Vanderbilt, a global provider of state-of-the-art security systems, announced that they will jointly attend this year’s IFSEC International with sister-company ComNet. The 2019 tradeshow takes place between June 18-20, at ExCeL London. In addition to their flagship products and prominence in open platforms and integrations, both companies, under the ACRE banner, will also highlight their ability to aid customers in every step of their security journey. “From the moment our customers...
IDIS launches the DirectIP Super Fisheye 5MP Compact camera (DC-Y6513RX), further extending its popular Super Fisheye range. IDIS fisheye cameras are some of IDIS’s best-selling models thanks to their exceptional, dual-side de-warping and Smart UX Controls, allowing for smooth and intuitive panning, tracking, and zooming with award-winning ease and accuracy. Accurate image capture The introduction of the DC-Y6513RX reflects IDIS’s continued commitment to market-responsive innovati...
Linx International Group, the global provider of security, risk management, consultancy and training services, has announced the appointment of Group Marketing Manager, Jerry Alfandari and Marketing Coordinator, Victoria Carter. Video production experts Fluent in both English and German, Jerry Alfandari has a proven track record managing international marketing campaigns, including social and digital content strategies. He is joined by Victoria Carter, who brings her expertise in social media,...
Pulse Secure, the provider of software-defined Secure Access solutions, announces that it has teamed up with Dynamic Worldwide Training Consultants (DWWTC) and Westcon Americas, A Division of SYNNEX, to deliver the new Pulse Secure Authorised Training program to its reseller partners and customers. As Pulse Secure Authorised Education Partners, DWWTC and Westcon Americas, A Division of SYNNEX, will deliver Pulse Secure’s new program of Authorised Education Training Courses, designed to pr...
Openpath, a pioneer in workplace technology and security, unveils at ISC West 2019 its new Elevator Board and Partner Portal to provide channel partners, property managers and tenants with even more comprehensive and convenient office security systems. Elevator Board enables Openpath to connect commercial spaces under a single, streamlined and secure mobile access system. And now, with Partner Portal, integrators can access best-in-class training and education online, enabling them to easily im...
HID Global, a global provider of trusted identity solutions, will showcase new offerings, an industry-changing access control tool and new integrations in HID booth #11063 at this week’s ISC West in Las Vegas. The company will also participate in Security Industry Association (SIA) educational sessions and local community events during the conference. Visit the HID in booth at the Sands Expo and Convention Center from April 10-12, 2018 for live demonstrations of the company’s latest...
Qognify - the trusted advisor and provider of physical security and enterprise incident management solutions, is exhibiting at ISC West and demonstrating to more than 1,000 organisations around the world, how Qognify solutions are safeguarding people, infrastructure and business operations. At booth 13074, Qognify’s team of subject matter experts will advise security practitioners on how they can maximise the outcomes of their security strategies. Attendees at the ISC West International Security Expo, being held at the Sands Expo Center will benefit from insights they can apply to maximise their organisation’s security strategy, whether in education, critical facilities, finance, healthcare, logistics, manufacturing, retail or transportation sectors. Qognify’s field-tested solutions have demonstrated maximum value to customers who place a premium on physical security. Incident management solutions Qognify applies a consultative approach to building solutions for customers, as opposed to recommending off-the-shelf products Qognify applies a consultative approach to building solutions for customers, as opposed to recommending off-the-shelf products. The company works with customers to understand their organisations’ strategic goals, along with any specific needs based on industry or legislative requirements. Assessing each scenario individually in this collaborative process, has resulted in system solutions that have quantifiably increased the security and operational efficiencies in enterprises. Qognify CEO and President, Steve Shine states: “Customers with complex physical security requirements, or systems that are dictated by strict regulations, or even those with specific needs based on their particular industry have realised optimised outcomes with Qognify solutions.” Shine adds: “Our software solutions reach beyond traditional safety and security applications and deliver far reaching and quantifiable value to the customer across many industries and use cases – even in unexpected areas that may surprise.” Qognify invites visitors of ISC West to visit booth 13074 to learn about how Qognify provides added value and unique physical security and incident management solutions to customers.
At ISC West 2019, ASSA ABLOY will highlight its commitment to helping security professionals stay ahead of industry trends and innovation for their clients. ASSA ABLOY’s Booth (#8061) will feature cutting-edge solutions that help security professionals across industries navigate what’s next in access control. “At ASSA ABLOY, we’re focused on helping our customers prepare for the future so they can build a safer, smarter and more seamless business,” said Peter Boriskin, Chief Technology Officer at ASSA ABLOY Opening Solutions Americas. “We’re excited to share the products that allow us to help security professionals open what’s next in the industry.” Unattended package delivery At its booth, ASSA ABLOY will display new innovations in access including: Unmanned Critical Infrastructure: ASSA ABLOY will highlight ways to ensure the security of critical infrastructure that is often unmanned or unsecured. One such example is Intelligent Traffic System (ITS) cabinets that are vulnerable to risks ranging from vandalism to malicious physical and cyber-attacks simply because they aren’t adequately secured. Mobile Credentials: Mobile is already a crucial part of people’s everyday lives. With the shift to mobile, ASSA ABLOY is supporting the growing adoption of mobile credentials and making strides in capabilities by integrating with key strategic partners. Unattended Delivery: The security of unattended package delivery has given rise to a new set of challenges and opportunities. Booth visitors can learn more about ASSA ABLOY’s newest addition to the family, Luxer One, a locker technology company, and how smart lockers can be used as a package delivery solution. Intelligent key system “These advances are the result of our continued commitment to developing solutions that improve security, safety and convenience for our customers,” said Mark Duato, Executive Vice President of Aftermarket Solutions at ASSA ABLOY Door Security Solutions. “The innovations on display at ISC West are just the start of what’s coming down the pike as we explore new opportunities in the market.” Various markets and technologies The booth will also showcase new expansions in ASSA ABLOY’s product lines for various markets from education to healthcare, as well as the latest technologies, including: The Securitron M380E Magnalock, which provides a strong hold, an optional integrated REX, sleek design and easy installation with a new strike mounting template. The Adams Rite G100 wireless digital glass lock with Aperio technology, which makes extending access control to all-glass doors easy and affordable while maintaining aesthetics. The latest Attack Resistant Door Solutions, 2019 Secure Campus Award and 2019 Govies Award winning technology designed to delay intruder entry. The Medeco XT Traffic Cabinet Lock, 2019 Govies Award winning technology designed to secure critical infrastructure with 27/4 security and access through an intelligent key system.
Tavcom Training, part of Linx International Group, has been chosen by leading alarm manufacturer Texecom to assist in providing professional training for installers. Through the Texecom Academy online portal, installers have the opportunity to gain a BTEC Level 3 intruder alarms qualification developed in conjunction with Tavcom Training. BTEC Level 3 Intruder Alarms course Wayne Foster, Technical Services Manager at Texecom states “Texecom Academy benefits our installers by giving them the skills and expertise to ensure the installation and maintenance of every Texecom system is done efficiently and to the highest possible standard. It also provides end users with the peace of mind that the work is being carried out by an installer with a recognised accredited qualification.” We are excited to be working with Texecom to deliver our BTEC Level 3 Intruder and Hold Up Alarms course" Andrew Saywell, Head of Sales at Tavcom Training adds, “We are excited to be working with Texecom to deliver our BTEC Level 3 Intruder and Hold Up Alarms course. Expert knowledge helps installers to stand out from the competition and provides their customers with the best service. We have worked very closely with Texecom to ensure the training syllabus perfectly matches the real world needs of the professionals who design, install, commission and service these systems.” Texecom – Tavcom partnership Wayne Foster continues, “Our expert teams are always on hand to offer support, but we also believe in empowering our installers with the knowledge they need to address any issues themselves. It is better for them, better for the end customer and better for us.” As a result, Texecom and Tavcom will also be providing ‘bite size’ training modules via their online portal. The modules are based on the top 20 technical support call topics identified by Texecom. Detection devices The first of these modules, entitled ‘Detection Devices’, will be offered free of charge to Texecom installers. Wayne Foster concludes, “We are committed to producing the highest quality products and ensuring our installation partners and end users receive the very best service.”
At ISC West 2019, ASSA ABLOY will demonstrate what’s next in the rapidly changing security industry with on-the-ground educational and engagement opportunities, including its in-booth (#8061) Technology Center, Systems Integrator Breakfast and training sessions. “As the modern security landscape continues to evolve, it’s critical for industry professionals to stay ahead of emerging trends and challenges,” said Mark Duato, Executive Vice President of Aftermarket Solutions at ASSA ABLOY Door Security Solutions. “With deep expertise and a comprehensive portfolio of solutions, ASSA ABLOY has always been a resource for security professionals navigating this complex industry. We’re excited to return to ISC West this year and give attendees a look at what’s next.” Systems integrator breakfast ASSA ABLOY’s annual press conference will highlight how the company is evolving with new product innovations ASSA ABLOY’s annual press conference will highlight how the company is evolving with new product innovations, new areas of business and new offerings. The press conference will be held in the ASSA ABLOY booth on April 10 from 11–11:30 a.m. PT. The 15th annual ASSA ABLOY Opening Solutions Systems Integrator Breakfast will give attendees a behind-the-scenes look at the innovative approach the City of Atlanta took to create a safer, easier experience for residents and visitors ahead of one of the largest sporting events in the world. The breakfast will take place at The Venetian on April 11 from 8–9:30 a.m. PT. Seating is limited. Technology center In addition to the broad range of products and solutions on display, visitors to ASSA ABLOY’s booth can explore the Technology Center for a demo of the support resources available to them, including: ASSA ABLOY Customer Support App, which provides immediate and intuitive troubleshooting, e-learning and support. BILT app for easy-to-use 3D installation instructions for ASSA ABLOY products. ASSA ABLOY Academy website for training and education resources. ASSA ABLOY Openings Studio which offers users integrative BIM software tools for designing, building and managing openings that can be used throughout the lifecycle of a building. Educational sessions Attendees can add these sessions to their calendar by logging onto the ISC West 2019 website Attendees can also participate in ASSA ABLOY’s annual USO Bag Build by packing supplies for military personnel leaving for or returning from deployment and awaiting the arrival of their personal luggage. ASSA ABLOY will host and participate in two educational sessions: Introduction to Access Control Wiring is an entry-level lab course designed to explain the basic electronic knowledge needed to wire an access control system. The lab will take place on April 9 from 1:30–4:30 p.m. PT in Sands 210. In Between the Lock and Controller: Why Wireless Locks Are Changing the Game in Access Control is a panel session that will address solutions for design and environmental issues impacting physical access control systems. The panel will take place on April 11 from 11 a.m.–12 p.m. PT in Sands 304. Attendees can add these sessions to their calendar by logging onto the ISC West 2019 website. ASSA ABLOY’s sister companies will also be onsite, including HID Global (booth# 11063), Alarm Controls (booth# 4050), Ameristar (booth# 9073), Traka (booth# 6103), and August (booth# 32067).
Interlogix, global provider of security and life-safety solutions, has re-launched its Interlogix Security Pro program, a premier national channel partner program offering Interlogix dealers a wide array of resources and incentives designed to help them successfully grow their businesses. Interlogix is a part of Carrier, a leading global provider of innovative heating, ventilating and air conditioning (HVAC), refrigeration, fire, security and building automation technologies. “The Interlogix Security Pro program is back and better than ever,” said Warren Hill, vice president, partner solutions, North America, Interlogix. “We listened to our dealers and designed a program with the resources they want and need to successfully compete in their service areas. It’s easy to join and participate and it’s open to all Interlogix dealers.” Interlogix Security Pro program The Interlogix Security Pro program will keep our dealers in demand and ahead of the competition" The Interlogix Security Pro program offers multiple award levels, designed to meet the needs of a wide range of dealers. Program benefits increase with each level and may include co-op marketing funds, new product samples, extended product warranties and preferential tech support. Other level-based program opportunities and benefits may include: Invitation to the annual Interlogix Elevate conference, with covered conference fees and travel benefits for qualifying program members Special product training Preferential positioning and designation on the dealer locator tool on the Interlogix website Networking through events and online communication opportunities Use of the Interlogix Security Pro logo and product image bank. Business-enhancing products As an Interlogix Security Pro member, dealers earn Pro Points to use on a range of business-enhancing products and services. The program’s four levels – registered, gold, platinum and diamond - make it easy to start with clear paths toward higher goals and greater success. The program also includes rewards for program members meeting or showing year-over-year growth. “The Interlogix Security Pro program will keep our dealers in demand and ahead of the competition,” said Hill. “This program is about making great dealers even better.”
BCDVideo, the provider of IP video surveillance infrastructure and appliances for the physical security industry, announced the hiring of Matt Strautman, who will serve as channel manager leading business development. In this role, Strautman will help foster growth by working with and educating security integrators, original equipment manufacturer (OEM) partners, and architectural and engineering firms on the latest industry, technology, and systems best practices. “Matt has outstanding OEM relationships and a diverse security industry background which includes working as a security integrator, sales representative and business development executive,” said BCDVideo CEO Jeff Burgess. “He brings a unique perspective to help lead our business development team into the future and we look forward to the immediate impact he will have as we continue to grow our footprint nationally in the physical security industry.” Addition of manufacturer sales rep firms BCDVideo is pleased to announce new additions to its nexus of manufacturer sales rep firms, including Bassett Sales Corporation, ISM, TLA, and ASR EnterprisesStrautman joins the BCDVideo team after serving as business development executive for Arrow Intelligent Systems, where he led national accounts and OEM partnerships for the global organisation. His expertise and knowledge of the industry will be essential as BCDVideo continues to fast-track its growth. BCDVideo is also pleased to announce new additions to its nexus of manufacturer sales rep firms, including Bassett Sales Corporation, Intelligent Systems Marketing (ISM), TaylorLong & Associates (TLA), and ASR Enterprises. Bassett Sales will offer BCDVideo’s solutions to customers throughout the Southwestern United States and Hawaii; ISM’s territory includes northern California and the Rocky Mountain region; TaylorLong will represent BCDVideo in the Northwest as well as Alaska; and ASR will help expand BCDVideo’s presence in the Maryland, Virginia, and Washington, D.C., marketplace. Enhanced customer access to products The addition of these most recent four firms helps give us the coast-to-coast sales coverage that we set out to fulfil at the beginning of the year"These new relationships will bring in a network of authorised dealers and distributors throughout these regions to further enhance customer access to BCDVideo’s product line of industry-leading video recording servers, hyperconverged infrastructure, the new BCDVideo Accelerator (BVA), environmentally hardened servers and switches, GPU analytics servers, as well as several private-label systems that BCDVideo builds for OEMs. “I am really excited about 2019 and beyond. The addition of these most recent four firms helps give us the coast-to-coast sales coverage that we set out to fulfil at the beginning of the year,” Strautman said. “I feel that we have aligned ourselves with not just with tenured rep firms, but with firms that have had longstanding success in the security industry and really understand the importance of a complete solution.”
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organisations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anything like the 5.4 billion user IDs on haveibeenpwned.com, their login has already been compromised. If it's not listed, it could be soon. Recent estimates state that 8 million more credentials are compromised every day. Ensuring safe access Data breaches, ransomware and phishing campaigns are increasingly easy to pull off. Cyber criminals can easily find the tools they need on Google with little to no technical knowledge. Breached passwords are readily available to cyber criminals on the internet. Those that haven’t been breached can also be guessed, phished or cracked using one of the many “brute-force” tools available on the internet. It's becoming clear that login credentials are no longer enough to secure your users' accounts. Meanwhile, organisations have a responsibility and an ever-stricter legal obligation to protect their users’ sensitive data. This makes ensuring safe access to the services they need challenging, particularly when trying to provide a user experience that won’t cause frustration – or worse, lose your customers’ interest. After GDPR was implemented across the European Union, organisations could face a fine of up to €20 million, or 4% annual global turnover Importance of data protection So how can businesses ensure their users can safely and simply access the services they need while keeping intruders out, and why is it so important to strike that balance? After GDPR was implemented across the European Union, organisations could face a fine of up to €20 million, or 4% annual global turnover – whichever is higher, should they seriously fail to comply with their data protection obligations. This alone was enough to prompt many organisations to get serious about their user’s security. Still, not every business followed suit. Cloud security risks Breaches were most commonly identified in organisations using cloud computing or where staff use personal devices According to a recent survey conducted at Infosecurity Europe, more than a quarter of organisations did not feel ready to comply with GDPR in August 2018 – three months after the compliance deadline. Meanwhile, according to the UK Government’s 2018 Cyber Security Breaches survey, 45% of businesses reported breaches or attacks in the last 12 months. According to the report, logins are less secure when accessing services in the cloud where they aren't protected by enterprise firewalls and security systems. Moreover, breaches were most commonly identified in organisations using cloud computing or where staff use personal devices (known as BYOD). According to the survey, 61% of UK organisations use cloud-based services. The figure is higher in banking and finance (74%), IT and communications (81%) and education (75%). Additionally, 45% of businesses have BYOD. This indicates a precarious situation. The majority of businesses hold personal data on users electronically and may be placing users at risk if their IT environments are not adequately protected. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine Hacking methodology In a recent exposé on LifeHacker, Internet standards expert John Pozadzides revealed multiple methods hackers use to bypass even the most secure passwords. According to John’s revelations, 20% of passwords are simple enough to guess using easily accessible information. But that doesn’t leave the remaining 80% safe. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine. Brute force attacks are one of the easiest methods, but criminals also use increasingly sophisticated phishing campaigns to fool users into handing over their passwords. Users expect organisations to protect their passwords and keep intruders out of their accounts Once a threat actor has access to one password, they can easily gain access to multiple accounts. This is because, according to Mashable, 87% of users aged 18-30 and 81% of users aged 31+ reuse the same passwords across multiple accounts. It’s becoming clear that passwords are no longer enough to keep online accounts secure. Securing data with simplicity Users expect organisations to protect their passwords and keep intruders out of their accounts. As a result of a data breach, companies will of course suffer financial losses through fines and remediation costs. Beyond the immediate financial repercussions, however, the reputational damage can be seriously costly. A recent Gemalto study showed that 44% of consumers would leave their bank in the event of a security breach, and 38% would switch to a competitor offering a better service. Simplicity is equally important, however. For example, if it’s not delivered in ecommerce, one in three customers will abandon their purchase – as a recent report by Magnetic North revealed. If a login process is confusing, staff may be tempted to help themselves access the information they need by slipping out of secure habits. They may write their passwords down, share them with other members of staff, and may be more susceptible to social engineering attacks. So how do organisations strike the right balance? For many, Identity and Access Management solutions help to deliver secure access across the entire estate. It’s important though that these enable simplicity for the organisation, as well as users. Organisations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so Flexible IAM While IAM is highly recommended, organisations should seek solutions that offer the flexibility to define their own balance between a seamless end-user journey and the need for a high level of identity assurance. Organisations’ identity management requirements will change over time. So too will their IT environments. Organisations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so. Importantly, the best solutions will be those that enable this flexibility without spending significant time and resource each time adaptations need to be made. Those that do will provide the best return on investment for organisations looking to keep intruders at bay, while enabling users to log in safely and simply.
Thousands of security professionals gathered Nov. 14-15 at the Javits Center in New York City to explore new products, solutions and technologies, network with security luminaries and obtain high-quality industry education. ISC East, sponsored by the Security Industry Association (SIA), is the Northeast’s largest security industry event; more than 7,000 security professionals attended or exhibited at this year’s conference. Following day 1 of ISC East, SIA gathered industry luminaries and experts for SIA Honors Night, an annual event featuring a cocktail reception, a gala dinner benefiting Mission 500, engaging entertainment and an awards ceremony recognising industry leaders. Sold-out event SIA Honors Night 2018 was a sold-out event held at the Current at Chelsea Piers. The awards presented at SIA Honors Night 2018 were: SIA Progress Award (presented by SIA’s Women in Security Forum) – Eddie Reynolds, president and CEO, iluminar Inc. Women in Biometrics Awards (co-founded by SIA and SecureIDNews and co-presented with sponsors FindBiometrics, IDEMIA and SIA’s Women in Security Forum) – Kelly Gallagher, senior account manager at NEC Corporation of America; Lisa MacDonald, director of the Identity Management Division in the Office of Biometric identity Management at the U.S. Department of Homeland Security; Colleen Manaher, executive director of U.S. Customs and Border Protection; Lora Sims, senior biometric examiner at Ideal Innovations, Inc.; and Anne Wang, director of biometric technology research and development at Gemalto Cogent SIA Insightful Practitioner Award – Guy M. Grace, Jr., chair of the Partner Alliance for Safer Schools Steering Committee and director of security and emergency planning for Littleton Public Schools in the Denver suburb of Littleton, Colorado Jay Hauhn Excellence in Partnerships Award – Larry Folsom, co-founder and president, I-View Now George R. Lippert Memorial Award – Pat Comunale, retired security industry veteran, former member of the SIA Board of Directors and former CEO and president for Tri-Ed Distribution, an Anixter company Standout keynotes SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States Honors Night guests enjoyed keynote remarks from Bonnie St. John, a Paralympic ski medalist, Fortune 500 business consultant, Rhodes scholar, former White House official and best-selling author. St. John discussed her journey to become the first African-American ever to win medals in Winter Olympic competition despite having her right leg amputated at age five and shared her top lessons from mentors and her advice for cultivating resilience. SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States; each year, SIA Honors Night raises funds for Mission 500. SIA presented 26 engaging education sessions through the SIA Education @ ISC East program, including two standout keynotes and four hands-on workshops. Hundreds of conference attendees participated in these sessions, with impressive speakers like Valerie Thomas, ethical hacker and executive consultant at Securicon; Pierre Bourgeix, president at ESI Convergent; Scott Swann, president and CEO of IDEMIA National Security Solutions; and Jumbi Edulbehram, regional president – Americas, Oncam. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event Confronting emerging threats Highlighted education sessions at this year’s conference included: Friend or Foe? Technology Disruption and the Physical Security Industry, a keynote address by Philip Halpin, senior vice president and head of global security at Brown Brothers Harriman, one of the country’s oldest and largest privately held financial firms 21st Century Best Practices: Reporting From the Front Lines on How Law Enforcement and the Security Industry Are Confronting Emerging Threats, a keynote address by James A. Gagliano, a retired FBI supervisory special agent, CNN law enforcement analyst and adjunct assistant professor at St. John’s University Cybersecurity professionals ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo Additional cutting-edge topics covered in the education sessions included the move to smart cities, convergence in the security industry and the use of artificial intelligence in video analytics. ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event, which featured a presentation from world-famous hacker Kevin Mitnick, insights from Dave Hogue of the National Security Agency’s Cybersecurity Threat Operations Center, a discussion on the cyber skills shortage gap and ways to attract, develop and retain talented cybersecurity professionals and more. Handle sensitive data Additional events at ISC East 2018 included: A breakfast presented by ISC Security Events and SIA’s Women in Security Forum featuring a panel discussion celebrating women in security and supporting the participation and advancement of women in the industry Paid hands-on workshops providing cutting-edge information and valuable insights on the most current business trends, technologies and new developments in security Free exhibitor product training sessions sharing live, in-depth demonstrations A meeting with SIA’s Data Privacy Advisory Board, which provides information and best practices to help SIA members handle sensitive data in a safe and secure manner to protect the personally identifiable information of their employees, partners and customers from potential breaches
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognise that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unless they are quickly brought under control. Training security officers Governments and organisations across the world are increasingly encouraging businesses to re-assess risks and to plan for and conduct drills for major emergencies. This is driving different agencies and companies to invest in new skills, resources and systems, and encouraging businesses to routinely re-evaluate their emergency response strategies. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents For example: UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents, as part of the UK government’s Action Counter Terrorism programme. And organisations including the Association of University Chief Security Officers (AUCSO) and Higher Education Business Continuity Network (HEBCoN) are developing customised training for their members to improve their own response and business continuity plans. Mass notifications systems Whether an organisation is facing a terrorist attack or a severe weather event, follow up reports consistently identify that the same types of challenges are common to all crisis situations, with similar errors often occurring again and again. Typically, these are centred on three key areas: poor communications, fractured command and control structures, and delayed deployment of resources. Communications skills and technologies clearly play a pivotal role in how effective an organisation is in responding to major incidents, particularly when it comes to assessing the situation and its implications, moving people towards safety and providing updates as an incident unfolds. However, when an organisation is considering its technology options, emergency response and mass notification systems (MNS) are often touted as the ideal platform to deliver all the required critical communications and ongoing updates. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents Emergency notification system All the incident reporting, command and control, and communications functions have been brought together on a single platform But, if an organisation does not know exactly where all its staff or students are, and it cannot see the location and availability of its first responders and other emergency coordinators relative to them and the incident, then how useful is it to send a top-down alert to everyone? And what about fast moving or multi-centre incidents, where previously agreed evacuation procedures, recommended actions or mustering points may need to change if an incident takes an unexpected turn? Many organisations may have been lulled into believing that an emergency notification system will allow them to confidently handle all the communications aspects of virtually any crisis. In reality, too many businesses are still unaware that there are now much more sophisticated and proven technologies where all the incident reporting, command and control, and communications functions have been brought together on a single platform. Using live map tracking The benefit of using these advanced and more integrated approaches – often categorised as mobile distributed command and control systems – is that they enable faster and better decision making in a crisis using real-time feedback and two-way dialogue with those closest to the emergency. And they avoid the risks of any potential delays, miscommunications or mistakes that can happen when an organisation is under pressure to respond and often switching between multiple systems. Leading universities and multi-national corporations are already using new mobile/web-enabled platforms to improve their incident response These next generation emergency management platforms have been specifically designed to enable real-time mapping of an organisation’s security assets and its users on a single screen and to fully integrate it with a highly targeted geo-fenced notification capability. The mass notification aspect of the system can then be used to advise specific groups on the best actions to take at their location as an incident develops. The use of live map tracking enables real time mapping of an organisation's security assets Segmented messaging Many leading universities and multi-national corporations are already using these new mobile/web-enabled platforms to plan, manage and improve their incident response, leading to 50% faster reactions and more positive outcomes.During a crisis, users can receive push notifications so the security centre can immediately see their exact location and advise them accordingly The systems have been widely adopted within the higher-education sector, but they are equally applicable to any large company with multiple international sites or those situated in research or corporate campuses where the bulk of assets and people are based in one or more key locations. Typically, systems provide users with a smartphone app that they can use to call for immediate emergency or first aid support when at work, or to report something suspicious which could prevent an apparently minor incident from escalating into a full-scale emergency. During a crisis, users can receive push notifications, SMS and E-mails asking them to open the app if they are not already logged in, so the security centre can immediately see their exact location and advise them accordingly. Supporting dispersed mustering Now that communications can be more nimble, responsive and flexible this can support the increasing numbers of planners are recognising the advantages of dispersed mustering. This is a strategy that has been developed to reduce the risk of secondary attacks on unprotected people complying with instructions to evacuate from premises and gather in what are, effectively, exposed locations. It is now acknowledged that evacuees waiting outside for any length of time are more vulnerable to targeted attacks or to injury, from flying glass for example. With dispersed mustering – a strategy made more effective by these new mobile distributed command and control systems - a building’s occupants can be advised not to go outside, but to move to known safe internal locations. People in each specific area can then be kept regularly updated. Many corporations are now using new mobile/web-enabled platforms to improve their incident response Coordination between response agencies The software platforms can be integrated with an organisation’s fixed security infrastructure to take real-time sharing of information First responders are permanently logged in, so the emergency operations centre can see their exact locations in real-time and can advise what actions to take in mustering people or in setting up and protecting security cordons. Bringing everything together on one platform, with real-time feedback and in a fully integrated system also removes what is often seen as the weakest communication link in managing any major incident: the need to rely on conventional two-way radio as the sole means of communication between the command and control centre and its first responders and other team members on the ground. The software platforms can be integrated with an organisation’s fixed security infrastructure to take real-time sharing of information to a new level for improved collaboration, coordination and communications between users, the incident management team and external agencies. Improving emergency response strategies One of the most powerful features of some of these new systems is the ability to record and view all alerts, responses and the detailed conversations between first responders, emergency coordinators and other parties. This allows the systems to be used to simulate major incidents involving inputs from the emergency services and other key agencies and to ensure the organisation’s crisis management plans have been fully tested against a range of possible incident scenarios.
Attendance has been growing steadily year-over-year for ISC West, and the 2018 show exceeded 30,000 total industry visitors for the first time. So it’s safe to expect ISC West 2019, April 10-12 at the Sands Expo in Las Vegas, will be bigger than ever. Preregistration for the 2019 show is on track to bring even more visitors than last year. “This is a show for everyone, for converged security,” says Mary Beth Shaughnessy, Event Director for Reed Exhibitions. “We bring a lot of different verticals together with IT and network security, physical security and robots and drones. It’s one-stop shopping and the number one security show in North America.” Identifying buying influencers The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show. The ISC West Executive’s Club is a ‘top buyer program’ created to welcome high-level buying influencers who have current projects in the pipeline. The program works throughout the year, networking, researching and identifying buying influencers among end users, integrators, dealers/installers and consultants who are working on current projects. Approximately 1,300 attendees are participating in the program this year. An Executive’s Club member might be an integrator working with several large projects or represent a school system that is building a new campus or retrofitting their systems. During the trade show, these guests get the VIP treatment with a variety of benefits, including a lounge, cocktail receptions, and continental breakfasts. Personalised matchmaking programs ISC West also provides personalised matchmaking programs to bring together these buyers with companies that can meet their needs. The Executive Club members are also led on guided exhibit hall tours, based on product interest, that highlight new and innovative solutions. The program also contributes to ISC West’s goal to grow its end user audience. In this case, it is a group of eager buyers with immediate needs. Another growing aspect of ISC West is its role shaping exhibiting companies’ technology roadmaps, in particular the timing of new product releases. Many new products and technologies are announced at ISC West, and attendees are conditioned to attend the show to see what’s new in the marketplace. “Vendors try and work to get whatever solutions they are promoting together in time for ISC West,” says Shaughnessy. “Vendors know that attendees have fresh budgets and new initiatives early in the year.” Network security products ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11 ISC West showcases the latest products, services, and technology including access control, video surveillance, disaster recovery, IT security products, network security products, wireless security products, and thousands more helping ensure safety by giving attendees the right tools and defenses to protect against security risks. In addition to the exhibition, ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11. SIA Education@ISC will kick off the day before the start of the exhibition. The comprehensive program includes 85+ accredited sessions covering a range of industry topics aimed at providing the critical knowledge attendees need to protect and defend against developing threats in today's security landscape.
ISC West in Las Vegas is the first of several major security trade shows planned for 2019 as part of the Reed Exhibitions ISC Security Events portfolio. Next up will be Expo Seguridad México in May in Mexico City, followed in June by ISC Brasil in Sao Paolo, and ISC East this fall in New York. Expo Seguridad México, May 7-9, will serve the important Mexican market for security goods and services. In Mexico City alone, a large population translates into plenty of buildings and facilities that need protection; security is a big concern and a large market. Concerns about information security, cybersecurity and convergence are also dominant topics. Benefitting from a revised trade agreement with the United States, Mexico offers a favourable business climate and low costs. In addition to video and other hardware products familiar at the U.S. show, Expo Seguridad also includes a large public safety/police component, a workplace, environmental and industrial safety sector, and fire products, offering a broad range of additional product categories. Developing knowledge of attendees The FISSE (Innovation and Solutions of Security) conference room will have cybersecurity and electronic security speakersOn the exhibition floor will be the VIII International Conference for the Administration of Security and Law Enforcement, which will bring together renowned specialists in the security and public safety sector. Free conference track rooms will be provided on the exhibition floor to develop knowledge of attendees in various business areas. The FISSE (Innovation and Solutions of Security) conference room will have cybersecurity and electronic security speakers. Manufacturers, distributors, integrators, and national and international end users have come together at Expo Seguridad since 2002 to interact and exchange knowledge during the three days dedicated to the security industry. Expo Securidad México provides access to more than 350 exhibitors and the opportunity to interact, connect and develop face-to-face relationships with more than 16,300 security and public safety decision-makers. This year, Daniel Linskey, former Boston police chief, will provide a welcome speech at the opening ceremony and will share his experience and thoughts about the 2013 Boston Marathon bombing. Exhibition of public safety equipment The exhibit encompasses a selection of public safety equipment and vehicles, body armour, and counter-terrorism solutionsISC Brasil, June 25-27, offers a combination of physical security and emerging information and cybersecurity elements. An Infosecurity pavilion on the show floor and related conference track sessions highlight growing concerns in the marketplace. A large meeting of Brasil’s law enforcement commanders is collocated with ISC Brasil, and the exhibit encompasses a selection of public safety equipment and vehicles, body armour, and counter-terrorism solutions. A strong VIP attendee program ensures attendance by high-level decision-makers with money to spend. The ISC Brasil Congress is an educational program for continuing professional education and technical training for corporate end users, police commanders, distributors, integrators, law enforcement officials, security consultants, IT and public safety managers. Of the expected 18,000 attendees, some 53% come from corporate end users in several vertical industries. Some 21% of attendees are commercial system integrators, with 9% central monitoring systems and 5% law enforcement and public authorities’ safety. Security for oil and gas companies Brasil’s economy has been improving steadily after a rough patch, and the ISC Brasil show has seen an uptick for the last two yearsBrasil’s economy has been improving steadily after a rough patch, and the ISC Brasil show has seen an uptick for the last two years. Brasil’s huge economy includes big industries that need lots of security – oil and gas companies, and automotive production are among the contributors to economic growth. Attendee and exhibitor satisfaction is strong for ISC Brasil, and the show is on a new growth path as the economic situation in Brasil continues to improve under a new president. Large exhibitors at ISC Brasil include Bosch, Genetec, Hikvision, Dahua, HID Global, Honda, Yamaha, and Microsoft. Large Reed Exhibition offices in Mexico City and São Paulo manage the Latin American events and work with local partners, marketing organisations and clients. Emerging Technology Zone ISC East in New York, Nov. 20-21, continues to build momentum in 2019 after a successful 2018 show that saw double-digit growth both in exhibition space and attendance. Reed Exhibitions’ Infosecurity/ISACA North America Expo and Conference will again be collocated with ISC East, expanding information security and cybersecurity horizons for attendees. (ISACA is an international professional association focussed on IT governance.) New at ISC East in 2019 will be an Emerging Technology Zone, providing a high profile for emerging technology companies at the show New at ISC East in 2019 will be an Emerging Technology Zone comparable to the one at ISC West, providing a high profile for emerging technology companies at the show. The Unmanned Security Expo, a big success last year, will be even bigger in 2019 with more exhibits than ever. There are good signs on the horizon for greater use of drones and robotics. Protection for enterprises ISC East has traditionally focussed on the ‘tri-state’ area around New York City – New York, New Jersey and Connecticut – an area rich in end user companies, especially in financial services, retail, entertainment and the media. In New York City alone, there are almost endless numbers of big enterprises that need protection, so a localised show is a natural, and doesn’t require the large pool of potential customers to travel away from their businesses. New York also has a large and active law enforcement community, and there are many large systems integrators that operate in and around the New York area. ISC East is a growing show that serves a large, unique audience. Growth of ISC East also suggests it is becoming more of a ‘super-regional’ event, drawing good attendance from the Southeast and Midwest in addition to the tri-state area.
Keynote speakers will kick off ISC West Day 1 and Day 2. Keynote sessions are open to anyone, and ISC West organisers look for speakers with broad-based appeal, either from the government or related to security strategies, standards and measures. Timely and newsworthy topics are included as a means of educating attendees on the best way to protect their own facilities. On the first day of the exhibition, April 10 at 8:30 a.m., the Keynote Speaker will be William Bryan of the Department of Homeland Security (DHS). As science and technology advisor for DHS, Bryan leads research, development, innovation and testing and evaluation activities. An Army veteran with 17 years of active military service and three years in the Virginia National Guard, Bryan brings a wealth of experience gained from multiple leadership roles in the U.S. Department of Energy (DOE) and Department of Defense (DoD). Safeguarding public at stadium Butler has been responsible for the personal security of Prime Ministers, Presidents, and members of the British Royal FamilyThe Day 2 Keynote, Thursday at 8:30 a.m., will be given by Russ Butler, Vice President of Security for the San Francisco 49ers and Levi’s Stadium. A former Scotland Yard Police Officer, Butler led a team of specially trained and equipped police officers tasked in the 1980s with safeguarding the public at soccer matches throughout the UK during the height of organised soccer violence. He was also a SWAT Team Leader for Scotland Yard, and has been responsible for the personal security of Prime Ministers, Presidents, and members of the British Royal Family. Butler has been involved in planning and executing notable events such as Super Bowl 50, ‘WrestleMania’ and this year’s College Football Championships. The ISC West conference program, provided by the Security Industry Association (SIA) and branded SIA Education@ISC, is expanding this year to 85-plus sessions, with something for everyone, whether they are an end user, dealer/installer, consultant, or are focussed on a specific vertical market. The conference program speaks to every audience segment at the show. Enhancing organisation’s cybersecurity Attendees will leave the session with a self-created model including concrete recommendations to enhance their organisation’s cybersecurityCybersecurity will be a bigger topic than ever, and among the new speakers will be Johna Johnson, CEO and Founder of Nemertes Research, whose session will enable end user participants to quickly and accurately ‘score’ the maturity of their cybersecurity initiatives. Session participants will use handouts to rate themselves and their current success based on operational metrics, deployment of key ‘bellwether technologies’, and organisational and operational best practices. Attendees will leave the session, planned for April 9 at 10:15 a.m., with a self-created model including concrete recommendations to enhance their organisation’s cybersecurity. Another new speaker will be Hector Alvarez, President of Alvarez Associates, a specialist in workplace violence prevention. His presentation, April 9 at 2:45 p.m., is geared towards security, safety, risk managers and HR staff who are new to threat management/workplace violence, or experienced professionals who can benefit from reviewing the foundational steps. Addressing threatening and concerning behaviour The sessions, on April 10 and 11, provide exhibitors an opportunity to educate and provide demonstrations to their customer base on new technologiesReal-world vignettes will be reviewed, including those with both negative and positive outcomes. The session will enable attendees to recognise the warning signs of individuals on the pathway towards violence, and to identify a range of intervention and response options to address threatening and concerning behaviour. Free Vendor Solution Sessions are another popular feature of the ISC West conference program. The sessions, on April 10 and 11, held in meeting rooms near the exhibit hall, provide ISC West exhibitors an opportunity to educate and provide demonstrations to their customer base on new technologies. They are free to any ISC West badgeholders. Some of the sessions attract large attendance, and preregistration is provided. Presenting companies include Axis Communications, StarLink Fire, FireLink FACP, Hikvision, Intel, Verkada, and IBM.
Maxxess, the innovative security management and communications solutions, partnered with the Santa Ana Unified School District (SAUSD) to deploy a powerful new security and operations solution that leverages the power of smart mobile devices to maintain comprehensive communications and emergency management operations. Maxxess Ambit, which provides private, two-way, managed messaging and intel on a more personal and intuitive level, received its first wide-scale test during the SAUSD’s annual earthquake preparedness drill called the Great Southern California ShakeOut. SAUSD used Maxxess Ambit as their primary communications solution during the Great Southern California ShakeOut drill “The 2018 Great Shakeout drill was more realistic than in years past,” said Camille Boden, Executive Director or Risk Management for the Santa Ana Unified School District. She further added, “With Maxxess Ambit, our Emergency Operation Center (EOC) was able to receive simulated eyewitness accounts and requests for assistance from multiple staff members at schools across the District. The information with GPS locations provided by Maxxess Ambit came into the EOC rapidly, providing first responders with the specific details they would need if we really had experienced a disaster. The drill tempo was accelerated and provided real-world insight as to what the District could possibly experience in the event of a massive earthquake.” Maxxess Ambit’s “see it, say it” SAUSD used Maxxess Ambit as their primary communications solution during the Great Southern California ShakeOut drill. Maxxess Ambit’s “see it, say it” application kept SAUSD’s EOC fully informed of missing people, dangerous situations, property damage and more during the emergency simulation. This allowed the EOC’s staff to instantly generate various reports and assign the appropriate personnel to respond. One report that came in during the drill was from a school needing to be evacuated, which was immediately assigned to SAUSD’s logistics personnel. Logistics then called the school transportation service and directed them to the correct pick-up spots. The EOC at SAUSD not only took action on reports that came in but was able to anticipate issues resulting from the information collected with Maxxess Ambit. All EOC’s actions were captured for reporting and future audits within Maxxess Ambit. Mass notification During an earthquake scenario, Maxxess Ambit can broadcast a mass notification that will be sent to all users of an organisation During an earthquake scenario, Maxxess Ambit can broadcast a mass notification that will be sent to all users of the organisation, by site, by department or even by selected user groups. This allows emergency personnel to quickly monitor staff status, communicate with staff members using an organised interface, and help first responders act efficiently. As end users respond to the mass alert broadcast, a geo-tag is placed on a map to correspond with each mobile user’s location. Unlike systems that handle only one aspect of communications like a mass texting tool, Maxxess Ambit also addresses longstanding security challenges by transforming the way organisations operate on a daily basis. In a school environment, for example, a staff member can activate a duress report via Maxxess Ambit in the event a meeting is becoming emotional or tense. Real-time chat session The report would appear on the mobile devices of the school’s security team, enabling a real-time chat session while continuously tracking the staff member’s location. This unique combination of features empowers total awareness by making administrators, teachers, staff and students an integral part of the security solution. Maxxess Ambit is a cloud-based solution that does not require a capital investment in any hardware or servers and is deployed like a mobile app with all information logged into the system for compliance and audit purposes.
IDF Aluminium has installed transom closers and latch locks from Alpro Architectural Hardware at a building that provides premium co-working and flexible office space in central London near Victoria Station. Thomas House in Eccleston Square is a seven-storey structure with a facade in Regency style and a distinctive timber-clad reception that leads to two wings. It has collaborative drop-in work areas, meeting rooms and facilities to suit present-day practices. The building has been refurbished for The Office Group who pioneered shared workspaces in Britain and now offers these services across multiple London locations as well as Bristol and Leeds. Hydraulic door controls The Alpro transom closers are a means of hydraulically controlling the opening and closing of aluminium doors The Alpro transom closers are a means of hydraulically controlling the opening and closing of aluminium doors. They allow precise adjustment of the latching and closing force generated by the valve according to the weight and height of individual doors as well as type of usage. Aesthetics are a major consideration for The Office Group who briefed Soda Studio, an architectural practice known for its clean simple interiors, to create a design in keeping with the neighbouring Georgian squares. In addition to the working facilities, Thomas House has a library, music room, roof terrace and gymnasium. It is named after the early nineteenth-century architect Thomas Cubitt who created much of the surrounding area and also designed the eastern front of Buckingham Palace. Preserving interior geometry Fabricator IDF devised a solution featuring tailored SBD aluminium profiles from Jack Aluminium Systems, bespoke glazing, internal screens and the Alpro door management. The Alpro products include Europrofile cylinder deadlatches which can be combined with electric strikes to provide the added option of remote access control. All of The Office Group premises are design-led, and we have now supplied equipment to five of their sites including Henry Wood House" Peter Keen, sales director at Alpro, said: “Installing transom closers on internal doors is unusual but the concealed nature of these closers, within the transom header bar, means they are unobtrusive and meet the architect’s goal of preserving interior geometry.” He continued: “All of The Office Group premises are design-led, and we have now supplied equipment to five of their sites including Henry Wood House, a former BBC building in the West End. Our transom closers are durable and have been tested independently at 250,000 double-action cycles.” Commercial door market IDF specialises in the design, manufacture and installation of aluminium doors. The door projects are often in commercial and public sector environments where usage may be high but maintenance costs must be minimised. IDF has 30 years’ experience in the shop front and commercial door market. The company ensures a quality service by designing and fabricating all of its doors and shop fronts in-house with no use of sub-contractors. The client portfolio covers transport, local government, healthcare and education from schools through to universities.
To succeed in business, one must be brilliant at one thing. In many cases it’s a skill, such as art, coding, engineering or design. Or that one brilliant attribute can also be a personality trait or a business process. No business will be successful unless it is at least adequate, and preferably superb, in product development, sales, and customer engagement - not to mention finance, planning, marketing and recruiting. Too many VMS producers are trying to do all these things themselves when they should be doubling up on what they are best at and leveraging the rest. It is a new mindset. Instead of obsessing about which ‘me-too’ product to supply, software producers could make their first priority finding complementary and compatible partners. Developing a partnership ecosystem One partner might see the opportunity to sell a solution. Another partner might know a better way to distribute a product. A third partner might provide the vertical expertise to get the customer a perfectly tailored solution. By leveraging partners and developing a partner ecosystem, a company will tend to have more unique offerings and the ability to execute faster in an ever-changing world. All this additional partner horsepower is still no guarantee a company will succeed but partnerships will also give a company a feedback channel. Many stand-alone companies plod along, never quite failing, but never getting better either. Partners are less likely to tolerate business limbo. They will be quick to utilise great products, and less wedded to the concept if it doesn’t prove out. Because the partners are in close contact with the market, they are the first responders to changing or developing needs. This is why a company should listen very closely to their partners: They are the feet on the street and the ears to the beat! Open platform matters Producing software takes time, and producing great software takes even longer All of this is not possible, however, if a company produces closed platform software. This is software whose functions can only be changed by the original developers. Producing software takes time, and producing great software takes even longer. This means low agility. The partners might identify great opportunities, but before the closed platform software producer can react, the opportunities might be gone - or worse, be grabbed by competitors. The slow reaction capabilities of closed platform providers will frustrate partners and may lead to the worst of all complications in a partnership: distrust. Add-on modules and intrinsic scripting When the products are based on an open platform, however, they are adaptable. Then the partners have the ability to change the solution through the open software architecture. Not by changing the basic code (that would be open source) but by add-on modules and intrinsic scripting abilities. Total integrated solution Open platform means that the partner can easily extend and enhance the software into a total integrated solution Open platform means that the partner can easily extend and enhance the software into a total integrated solution to fulfill the customer’s needs with the minimum of effort. This gives agility, and agility means fast go-to-market abilities. Just what is needed in this fast-moving world. There are some important things to note here. The ways to extend and enhance the software have to be easy and well documented. The partners must have access to training and knowledge sharing. (It does not help to have a system for extending the capabilities of the software if the partners have to guess at the process and the documentation is rudimentary.) Open access is key It is important that the business philosophy is based on openness, giving the partners full access to all relevant information. And openness is a two-way street: By being open for your partners, you also have to be open about their business. A partner might be able to develop a highly sophisticated solution but be unable to market the solution. By building a catalogue of partner solutions easily accessible to customers, openness extends to ensure open access to the partners. Openness is not something a business can just tack on to their approach. It has to be in the DNA of the business from the start. In a Harvard Business Review article entitled ‘Predators and Prey: A new ecology of competition,’ JF Moore says: “A business ecosystem, like its biological counterpart, gradually moves from a random collection of elements to a more structured community.” Structured business ecosystem Milestone has seen this progression within the company's ecosystem Milestone has seen this progression within the company's ecosystem. They introduced training and certification requirements as part of the partnership success structure, ensuring knowledge is shared and also used in a way that is most mutually beneficial for all involved. Moore also writes: “Every business ecosystem develops in four distinct stages: birth, expansion, leadership and self-renewal.” At present, Milestone and its partners are entering into the ‘leadership’ stage, where video enabling is creating opportunities beyond those offered by a traditional video surveillance system, and into areas that provide additional business benefits to our customers. Video enabling “A leader must emerge in the ecosystem,” Moore says, “to initiate a process of rapid, ongoing improvement that draws the entire community toward a grander future.” This is the role Milestone has played in leading the industry towards the video enabling phase and redefining the industry’s expectations of what a surveillance system is capable of. In the article, Moore underlines that “executives whose horizons are bounded by the traditional industry perspectives will find themselves missing the real challenges and opportunities that face their companies.” Getting connected Connectors are those people with a wide range of contacts across different social circles In his book The Tipping Point, Malcolm Gladwell describes what he calls ‘The Law of the Few,’ which says: "The success of any kind of social epidemic is heavily dependent on the involvement of people with a particular and rare set of social gifts." This is based on the 80/20 principal, “which is the idea that in any situation roughly 80 percent of the 'work' will be done by 20 percent of the participants." He goes on to identify three types of people with these gifts: Salesmen, who are skilled in persuasion and negotiation; Mavens, who collect and disseminate useful information; and Connectors. Connectors are those people with a wide range of contacts across different social circles who can make introductions and create links between otherwise disparate individuals. Milestone, key connector in physical security industry In the wider scheme of things, Milestone effectively acts as a ‘Connector’ in the business ecosystem and in the overall physical security industry. Milestone brings together companies who are brilliant in their respective fields and make it easy for them to work together to create a valuable solution for the customer. The company provides the environment for that to occur and work closely with them to ensure that the end result is useful and effective. At Milestone, partners realised that significant investments in education and training was required to create the demand for the company's products and solutions that the conservative physical security industry required. The value of partnership was learnt and the ‘open’ approach adopted, which was a central part of the thinking behind our software. Adopting the Scandinavian management model Milestone effectively acts as a ‘Connector’ in the business ecosystem and in the overall physical security industry Milestone extended this approach to the entire business model, creating the ecosystem that has been the driving force for success. And while the company embraced the best of the Scandinavian management model, its inclusiveness and encouragement of creativity, they still needed to have the courage to make changes to the business, changes which would ensure the best possible position to take on whatever challenges the future might hold. Milestone partner ecosystem Milestone have always worked in a partner-driven business mode. The company from the start was designed to be open and partner oriented. The Milestone partner ecosystem is a fundamental part of its mindset and daily operations. It is one of the major reasons for getting the company to the position where it is today. To be in a company without the partner component would be like cutting the internet and phone cables while reverting to telex and written paper letters! The company would be developing products in the dark, not knowing the demand. Open business world Today, Milestone's partners are delivering optimal solutions to mutual customers, building a better and open business world with video as a business enhancer. All thanks to the company's open platform and community approach. To have a flourishing partner ecosystem, one must think not as a corporation but in human terms. Because companies don’t think, humans do. In all senses of the word, there is one thing that will contribute more to the success of a partnership than anything else; 'Give before hoping to receive'.
Opengear, a provider of solutions that deliver secure, resilient network access and automation to critical IT infrastructure, today announced CSC – IT Center for Science Ltd, a Finnish center of expertise in Information and Communications Technology, has deployed Opengear Smart out-of-band appliances to streamline a major upgrade project and improve day-to-day remote management. CSC, a non-profit organisation with 70% ownership by the state of Finland and 30% controlled by Finnish higher education institutions provides services for research, education, culture, public administration and enterprises, to help them thrive and benefit society at large. CSC's primary customers are the Ministry of Education and Culture and organisations within its field of operations, higher education and research institutes and public administration sector. Planned network upgrade As Antti Ristimaki, Senior Network Specialist for CSC explains, "Getting from our data centres to some of the sites we look after might take many hours and so having remote out-of-band access is vital for us." CSC has used a legacy out-of-band (OOB) console server solution for several years, but with a major network upgrade planned for 2018-2020 it was decided that more flexibility was needed to help the small networking team support clients at around 40 sites spread across the country. "What we liked most about Opengear was its small footprint and high-quality software along with the 4G mobile connectivity option which provides us with the option to deploy the OOB console server at site before we have any working in-band access," says Ristimaki. Setting up the devices took very little time and we are now remotely managing the process" Remotely configure networking equipment CSC has already deployed Opengear ACM7004-5-LMR - Resilience Gateway appliances at around 10 locations across the country, which were initially used to help remotely configure networking equipment at sites connecting to its newly upgraded backbone network. Having a remote access server at distant locations makes it easier to reliably commission and configure new network equipment from its main offices at Espoo and Kajaani. At the final stage, there will be around 40 Opengear Resilience Gateway appliances across the country. "Setting up the devices took very little time and we are now remotely managing the process - which has proved surprisingly simple using 4G LTE and even 3G connections," Ristimaki adds. Built-in CLI tools The built-in CLI tools provided by the Opengear software have proven to be useful especially when commissioning the console server itself. Through this accessibility, CSC has integrated the management of its Opengear Smart OOB devices into its own internally developed network management and orchestration platform based on Ansible. CSC is also using Opengear to help record, and in the event of any problems, rollback critical firmware upgrades and configuration changes for core networking elements at remote sites.
Siemens Rail Automation is a supplier of signalling systems to the rail industry worldwide. The signalling system is fundamental to the safety of a rail network as it maintains safe separation and prevents collisions. Signallers rely on the safety critical signalling features to ensure safe operation in both normal and degraded conditions. Thorough initial training and regular refresher courses in a realistic environment is essential to maintaining the signallers’ competency and knowledge of operating procedures. Siemens collaborated with Matrox to implement a unique, IP-based simulation environment for their European-rail-network client with an innovative use of streaming and recording of multiple video feeds. Simulator for signal monitoring A simulator allows a trainer to vary scenarios—by changing the weather, introducing obstacles on the line, incidents in stations, broken-down trains, or other things that affect the scheduling of movement of rolling stock. Additional screens from other collaborative applications, such as timetabling, are displayed for the trainee The trainer needs to monitor a trainee’s reaction(s) to a particular scenario, as it transpires. To be able to view the entire session later, for analysing, and pinpointing areas of improvement, each individual trainee’s performance needs to be recorded as well. The trainee operator’s signalling desk contains multiple monitors for the signalling application that shows, amongst other things, the state of the signals, dynamic speed limits, state of points on the track, and train positions. Additional screens from other collaborative applications, such as timetabling, are also displayed for the trainee. Trainers too have multiple screens where they define and manage the training scenario. Networked training ecosystem Siemens Rail Automation met their client’s need by leveraging Matrox’s video wall and enterprise encoding portfolio as building blocks to create an end-to-end, IP-based simulation system—all on the client’s 1 Gigabit Ethernet network. At the individual trainee stations, ‘operator’ workstations host a Matrox multi-display graphics card to power an eight-monitor, 4x2 desktop configuration. In the same PC system are two Matrox Maevex 6100 quad 4K enterprise encoder cards. Capable of simultaneously capturing, streaming, and recording up to four 4K inputs, Maevex 6100 in this case captures quad Full HD inputs, composites them as a single 4K signal, and streams them to a collaborative video wall. Doing so ensures that the time correlation between the individual screens is not lost—a cursor moving across a desktop from screen to screen is seen as it happens. One of the training objectives is to support the team working between the signallers and planners Monitoring trainee cursor movements This is important for the trainer to get a realistic picture. A jerky or delayed cursor movement could be construed by the trainer as indecision or hesitation on the part of the trainee. If the cursor movement by the trainee—including between screens—is smooth, it is imperative for it to be seen live and recorded as being smooth. In addition to the above are three dual-monitor timetabling workstations and a quad-monitor trainer workstation, each with a Matrox graphics card and Maevex 6100 encoder card to stream desktop content to the collaborative display wall. The timetabling workstations are used by trainee timetable planners to make on-the-day changes. One of the training objectives is to support the team working between the signallers and planners. Reviewing training sessions On the video wall are 12 monitors in several arrangements that enable the trainer to control the simulation environment and monitor trainee signallers and planners. The video wall can also be used collaboratively to replay and review the training session. This is all from a single, low-footprint Blue Chip Ultima 2M system that hosts a combination of Matrox Mura IPX decoder cards and Matrox Mura MPX input/output video wall cards, which work together to seamlessly decode and display the various incoming streams. The rail network uses Matrox MuraControl for Windows video wall software to manage the incoming IP sources, presenting the information on the wall in a way that looks like the original setup at the trainee’s desk. Matrox provided product and configuration training for Siemens personnel, onsite at Siemens Rail Automation’s headquarters Product and configuration training These ‘video wall copies’ allow trainers and other decision makers to remotely, and instantaneously, see the trainee’s reaction to a given situation. Desktop views are easily switched between trainees. Additionally, Maevex 6100 allows training sessions to be simultaneously recorded to network storage from where the simulations are played back on demand to the individual trainee, or to other interested parties. To complete the offering, Matrox provided product and configuration training for Siemens personnel, onsite at Siemens Rail Automation’s headquarters. Successful implementation Siemens Rail Automation has deployed the IP-based signalling simulator as part of a major project in a leading European-rail-network organisation where it is performing in line with the rail industry’s stringent standards. Similar deployments for other clients are being planned. Using Matrox’s video wall and recording technologies has been instrumental to the successful implementation of this IP-based signalling simulator" Using the standard network to stream the various elements of the simulator in real time has offered many benefits to the client. The video wall displays copies of the trainer’s own screens, as well as a selected trainee’s screens. This IP-based implementation is easily scalable and allows multiple trainees to be participating in the same training session—with the trainer able to select which trainee to be overseeing at a given time. Andy Powell of Siemens Rail Automation says, “Using Matrox’s video wall and streaming and recording technologies has been instrumental to the successful implementation of this pioneering IP-based signalling simulator in our client’s organisation. Without Matrox, this clearly wouldn’t have been achievable.”
The Wisenet hybrid recording solution has been installed at New Cross Hospital, Wolverhampton by electronic security specialists, JKE Security. “The medium term objective is to provide the hospital with a complete end-to-end Wisenet solution incorporating the very latest video surveillance technology,” said Dan Mather, director of Derby based JKE Security. “However, New Cross Hospital is not alone in having to carefully manage its budgets and with this in mind, the priority has been to install a hybrid recording solution which comprises a combination of HD+ and NVRs. This has enabled the images from all existing analogue and IP cameras installed throughout the hospital to be recorded at the highest possible resolution.” New Cross Hospital, which is run by the Royal Wolverhampton Hospitals NHS Trust was originally built circa 1900 as a workhouse. It now provides 700 beds, employs almost 9500 staff and is the largest teaching hospital in the Black Country. In 2004 the United Kingdom's first purpose built specialist heart centre was opened on its site.AHD technology enables the Wisenet HD+ DVRs to record high-definition images Large storage capacity A total of 17 recording devices have been installed. These include 4 x Wisenet 32 channel XRN -2010 NVRs which each have 21 Terabytes of on-board storage and 13 x Wisenet HD+ 16 channel SRD-1694 DVRs, each with 5 Terabytes of storage. Using AHD technology, the Wisenet HD+ DVRs are able to record high-definition images transmitted over the hospital’s existing coax cabling. “An important aspect of this project is that the Royal Wolverhampton Hospitals NHS Trust wanted a recording solution which would be totally compliant with the new GDPR data protection regulations,” said Dan Mather. “Having taken advice from Midwich, the distribution company which we source our video surveillance products from, and having attended a 3 day training course conducted by Hanwha Techwin, we had the confidence to recommend the Wisenet hybrid recording solution to the Trust both in terms of its compliance with GDPR and the user-friendliness of the recording devices.” For the first time in years we are now able to view our entire system on one platform, which is functional and easy to operate" Effective healthcare security “Having successfully completed the first phase of the upgrade, we are looking forward to installing over 200 x Wisenet cameras throughout the hospital in the near future in order to provide security personnel and the hospital’s managers with a powerful tool to maintain a safe and secure environments for doctors, nurses, administration staff and patients.” Paul Smith, Trust Security Manager and Local Security Management Specialist said “We looked long and hard for a suitable solution of integrating our older systems with newer IP systems on the site. For us the best option came in the form of the Wisenet software and recording units and for the first time in years we are now able to view our entire system on one platform, and a platform that is functional and easy to operate." "All of our pre-existing cameras have been synced with the new software with the assistance of JKE Security Ltd. I look forward now to the next stage which will be to replace end of life cameras for the much more technologically advanced kit, which will enable us to use the smarter functions of the Wisenet software.”
Round table discussion
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Even the most advanced and sophisticated security systems are limited in their effectiveness by a factor that is common to all systems – the human factor. How effectively integrators install systems and how productively users interface with their systems both depend largely on how well individual people are trained. We asked this week’s Expert Panel Roundtable: What is the changing role of training in the security and video surveillance market?
The beginning of the school year and upcoming seasonal changes remind us that demand for security systems, like almost everything else, is seasonal to some extent. Making improvements to educational facilities during the summer months – including installation of security systems – is the most obvious example of seasonal demand, but there are others. We asked this week’s Expert Panel Roundtable: Which vertical markets for security are impacted by seasonal changes in demand?