed to highlight cutting-edge solutions and increase contextual understanding GSX seeks to attract more attendees to the exhibition hall with education events positioned alongside the industry’s latest-and-greatest equipment and technology exhibits. On the expo floor, the GSX: Disruption District will include new and enhanced programs such as the X Learning stages, the D3 (drones, droids, defence) Learning Theater, the Pitch Competition and the Innovative Product Awards. X Learning is a series of experiential sessions. X1 Stage sessions are designed to highlight cutting-edge solutions and increase contextual understanding of new technology. GSX: Startup Sector highlights new companies with emerging technologies; and GSX: Pitch Competition brings together entrepreneurs, investors and industry leaders to feature early-stage startup pitches. Career HQ will provide free resume reviews, career coaching, professional development and networking opportunities. A Sharpshooter Contest sponsored by Smart Simulators and SB Tactical will allow contestants donating $20 to compete for $500 in prizes each day. Pre-conference certification courses More than 300 security courses, plus pre-conference certification courses, will provide security professionals expertise to enhance their career development. Programming will be led by ASIS and InfraGard subject matter experts. (InfraGard is a non-profit organisation serving as a public-private partnership between U.S. businesses and the Federal Bureau of Investigation.) Seventeen education tracks will serve the needs of security professionals interested in topics from business continuity to crime/loss prevention, law and ethics to national security, information security to physical and operational security. The show also provides opportunities for dealers, installers, integrators, consultants, specifiers, architects and engineers 'Game Changer' sessions will address hot and controversial topics, including 'The Ever-Changing Drone Landscape: What You Need to Know' and 'Accelerating Digital Transformation: Insights and Applications.' Ian Bremmer of Eurasia Group will speak on navigating the geopolitical landscape; Steve Demetriou and Joe Olivarez of Jacobs, a global professional services company, will speak about harnessing technology and big data to make strategic decisions. Providing new opportunities Wednesday morning, General John F. Kelly of the U.S. Marine Corps (Ret), will provide insight into the evolving geopolitical landscape around the world. His keynote presentation on Sept. 11 will kick off Military and Law Enforcement Appreciation Day. Tarah Wheeler, cyber security researcher, will speak on protecting assets in the age of cybersecurity leaks and scandals. More than 20,000 registered attendees are expected from 110-plus countries across the entire industry Although the attendee emphasis is on security end-users, the show also provides opportunities for dealers, installers, integrators, consultants, specifiers, architects and engineers. More than 20,000 registered attendees are expected from 110-plus countries across the entire industry, according to ASIS International. Networking events will include an ASIS Town Hall Meeting on the afternoon of Sept. 8, aimed at opening communication between ASIS staff and membership. There will be an Opening Night Celebration Sept. 8 centred on the theme 'Chicago on the Silver Screen' at Revel Motor Row, a popular Chicago landmark originally home to the Illinois Auto Club. Emphasis on education On Monday (Sept. 9) a networking luncheon will be followed by the Awards Reception later in the day. A reception in the evening will present the Karen Marquez Honors Award, recognising a female security professional. Tuesday (Sept. 10) will have a Happy Hour at the exhibit hall, followed later by a Women in Security and Young Professionals Happy Hour. Wednesday evening will be the President’s Reception at Wintrust Arena, with a 1980s theme. The annual trade show has declined in recent years, and ASIS International has implemented changes that seek to reinvigorate the show, culminating in the rebranding last year. One challenge is that the show’s emphasis on education keeps attendees engaged for hours of the day, making it harder to meet the expectations of exhibiting companies who want more booth traffic. More attractions on the show floor, including the Tuesday happy hour, are aimed at increasing overall foot traffic in the hall.
School shootings, especially in the United States, present an ongoing tragedy and a challenge to the security industry. We like to think we have solutions that can help, if not “solve”, the problem: but how effective are they at the end of the day? The sad answer – even after dozens of school shootings and even in the wrenching aftermath of the latest one – is that we don’t know. There is a gaping lack of knowledge and research when it comes to measuring the effectiveness of preventative measures as they relate to school shootings. A 2016 study by the Rand Corp. points to the problem: Lack of data and research on what works and what doesn’t. “Despite growth in the school safety-technology sector, rigorous research about the effectiveness of these technologies is virtually non-existent,” according to Rand (as reported in Education Week). “The field is in desperate need of more evidence on what works, and schools want this information presented to them in vetted, digestible ways to help them with procurement.” Role of early detection Early detection of weapons in the school environment can minimise the impact of school violence Early detection of weapons – and their users – in the school environment can minimise the impact of school violence. For example, ZeroEyes is an intelligent video analytics platform, powered by artificial intelligence (AI), to detect weapons and recognise faces in real time. The company’s goal is to provide school administrators and decision-makers with a simple, intuitive situational awareness platform that gives first responders a tactical advantage. Data capture form to appear here! An emerging tool in campus security is audio analytics: Aggression and gunshot detection are some of the best security tools in the campus security market when it comes to detection, intervention and deterrence. Aggression detectors are capable of accurately recognising duress in a person’s voice. The software automatically and objectively detects the presence of rising human aggression, anger or fear, and subsequently warns staff by a visual alert or alarm trigger. A gunshot detector recognises firearm discharge from various firearms in different settings. Within seconds of a gunshot, the software accurately classifies and triggers an immediate notification. Emergency response technology CLASS [Crisis Lockdown Alert Status System] by Sielox is an incident and crisis management solution Emergency response in also important, and technology can play a role. For example, physical security company Sielox has adapted the idea of using a colour scheme to characterise an emergency situation into its electronic security system. CLASS [Crisis Lockdown Alert Status System] by Sielox is an incident and crisis management solution that uses a variety of colours to designate the emergency conditions in various parts of a school building – red to alert to a crisis condition and green to designate "safe/secure". Colours are displayed on a schematic of the building, and new colours have been added, too, such as yellow for “unaccounted individual", orange for “disturbance” and blue to designate a medical emergency. CLASS offers five different alert levels and eight different colours that are configurable to denote a wide variety of emergency or non-emergency situations (such as maintenance or homeroom check-in status). Emergency response in also important, and technology can play a role Non-lethal methods to suppress active shooters in schools are also emerging. For example, one remotely deployed threat suppression system drenches a perpetrator with a repulsive water-based solution, thus impairing their ability to enact violence. The solution irritates eyes, throat, lungs and skin, but does not cause permanent injury. Cleanup is easy using water and detergent. The solution is manually deployed in predetermined zones, which limits the affected areas in a building. Touch-screen control enables rapid deployment, which can also be integrated with Threat Alert buttons and/or gunshot detection. ShotSpotter gunfire tracking Gun violence is also an issue in the neighborhoods where schools are located Beyond the schools themselves, gun violence is an issue in the neighborhoods where schools are located. ShotSpotter, Inc. released data tracking gunfire in and around public K-12 school communities within ShotSpotter coverage areas during 2017. The data revealed more than 4,800 gunfire incidents occurred during school hours within a one-half mile radius of public K-12 schools and within the coverage area. There are 2,320 public K-12 schools and over 1,079,700 students within ShotSpotter coverage areas in 77 cities in the United States. The ShotSpotter study tracked and analysed data on the number of gunfire incidents that occurred at or near those schools across the time period from 7 a.m. – 5 p.m. local time, Monday – Friday, including summer and holidays. On a positive note, awareness of high-profile school violence has prompted action. Schools and universities are most certainly safer than ever before. High-profile incidents, especially active shooters tragedies, have increased collective security awareness. Heightened awareness leads to safer practices, improved emergency preparedness and security technology innovations. Collaborative efforts that involve stakeholder groups, such as administrators, responders and students, are the key to a safer learning environment. Investing in technology advances in 1) access control (e.g. electronic access, visitor management) and 2) communications (e.g. duress capabilities, mass notification) is the most effective way to protect people.
IFSEC Global, like any large trade show, can be daunting for attendees. At big shows, there can be hundreds of physical security manufacturers and dealers vying for your attention. As the scope of physical security expands from video surveillance and access control to include smart building integrations, cybersecurity and the Internet of Things (IoT), there is an increasing amount of information to take in from education sessions and panels. With IFSEC Global approaching next week, we present eight hints and tips for visitors to make the most out of trade shows: 1. Outline your objectives As the famous saying goes, “Failing to plan is planning to fail!” Once you know your objectives, you can start to research who is exhibiting Before you plan anything else, ensure you know what you need to achieve at the show. By clearly noting your objectives, you will be able to divide your time at the show appropriately, and carefully choose who you speak to. If there is a particular project your organisation is working on, search out the products and solutions that address your security challenges. If you are a security professional aiming to keep up with the latest trends and technologies, then networking sessions and seminars may be more appropriate. 2. Bring a standard list of questions Prepare a list of specific questions that will tell you if a product, solution or potential partner will help you meet your objectives. By asking the same questions to each exhibitor you speak to, you will be able to take notes and compare their offerings side by side at the end of the day. This also means you won’t get bogged down in details that are irrelevant to your goals. 3. Do your homework Once you know your objectives, you can start to research who is exhibiting and decide who you want to talk to. Lists of exhibitors can be daunting, and don’t always show you which manufacturers meet your needs. Luckily, most trade show websites provide the option to filter exhibitors by their product category. Once you know your objectives, you can start to research who is exhibiting and it may be easier to download the floor plan to your phone/tablet Many exhibitions also offer a downloadable floor plan, grouping exhibitors by product category or by relevant vertical market. It may be easier to download the floor plan to your phone/tablet or even print it out, if you don’t want to carry around a weighty map or show-guide. 4. Make a schedule Once you have shortlisted the companies you need to see, you can make a schedule that reflects your priorities. Even if you are not booking fixed meetings, a schedule will allow you to effectively manage your time, ensuring you make time for the exhibitors you can’t afford to miss. When scheduling fixed meetings, keep the floor plan at hand If the trade show spans several days, aim to have your most important conversations early on day one. By the time the last afternoon of the show comes around, many companies are already packing up their booth and preparing to head home. When scheduling fixed meetings, keep the floor plan at hand to avoid booking consecutive meetings at opposite ends of the venue. This will ensure you can walk calmly between stands and don’t arrive at an important meeting feeling flustered! 5. Make time for learning If you’re on a mission to expand your knowledge in a given area, check the event guide beforehand to note any education sessions you may want to attend. Look for panels and seminars which address the specific needs of your project, or which will contribute to your professional growth. This is one of the best opportunities you will have to learn from industry leaders in the field. Be sure to plan your attendance in advance so you can schedule the rest of your day accordingly. Check the event guide beforehand to note any education sessions you may want to attend and be sure to plan your attendance in advance 6. Keep a record Armed with your objectives and list of questions, you will want to make a note of exhibitors’ responses to help you come to an informed decision. If you’re relying on an electronic device such as a smartphone or tablet to take notes, you may like to consider bringing a back-up notepad and pen, so you can continue to take notes if your battery fails. Your record does not have to be confined to written bullet points. Photos and videos are great tools remind you what you saw at the show, and they may pick up details that you weren’t able to describe in your notes. Most mobile devices can take photos – and images don’t need to be high quality if they’re just to refresh your memory. 7. Network – but don’t let small talk rule the day It may seem obvious, but don’t forget to exchange business cards with everyone you speak to It may be tempting to take advantage of this time away from the office to talk about anything but business! While small talk can be helpful for building strong professional relationships, remember to keep your list of questions at hand so you can always bring conversations back to your key objectives. Keeping these goals in mind will also help you avoid being swayed by any unhelpful marketing-speak. It may seem obvious, but don’t forget to exchange business cards with everyone you speak to, or even take the opportunity to connect via LinkedIn. Even if something doesn’t seem relevant now, these contacts may be useful in future. Have a dedicated section in your bag or briefcase for business cards to avoid rummaging around. 8. Schedule time for wandering With your most important conversations planned carefully, there should be time left to explore the show more freely. Allowing dedicated time to wander will give you a welcome break from more pressing conversations, and may throw up a welcome surprise in the form of a smaller company or new technology you weren’t aware of. Allowing dedicated time may throw up a welcome surprise in the form of a smaller company or new technology you weren’t aware of Security trade show checklist Photo Identification: As well as your event pass, some events require photo identification for entry. Notebook and pen: By writing as you go, you will be able to compare notes at the end of the day. Mobile device: Photos and videos are great tools to remind you what you saw at the show, and may pick up details you missed in your notes. Paper schedule and floor plan: In case batteries or network service fail. Business cards: Have a dedicated pouch or pocket for these to avoid rummaging at the bottom of a bag. Comfortable shoes: If you’re spending a whole day at an event, and plan on visiting multiple booths, comfortable shoes are a must! Click here for an infographic on attending the event.
Traka has launched a new downloadable white paper to open a discussion on the changing nature of retail banking in the UK, using latest case examples to consider branch management and shifting customer expectations. The white paper, titled ‘Shaping the retail banking industry’ looks at several factors influencing the sector, including the increasing expectations and values of customers demanding a more personalised branch experience. Key and equipment management Incorporating analysis from globally renowned financial services, including PwC, Accenture and Deloitte, the paper highlights the opportunities for innovation, together with collaboration and adoption of new operational processes. This incorporates key and equipment management to enable retail banks to deliver on top quality service. The future for retail banking could arguably also be cited as bleak and in a state of industry disruption" Says Mike Hills, Traka UK Market Development Manager and Author of the white paper: “Against a backdrop of negative press concerning the state of UK high streets, the future for retail banking could arguably also be cited as bleak and in a state of industry disruption, as customers move towards a more mobile-connected lifestyle.” Staff and customer security “However, our research in putting together this white paper tells a different story. That actually, the sector has a real chance to embrace the changes occurring and entice their customers, meeting demands for personal service. We found that brands riding the storm are taking small yet significant steps to tailor their services and make operational differences that are proving key to their success.” The white paper focusses on Traka’s experience with Nationwide Building Society to demonstrate how supporting operational efficiency can benefit banking staff and ensure they can focus on serving their customers, without compromising on security. Retail Banking security Mike concluded, “We have brought this white paper together using the latest research and intrinsic market reports, together with case evidence on the future of the retail banking industry and the issues faced by the sector to ensure long term success.” “Within this, we wish to stimulate debate and encourage views and contributions from as many different voices as possible. We look forward to your opinion, experience or comment on this matter of growing importance so together, we can look to support and shape the future of retail banking.”
PerpetuityARC Training, part of the Linx International Group recently delivers a risk and crisis management workshop for Lafarge Egypt (part of the LafargeHolcim Group) in Cairo. The training provided senior managers from across the organisation with the knowledge and skills needed to manage resources during a crisis and operate within the organisation’s crisis management and compliance framework. The intensive programme was built collaboratively between PerpetuityARC Training and Lafarge Egypt and specifically tailored to its operating environment in the construction materials industry. Achieve successful resolution It was great to see them solving problems in a pressured, but safe environment" In a series of practical and theoretical exercises, Linx International Group Director, Angus Darroch-Warren, assessed and enhanced the ability and confidence of participants to apply their new skills to manage complex and evolving crisis scenarios, each requiring close collaboration between team members, in order to achieve a successful resolution. Security Director at Lafarge, Magdy Khorshid, stated: “The course was amazing, very practical and interesting to all and I received much positive feedback from all learners.” Angus commented: “The Lafarge teams engaged fully with the workshop scenarios. It was great to see them solving problems in a pressured, but safe environment, that allowed them to think through issues and respond using identified resources and procedures.” The workshop is the latest collaboration in a five year relationship between Lafarge Egypt and PerpetuityARC Training. During this time PerpetuityARC Training has delivered its security and risk related courses to employees and stakeholders in Egpyt and the UK.
Wintec (The Waikato Institute of Technology), established in 1924 is a major New Zealand Government-funded tertiary institution, which has three Hamilton campuses; a city site overlooking the central business district, Avalon campus on the northern outskirts of the city, and a horticultural campus at Hamilton Gardens. In addition, it has regional operations at Te Kuiti and Thames and also an office in Beijing. The Avalon campus, a ten-minute drive from the city, is home to specialist trades training facilities, a state-of the-art sport and exercise complex and custom designed facilities for the School of International Tourism, Hospitality and Events. The third Hamilton campus, the Horticultural Education Centre, is situated amidst the 58 hectares of Hamilton Gardens. On-line distance education Wintec’s programmes and qualifications are nationally and internationally recognised Wintec is one of the largest institutes of technology in New Zealand, and has more than 35,000 full-time and part-time students, more than 500 full and part time staff and eleven schools within its academic faculty. International enrolments exceed 1000 from 47 countries. A range of student services provide its domestic and international students with a high level of support so they enjoy a positive, safe and secure study experience. Wintec’s programmes and qualifications are nationally and internationally recognised and its degrees have equal status to those from universities. The degree programmes include Media Arts, Midwifery, Nursing, Occupational Therapy, Early Childhood Education, Business Studies, Engineering, Technology, Information Technology, and Sport and Exercise Science and a wide range of full and part time courses for those already in the workforce. Wintec is also recognised nationally in the delivery of on-line distance education for those unable to attend regular classes for reasons of geographical access or other constraints. Electronically controlled doors Wintec strives for a balance of unobtrusive yet robust control of site activity, essential for maintaining an open campus environment. Shane Goodall, Security Manager at Wintec, describes the approach to security as highly proactive and collaborative: “by focusing on preventing issues arising, we now have a minimal policing role and the crime resolution rate is high”. This environment is underpinned by Gallagher’s security system, a core access control, intruder alarms and integration platform. Wintec first installed the Gallagher system (formerly Cardax FT) in 1999 and has since migrated this legacy system to Gallagher’s latest security technology platform. Security for the entire organisation, including satellite sites, is managed and monitored centrally from Wintec’s single Gallagher security system. Since initial installation, Wintec’s Gallagher access control system has grown from 7 to 240 electronically controlled doors in 2009, with another 40 planned - testimony to the scalability and flexibility of the system. Network friendly system communications The organisation first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras Wintec has integrated its imaging system to the Gallagher system delivering a visual record which can be matched to the audit trail of events in Gallagher Command Centre software. The organisation first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras (both analogue and IP). Another compelling aspect of the system for Wintec is the scalability and TCP/IP network friendly system communications. As well as monitoring and controlling staff and student access, equipment including computers, TVs, printers, audio visual resources at Wintec are also monitored through the Gallagher system. The ‘Gallagher Hub’, a new computer laboratory offering comprehensive IT resources is open 24 hours. The Hub contains 125 workstations, and there are plans to extend that number. Active monitoring of equipment though the Gallagher system has significantly reduced theft. Students and staff have scheduled access to shared IT resources, classrooms and lecture theatres. Manage cardholder data ‘Cardholder Import’, an XML Interface, supports the importation of cardholder data including course enrolments from their student record system to Gallagher Command Centre. Shane comments, “Student card issuing is an automated process which is enrolment-driven – a student’s access privileges are assigned according to their enrolled courses.” “To implement this, we defined a rules-based allocation of access groups in the Gallagher system using the XML interface. The interface is ‘live’ so that changes in the student enrolments database are immediately reflected in the Gallagher system. The student’s updated access privileges come into effect without delay.” Staff that interact directly with students are now empowered to manage cardholder data enabling the security team to focus on security. Students and staff utilise Mifare SmartCard functionality extensively, embracing them as an integral multiapplication tool in their modern educational environment – SmartCards are used to issue resources from the library and as pre-stored value cards enabling prepaid printing and photocopying. In the near future they will also be used in Wintec’s Pay and Display car-park and potentially as passes onto city council buses. Electronic access control At Wintec, security is not viewed as a discrete functional activity relegated to security staff only Stewart Brougham, Director of Internationalisation at Wintec, says students have given very positive feedback about their ID cards. In particular, the ability to verify the identity of staff members from their ID access cards provides peace of mind for students. The end result is a people-friendly campus. Future enhancements of Wintec’s security may include the utilisation of the CommCard solution from Gallagher to manage and monitor access to student accommodation. CommCard is a unique high level integration between the Gallagher Command Centre software and Salto off-line readers, delivering offline, non-monitored electronic access control for lower security doors. An overriding philosophy of collaboration has seen Wintec take a lateral approach to security, the value of which many organisations have yet to realise. At Wintec, security is not viewed as a discrete functional activity relegated to security staff only. The ongoing management of security is a joint effort between the security services team and the information services team. Increasing operational security The security services team manages the Gallagher system while IT looks after back end functions such as installation on the network and backup. Wintec has leveraged the convergence of security (access control) and other operational business functions recognising the tremendous potential for reducing risk and increasing operational security, safety, performance and efficiency. Looking beyond simply controlling and monitoring who goes where and when on site, Wintec is harnessing the reporting capabilities of Gallagher Command Centre to meet regulatory requirements. The Gallagher system enables the institution to report on actual space utilisation (not just space booking). Decisions are made for best use, and also to substantiate funding, based on these reports. “The key to space utilisation reporting are the frequency of reporting and the integrity and reliability of information,” states Stewart Brougham. It’s a national issue for educational institutes in New Zealand. Extending external partnerships “For Wintec, reporting is about ensuring compliance with regulatory requirements and is also a staff time management issue – reducing the administration load on lecturers, who would otherwise have to track student attendance manually.” Brian Fleming, Director of Gallagher Channel Partner, Concord Technologies, sites this lateral application of a security system as key to maximising the value of Gallagher to Wintec. Wintec has a strong relationship with Gallagher in the ongoing development of its technologies This collaborative philosophy extends to proactive external partnerships with their Gallagher Channel Partner, Concord Technologies, for the installation and maintenance of the Gallagher system, and with system designer and manufacturer, Gallagher. Having signed an agreement to continue in the capacity of a Gallagher field test site, Wintec has a strong relationship with Gallagher in the ongoing development of its technologies. Wintec’s success, in the last 5 years, as a test site reflects the competence of both its IT and security staff and the institute’s commitment to edge student services. Minimal training has been required. Software maintenance agreement There is open communication and information sharing between all internal and external parties involved, which means any issues that arise can be quickly addressed. Wintec has committed to a site maintenance plan with their security partner, Concord Technologies. The plan incorporates both software and hardware maintenance to ensure the system is maintained on the latest operating platforms within a known cost structure. A Software Maintenance Agreement also ensures enhanced ongoing system performance and reliability of the Gallagher system. Acknowledgements Gallagher would like to acknowledge the support of Wintec and security partner, Concord, with the development of this in-site study. Gallagher would also like to particularly acknowledge and thank Shane Goodall for the pivotal role he plays in championing the collaboration of these parties and for his outstanding support of the Northern Region Cardax User Group (NZ) in the capacity of Chairman of the group.
Located in the buzzing heart of England’s capital city, University College London is one of the top ranking establishments for higher education in the world. Founded in 1826, London’s first university institution, the College now has an estimated 28,600 enrolled students and 14,600 members of staff. Including agency staff, academic associates, and other visitors, UCL currently has a system of over 48,000 valid cardholders. Based primarily in the Bloomsbury area, UCL’s main campus is situated on Gower Street and includes departments such as biology, chemistry, economics, engineering, geography, history, languages, mathematics, philosophy, politics, physics, architecture and the Slade School of Fine Art, as well as the preclinical facilities of the UCL Medical School and the London Centre for Nanotechnology. Electronic access control UCL has been used as a location for a number of high profile film and television productions While the UCL Cancer Institute and Faculty of Laws are also nearby, notable College buildings include the original Wilkins Building and Gower Street’s Cruciform Building, previously home to University College Hospital. The University has further sites based elsewhere in and around London, such as the UCL Institute of Ophthalmology, the UCL Institute of Orthopaedics and Musculoskeletal Science, The Royal Free Hospital Medical School, and also the UK’s largest university-based space research group, the Mullard Space Science Laboratory, and UCL’s own astronomical observatory at Mill Hill. Due to its position within London and the historical nature of its buildings, UCL has been used as a location for a number of high profile film and television productions, including Gladiator, The Mummy Returns, The Dark Knight and Inception. The sheer scale of the University’s operations, with thousands of occupants fluctuating between its numerous facilities, has dictated the need for a comprehensive electronic access control security system – one which has evolved over many years. Physical locking controls UCL’s Security Systems Manager, Mike Dawe explains that while adhering to the University’s culture of ‘general openness’ on campus, Gallagher systems have been introduced as “a progressive response to the need for more security control on site.” Security throughout the University is managed by the Security Department of the Estates Division, which has responsibility for all the physical locking controls and electronic systems, as well as the provision of the security guarding service. By and large an open campus, a number of university buildings are free to visitors from the general public, while others are controlled by turnstiles accessible by valid cardholders only. Many other research areas are available only to those with specific security passes. Gallagher’s systems have been in place with the University since 1993 and were originally chosen for the Gallagher Commander Hardware’s ability to communicate effectively over long distances between buildings. Key industry challenges Following were the key industry challenges involved: Ensuring appropriate access to students/staff onsite Implementation of lockdown and evacuation procedures Controlling access to key University areas Protecting University property Providing unobtrusive but robust security Control and management of multiple systems Visitor time and access management Central records systems Full data integration was achieved in 2006 when the system was linked to UCL’s central HR Recognised by Mike as the ‘next important direction for the University’, the subsequent introduction of the Gallagher Access Control system (formally Cardax FT) in 2003 enabled Gallagher’s main security system to be integrated with UCL’s other data systems. Additionally, Mike highlights how “Gallagher’s ‘building blocks’ approach to programming the software also provided greater flexibility when using the system, while the network infrastructure enabled us to move away from our own discrete wiring.” Full data integration was achieved in 2006 when the system was linked to UCL’s central HR, student records and visitor records databases. Combining the regular ID card with a single access control card then followed, and validity is kept fully updated by the University’s central records systems. Currently the University has 101 buildings on the Gallagher system, which controls 939 doors, 32 turnstiles and 15 lifts. General perimeter control Typically, Gallagher security is used for the general perimeter control of the buildings, such as those with both turnstile access and a reception at the entrance, as well as additional control within College buildings to divide public and semi-public areas from departmental spaces. Gallagher systems also control UCL’s top security areas such as high risk research space and data centres. Describing UCL’s security operation, Mike explains how the Gallagher solution has been integrated with the inhouse HR, student and visitor records systems and filters duplications to ensure a single identity. This information is then fed through the Gallagher system to update cardholder records using an ‘import/export’ function. The Gallagher technology is also used to automatically send barcode information to the Library systems and update the student records system with student photos. Scheduled email notification reports are also sent regularly which, according to Mike, “has proved very useful for UCL’s high value areas.” Security operations team We routinely use reports and produce these in response to departmental concerns and requests" “We routinely use reports and produce these in response to departmental concerns and requests”, he explains. “Typically this is done by the security operations team, which analyses the information, along with CCTV data to investigate suspected crimes.” UCL is planning to integrate the Gallagher Security system with its existing CCTV system and will use this, in addition to the new Command Centre Premier client, to improve the provision of site information to the Security Control room staff. The University is also currently developing its import/ export process to automatically provide access levels based on person-type information, such as department, course etc. Gallagher would like to thank Mike Dawe, UCL’s Security Systems Manager, for his support with the production of this site profile. We would also like to acknowledge the support of our security partner, Reach Active Limited who has contributed significantly to the successful implementation of the Gallagher system at University College London.
After a period of decline, the number of pupils being expelled from mainstream schools is increasing, placing more pressure on the need for Pupil Referral Units and the security at these premises, which is vital for managing student and staff safety. ASSA ABLOY High Security & Safety Group offers a range of locks and doors suited to the sensitive needs of Pupil Referral Units and pupils in care. Fire resistance integrity All doorsets in the Secure Education range are independently tested and certified The breadth of doorset solutions means the High Security & Safety Group can specify products for every area and need of a secure education environment. From classroom doors and personnel doors to circulation doors and high-performance doors. All doorsets in the Secure Education range are independently tested and certified to achieve 60minute fire resistance integrity and insulation to BS EN 1634 from both sides of the door. In addition, all doors within the offering are tested in line with the Department of Health’s environmental design guide attack test for secure services, as well as meeting with DD171 & BS EN 1192 severe duty performance and strength, and are tested to PAS 24 enhanced security performance requirements. Secure educational facilities This guaranteed and certified level of performance gives building owners and users the peace of mind that all doorsets are fit for purpose, as well as providing the added level of security and safety often needed in secure educational facilities. Mike Dunn, Commercial Director for ASSA ABLOY High Security & Safety Group, said: “A recent report by the think tank IPPR, found the total number of children being taught in ‘alternative provision’ for excluded children is far higher than the total number of reported exclusions. This will inevitably mean increasing pressure on facilities, such as Pupil Referral Units, and the safety of staff and pupils within those buildings.” Added level of security Pupil Referral Units are first and foremost a place of education" “Pupil Referral Units are first and foremost a place of education and therefore doors and locks must allow for this, grant access, as well as restricting permissions. However, an added level of security and safety must be considered and handled sensitively within these premises.” “Our experience and wide product range means we can advise on and supply doors and locks for every aspect of a secure education environment, mitigating any risk and ensuring a smooth specification process.” Doors within the Secure Education range come in a variety of materials and finishes, giving specifiers improved design flexibility.
Prama Hikvision partnered with the Sanjivani Group of Institutes to offer latest surveillance and security solutions. For the first time that Artificial Intelligence was offered, and enabled face recognition terminals in India’s education sector. Sanjivani Group of Institutes situated at Kopargaon, Ahmednagar is a premier institute for Engineering, Pharmacy, Nursing and Diploma in Ahmednagar District. Sanjivani took its names and inspiration from the famous epic of Ramayana where ‘Sanjivani buty’ was brought for revival of life. The Sanjivani Rural Education Society (SRES), was established by Honorable Shri. Shankarrao Genuji Kolhe in 1983, at Kopargaon, rural domain in Ahmednagar district of Maharashtra, India. Identify unauthorised person The entire campus of the Sanjivani Group of Institutes is spread out in more than 100 acres land As the educational scenario changed with time, SRES understood the need and added a number of courses under the umbrella of the Sanjivani Rural Education Society (SRES) and consequently it gave birth of the Sanjivani College of Pharmaceutical Education and Research, Sanjivani Senior and Junior College, Sanjivani Academy, a CBSE school and Sanjivani International school. The entire campus of the Sanjivani Group of Institutes is spread out in more than 100 acres land. There are different departments in various buildings, playgrounds, hostels and staff quarters. Due to vast area and huge numbers of students, it’s very difficult for management to identify unauthorised person inside the campus. In the past, many instances of bullying, robbery, theft, ragging and pick-pocketing were reported. Up-to-date surveillance solution With the expansion of the Sanjivani Group, there were many challenges faced by students and staff in terms of safety and security. “Consequently, we took our first step towards it by installing Hikvision IP CCTV surveillance in all our campus areas for monitoring. The clarity and the quality of the camera is appreciable and satisfying,” said Amit N Kolhe, Managing Trustee, Sanjivani Rural Education Society (SRES). He further added, “Presently the security technology has changed a lot. While understanding the need of safety and security of the students, we decided to go for an up-to-date surveillance solution. We contacted Prama Hikvision team and their system integration partner Om Agency for an advanced solution. After understanding our requirements, they introduced some of the latest technologies related to security surveillance.” Facial recognition devices The same software can be used by seamless integration for time attendance, access control and surveillance" He further elaborated, “After this we finalised the key areas by conducting the security survey in the campus. We got many advanced solutions implemented with help of SI partner and Prama Hikvision team. The solutions included, ANPR cameras for number plate recognition of cars and bikes at entry and exit gates, facial recognition devices for time attendance and access control of students & staff members.” “The advantage of Hikvision security and surveillance products is that things can be monitored through a single software platform, i.e. IVMS 5200E, which comes as all in one software. The same software can be used by seamless integration for time attendance, access control and surveillance,” concluded Amit N. Kolhe. Access control systems By visiting Sanjivani Group of Institutes along with System Integration Partner Om agency, the following solutions based on the latest technology and products were adopted: Automatic Number Plate Recognition (ANPR) cameras Tripod turnstile integrated with face recognition panels HD IP cameras A broadcasting solution for the seminar rooms Face recognition based access control systems Hikvision solutions delivered results: ANPR Cameras helped the institute to identify unauthorised vehicles at entry gates, through which they stopped many outsiders in getting entry into campus area. Face recognition panels and access control panels helped institute in getting entry and exit record of students as well as visitors. Through the large number of cameras installed at various locations, the management is able to keep an eye on the entire campus. One-stop solution We are proud to execute this project with support of Prama Hikvision" “Implementing IP Surveillance project for Sanjivani Group of Institutes, Kopargaon was a great learning experience. We have built a strong relationship with Prama Hikvision over the past 10 years. They work with vendor partners to deliver solutions that suit the requirements. The efficient professionals and quality of service is appreciated.” said Mr. Hemant Rokade – Director Sales, OM Agency. “We are proud to execute this project with support of Prama Hikvision. It was a huge challenge to execute the project of such gigantic proportions. While implementing the project, Prama Hikvision helped us through the project at every step. We appreciate the level of details and accountability, which Prama Hikvision has demonstrated in this project. This reaffirms our faith that Hikvision is the one stop solution for all security and surveillance solutions,” said Mr. Pravin Rokade – Director Operations, OM Agency.
Round table discussion
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?