Aqua Security, global platform provider for securing container-based and cloud native applications, has announced version 3.5 of its cloud native security platform, which now protects a wide range of cloud native technologies, including applications using serverless functions. Customers can deploy end-to-end security to establish a consistent policy enforcement layer spanning container, serverless containers (such as AWS Fargate) and serverless functions (such as AWS Lambda). Aqua CSP v3.5 In...
Following the latest budget, which highlighted increased funding for terrorism prevention despite recent cut backs in other areas of police funding, the Small Business Network (SBN) of professional security companies has highlighted an opportunity for the private security industry to support public services. “Whilst the budget saw extra money for the prevention of terrorism, the selling off of other police assets and the reduction in officers on the street has made life difficult when it...
With smart city projects on the rise across Thailand, international security brands have converged at the 6th edition of Secutech Thailand in a bid to connect with regional buyers and project owners. Stricter fire and safety regulations enacted by the government have also led to heightened demands for fire and safety equipment, which will be a popular product category during the show. The high demand has translated into an expansion in show scale at Secutech Thailand, which continues its year o...
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our...
ESA is proud to recognise the distinguished group of companies supporting the industry in 2018 through its Executive Strategic Partners program. Executive Strategic Partners program This program allows us to partner with key manufacturers and service providers that are looking to make a significant impact on the industry" “This program allows us to partner with key manufacturers and service providers that are looking to make a significant impact on the industry,” says Merlin Guilbe...
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security industry experts The Partner Alliance for Safer Schools (PASS) is one of the organisations at the forefront of establishing security standards...
Deep Sentinel delivers an unrivalled, next-generation approach to home security., released results of a new study that focuses on the lack of response to home security alarms within key metro areas across the United States. Deep Sentinel surveyed major American cities and sampled a portion of surrounding metro areas on their alarm response policies and found that every day, tens of millions of people run the risk of having their alarm calls go unanswered. Ranked by the number of residents potentially affected by a ‘no response’ or ‘no guaranteed response’ to an alarm call in the surveyed cities, the top 20 American metro areas at risk are: New York-Newark-Jersey City Los Angeles-Long Beach-Anaheim Houston-The Woodlands-Sugarland San Francisco-Oakland-Hayward San Diego-Carlsbad Dallas-Fort Worth-Arlington Philadelphia-Wilmington Denver-Aurora-Lakewood Seattle-Tacoma-Bellevue San Jose-Sunnyvale-Santa Clara Riverside-San Bernardino-Ontario Sacramento-Roseville- Arden-Arcade Detroit-Warren-Dearborn Phoenix-Mesa-Scottsdale Milwaukee-Waukesha-West Allis Las Vegas-Henderson-Paradise Salt Lake City Boston-Cambridge-Newton Fresno Tampa-St. Petersburg-Clearwater Consequences due to unanswered alarm calls Deep Sentinel is dedicated to putting an end to false alarms and ensuring that when an alarm is activated, it will be taken seriously" Ranked at #1, the New York-Newark-Jersey City metro highlights the severity of the problem. Deep Sentinel surveyed 19 cities in the metro area and found that 21 percent have a ‘no response’ or ‘no guaranteed response’ to an alarm call. This leaves nearly 9M people at risk of having an alarm call go unanswered. Law enforcement agencies are inundated with false alarm calls (up to 95 percent), draining resources from their respective cities. This has resulted in many cities and agencies across America adopting policies that they do not respond or they don't guarantee a response to alarms. “Because the overwhelming majority of home security alarms are false, there is a ‘boy who cried wolf’ mentality surrounding these calls,” said David Selinger, CEO and co-founder, Deep Sentinel. “It’s unfortunate because many of these calls are legitimate, but can go unanswered, leaving people and their property at risk. Deep Sentinel is dedicated to putting an end to false alarms and ensuring that when an alarm is activated, it will be taken seriously.”
In today’s market, efficient use of bandwidth and storage is an essential part of maintaining an effective video surveillance system. A video management system’s ability to provide analysis, real time event notifications and crucial image detail is only as a good as the speed and bandwidth of a surveillance network. In the physical security industry, H.264 is the video compression format used by most companies. Some companies also employ H.264 enhancements to compress areas of an image that are irrelevant to the user at a higher ratio within a video stream in order to preserve image quality for more important details like faces, license plates or buildings. The H.265, H.264’s successor, will be increasingly used for compression in the future. Some companies are already using H.265 in their cameras and video management systems, while a host of other manufacturers are certainly preparing for its broader adoption in the years to come. Video compression technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies. In some cases, H.265 can double the data compression ratio of H.264, while retaining the same quality. Increased compression rate translates into decreased storage requirements on hard drives, less bandwidth usage and fewer switches – all of which reduce overall costs of system ownership. H.265 compression delivers a lower bitrate than H.264, which is relevant to end users and integrators because the lower bitrate reduces strain on hardware and can reduce playback issues. It’s very important that the compression format that is used is supported in all of the different components of a system: cameras, desktop computers on which the VMS is running and the VMS itself. It is also good for end users and integrators to understand the basics of video compression. Having a basic understanding of compression allows users to tweak settings to reduce bandwidth usage even more. Many cameras come with default settings that can be changed to ultimately reduce costs. ONVIF physical security In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 but is not directly involved in developing the compression standards themselves. With Profile T, the new ONVIF video profile released will employ a new media service that is compression agnostic. This means that it can support new video compression formats, including H.265, as well as new audio compression formats, with the ability to include new video and audio codecs as needed in the future without having to redesign its media service. In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 Standardisation organisations that are directly addressing new compression standards include the International Telecommunication Union (ITU), the Moving Picture Experts Group (MPEG) and a joint commission of the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC), which is addressing the coding of audio, picture, multimedia and hypermedia information. Other compression formats on par with H.264 and H.265 are being developed by companies such as Google. H.265 compression formats Using products that employ H.265 compression will reduce costs through bandwidth reduction, as will changing default settings on cameras, which are often conservative. Having a basic understanding of compression formats and how to tweak camera factory default settings also gives integrators the ability to further reduce bandwidth for added costs savings and increased system performance. These enhancements will analyse which parts of an image are most important and adjust local levels of compressions accordingly It is also worth noting that H.265 enhancements will likely be developed by camera manufacturers to further reduce bandwidth, as was the case with H.264. These enhancements will analyze which parts of an image are most important and adjust local levels of compressions accordingly. While H.265 itself is ready for prime time, its value as a tool for IP-based surveillance systems is dependent on support for the codec in all parts of the system – the VMS, server hardware, graphics cards and camera. Though widespread H.265 adoption is predicted, providers of these components are jumping on the H.265 bandwagon at different rates of speed. ONVIF is including support for H.265 in its new video profile, Profile T, because it believes it will become the most widely used compression format and ONVIF recognises the need to anticipate that migration as a future need of the industry. The new media service, which will be implemented with Profile T, will be future-proof in that when new compression formats are released in the future, ONVIF can adopt them very quickly. That flexibility will definitely help integrators.
This week sees Nedap Security Management launch its new brand tagline, ‘Security for Life’. The words are new but the future-facing, people-first approach that it communicates is what drove the development of AEOS, the access control system by Nedap. And it’s what continues to drive the brand’s initiatives such as recent AEOS performance optimisation and its Global Client Programme. AEOS access control system Nedap invests in continuous research and development to ensure AEOS customers have an access control system that’s fit for purpose, up-to-date and has no end of life. Recently, this led to Nedap modifying and adapting 30% of the AEOS codebase and re-writing more than 3 million lines of software code. The result is huge performance improvements that are, for example, preventing delays during peak periods and enabling customers to expand their systems without hindering performance. Future-proofing security The human dimension in security management is crucial and that’s one of the main messages behind security for life" Fokko van der Zee at Nedap Security Management says: “Our world is changing more quickly every day. To give our clients security for life, we not only respond proactively to changing circumstances we stay one step ahead. We’re continually developing AEOS innovations and optimising its performance.” This focus on improving the user experience is also a great example of how, for Nedap, security doesn’t start with technology; it focuses first on people and how they live their daily lives. Fokko van der Zee explains: “For us, the human dimension in security management is crucial and that’s one of the main messages behind security for life. In our industry, brand communications often centre on technology. But we believe people aren’t looking for technology in itself – it’s the benefits of technology that help them feel safe and secure. As human beings, we have a fundamental need for this sense of security to really make the most of our life and work.” Enhancing people physical security Nedap addresses the human dimension of security management by providing a strong foundation for the physical security of people On a functional level, Nedap addresses the human dimension of security management by providing a strong foundation for the physical security of people, locations and buildings. On an emotional level, it frees people from having to even think about security or the technology that enables it. This allows them to fully enjoy their day and focus on the tasks at hand knowing that their security is being taken care of by experts. Many of the ideas behind security for life are already implemented in AEOS, which is designed to meet the needs of every client and adapt to changing circumstances. It’s the ultimate, sustainable foundation for any application of access control, anywhere – from businesses to government offices, hospitals, airports, schools, industrials sites and public venues. Streamlining physical access control Now, and in the future, Nedap will apply its philosophy to enrich AEOS further with industry-specific features that will give even greater usability. And with the Global Client Programme, for example, it’s helping multinational organisations to streamline their physical access control with increased ease and speed. A project rollout system managed by Nedap, the Global Client Programme gives multinationals a cost-effective, efficient framework for standardising security across all their buildings around the world. All of which means that Nedap is continuing to enable organisations and their people to focus on their core business – and so boost both their productivity and creativity.
Nedap Security Management has developed a new way for multinationals to streamline physical access control – without the headaches of handling it themselves. It’s called the Global Client Programme and is a progressive project rollout system managed by Nedap. A cost-effective, efficient framework for standardising security across all your buildings, it also gives the flexibility to future-proof your access control. AEOS standarisation Large, renowned companies are using The Global Client Programme to easily implement, maintain and update AEOS (Nedap’s access control system) across multiple international sites. Nedap takes care of project management and local coordination centrally, with the support of local installation and service partners. And makes sure you’re protected by the best physical access control at all of your locations worldwide. Enhanced Cyber Security The Global Client Programme also ensures your access control is cyber secure, future-proof and secure by design The Global Client Programme also ensures your access control is cyber secure, future-proof and secure by design, so it’s easy to adapt your system to future trends and risks. And it keeps your budgets in check while giving you a physical access control system that’s: Unified internationally Locally compliant Always up-to-date Security standardisation and unification Fokko van der Zee at Nedap explains: “In today’s increasingly globalised, mobile business world it’s essential to unify your security internationally. But it can be extremely complex. You’re trying to standardise security across many buildings in many countries while dealing with different cultures, languages, laws, support centres and stakeholders. And you’re faced with projects that stretch for months. That’s why we developed the Global Client Programme – it gives you full control and takes away the stress of streamlining global security.” The key benefits of using the programme rather than handling a global security rollout internally are the ease of achieving both international standardisation, flexibility, scalability, cost efficiencies and faster implementation.
Viakoo, a provider of a proven means to proactively automate surveillance and access control system verification in the security industry, is demonstrating solutions to assist in proving and maintaining regulatory or organisational compliance at GSX 2018. The dynamic capabilities of this system help customers ensure – and prove – consistent compliance with physical security regulations across a wide range of applicable industries including: transportation, payment card processing (PCI), electrical distribution and many more. This solves a persistent challenge in these industries to help avoid the risk of fines or service interruptions. Cyber-risk management Working in conjunction with Coalfire, a cyber-risk management and compliance firm, the Viakoo Predictive product was found to fully or partially automate the audit process for 38 specific physical security controls. Using automated discovery and push-button reporting from Viakoo can save significant time during an audit, and can help avoid the risk of expensive penalties, recalls or other service interruptions as a result of failing an audit. Additionally, Viakoo sits on the TIA-942 Edge Data Center working group, providing a focus on physical security requirements and cyber hardening of data centers to the group. Viakoo provides the only patented solution available to prove data retention compliance. Viakoo offers the only proactive and automated solution assessed by forensic auditors from Coalfire for physical security controls" Physical security compliance Viakoo has joined with the Telecommunications Industry Association (TIA), which represents the global information and communications technology industry, to comprehensively and proactively participate in providing compliance solutions for protecting telecommunications facilities and products. “Viakoo offers the only proactive and automated solution assessed by forensic auditors from Coalfire for physical security controls,” said Bud Broomhead, CEO, Viakoo. “By working with Coalfire, and joining with the TIA, Viakoo continues to work with industry leaders to provide proactive, automated solutions for ensuring physical security compliance across industries.” Surveillance systems Many organisations that employ surveillance systems are required by regulations, industry standards, or internal compliance standards to retain video evidence for a period (typically 30 to 90 days). Auditors for industry standards such as PCI, NERC, NIST, TIA-942, FedRAMP and others, are now required to confirm that organisations systematically retain video data for the required retention period in order to achieve compliance certification.
DigiCert Inc., the global provider of scalable PKI solutions for identity and encryption, Gemalto, a global provider in digital security, and ISARA Corp., the provider of quantum-safe security solutions, announced a partnership to develop advanced quantum-safe digital certificates and secure key management for connected devices commonly referred to as the Internet of Things (IoT). “DigiCert, Gemalto and ISARA are collaborating today to solve tomorrow’s problem of defending connected devices and their networks against the new security threats that the implementation of quantum computers will unleash,” says Deepika Chauhan, Executive VP of Emerging Markets at DigiCert. “The work we’re doing now will ensure that the connected systems that serve as the brains of automobiles, industrial control systems, medical devices, nuclear power plants and other critical infrastructure are safe from those threats in five, 10 and 20 years.” ISARA recognises DigiCert’s track record in advancing many of the certificate innovations in use Secure key storage and management The partnership provides significant advantages for enterprise security teams looking to secure connected devices with lengthy product lifetimes to avoid expensive security retrofitting as quantum computing becomes more prevalent. Organisations can deploy these solutions at any scale, given that DigiCert is already capable of issuing and reliably hosting billions of digital certificates for public trust and private PKI systems. The work of DigiCert with ISARA and Gemalto will enable quantum-resistant certificates with the full capability of hosted, on-premise and hybrid deployment options. DigiCert already works with many companies and consortiums using PKI to authenticate, encrypt and provide integrity for their connected devices. ISARA recognises DigiCert’s track record in advancing many of the certificate innovations in use, as well as its robust certificate management capabilities, and in operating the industry’s most ubiquitous, trusted roots. Gemalto offers secure key storage and management via its SafeNet Hardware Security Modules (HSMs) that integrate with DigiCert APIs to enable large-scale, automated credential issuing for connected devices via an internet-enabled gateway to distribute identity over the cloud. Certificates obtained through this partnership will be enabled with quantum-safe cryptography ahead of any breakthroughs that could eventually lead to quantum computing threatening connected device security. Quantum-safe cryptography Gemalto’s SafeNet Hardware Security Modules act as the root of trust to secure the most sensitive data and applications" “Experts estimate that the dawn of large-scale quantum computing will arrive in the next eight to 10 years, bringing with it the moment when all current public key cryptography can no longer be trusted,” says Scott Totzke, CEO & Co-founder at ISARA. “The work we’re doing today ensures that a fundamental element of the security stack, root certificates, is secure by embedding quantum-safe cryptography. This means that IoT manufacturers and other large organisations will have the solutions and tools they need to prepare for the quantum threat well in advance of that date, keeping confidential information and high-value assets safe.” “Gemalto’s SafeNet Hardware Security Modules act as the root of trust to secure the most sensitive data and applications and protect billions of the digital transactions every day around the world,” said Todd Moore, Senior Vice President for Encryption Products at Gemalto. “This partnership with DigiCert and ISARA will help organisations build secure and future-proof cryptographic operations that can guard against the potential security threats of quantum computing and ensure a more secure world for connected automobiles, devices, machines, smart cities and mission-critical infrastructure.” Quantum computing security Many IoT devices rely on RSA and ECC cryptography to protect the confidentiality, integrity and authenticity of electronic communications. However, NIST and others in the security community predict that within a decade, large-scale quantum computing will break RSA and ECC public key cryptography. DigiCert, Gemalto and ISARA recognise that crypto-agility becomes paramount for manufacturers of connected devices that will be in use a decade or more from now. Efforts to address quantum computing security will support connected device manufacturers and users well into the future To advance the use of reliable quantum-proof certificates, DigiCert, Gemalto and ISARA are collaborating with industry standards bodies that also are pursuing the advancement of post-quantum cryptography such as the Internet Engineering Task Force (IETF). Efforts to address quantum computing security will support connected device manufacturers and users well into the future. Sustainable security management Consider the automobile industry, which is producing more vehicles with semi- and fully-autonomous driving capabilities. A car should last for 20 years or more, and manufacturers will need to ensure that the IoT devices they install will be secure and continue to function even if there is a breakage in the RSA algorithms that would render digital certificates ineffective. “The automotive industry is very focused on long-term and sustainable security management that covers the lifecycle of our vehicles," said SAE Hardware Security Sub-Committee Chair Bill Mazzara. “Crypto agility is one of the key areas we consider and that includes quantum-resistant technology.”
Premier League football club Everton FC has deployed SureCloud’s GDPR suite to manage and monitor its data and GDPR compliance, enabling the club to work towards GDPR compliance, optimise internal processes and position it strategically for the future. The solution replaced Everton FC’s manual data mapping and processing methods. Manual data mapping and processing Everton FC’s databases are extensive, containing details on over 32,000 season ticket holders and over 600,000 registered fans, with details on around 360 employees, players, agents, suppliers, and individuals associated with the club’s community charity and partner school. Much of this information is sensitive. This data and all of the processes associated with it were being manually managed and tracked in a series of Excel spreadsheets. With multiple requests and queries to respond to every day, the club’s Data Protection Officer was struggling to record and manage smaller ad hoc queries, incidents, and tasks. With GDPR due to place much tighter restrictions on how the club processed, managed and shared its data – as well as on the reporting of any incidents that did occur – the club needed a more comprehensive and reliable tool in place before 25th May 2018. SureCloud platform The club approached its long-standing IT support provider NCC to find a solution. NCC recommended the SureCloud GDPR Suite, delivered on the SureCloud platform. After SureCloud had successfully demonstrated the ability to provide full visibility for management and automation of GDPR processes across the organisation, Everton FC selected its cloud-based suite of solutions. Two dashboards were created according to Everton FC’s specific needs Two dashboards were created according to Everton FC’s specific needs: one to show all data mapping and transfers, including where data is being held and who it is being shared with; and one showing incidents and requests, including a subject request register and incident tracker path. This gives an immediate overview of which requests are still outstanding, such as a request for an individual’s personal information to be erased from the database. SureCloud GDPR Suite The five applications Everton FC chose to deploy from the SureCloud GDPR Suite were: GDPR Program Tracker - to enable the club to map all its disparate data and workflows using intelligent risk-based questions GDPR Management – to provide all mandatory GDPR business-as-usual processes Information Asset Management - to record and maintain the club’s entire data inventory Compliance Management for GDPR - to help Everton FC speed up their process of attaining compliance and on-going real-time risk remediation Incident Management for GDPR – to meet the GDPR requirement to log, track and notify the ICO of any data breaches, should an incident arise Ian Garratt, Data Protection Officer at Everton FC said: “The penalties for not achieving GDPR compliance are severe – up to 4% of our revenues, or €20 million. It was imperative that we got a solution in place that could not only help us achieve GDPR compliance but would also make it quick and easy for us to demonstrate that compliance at any point, on request. SureCloud’s GDPR Suite fit the bill.” Centralised data management Now, all of Everton FC’s disparate data are mapped, risk-assessed and tracked in a single centralised system “We are now tracking and recording every single data request in a centralised way. With NCC’s support, SureCloud’s solution has brought a comprehensive clarity to our data processing that was impossible to achieve with manual spreadsheets. The system is so intuitive; it has helped us streamline multiple processes and undertake impact assessments that we couldn’t handle before.” Now, all of Everton FC’s disparate data are mapped, risk-assessed and tracked in a single centralised system. All changes and requests are automatically tracked so that activity records and data audits can be produced at the click of a button. Should an incident like a suspected data breach occur, it is identified and reported immediately and automatically. The club’s data protection team can select which asset has been affected and immediately determine the severity of the incident and whether it needs to be reported to the ICO. Should it need to be escalated, the report is available instantly. Data processing, documentation and risk management Ian Garratt added: “The SureCloud GDPR Suite isn’t just a compliance tool; it’s a comprehensive management tool. We now have a continuous, real-time status of where we are and what we need to be doing in terms of data processing, documentation and risk management. It would have simply been impossible to achieve this manually. SureCloud has not only helped us to work towards GDPR compliance they have optimised our internal processes and positioned us strategically for the future.” In addition to deploying five applications within the GDPR suite, SureCloud is currently adapting its Incident Assessment tool to meet Everton FC’s specific requirements.
To succeed in business, one must be brilliant at one thing. In many cases it’s a skill, such as art, coding, engineering or design. Or that one brilliant attribute can also be a personality trait or a business process. No business will be successful unless it is at least adequate, and preferably superb, in product development, sales, and customer engagement - not to mention finance, planning, marketing and recruiting. Too many VMS producers are trying to do all these things themselves when they should be doubling up on what they are best at and leveraging the rest. It is a new mindset. Instead of obsessing about which ‘me-too’ product to supply, software producers could make their first priority finding complementary and compatible partners. Developing a partnership ecosystem One partner might see the opportunity to sell a solution. Another partner might know a better way to distribute a product. A third partner might provide the vertical expertise to get the customer a perfectly tailored solution. By leveraging partners and developing a partner ecosystem, a company will tend to have more unique offerings and the ability to execute faster in an ever-changing world. All this additional partner horsepower is still no guarantee a company will succeed but partnerships will also give a company a feedback channel. Many stand-alone companies plod along, never quite failing, but never getting better either. Partners are less likely to tolerate business limbo. They will be quick to utilise great products, and less wedded to the concept if it doesn’t prove out. Because the partners are in close contact with the market, they are the first responders to changing or developing needs. This is why a company should listen very closely to their partners: They are the feet on the street and the ears to the beat! Open platform matters Producing software takes time, and producing great software takes even longer All of this is not possible, however, if a company produces closed platform software. This is software whose functions can only be changed by the original developers. Producing software takes time, and producing great software takes even longer. This means low agility. The partners might identify great opportunities, but before the closed platform software producer can react, the opportunities might be gone - or worse, be grabbed by competitors. The slow reaction capabilities of closed platform providers will frustrate partners and may lead to the worst of all complications in a partnership: distrust. Add-on modules and intrinsic scripting When the products are based on an open platform, however, they are adaptable. Then the partners have the ability to change the solution through the open software architecture. Not by changing the basic code (that would be open source) but by add-on modules and intrinsic scripting abilities. Total integrated solution Open platform means that the partner can easily extend and enhance the software into a total integrated solution Open platform means that the partner can easily extend and enhance the software into a total integrated solution to fulfill the customer’s needs with the minimum of effort. This gives agility, and agility means fast go-to-market abilities. Just what is needed in this fast-moving world. There are some important things to note here. The ways to extend and enhance the software have to be easy and well documented. The partners must have access to training and knowledge sharing. (It does not help to have a system for extending the capabilities of the software if the partners have to guess at the process and the documentation is rudimentary.) Open access is key It is important that the business philosophy is based on openness, giving the partners full access to all relevant information. And openness is a two-way street: By being open for your partners, you also have to be open about their business. A partner might be able to develop a highly sophisticated solution but be unable to market the solution. By building a catalogue of partner solutions easily accessible to customers, openness extends to ensure open access to the partners. Openness is not something a business can just tack on to their approach. It has to be in the DNA of the business from the start. In a Harvard Business Review article entitled ‘Predators and Prey: A new ecology of competition,’ JF Moore says: “A business ecosystem, like its biological counterpart, gradually moves from a random collection of elements to a more structured community.” Structured business ecosystem Milestone has seen this progression within the company's ecosystem Milestone has seen this progression within the company's ecosystem. They introduced training and certification requirements as part of the partnership success structure, ensuring knowledge is shared and also used in a way that is most mutually beneficial for all involved. Moore also writes: “Every business ecosystem develops in four distinct stages: birth, expansion, leadership and self-renewal.” At present, Milestone and its partners are entering into the ‘leadership’ stage, where video enabling is creating opportunities beyond those offered by a traditional video surveillance system, and into areas that provide additional business benefits to our customers. Video enabling “A leader must emerge in the ecosystem,” Moore says, “to initiate a process of rapid, ongoing improvement that draws the entire community toward a grander future.” This is the role Milestone has played in leading the industry towards the video enabling phase and redefining the industry’s expectations of what a surveillance system is capable of. In the article, Moore underlines that “executives whose horizons are bounded by the traditional industry perspectives will find themselves missing the real challenges and opportunities that face their companies.” Getting connected Connectors are those people with a wide range of contacts across different social circles In his book The Tipping Point, Malcolm Gladwell describes what he calls ‘The Law of the Few,’ which says: "The success of any kind of social epidemic is heavily dependent on the involvement of people with a particular and rare set of social gifts." This is based on the 80/20 principal, “which is the idea that in any situation roughly 80 percent of the 'work' will be done by 20 percent of the participants." He goes on to identify three types of people with these gifts: Salesmen, who are skilled in persuasion and negotiation; Mavens, who collect and disseminate useful information; and Connectors. Connectors are those people with a wide range of contacts across different social circles who can make introductions and create links between otherwise disparate individuals. Milestone, key connector in physical security industry In the wider scheme of things, Milestone effectively acts as a ‘Connector’ in the business ecosystem and in the overall physical security industry. Milestone brings together companies who are brilliant in their respective fields and make it easy for them to work together to create a valuable solution for the customer. The company provides the environment for that to occur and work closely with them to ensure that the end result is useful and effective. At Milestone, partners realised that significant investments in education and training was required to create the demand for the company's products and solutions that the conservative physical security industry required. The value of partnership was learnt and the ‘open’ approach adopted, which was a central part of the thinking behind our software. Adopting the Scandinavian management model Milestone effectively acts as a ‘Connector’ in the business ecosystem and in the overall physical security industry Milestone extended this approach to the entire business model, creating the ecosystem that has been the driving force for success. And while the company embraced the best of the Scandinavian management model, its inclusiveness and encouragement of creativity, they still needed to have the courage to make changes to the business, changes which would ensure the best possible position to take on whatever challenges the future might hold. Milestone partner ecosystem Milestone have always worked in a partner-driven business mode. The company from the start was designed to be open and partner oriented. The Milestone partner ecosystem is a fundamental part of its mindset and daily operations. It is one of the major reasons for getting the company to the position where it is today. To be in a company without the partner component would be like cutting the internet and phone cables while reverting to telex and written paper letters! The company would be developing products in the dark, not knowing the demand. Open business world Today, Milestone's partners are delivering optimal solutions to mutual customers, building a better and open business world with video as a business enhancer. All thanks to the company's open platform and community approach. To have a flourishing partner ecosystem, one must think not as a corporation but in human terms. Because companies don’t think, humans do. In all senses of the word, there is one thing that will contribute more to the success of a partnership than anything else; 'Give before hoping to receive'.
The Security Industry Association (SIA) has expressed strong support for MI HB 5828 and HB5830, two bills designed to improve school security across the state of Michigan. Michigan Legislation In a letter to Michigan House of Representatives Committee on Appropriations Chairwoman Laura Cox and Vice-Chair Rob VerHeulen, SIA CEO Don Erickson praised the bills’ creation of a comprehensive school plan and fund to enable local districts to procure security solutions to protect students from malicious perpetrators and update building code requirements to include security measures. “Sadly, our nation’s schools have increasingly become a soft target for mass violence – at Sandy Hook Elementary, recently at Stoneman Douglas High School and in many other attacks,” said Erickson. “We support holistic approaches to improving school safety and security in response to these tragedies – recognising there is no single action that can be taken that will, by itself, make our schools safe.” SIA is a co-founder of the Partner Alliance for Safer Schools (PASS), a consortium of school security experts Improving school security SIA represents about 900 security and life safety solutions providers – companies that develop, manufacture and integrate technologies that help keep people and property safe from hazards. These industry leaders strive to introduce robust security solutions integrated into our nation’s K–12 public schools, private academic institutions, colleges and universities. In addition to serving member organisations working to improve security in schools and other environments, SIA is a co-founder of the Partner Alliance for Safer Schools (PASS), a consortium of school security experts that developed threat- and income-based guidelines for schools housing grades K–12 to implement appropriate, layered security measures. These guidelines are available to help guide school investments. Additionally, PASS provides integrators with risk assessments and white papers that can be used when working with schools to evaluate and establish the best security protections for their buildings. SIA believes state assistance like that in the Michigan legislation is a start to addressing key security gaps in schools and is especially critical to high-risk school districts or those with limited budgets.
Keeping the food supply safe was not an issue for Furman Foods back in 1921, when John W. Furman canned 360 glass jars of tomatoes with his wife, Emma, and their six children. Just as food processing practices have evolved over time, so too has the nation’s approach to securing food processing facilities. Today, Furman Foods uses ID cards as the first step of a greater plan to enhance its plant security. Furman Foods is a family-owned business. By 1969, the company had sold a million cases of tomatoes and was complementing its tomato crop with beans, peppers and other vegetables sold under the Furmano’s name. The company’s roots are planted firmly in the soil of the Susquehanna River Valley of Pennsylvania. Despite this remote location, Frank Furman, Vice President of Quality, is ready to take the facility to the next level of security and quality. “The need is here,” he said. “Everything is coming together at once. Not only does security make good business sense, but it also is something we need to do for our customers.” Food safety and security While the company has focused on food safety for many years, the U.S. Food and Drug Administration’s (FDA’s) Bioterrorism Act of 2002 made security a top concern for food producers such as Furman’s. Title III of the act specifically addresses protecting the safety and security of food and drug supplies. In addition, because Furman Foods provides food for U.S. Department of Agriculture (USDA) food programs, it is subject to USDA security measures. Security isn’t new to the company. It began incorporating additional security measures shortly after September 2001. The well heads for the water supply are locked and checked daily, for example, and a third-party security service is on duty during off-hours. Delivery truck doors now must be sealed, the company’s computer systems have new access controls in them, and locks now adorn all bulk storage areas, such as those for corn sweeteners and vinegar, some of the most vulnerable areas in the company. An important part of the security system at Furman’s is a new ID card program Time and attendance tracking An important part of the security system at Furman’s is a new ID card program. “We needed to replace our time clocks,” said Mark Slear, Systems Administrator, “so we took advantage of the opportunity to introduce employee ID cards to track time and attendance.” “I wanted some kind of control so that people who don’t work here don’t get in,” Furman said, “Despite the fact that we are located in a rural area, we still were seeing people here who shouldn’t be here. We had to figure out some way to limit access.” In the past, the company had pre-printed, pre-numbered, bar coded cards for hourly employee access. Employees were assigned a number, but that was it. HID Fargo Printer/Encoder Slear and Furman selected the Fargo DTC550 Direct-to-Card Printer/Encoder with lamination capabilities from ID Wholesaler (www.idwholesaler.com), a Fargo Value-Added Retailer and the largest online reseller of photo ID products. “I looked around quite a bit,” said Slear, “and all of my research kept coming back to Fargo.” Furman’s warehouse employees require a stronger card to withstand the everyday wear and tear associated with their active jobs" “We determined that Furman Foods needed a higher level of security than a basic photo ID card could offer,” said Shane Stark, Account Manager, ID Wholesaler. “The FDA keeps tight regulations on who has access to food processing areas. Along with using bar codes and magnetic encoding for security measures, Furman’s warehouse employees require a stronger card to withstand the everyday wear and tear associated with their active jobs. This led us to lamination and a Mylar card, which offers greater durability.” Slear was also interested in the printer’s speed. “When we ramp up during the summer, we produce a year’s worth of product in three months,” he said. “We have to print a lot of ID cards quickly to accommodate our seasonal workers.” Security access cards Furman’s bought the Fargo printer in October, took employee pictures in November and began issuing new ID cards in January. The ID cards contain a full photo, and the program includes all employees, even the extra 300 that are hired during the July-to-October busy season. While tracking time and attendance with the ID cards was the company’s first concern, Slear and Furman were thinking ahead when they chose an ID card printer, knowing that security needs would be enhanced down the road. “We added a magnetic stripe and photo in preparation for future security,” said Slear. “We haven’t defined yet what else we might do, but much of it will be driven by FDA and USDA directives.” “We liked the fact that the DTC550 printer can print on proximity cards if we decide to upgrade our ID cards someday,” said Slear. Furman agreed. “Eventually, we will go to smart cards, especially for the room where our ingredients are mixed,” he said. “We need to limit this area to those who are designated to be there. They will have to swipe an ID card for access. We chose a printer that will allow us to upgrade the cards, knowing that sooner or later we’ll have to go further with security.” Our product and industry knowledge enable us to assess our customers’ needs and present options that meet their requirements" Comprehensive identification solutions “Everything has been going well,” Slear said. “The person printing the cards picked up on it quickly.” Slear gives high marks to ID Wholesaler for their customer service. “Every time I talk to Shane, I get the answers I need,” he said. “He also checks in from time to time, just to see how things are going.” “Our product and industry knowledge enable us to assess our customers’ needs and present options that meet their requirements and their budgets,” said Jennifer Clancy, Marketing Manager, ID Wholesaler. Currently there are three variations to the Furman’s ID cards: yellow background for employees, green background for visitors and blue background for vendors. “Certain vendors are allowed on site without an escort,” said Furman. “For instance, because we are a kosher facility, once a month a rabbi comes in to check our operations. He has his own vendor ID card and is pre-approved, so he can move throughout our facility unescorted.” Facility security One of our big concerns is having someone follow a carded employee into the plant Furman Foods prides itself on its strong values, its quality products, its sustainability and its food security. Yet Furman isn’t satisfied. “We are still not where we should be,” he said. “We have come a long way, but we have a long way to go. If I could wave a magic wand, we would have one entrance, where everybody has to enter and exit. This entrance would be secured by a card reader, so individuals would have to swipe an ID card to get in. One of our big concerns is having someone follow a carded employee into the plant. Restricted areas should require special access cards, and I’d like a fence around the entire facility, with a guard shack where everyone checks in and out,” he further added. Right now, there are multiple entrances for traffic. The facility is very spread out, and the road in front is a public road. Photo ID access card Yet, all agree that the ID cards are an important step on Furman Foods’ journey toward enhanced security. “A safe workplace is fundamental,” said Clancy. “Photo ID cards provide at-a-glance validation that the card wearer is authorised to be on the premises. This is especially important for food manufacturers.” “I tell our employees security is only going to get tighter,” Furman said. “More safeguards will be put in place. We are in the food business. If we don’t have safe foods, we don’t have jobs.”
Following several high-profile incidents alleging abuse of special needs students (including some non-communicative students), and the activism of a number of parent groups in the state of Texas, Governor Greg Abbott signed Texas Senate Bill 507, requiring districts to install audio and video surveillance equipment into select special education classrooms when requested. The law requires the installation of cameras and recorders in classrooms meeting certain criteria—if and when a parent, school board member, or school staff requests them from the 2016-2017 school year forward. Surveillance must cover all areas in a classroom, with the exception of bathrooms and changing areas, and recorded footage must be retained for a minimum of six months. Many Texas school districts have begun the work of bringing relevant educational spaces into compliance with the law, including the Edna Independent School District.The IDIS solution crafted by PSX meets Edna ISD’s SB 507 compliance requirements Super Fisheye-powered surveillance Carefully considering Edna ISD’s requirements for a highest-quality surveillance solution, capable of audio recording and coverage in compliance with the law, along with their need for a fiscally responsible solution that minimised total cost of ownership, while maximising value, PSX recommended the IDIS Total Solution’s DirectIP line. The IDIS Total Solution has a selection of affordable, highest-quality options for school districts, easily scaled to meet any classroom size, configuration, or budget. The IDIS solution crafted by PSX meets Edna ISD’s SB 507 compliance requirements with a custom configuration of IDIS cameras and recorders for multiple classrooms and sites. At the heart of the solution is the IDIS DirectIP Super Fisheye Camera, which features breakthrough IDIS technology recognised by the industry for solving common concerns found with many other fisheye models.The IDIS Super Fisheye offers unparalleled client, camera, and mobile dewarping for a clearer picture Smart UX controls The IDIS Super Fisheye offers unparalleled client, camera, and mobile dewarping for a clearer picture and strongest possible assessment and documentation of incidents. It also features the company’s award-winning IDIS Smart UX Controls (named a 2016 ‘New Product of the Year’ by Security Products magazine), which allow for agile real-time pointing and zooming in a simplified and smooth manner previously unheard of in the industry. Other IDIS benefits, including two-way communication and the powerful recording and storage technology the company is known for, make the solution an ideal one for Edna ISD’s needs. Significantly, SB 507 was not accompanied by additional funding for implementation. It required school districts to cover the cost of surveillance purchases and installation from existing funds, donations, or other alternate funding strategies. This expands the requirement for school districts such as Edna ISD, beyond the simple purchase and installation of new surveillance solutions, to include the identification of surveillance solutions able to provide maximum quality with a low total cost of ownership and to be as responsive as possible to the law, student needs, and existing budgetary requirements.The IDIS Total Solution has proven a strong fit for school districts Cost-effective deployment Offerings that feature combinations of technical and cost-effective benefits have proven a strong fit for school districts, including Edna ISD, looking to meet SB 507 requirements without sacrificing quality for cost, something that is important to institutions such as public schools, charged with both optimal execution of their core educational mission and careful stewardship of public funds. The IDIS Total Solution, differentiated by its ease of installation and use as well as its lack of licensing and maintenance fees, has proven a strong fit for school districts, including Edna ISD. Alan Morris, Vice President of Sales for PSX, Inc., stated, “While SB 507 compliance has proven a challenge for some school districts, Edna ISD has shown an uncompromising commitment to its special needs students through the selection of technology that provides easy real-time review of classroom behavior and provides the best, clearest evidence possible should an incident occur.” Secure learning environment "In Edna ISD, the safety of our students, teachers, and staff is a key part of our educational mission. When those in our schools, and the families that love them, know their environment is safe and secure, the educational mission can thrive. We have embraced the SB 507 requirements as yet another tool in ensuring an ideal learning environment for all, providing additional support and protection for our special needs population.” “We were committed to doing this with only the best technology the industry had to offer, while also remaining responsible to our taxpayers throughout the process. The IDIS combination of a fully scalable solution of next-generation technology with a lower total cost of ownership than typically seen in the industry made it the right choice for our needs."
The Monterey Bay Aquarium has a rich history of innovation. Since its founding in 1984, the facility has become one of the world’s leading public aquariums and ocean conservation organisations. Monterey Bay Aquarium has produced significant insights into the life history of sharks, sea otters, and bluefin tuna. The aquarium also was the first to exhibit a living kelp forest, and in 2004 it was the first to successfully exhibit and return to the wild a young great white shark. It is therefore no surprise that the Monterey Bay Aquarium desired the most innovative and state-of-the-art cameras as a key component for its security system, and Arecont Vision was able to deliver what they required. Until recently, the Monterey Bay Aquarium relied upon up to 60 analogue cameras for its video security needs Constant surveillance and monitoring The aquarium has a huge campus, with multiple separate properties and an average annual visitation of two million people. Until recently, the Monterey Bay Aquarium relied upon up to 60 analogue cameras for its video security needs. With such a large area to cover and with so many people to monitor, this type of system proved increasingly unreliable and insufficient to its growing security needs. The aquarium’s security staff also found it a major inconvenience that accessories and other parts for the system were exclusive to the original provider, limiting the security team’s options both technically and financially. The footage from the analogue cameras was monitored on monochrome screens and useful viewing of surveillance video was quite difficult at times. The quality of the images was low, and the inflexible nature of the cameras resulted in a number of blind spots throughout the aquarium’s large campus. Difficult lighting conditions The aquarium also has some very challenging lighting situations, requiring more specialised, versatile cameras in order to properly capture images. “We have some very difficult light levels here. The reflections of the water tanks can make certain areas lighter on camera than they are in person, or vice-versa,” stated Thomas Uretsky, Director of Security and Emergency Management for the facility. The security team reached the point where they knew they needed to upgrade. “The system needed more flexibility, multiple views on one camera, the works,” Mr. Uretsky said. “Blind spots needed to be eliminated, and we wanted as close to a 360-degree view as possible.” After thorough research, San Jose, California-based security integrator NSI Systems recommended Arecont Vision for the camera solution. The aquarium has a huge campus, with an average annual visitation of two million people Arecont Vision surveillance expertise Mr. Uretsky and the team at Monterey Bay Aquarium collaborated with Arecont Vision regarding what they were looking for, where coverage was needed, and how to best fit in into their budget. Monterey Bay Aquarium chose ExacqVision as their video management system, another solid partner to help upgrade their prior surveillance system. A range of different Arecont Vision cameras were ultimately deployed to serve the aquarium’s varying needs. Arecont Vision MicroDome cameras were ideal for the ticketing area and customer lines. The series includes Wide Dynamic Range (WDR) models, which can achieve clear images across extreme lighting conditions, such as those found in some of the indoor spaces at the aquarium. MicroDome cameras have an extremely low profile and only a 4” diameter, making them ideal for discrete security surveillance. When asked for his thoughts about the MicroDome camera, Mr. Uretsky responded, “They are small and nearly invisible to anyone who doesn’t know what they’re looking for. The fact that they have such a small footprint makes them ideal for us in the ticketing and front entrance areas.” The Monterey Bay Aquarium now has the unique and flexible camera solution it required, utilising 360-degree video Another favourite at Monterey Bay Aquarium were Arecont Vision SurroundVideo Omni G1 and G2 adjustable-view cameras. The SurroundVideo Omni series utilises a patented 360º track where each of its four-megapixel sensors can be moved to cover virtually any angle. Remote motorised focus simplified installation with the Omni G2. Combined with the ability to interchange lenses, the Monterey Bay Aquarium now has the unique and flexible camera solution it required. The customisable features of the camera also simplify future changes that may occur at the aquarium, saving time and money if construction or remodelling were to occur. “The SurroundVideo Omni cameras are some of our favourites because we are getting four cameras in one. They have the most flexibility,” said Kevin Wright, Monterey Bay Aquarium’s security manager. “Our blind spots are much more limited, and we don’t need to use nearly as many cameras as we previously had in those areas.” Although each camera offers four separate views, only a single PoE (Power over Ethernet) cable and a single software license is required for integration with the Exacq software, further reducing costs. Megapixel camera performance The system has performed incredibly well to date. Not only was it installed on time, but it was completed within budget. The Monterey Bay Aquarium monitors the system locally, 24-hours per day. The images are viewed on a dynamic video wall in the new Security Operations Center. While most footage is viewed on-site, some cameras have been enabled with the Exacq software for remote monitoring at satellite offices. For example, holding areas for rescued sea otters can be viewed remotely by a research team. Some cameras have been enabled with the Exacq software for remote monitoring off-site Arecont Vision cameras have helped the aquarium’s security department in a variety of ways, one of which is increasingly common: addressing bicycle theft. Individuals will sometimes access a public recreational trail that runs along the aquarium’s main campus to steal unattended bikes parked by visitors or staff. Unlike the previous analogue surveillance system, Arecont Vision’s megapixel cameras are able to provide the security department with good views and high-resolution images when reporting such incidents to the police department. The project at Monterey Bay Aquarium fulfilled a vast array of surveillance requirements — indoor and outdoor scenes, large and small spaces, low- to high-lighting conditions — and Arecont Vision cameras addressed each of the challenges. The deployment of the new cameras made an impression on Mr. Uretsky and his team. Making potential security solutions reality One installation inspired ideas for another, and Arecont Vision helped make these potential security solutions a reality as well. The continual partnership between the aquarium, the system integrator, and Arecont Vision has resulted in an ongoing collaboration between the three entities. “The reason we went with Arecont Vision was because it has a niche where a lot of manufacturers don’t, with its multi-view cameras,” Mr. Uretsky stated. Arecont Vision pioneered the first multi-sensor megapixel panoramic cameras in the surveillance industry in 2006, and has continued to enhance their capabilities, introducing adjustable-view Omni cameras in 2014. “These cameras have been fundamental as we systematically replace our old cameras with newer, megapixel versions. We are always improving and always adding cameras, so each time we’ve installed them we’ve been pleased.”