Security service
Transportation enables the movement of goods and people, facilitates trade and commerce, and is crucial for businesses to operate and expand. Security technology plays a major role both in protecting today's various transportation systems and increasingly to make them more efficient. We asked this week's Expert Panel Roundtable: What’s new in technology serving the transportation market?
dormakaba is expanding its activities in the airport business area. Unique pilot projects for the automation of security checks are already underway at various airports and more will be coming soon. dormakaba has also seen a very good order intake in the airport sector for the financial year 2023/24. Argus Air eGates sensor gates Orders for the supply and maintenance of Argus Air eGates sensor gates were successfully implemented at several airports. The total revenue was in the high sin...
Critical Response Group (CRG), the global pioneer in critical incident mapping data, and Intrado, a global pioneer in emergency communication services and end-to-end solutions announced the integration of CRG within Intrado’s FirstNet® certified Safety Shield application. This integration brings CRG’s critical incident mapping data into Intrado’s comprehensive Safety Suite, an end-to-end incident management solution designed to enhance school and enterprise safety by helpi...
March Networks®, a pioneer in intelligent video surveillance, is pleased to announce a number of enhancements and new features in the company’s mid-year software release. This release focuses on future-proofing, including enhanced analytics to meet the evolving demands of modern security, making the user experience easier and boosting efficiency through technology and automation. Evolving demands of modern security Future-Proof: Enhanced AI Analytics: Attribute search: Search f...
Over the past decade, scientists have proved that engineered microbes are capable of exhibiting a range of sense-and-response functions. They can be programmed to convert input signals into detectible outputs, such as a change in colour when they encounter specific toxins. They can sense and respond to physical stimuli such as light or magnetic fields. They can even produce an electric current to actuate a tiny gear. Microbe-based sensing technologies Draper is looking to test the bound...
The Security Industry Authority (SIA) – the UK’s private security industry regulator is encouraging everyone to show their appreciation to security operatives on International Security Officers’ Day, which takes place annually on 24 July. This follows a reception at the House of Lords (22 July 2024) to mark 20 years of SIA licencing. The anniversary event was sponsored by Baroness Meacher, the first Chair of the SIA. Public security and safety The event was attended by SIA f...
News
Allied Universal®, the security and facility services company announced the launch of its new Enhanced Protection Services business unit. Enhanced Protection Services To address the most critical threats to life and safety, Enhanced Protection Services offers comprehensive, high-consequence threat mitigation at every stage of the risk cycle from planning and preoperational surveillance to execution and completion. Leveraging extensive subject matter expertise, the team delivers unrivaled protection for government agencies and commercial entities around the world. Special services integration The business unit will be led by industry expert Glen Kucera, president, of Enhanced Protection Services Enhanced Protection Services is the integration of several of the company’s specialised services including firearm and explosive detection canine teams; risk advisory and consulting; executive protection; intelligence; disaster and emergency response; chemical, biological, radiological, nuclear, and explosives screening; SmartTech screening technology; and active law enforcement. The business unit will be led by industry expert Glen Kucera, president, of Enhanced Protection Services. Specialised security services “Today’s elevated and dynamic threat landscape requires businesses and organisations to utilise specialised services that address high consequence threats,” said Steve Jones, global chairman, and CEO, of Allied Universal. “We’ve formed Enhanced Protection Services to better protect our clients in this environment and position Allied Universal as the innovative, go-to partner for specialised security services.” Team members Enhanced Protection Services boasts a team of 17,000 highly specialised security experts, a streamlined suite of services, an expanded national footprint with greater surge capacity, and more than 3,000 teams the world’s largest private sector team of explosive and firearm detection canines. The new business unit is built upon a bench of unrivaled subject matter expertise. Subject matter experts From executive leadership to field personnel, members of the Enhanced Protection Services team draw from decades of experience including elite law enforcement and military organisations, corporate security, Big Four consulting, and beyond. They are experts in strategic intelligence, counterterrorism, explosive mitigation, countersurveillance, executive protection, disaster response, and other areas of specialised protection. In a complex threat environment, Allied Universal Enhanced Protection Services designs situation-specific plans and programmes to preserve life safety, protect business continuity, and deliver peace of mind.
Sophos, a global pioneer of innovative security solutions for defeating cyberattacks announced that Teresa Anania has joined the company as Chief Customer Officer (CCO). Anania will play a key role in accelerating Sophos’ customer and partner success initiatives to maximise the value of Sophos’ portfolio of cybersecurity solutions and services, including Managed Detection and Response (MDR) services and endpoint, network, email, and cloud security. Teresa Anania Anania has more than 25 years of experience in pioneering customer satisfaction and sales growth across the public and private sectors, excelling in both direct and indirect sales channels. Joining Sophos from Zendesk, Anania was responsible for the management and development of its global client base of more than 110,000 customers from small- and medium-sized businesses (SMBs) to enterprises. During her time at Zendesk, Anania led all post-sales functions, including Professional Services, Customer Support, Customer Service, Customer Success, and Renewals, to deliver top-line growth and measurable impact for customers. Anania has extensive experience specialising in scaling post-sales customer engagement for enterprise, commercial, and volume segments, delivering significant Return on Investment (ROI) and driving revenue. Anania's responsibilities Anania will be responsible for developing a stronger customer-centric culture to deliver a seamless experience As CCO, Anania will be responsible for developing a stronger customer-centric culture, working together with channel partners and Managed Service Providers (MSPs) to deliver a seamless experience for Sophos’ growing customer base of more than 600,000 organisations worldwide. This vision also assures that smaller customers, which are a prime target for attackers, have access to the same innovative security solutions and industry-pioneering threat intelligence as their larger counterparts, a critical overall mission for Sophos in 2024 and beyond. Cybersecurity and managed security services “Sophos is in an exciting phase of its business growth, and I am eager to bring my career success building positive customer experiences to the company,” said Anania. “Sophos has a stellar reputation for continually innovating cybersecurity technology and managed security services that help organisations defend their businesses against ransomware, data breaches, and other potentially business-ending cyberattacks." Interactive assessments "I will be working closely with channel partners, MSPs, and the global team, to advocate for Sophos’ customers and their security defences and to drive value for partners from Sophos’ entire portfolio of solutions and services,” added Anania. “The threat landscape is always changing, and organisations need regular, interactive assessments of their overall IT environments to determine how to most efficiently and effectively adapt to defeat active attackers,” said Joe Levy, CEO of Sophos. Customer experience "To help facilitate this, security vendors need to take responsibility to ensure that customer investments in their products and services are providing real value to them, which requires engagement throughout contract lifecycles." "This also requires world-class customer experience (CX) for renewals and upgrades to the most relevant and appropriate technologies and services, and an awareness of the full potential already available in existing licences. The best tool is of little value without the right operation, so these components are critical to properly and consistently defending against modern attacks." Post-sales relationships “To provide this pathway, we’ve hired Teresa, who has an impressive track record building post-sales relationships and delivering experiences that increase customer satisfaction and drive topline growth." "Her knowledge and expertise will allow us to further put customers at the centre of our business, alongside our channel partners and MSPs. Most importantly, Teresa’s new role will help keep our customers as secure as possible, which is always our top priority. We are delighted to welcome Teresa to the Sophos team.”
The faulty CrowdStrike Falcon Sensor update and subsequent outage – the CrowdOut Event – underscore the potential for Single Point of Failure (SPoF) technology outages to impact the global digital economy. CyberCube is advising clients on how to use SPoF Intelligence to identify exposed insureds and estimate the exposure footprint of the event. SPoF Intelligence is the definitive source for analysing a portfolio's digital supply chain, integrated with the industry's pioneering cyber model. What happened? A global IT system outage was triggered by a faulty software update from CrowdStrike, causing widespread disruptions across various Windows operating system (OS) types. The issue originated from a defective kernel driver included in the update, which led to numerous systems crashing globally and displaying the “Blue Screen of Death” (BSoD). The BSoD is a protective measure to prevent further damage to the OS by stopping all operations The issue began with a CrowdStrike update that was intended to enhance security but inadvertently included a logic error in a configuration file. Invalid operations caused by the logic error led to the OS encountering conditions it cannot resolve. This resulted in system crashes, manifesting as the BSoD. The BSoD is a protective measure to prevent further damage to the OS by stopping all operations. Who is impacted? The faulty update affects companies using CrowdStrike’s Falcon software on machines running Windows OS, both desktop (including Windows 10 and 11) and Windows Server. These are the primary companies affected by the event. With its global position in cybersecurity, CrowdStrike’s own customer base includes many other organisations that CyberCube identifies as SPoFs. Companies relying on one of these SPoFs may be secondary victims of the event, even if they do not use CrowdStrike and Windows directly. Additionally, CrowdStrike Falcon is deployed by managed security service providers (MSSPs) on the networks of other – typically smaller – organisations they oversee. These organisations using such MSSPs are also secondary victims of the event. Notably, financial institutions, healthcare providers, and transportation networks have all experienced disruptions. CrowdStrike Falcon and Windows OS CrowdStrike Falcon is at risk of experiencing system crashes and operational disruptions Applying the SPoF Intelligence tool to search for insureds that are dependent on CrowdStrike Falcon, shows it is likely that all users of the core components of the CrowdStrike Falcon platform in conjunction with Windows OS are impacted. Analysis of the count of companies exposed across CyberCube’s US Industry Exposure Database (IED) identifies large companies in Manufacturing, IT, Healthcare, and Financials as the most likely to be exposed. Examination of exposed limits shows an outsize exposure in the Aviation, Banking, and Retail sectors. CyberCube has provided clients with a list of SPoFs that are dependent both on CrowdStrike Falcon and Windows OS. The outage affects various versions of Windows operating systems. This broad scope means that any organisation or individual using these operating systems alongside CrowdStrike Falcon is at risk of experiencing system crashes and operational disruptions. Catastrophic loss modelling The primary impacts of the CrowdOut Event closely resemble two scenarios in CyberCube’s Portfolio Manager aggregation model. Modelling scenario classes 41 (operating system disruptions on endpoints) and 42 (operating system disruptions on servers) within CyberCube’s event catalogue show the CrowdOut Event to be mainly a system failure or business interruption (BI) event. Customers may share secondary hits by way of extra SPoFs that fall within this prior footprint Customers may experience secondary impacts by way of additional SPoFs that fall within this primary footprint. SPoFs for scenario classes 4, 9, 10, 11, and 18 (mainly related to financial services and payment system technologies) have been observed as users of CrowdStrike and Windows operating systems, exposing companies that rely on these SPoFs to possible contingent business interruption (CBI) outages. What to expect? Affected organisations can expect a series of remediation and recovery efforts to take place immediately. Companies with the IT resources to handle large-scale incidents are expected to recover faster. There may be ongoing disruptions as companies implement patches and verify their systems' stability. Rolling back the update and applying patches requires specialised knowledge Rolling back the update and applying patches requires specialised knowledge. For small and medium-sized companies, a lack of access to IT staff could delay the remediation process. Companies lacking robust contingency or IT backup plans could also face additional disruptions. CyberCube support CyberCube's Cyber Aggregation Event Response Service (CAERS) has been activated as a result of the CrowdStrike event. CAERS provides up-to-date intelligence on major cyber catastrophes worldwide as they unfold to ensure CyberCube clients have the most relevant information. CyberCube will continue to monitor this developing event and provide support for customers in calculating the impact on their own cyber insurance portfolios.
Convergint, a global pioneer in service-based systems integration announced that it has acquired Helinick, a Romania-based integrator that specialises in the design and implementation of electronic security, fire safety, communications, and building management systems. Helinick is a market pioneer and fast-growing organisation in Romania with over 500 regional customers. This acquisition greatly expands Convergint’s key service and technology capabilities across Europe. Helinick Founded in 1991, Helinick provides turn-key, innovative technology solutions, tailored to customers’ unique industry needs. With a reputation for providing best-in-market service, Helinick has fostered strong business growth across the region, acting as a strategic partner to customers across Romania and Germany to reduce risk, improve safety, and deliver transformative results. The acquisition brings over 160 colleagues to Convergint extending its foothold across the region and allowing it to meet growing customer demand with cutting-edge technology solutions. Strategic growth “Helinick is a pioneer in their region for security technology and design, and their expertise will accelerate our strategic growth in this crucial market, and with our global customers,” said Ann Fandozzi, CEO of Convergint. “We’re thrilled to welcome Helinick colleagues to Convergint. Their dedication to providing customers with innovative technology integrations and industry-pioneering service is well-aligned with our core Values and Beliefs, and together we will strengthen Convergint’s global reach.” Digital solutions “With a shared mission to deliver the market’s most advanced technology solutions, joining Convergint enables Helinick to meet progressing demand for fully integrated, digitally transformed security systems,” said Marius Retegan, Executive Director of Helinick. “Convergint’s global presence and culture of service will allow us to power growth, and continue to deliver premium service to our existing customers across Romania.”
Cloudbrink has expanded its personal SASE service with Internet security features that allow all classes of applications to be managed on one platform under a single policy for work-from-anywhere (WFA) users. With the addition of Internet security controls, Cloudbrink now supports single-policy management of web, SaaS and private enterprise applications from a single lightweight app running on the user’s device. Cloudbrink’s Internet security A single agent for both ZTNA and SWG simplifies deployment, endpoint maintenance and licencing In most SASE deployments, enterprise apps are managed under a zero-trust access model with access to external Internet apps handled by a secure web gateway (SWG). Cloudbrink’s Internet security allows for secure web access as defined in Gartner’s research note Critical Capabilities for Security Service Edge, using built-in policies for ease of deployment. The new features enable customers to protect their users and endpoints from accessing malicious Internet websites. They can also consolidate their Internet security and high-performance ZTNA solutions on a single platform without resorting to performance-sapping proxies. A single agent for both ZTNA and SWG simplifies deployment, endpoint maintenance and licencing. Cloudbrink personal SASE service Customers gain visibility into all the websites and app sorts that users are accessing and stature scores Customers gain visibility into all the websites and app categories that users are accessing as well as their reputation scores and details of blocked sites. A unified policy definition makes it easier to manage different use cases and prevents configuration errors that can cause user frustration and weaken security. The Cloudbrink personal SASE service now includes zero trust access, Internet security, FWaaS, digital experience monitoring, hybrid multi-cloud access, application visibility, and unified policy infrastructure along with high-performance application access from anywhere on any device. Secure access solution Prakash Mana, chief executive of Cloudbrink said: “Customers want to be able to give remote workers access to on-prem, SaaS and web apps without having to manage multiple network and security policies and tools." "Our goal is to keep access as secure and simple as possible, reducing operational overhead and enhancing performance. Cloudbrink is the only secure access solution that outperforms unsecured connections by an order of magnitude.”
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions announced that Heathrow Airport’s multi-year investment in Genetec solutions is enabling them to continuously innovate and transform operations. The joint effort provides Heathrow with a unified view across large-scale airport operations that is securing people and assets, bringing efficiency, and enhancing the passenger experience while ensuring data privacy and cybersecurity compliance. London Heathrow London Heathrow is Europe’s busiest airport, handling approximately 80 million passengers and 14 million tonnes of goods annually. Over 76,000 employees work around the clock to ensure the airport’s smooth operations across its 1,227-hectare site, including maintaining passenger flow, securing the premises, and managing over 1,300 daily take-offs and landings for 89 different airlines. Genetec Security Centre Genetec solutions are used to monitor over 150 km of baggage belts and facilitate the daily entry and exit Heathrow initially deployed Genetec Security Centre to bring all of its IP security systems onto one unified platform. What began as a 2,000-camera deployment in 2016 has since more than quadrupled in size, incorporating everything from video and access control to LIDAR, analytics, numberplate recognition, and more. Genetec solutions are used to go far beyond security. For example, Genetec solutions are used to monitor over 150 km of baggage belts and facilitate the daily entry and exit of over 150,000 vehicles. Passenger management “We’re essentially running a small city operation that happens to be called Heathrow,” explains Danny Long, IT Product Owner for physical security products at Heathrow. “Alongside the traditional airport security functions, we’re responsible for the monitoring of roads, retail space, three train stations, a bus terminal, offices, a church, fuel stores, a high voltage electrical network, and all the other associated infrastructure that maintains passenger flow.” Customised dashboards Some operational staff are given the tools to monitor passenger flow and are automatically notified Genetec Security Centre supports 90 different stakeholder groups working across 110 distinct control rooms, all of whom have different needs and access rights. Customised dashboards enable individual teams and third parties, such as police, government agencies, airlines, and retailers, to focus on their specific tasks. For example, some operational staff are given the tools to monitor passenger flow and are automatically notified when security queues grow too long. Meanwhile, colleagues in IT don’t see camera feeds. Instead, they have access to system health dashboards that notify them of devices that have fallen offline or require software/firmware updates. Area identification “The joy of working with London Heathrow is that the team is constantly striving to put our system through its paces and identify new areas where it can add value,” states Simon Barnes, Director of Business Development, Genetec, Inc. “While our software is configured to their requirements at the time, once in the field, new requirements emerge, and we have to adjust to their reality." Workable solutions “My job is to translate business requirements into workable solutions and Genetec provides me with the valuable tools with which to achieve that,” concludes Long. “Our experience with Genetec has been very positive. We’re only looking to expand in terms of the size and usage of the system.”
Expert commentary
The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. While traditional methods, including physical barriers and security personnel, are still necessary, the future of our approach is built on the backs of emerging technologies. Substantial vulnerabilities As an industry, we’ve operated reactively for decades, it has been common for security teams to address threats only after they occur. The growing risk landscape proves that this approach has significant limitations. Human oversight, delayed responses, and the inability to monitor large areas have exposed substantial vulnerabilities. Emergence of AI AI enables real-time monitoring, advanced data analysis, and more accurate risk detection Times are changing though and it’s largely due to the emergence of AI. AI is revolutionising the security landscape by making technology smarter. It enables real-time monitoring, advanced data analysis, and more accurate risk detection. This ensures a higher level of security and safety, minimising potential incidents' impact while enhancing overall safety. Focus on strategic aspects AI's ability to process vast amounts of data quickly and accurately is, quite frankly, a game-changer. It can identify patterns and anomalies that can provide stakeholders with critical insights to respond in a more prepared manner. By automating routine tasks and highlighting potential issues, AI also allows operators to focus on more complex and strategic aspects of security management, rather than responding to false alarms. The future is AI The future of security lies in AI. The Security Industry Association (SIA) has recognised AI as one of the top security megatrends in 2024. However, the challenge is not adopting AI, it is about effectively using it to enhance security. AI can enhance video surveillance by improving object detection and enabling real-time, informed responses AI systems can easily integrate with existing infrastructures, providing a layered defence that combines traditional methods with more modern technology. For example, AI can enhance video surveillance by improving object detection, reducing false alarms, and enabling real-time, informed responses. This ensures that security measures are adaptive, scalable, and capable of addressing the evolving risk landscape. Don’t react, anticipate One of AI's most significant benefits is its ability to provide proactive insights. AI can predict potential breaches by analysing behaviour patterns and detecting anomalies allowing security pioneers to do something before an event happens. This shift, from reactive to anticipatory measures, marks a significant advancement in asset protection and risk management. AI systems can also continuously analyse data and distinguish between everyday events and real-world threats. It’s AI's continuous learning capabilities that mean the systems can adapt and improve over time to become more accurate and efficient in threat detection and response. Save money, scale on demand Contrary to common belief, adopting AI technologies will not put a security department over budget. It may be surprising, but these solutions offer cost-effective and scalable alternatives to traditional security measures. An initial investment in AI technology can result in substantial long-term savings (and ROI) by reducing the need for physical infrastructure and on-site security personnel. Customisable solutions The ability to scale and customise AI solutions makes them an efficient choice for enhancing perimeter defence AI systems are also inherently scalable and can be tailored to meet the specific needs of different environments. This ensures the system can evolve with emerging threats and technological advancements without requiring a complete system overhaul. The ability to scale and customise AI solutions makes them a practical and efficient choice for enhancing perimeter defence. How’s that for staying within budget? Embrace the possibilities Integrating AI into perimeter security is the future of proactive and intelligent security. As these technologies continue to evolve, we can expect even more refined solutions that are predictive, autonomous, and capable of directly addressing new and emerging threats. We’re experiencing an exhilarating transformation as AI becomes more trusted, precise, and advanced on multiple levels. This evolution is bigger than pilots and small, low-profile deployments. AI in perimeter security For instance, France is preparing to deploy AI-powered video surveillance as it gears up to host the 2024 Olympics, part of its efforts to detect sudden crowd movements, abandoned objects, and suspicious activities. Think about the sheer scale of that project. We’re finally moving forward, and staying one step ahead must be our priority. But this shift requires a significant change in mindset. Are you ready to make the change?
In the realm of physical security, the distinction between being perceived as a security vendor and a security partner holds great importance. While both may seem interchangeable at first glance, how an organisation is viewed by its clients can have a huge impact on the success of its security programmes. At the heart of this differentiation is the concept of relationships and how they shape the dynamics between providers and their clients. Time, care, and diligence For security vendors such as systems integrators, security dealers, monitored services providers or manufacturers that sell directly to the end user elevating from supplier to partner requires a greater investment of time, care, and diligence. However, the eventual payoff can be incalculably advantageous to the organisation. Not only does this approach better serve the client but it also cultivates longer-term business and is more likely to generate referrals. Clients will change vendors often but stick with partners for the long haul. Simple installation and/or service Security end-users should look to their security products and service providers to partner with them Security end-users should look to their security products and service providers to partner with them, be vested in their success, and be part of the solution. They should seek out and expect more than a simple installation and/or service in the absence of any real, tangible, and value-added relationship with stakeholders. That means looking deeper than the similar cameras or equipment most vendors provide. Doing so brings benefits from the partnership in solving problems and creating strategies for mitigation. Vendors have short shelf lives A security vendor is typically seen as a transactional company that offers products or services to address specific security needs or challenges. When an organisation engages with a vendor, the focus is primarily on the exchange of goods and/or services for a fee. The relationship tends to be more transactional, with limited interaction beyond the scope of the security solution being provided. Tools, technologies, or service offerings The relationship between a security vendor and a client is often short with a one-time purchase Security vendors often play a crucial role in the security industry by offering specialised tools, technologies, or services that can help organisations improve their defences against threats. Examples would be video surveillance, access control, intrusion detection, or fire/life-safety systems, as well as the monitoring of any of them from a central monitoring station or security operations command centre. The thing about it is, however, that the relationship between a security vendor and a client is often short with a one-time purchase and limited ongoing engagement or consultation. Partners prove their value On the other hand, a security partner is viewed as a member of the team that works closely with an organisation to address its security challenges. Unlike a vendor, a security partner is invested in the long-term success of their clients and is committed to building a strong relationship based on expertise, trust, and transparency. Creating custom solutions Security partners go beyond offering products or services by engaging with companies and organisations Security partners go beyond offering products or services by engaging with companies and organisations to understand their unique security needs, goals, and challenges. They work concurrently with organisations to develop customised security solutions, provide support and guidance, and adapt to ever-changing threats and risks. When this kind of scenario is developed, the potentially distracting and detracting focus on monetary cost moves to the back burner because the value and return on investment (ROI) are so thoroughly compelling. Relationships bring real benefits The core of the difference between being perceived as a security vendor and a security partner hinges on the crucial role of relationships. While vendors focus on transactions and sales, partners prioritise collaboration and a sense of being in it together. Building strong relationships based on trust, communication, and shared goals is essential for forging a successful security partnership. Personalised approach Security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients. They can be reached easily when needed and emphasise a personalised approach with custom-tailored solutions. By building strong relationships based on respect and understanding, security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term. Operational opportunities Businesses and facilities often encounter or face very specific security needs that can only truly be solved in concert with a vendor that essentially acts like an extension of the end-user organisation. Furthermore, when communicating and collaborating on that level, additional security/safety and sometimes even operational opportunities for improvement come to light. This amplifies the value for both the end customer and their security vendor. Talk about a win-win! Prosper with partner power While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment At the end of the day, the difference between being a security vendor and a security partner is not merely a matter of semantics. It is about the fundamental difference in approach and mindset toward physical (electronic and networked) security. While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment to reducing losses and crime. Quality of relationships Ultimately, it is the quality of relationships that separates providers in the security space and determines the success of security initiatives in the current rapidly changing security landscape. This unification of intent, practice, and purpose enables practitioners and the public alike to harness the full power of pioneering-edge technologies that support the security industry’s core mission of protecting people and property. Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients.
As we head into a new year, it’s fair to say that it isn’t easy out there for the security integrator community. That’s understandable given the big ruptures felt in the market for physical security in 2023. Typically, Commercial Real Estate (CRE) landlords are the biggest and most influential buyers of physical security hardware and software, but this is starting to wane as heightened borrowing costs and biting inflation cause real estate valuations to plunge. Building security upgrades A lot of CRE landlords are in a fight for survival which unfortunately doesn't leave much room for budget spend on building security upgrades. This state of affairs is a problem for security integrators with extensive connections in the CRE space. Where do they pivot their services to keep their business growing in 2024? From the conversations I’ve been having with integrators and customers alike over the past few months – the answer is that the growth potential lies in the enterprise space. The trajectory of enterprise IT and physical security Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working It might initially feel unnatural to see the enterprise segment as a potential driver of demand for physical security services and products. Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working habits? These things are true but also present an opportunity for the right physical security proposition. Standardisation of enterprise IT Take efficiency drives as an example. A key element of such efforts is an acceleration towards the standardisation of enterprise IT platforms, hardware, and solutions, using the cloud. What was once a focus on moving on-prem systems and workloads to the cloud has shifted to efforts to keep cloud OpEx costs down by centralising as much as possible. Practically, this means utilising APIs to plug disparate IT applications and services into central platforms that boast a “single pane of glass” view. APIs APIs drive consumption, open new business models, and foster cross-industry partnerships APIs aren’t anything new to enterprises. They drive consumption, open new business models, and foster cross-industry partnerships. However, the use of APIs in the physical security sphere has been surprisingly slow to take off. There are multiple elements to this but a key reason is that some security software products on the market aren’t cloud-based. Adding cloud-based solutions to network Others are cloud-based, however, and these are the solutions that security integrators need in their portfolio to serve the influential enterprise market segment and its approach to IT networks. Selling the value of these solutions requires integrators to take it a step further by speaking the language of the enterprise IT buyer and understanding their goals. The power of cloud-based access control in the enterprise Hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events The continued relevance of physical security for enterprises can’t be understated. After all, hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events – not less. Despite the discourse around office downsizing, the reality for most enterprises is that the office can’t be done away with completely and there’s always going to be growth experienced by successful companies that require an upgrade in physical square footage. Physical security Access control systems that are cloud-based will be preferred by the enterprise to fulfill the essential function of physical security. That’s because they align with the push towards centralisation in the cloud that enterprises are carrying out business-wide. Access control has the potential to result in lots of disparate dashboards and apps. Think video management, license plate recognition, building management software, elevator monitoring, hot desking solutions, guest booking software, room booking functions, and more. Uniting all of these functions in one platform suits enterprise security teams well. Access control solutions Linking employee databases to an IAM solution, or creating seamless experiences by tying access credentials But this only scratches the surface. Access control solutions that can be integrated with hugely popular corporate software applications like Okta, Azure Active Directory, and Google Workspace quickly catch the eyes of enterprise IT security teams by pulling in the same direction as the broader tech stack. Whether it’s applying AI analytics to anomaly detection, linking employee databases to an Identity Access Management (IAM) solution, or creating seamless experiences by tying access credentials to things like meeting room bookings, it’s through APIs that cloud-based access control can thrive in an enterprise setting. Security integrators It’s worth also noting that as enterprises grow, access control gets harder. Managing the access requirements of thousands of employees across a global real estate footprint requires the scale that cloud computing is best placed to bring. Security integrators who can join the dots to make that link are well positioned to pivot toward the enterprise. Broadening horizons Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates This pivot is understandably a daunting prospect but the potential for natural synergy shouldn’t be overlooked. Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates and security anomalies won’t be completely alien to cloud-first enterprises. That’s an opportunity for integrators to upsell more sophisticated security set-ups in a way that they may have found more difficult with CRE clients and prospects. Tailored propositions It would be remiss to avoid mentioning that ‘enterprise’ is a very loose term that encompasses businesses across multiple industry verticals. To better pivot, security integrators need to offer tailored propositions specific to set verticals that cover all bases as opposed to offer, for example, piecemeal alarm or video product solutions. Enterprise industry verticals Security integrators should be weary of all-encompassing narratives in 2024. Whether or not the global economic picture darkens, there are always going to be pockets of growth within certain enterprise industry verticals. Plus, anecdotally, the indicators point to enterprises being the driver of demand for cloud-based access control as we head into the new year. Integrators who can dial into that shift have a lot to gain and nothing to lose.
Security beat
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solutions that go beyond just security at the device and software level, and manufacturers have been continuously developing improved application programming interfaces (APIs), and hybrid and cloud-connected solutions. Artificial intelligence (AI) Also, artificial intelligence (AI) plays an important role in modern intrusion systems by helping enable automated threat detection, real-time response, and predictive analysis. AI algorithms can analyse vast amounts of data to identify patterns and anomalies that may indicate security breaches. Security solutions are being developed with a focus on AI and machine learning to provide more proactive and resilient defences against increasingly sophisticated cyber threats. Benefits of AI AI-driven security solutions can continuously learn and adapt to new threats, providing more robust protection “The practical benefits of AI in security systems include enhanced accuracy in detecting threats, reduced response times through automation, and the capability to anticipate and prevent potential vulnerabilities before they are exploited,” says Sergio Castillejos, President, of Commercial Security at Honeywell. Additionally, AI-driven security solutions can continuously learn and adapt to new threats, providing businesses with more robust and dynamic protection. Unified Intelligent Command user interface Honeywell meets the challenge of better-integrated systems with a unified Intelligent Command user interface (UI). Castillejos says Honeywell continually innovates with the latest analytics and encryption to keep up with evolving threats. Honeywell’s products integrate with many offerings for partners to construct a robust and modern system relevant to their security needs. Advanced cloud-based security Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection, and remote management, essential for hybrid work environments, says Castillejos. “These solutions enhance scalability, improve data analytics capabilities, and provide seamless updates reducing significant maintenance costs that help companies to respond swiftly to emerging threats and enable robust, adaptive security measures.” Physical and digital security The best security systems are a combination of physical, digital, and national security, says Castillejos. While Honeywell focuses on providing the best in physical and digital security within their solutions, protecting sensitive and/or personal information must also be within the responsibility of the organisational policy. Cybersecurity for connected devices Some of the challenges in the next five years will likely include integrating advanced technologies Security systems can safeguard this information by being highly configurable while also notifying users of unwanted activity. Sometimes, just restricting access to sensitive areas can be enough. However, in the world of data analysis and machine learning, security systems can audit and report on users who have accessed data to ensure that the protections are in place. Some of the challenges in the next five years will likely include integrating advanced technologies such as AI and the Internet of Things (IoT) while securing cybersecurity for connected devices, notes Castillejos. Balancing act “Additionally, there will be a growing need for skilled professionals to manage and maintain these complex, connected systems,” he says. “Balancing cost-effectiveness with the demand for resilient security solutions will also pose a significant challenge, especially for smaller businesses.” Legacy systems that are susceptible to vulnerabilities like cloning or unauthorised access present the largest challenge to overcome. “However, as technology evolves, it becomes more challenging for a customer to manage a unified security system rather than a collection of unique solutions that all operate independently,” says Castillejos. Disruptive technology But investing in the newest analytics, AI and IoT will not improve a company’s physical security systems if they do nothing with the data. “They are not a replacement for the devices that keep people and property safe,” says Castillejos. “They can enhance a user’s experience and speed up the time to respond when they are planned correctly.” The best security systems will look at disruptive technology as another tool in the overall system. However, the focus should remain on the user experience. If the latest technology is not properly integrated or configured, it will turn into more noise that most operators will ignore. {##Poll1720586145 - Which is the most useful benefit of artificial intelligence (AI) in security systems?##}
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defences against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defences. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasises the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognising the need for continuous improvement and adaptation to evolving threats. Recognising the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognise the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defences. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defence against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorised infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defences of our nation’s critical infrastructure.”
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
Cognitec Systems is providing reliable face recognition technology to Brazilian payment solutions provider - Billingpay for use in Rio de Janeiro’s public transport system. Automated face recognition Billingpay has implemented automated face recognition to facilitate digital ticketing via the transport application Jaé, to be used by more than four million users daily. Currently, about 11 thousand capture devices are installed throughout the city’s transportation system. Facial biometrics The process starts with the enrollment of facial images during the registration service The process starts with the enrollment of facial images during the registration service, which is then used to prevent revenue evasion in public transportation. Facial biometrics match the ticket holder to the correct ticket, therefore preventing fraudulent use of subsidised tickets. “The second largest city in Brazil now operates one of the most modern and secure ticketing systems in the world, with added high-performance technology from Cognitec!” comments Marcello Perrotta, CCO of Billingpay. Modern identification services Public transport users can also present their faces to log into the Jaé platform and access buses or trains without the need for a ticket or identification. “This use case is a testament to the countless capabilities of face recognition technologies for modern identification services,” says Alfredo Herrera, Cognitec’s Managing Director, adding “We are excited to be a part of this innovative project, and this successful international partnership with Billingpay!”
Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partners, like suppliers and vendors. Honeywell's customer, a global pharmaceutical company, realised that potential vulnerabilities like these might be in its partner ecosystem. Therefore, the pharmaceutical company wanted to get ahead of a potential breach so they trusted Honeywell to do a thorough assessment of its suppliers’ operational technology (OT) cybersecurity gaps. Why did the customer choose Honeywell? First, Honeywell's OT cybersecurity experts took the time to understand the customer’s processes at more than 100 sites around the globe. Second, Honeywell experts used their knowledge and experience along with the customer process insight to conduct assessments that met their unique needs. Many of the competitors are simply IT vendors dabbling in the world of OT. Honeywell, however, has the knowledge and the experience to better meet the demands of OT. The pharmaceutical company chose Honeywell over the competitors based on the quality and wealth of OT knowledge the experts provided. Spreading security The Cybersecurity Vulnerability Assessment is part of a global two to three-phase project that covers over 100 sites This was not to be a small or limited undertaking. This Cybersecurity Vulnerability Assessment is part of a global two to three-phase project that covers more than 100 sites. The first assessment was completed for the company’s site in India with other sites being covered in later phases. Vulnerability assessment Honeywell’s OT cybersecurity experts conducted the vulnerability assessment to help capture the customer’s control system vulnerabilities and potential weak spots. The assessment performed was a holistic technical review of the ICS infrastructure. It focused on analysing their cybersecurity processes, procedures, and safeguards to better protect their industrial control systems(ICS) from internal and external threats. Because Honeywell focuses on OT as opposed to IT only, Honeywell experts are skilled in considering the entirety of an ecosystem. This means including people, processes, and any technical issues that can impact the ICS cybersecurity posture. Digging in to reduce risks The Honeywell team was able to holistically assess the customer’s ICS environment, documenting observations The Honeywell team has deep expertise across IEC 62443 standards and other industry-specific guidelines, as well as invaluable experience with control systems. Because of this expertise, the Honeywell team was able to holistically assess the customer’s ICS environment, documenting observations and recommendations to help reduce cybersecurity risks. Physical site review Honeywell team first conducted a physical site review to assess to uncover issues such as control room doors left unlocked, passwords in the line of sight, and other security compliance violations. The team also reviewed the customer’s network equipment from third parties such as switches, routers, and firewalls; reviewed the infrastructure configurations; and checked installation processes. Site-specific recommendations The report detailed best practices and site-specific recommendations to help the customer help mitigate and prioritise All the vulnerabilities, severity levels, and remediation details were included in the Cybersecurity Vulnerability Assessment report. The report also detailed best practices and site-specific recommendations to help the customer help mitigate and prioritise any identified threats or vulnerabilities and notes regarding how and where each step can serve as a foundation for the best practice architecture. Challenges and successes Honeywell experts remained diligent in exceeding the customer’s expectations despite the shutdown in India due to the pandemic and the unexpected need to assess and remediate assets. Honeywell also had one secret weapon: one of the OT cybersecurity experts had real-life experience in the pharmaceutical industry. This made it possible for the team to better tailor the assessment (and recommendations) to this particular customer.
When students come to study at the prestigious Les Roches Marbella campus in Spain, they are not just attending one of the world’s major hospitality business schools, they are also enveloped in extraordinary innovation and sophisticated living to mirror the exceptional experiences they are being prepared to facilitate in their future careers. Real-life training site The institution aims to serve up “academic rigor with a twist of innovation and entrepreneurship” to its 1,000+ students from all corners of the planet who collectively represent more than 80 nationalities. This real-life training site for elite hospitality professionals must offer an authentic, hands-on experience to its students — one that reflects the luxurious living and progressive comforts expected from high-end hospitality properties and their employees. Digital badge One particular aspect they sought to enrich was integrating “digital badge” access across the coastal Mediterranean To ensure Les Roches is always ahead of the curve and a model campus when it comes to exemplary learning based on cutting-edge technologies, administrators wanted to evolve its mobile ecosystem. One particular aspect they sought to enrich was integrating “digital badge” access across their coastal Mediterranean property in Spain. Project objective The project’s objective was to migrate to a mobile credentials-based system where a student’s plastic access card is replaced by a digital ID on a smartphone. This would serve as the verification for daily physical access and digital touchpoints (e.g., building access, vending machines, restaurant reservations, etc.). This effort would also allow the school to steer digital transformation and student efficiencies throughout its security and administrative functions. Catering to student experience “Everything here is about the student experience,” said Mano Soler, Director of Student Services and Operations at Les Roches Marbella. “It is our main driver and the reason we embrace and foster innovation because innovation makes our students’ lives easier and supports their well-being through secure technology. The students will eventually leave this campus and, in turn, take that know-how and excellence into the world with them.” Case study challenge The team wanted a mobile solution to fit specific campus requirements such as swift access For 10 years, Les Roches Marbella relied on an RFID (radio frequency identification) card-based system to identify and grant access to students. This was a fundamental tool that nearly 1,000 individuals needed to have with them at all times to validate themselves day in and day out. Supporting their quest for digital transformation, as part of the school’s Spark incubator programme, the leadership team wanted a mobile solution to fit specific campus requirements such as swiftly granting/removing accesses, avoiding disruption when students lose/forget cards, and accommodating a multi-system environment. Need for a mobile credentials-based system Management also wanted to drive improvements through back-office processes and procedures to save time and resources and enhance everyday life on campus through modern technology. One of the most pressing factors for this particular mobile initiative was to achieve higher efficiency around the school’s new student intake registration/check-in process each semester. Loading ID credentials individually onto RFID cards, then printing each of the 1,000+ cards, meant corrections along the way were inevitable. System re-adaptation Yet, the transition to mobile didn’t come without a series of obstacles and serious considerations. Each touchpoint where a card was to be replaced with smartphone technology required deep analysis and complex integration work, specifically involving seven to eight different brands whose products were already deployed throughout the premises (e.g., printers, vending machines, security technologies, door access, laundry facilities, parking garages and more). Les Roches required an access partner with solutions compatible with the many other products already in play within its existing infrastructure, and an ability to successfully address former system re-adaptation. iOS and Android support The mobile technology needed to support both Android and iOS phones, as well as physical card technology In addition, the mobile technology needed to support both Android and iOS phones, as well as physical card technology (the RFID ecosystem would remain intact for non-student purposes and serve as a migration path for other areas not yet mobile). The school wanted a single company to supply both the hardware and software elements. And, as a higher education establishment with upscale expectations and an outstanding reputation, the Les Roches decision-makers required a proven partner of this same ilk. HID solution To transform technologies and reach new degrees of onsite productivity and novel amenities, Les Roches Marbella selected HID for its unmatched mobile access portfolio. As a market pioneer in trusted identification and authentication, and with a network of partnerships that spans the globe, HID’s experts designed a system to meet each requirement from the school resulting in a tremendous collection of 40+ access points featuring mobile identification, app, portal, and reader technologies. Mobile components from HID The integration project was completed within an accelerated time frame to ensure it was in place before students set foot onto campus that fall. HID components that comprise this robust mobile ecosystem include HID OMNIKEY® readers and reader modules (OMNIKEY 5427, OMNIKEY 5127CK Mini, OMNIKEY 5127 Reader Core), HID Signo™ access control readers, HID Seos® mobile credentials, Aperio® locks from ASSA ABLOY and Aero™ X100 door modules. HID access technologies With a slight tap or wave of their smartphone, students interact easily with the mobile ecosystem and via the digital Seos credential to authenticate themselves as they move throughout the property each day. HID access technologies are embedded in: Parking garage systems Building entrances Vending machines Laundry facilities Printers Point-of-sale at restaurants/on-campus eateries Restaurant access control Class attendance tracking Dorm room door locks Mobile-first world “You cannot discount the value of mobile when it comes to today’s student populations,” said Soler. “It is their way of life. They were ‘born digital’ and they have an expectation when it comes to smart living, for them, it’s a mobile-first world. We get it. We embrace it. And, we intend to attract and retain students by offering them an unparalleled educational experience while here in Marbella.” Efficiencies and integration “We not only transformed our campus with epic mobile access technology but also drove important efficiencies and integration into everything we touched." "The value and inventiveness HIDexperts contributed to constructing this complicated mobile ecosystem is completely in line with our ongoing quest to ensure that innovation is at the heart of the Les RochesWay of Life," said Carlos Diez de la LastraGeneral Manager Les Roches Marbella. Results achieved HID credentials available via a smartphone make scaling individual access up and down significantly easier Tying back to one of the original reasons for this mobile initiative, registration check-ins are streamlined, and Les Roches Marbella has gained immediate improvements around this important event that takes place each semester. 100% of students use the mobile access system on campus. Students register digitally with the option to do so in-person, ahead of time, or remotely with no human interaction. HID credentials available via a smartphone make scaling individual access up and down significantly easier for IT, faculty, and students. A unique, homegrown handheld tool On a case-by-case basis, Les Roches Marbella is already finding ways to apply its in-house ingenuity to foster disruptive thinking. The school used 3D printers to design a customised case to house phones/tablets alongside HID access modules creating a unique, homegrown handheld tool that easily allows campus security personnel to check IDs as required. This safety support tool came about when there was no suitable offering available on the market to meet the school’s specific needs for security checkpoints. Automated student attendance tracking The flexibility and power of HID components enabled the team to re-imagine and invent an original Les Roches security product to, as always, improve the student experience. Many new use cases are in the works to fuel future “wins” across the premises. Automated student attendance tracking is already at the beginning of each class period and serves as another way to further support and protect students. Mini computers and readers were installed in each classroom so students could use their mobile ID (via their smartphone) to mark attendance. API-based interfaces, Aero door module When students go back to their dorm rooms any time, each door loc is integrated with the Aero door module All is handled by a web application running on the mini-computer that pushes and pulls data to/from the Les Roches Absences application in real time through API-based interfaces. And, when students go back to their dorm rooms any time, each door loc is integrated with the Aero door module, providing them with a seamless experience across the entire campus. Mobile authentication and verification “Our eyes are wide open to all the possibilities afforded by the marvelous world of mobile authentication and verification, and each week we come up with new ideas for the continued transformation we have in motion on our campus,” said Juan Luis Velasco, IT Manager at Les Roches Marbella. “Our students love this newfound convenience, and our staff members are reaping the benefits of this technology overhaul.” Best-in-class mobile access system Les Roches Marbella has a best-in-class mobile access system that squarely aligns with the school’s wider objective to be an example of innovation and excellence in global hospitality training both within its own brand family, as well as within the broader realm of higher education. Beyond elevating the student experience through the convenience of mobile IDs and strengthening security when it comes to student safety and mobile ID verification, Les Roches Marbella has an extremely efficient, flexible, and scalable solution that can grow with them as technologies evolve and digital trends continue to transform and connect us all to an international degree. Benefits of digital transformation “This is a story about the value of mobile and any size campus in any sector of education can benefit from the digital transformation angles when it comes to campus business,” said Velasco. “But the most rewarding aspect truly is connecting to our students in a way that’s important, convenient, and meaningful to them keeping them connected and secure via a device that’s already an extension of their existence.”
A major European oil and gas company that acquires, explores, produces and supplies chemical and petroleum products had a cybersecurity challenge. Company leadership wanted a better way to quantify and respond to the industry’s increasing levels of cybersecurity risk. Cybersecurity challenges Pioneers were looking for a new way to understand better and improve their company’s OT cybersecurity. As part of this effort, pioneers wanted to compare the company’s current levels of protection against a series of hypothetical attacks to identify gaps. With operations in several locations and a supply chain network of over 1,000 gas stations, auditing and improving the company’s cybersecurity would be no small task. csHAZOP services To help overcome these challenges, the company called in Honeywell and, specifically, its Honeywell Cybersecurity HAZOP (csHAZOP) services team to perform a detailed design evaluation based on OT cybersecurity risk. The Honeywell csHAZOP solution is designed to deliver a comprehensive set of analysis and recommendations – it goes beyond the standard cybersecurity vulnerability assessment or IEC 62443 compliance audit by adding deeper analysis that is designed to: Investigate a significant amount of what can go wrong, including approximately 500+ attack scenarios – evaluating these for multiple threat actors and different consequences. Address – via risk assessments – both the likely risk reduction through the regular IT type of countermeasures (AV, firewall, hardening, etc.) and the consequence severity reduction through the implementation of safeguards (e.g., hardwiring critical control signals). Estimate residual risk for each hazard, allowing identification and quantification, making mitigation actionable. Focus on process automation cybersecurity risk (csHAZOP stage 1) or production process cybersecurity risk (by adding csHAZOP stage 2 vs. cybersecurity production risk) to add a higher level of cybersecurity analysis from an OT perspective unique in the industry. Determining cybersecurity hazards The Honeywell cybersecurity professionals also identified some high-risk design deficiencies For this project, the Honeywell OT cybersecurity professionals used the Honeywell proprietary csHAZOP method to identify several concrete recommendations for immediate remediation and technical design in the company’s ICS to be considered in upcoming migrations. The Honeywell cybersecurity professionals also identified some high-risk design deficiencies. The Honeywell csHAZOP framework was also used to identify levels of residual risk to determine which cybersecurity hazards were more critical to address versus others. Cybersecurity assessments Honeywell provided targeted guidance on several aspects of the study, using experience from real-world cyber attacks in the industry. Honeywell’s csHAZOP service is one of the few cybersecurity assessments available on the market that is designed to apply counterfactual risk analysis. Given a system’s protective measures, this method helps a company evaluate which cyber attacks (based on countermeasures, security protections, and type of threat actor) may succeed. This evaluation directly links OT cybersecurity to loss prevention and process safety. Honeywell’s csHAZOP report for this oil and gas refinery was considered successful by the customer because of its well-defined procedure, the tools Honeywell has specifically designed for OT systems, and the team’s experience and efforts in OT cybersecurity. Customer's quote “The results of the cshazop assessment from Honeywell went beyond our expectations. We have received a detailed and analytical cybersecurity hazard and operability report concerning both identified risks and realistic recommendations for remediation," said a major refinery in Europe. "Additionally, the report is a valuable tool for future upgrades of our systems as well as new projects and the development of an incident response plan. We intend to repeat this assessment periodically, as it is a valuable tool in our continuous efforts to improve security for our systems from the ever-evolving cybersecurity threats.”
As an Indian multinational public sector bank, this financial services entity plays a crucial role in bolstering India’s economy and addressing the diverse needs of its vast customer base. In the United Kingdom, this institution has been active since the early 1900s, gradually growing to become the largest Indian bank in the UK. Initially, its focus in the UK market was on wholesale banking, but it has since expanded its offerings to include a dedicated retail arm. Financial products and services Operating 11 branches across the UK, it provides a wide range of financial products and services tailored to both commercial and individual clients. These include commercial lending, buy-to-let mortgages, cash ISAs, safe deposit lockers, instant access savings accounts, business accounts, and fixed deposits. Overview The institution faced operational inefficiencies and security concerns due to maintaining separate software Confronted with the challenge of integrating attendance and payroll software, along with the inability to effectively restrict unauthorised access to its secured premises across 14 locations, a prominent financial institution sought a comprehensive multi-location solution. Additionally, the institution faced operational inefficiencies and security concerns due to maintaining separate software platforms for employee directories. Need for a cloud-based attendance system To address these issues, the institution sought an integrated cloud-based attendance system that seamlessly integrates with payroll, enhances access control measures, and consolidates employee directory management. This solution aimed to ensure streamlined operations and heightened security across its premises. Institution's challenge The challenges centered around implementing a cloud-based attendance system and access management processes, as detailed below: Need for Integrated Attendance and Payroll Software The financial institution faced difficulties managing attendance and payroll software separately, resulting in inefficiencies and potential discrepancies in salary processing. There was an urgent need to integrate these systems to ensure seamless data flow and improve payroll management. Inadequate Entry and Exit Security Measures The institution struggled to restrict unauthorised entry and exit into its secured premises, posing significant security risks. Strengthening access control measures was essential to mitigate the threat of unauthorised access and protect personnel and assets. Need for a Single Employee Directory Using different software for employee directories created complexity and inefficiency Using different software for employee directories created complexity and inefficiency in administrative processes. It was crucial to consolidate employee directory management into a single platform to ensure accurate, consistent, and easily accessible employee information. Need for a Dedicated Server to Safeguard Data Integrity and Compliance The client had stringent requirements regarding data usage, with a key stipulation being that their main servers could not be used to manage third-party applications. This necessitated the implementation of a separate server or a cloud-based attendance system to host third-party applications and services, ensuring strict data protection measures and compliance with relevant regulations. These challenges highlighted the need for comprehensive solutions to improve operational efficiency, security, and data management within the financial institution. Matrix solution To tackle the challenges faced by the financial institution, Matrix delivered comprehensive solutions, including a cloud-based attendance system that transformed its attendance management processes: Integration of Events and Payroll Software: Matrix seamlessly merged the institution's event logs and payroll software, Darwin Box, through API Integration, guaranteeing synchronised data flow. Through this consolidation, Matrix facilitated smooth payroll processing, lessening inefficiencies, and decreasing the likelihood of discrepancies in salary management. Enhancement of Entry and Exit Security Measures: Utilising advanced technology, Matrix enhanced security protocols, reducing potential risks Matrix deployed proactive access control measures to strengthen the institution's premises against unauthorised entry and exit. Utilising advanced technology, Matrix enhanced security protocols, reducing potential risks and effectively protecting personnel and assets. Unified Employee Directory Management: Matrix unified the institution's management of employee directories by offering a centralised platform. By consolidating employee data, Matrix optimised the system so that updates made in the payroll software would automatically synchronise with the COSEC software, ensuring precise, uniform, and easily accessible vital employee information. Implementation of Cloud-based Solution: Due to a strict restriction on using the COSEC application on their primary server, Matrix proposed and implemented COSEC VYOM, a cloud-based attendance system tailored to their requirements. Moreover, this system was seamlessly linked with their payroll system through API Integration. Results observed Matrix's comprehensive solutions brought significant enhancements across various facets of the financial institution's operations, yielding measurable improvements in efficiency, security, and compliance: Efficient Payroll Processing: By integrating event logs and payroll software, Matrix facilitated seamless data flow and streamlined payroll By integrating event logs and payroll software, Matrix facilitated seamless data flow and streamlined payroll processing. This consolidation minimised inefficiencies and reduced discrepancies in salary management, causing more accurate and efficient payroll operations. Improved Premises Security: Matrix's proactive implementation of access control technology, Matrix fortified entry and exit points, mitigating security risks, and effectively safeguarding personnel and assets. Centralised Employee Directory Management: Through a unified platform for employee directory management, Matrix streamlined administrative processes and ensured consistency and accuracy in employee data. Changes made in the COSEC application automatically updated the payroll software, reducing manual effort and error. Compliance with Data Protection Regulations via Cloud-Based Attendance System: Matrix's provision of COSEC VYOM, a cloud-based attendance system, helped ensure compliance with strict data protection requirements. By segregating data and applications, Matrix improved data integrity and ensured adherence to regulations, minimising the risk of data breaches and non-compliance penalties. Operational efficiency, security, compliance Matrix's solutions not only tackled the financial institution's challenges but also delivered tangible enhancements In summary, Matrix's solutions not only tackled the financial institution's challenges but also delivered tangible enhancements in operational efficiency, security, compliance, and data management. Matrix contributed to the institution's effectiveness and resilience in the financial sector through integrated systems and innovative solutions. Products offered COSEC ARGO CAM200: MiFare Classic Card-Based Ultra Fast Door Controller COSEC VYOM TENANT: Tenant User Licence COSEC VYOM PLATFORM UD10K: Cloud-based Platform User Licence for 10K User Days COSEC VYOM PLATFORM UD100K: Cloud-based Platform User Licence for 100K User Days
Every year, the Veronafiere exhibition centre and its conference centre host an average of 35 exhibitions and 50 conventions. Among the successful and best-known events, Vinitaly, Marmomac, Fieracavalli, Fieragricola, Samoter, Progetto Fuoco, and MotorBike Expo stand out. These events attract up to 800,000 trade fair visitors and exhibitors every year. To ensure security for the outdoor areas of the brand new “Gallerie Mercatali” in Verona, Veronafiere again decided to install a Dallmeier video security system with Panomera® cameras. Trade fairs and events Veronafiere S.p.A. is an international group that has been organising trade fairs and events “connecting people, nations, and different businesses” since 1898. The trade fair site of Veronafiere with its various exhibition halls stands in the centre of the Italian city of Verona. Dallmeier video security system The high-tech solution also allows for objective management of any complaints Precisely to ensure greater safety for its guests, since 2016 Veronafiere implemented a Dallmeier video security system with a total of 15 Panomera® cameras. The initiative protects as much as possible both exhibitors, starting from the stand set-up phase, and visitors and operators, during the events. This high-tech solution also allows for objective management of any complaints, in a rapid, reassuring, and unequivocal way. “Recognition” with a minimum number of cameras In 2021 the Dallmeier Panomera® video coverage was also extended to the spaces of the “Gallerie Mercatali” of Verona, transformed by Veronafiere into additional exhibition and meeting spaces serving business and the city, after a long conservative restoration intervention of the two archaeological industrial structures. “The purpose of the video system is to minimise the hazards from vandalism, theft, and unauthorised entry, even when no trade fairs or events are taking place. At the same time, Veronafiere wanted to watch over the adjacent parking area,” says Simone Sterza, System Engineer of Italsicurezza, installer and system integrator who collaborates with Dallmeier. Price-performance ratio “It was just as important to the customer to have the best possible price-performance ratio: Veronafiere wanted to have 'Recognition' image quality according to DIN 62676‐4 over the entire area to be monitored, with the smallest number of cameras possible and low total operating costs.” Furthermore, the system should also offer high availability and have comprehensive data protection and data security functions. Any number of “virtual PTZs” and just one Allen key To find a video solution that satisfies the requirements profile, Veronafiere instituted a call for tenders To find a video solution that satisfies the requirements profile, Veronafiere instituted a call for tenders, which was won by the Italian general contractor Cubi S.r.l. One of the main reasons the contract was awarded to Cubi was that as a customer of Italsicurezza, it was able to offer the patented “Panomera®” multifocal sensor cameras. High-resolution images The remarkable feature of the Panomera® cameras is that they can capture long distances and large expanses in high resolution. To do this, they combine up to seven detail sensors having various focal lengths with an overview sensor in one optical unit. The result is a homogeneous, high-resolution total image covering the entire area that is to be captured. 4K cameras The benefit in this case is equivalent to combining multiple 4K cameras with any number of “virtual” PTZ systems but with significantly lower total operating costs. The reason for this is that, apart from fewer cameras, users also need considerably less infrastructure, such as cables, masts, networks, and monitors, to be able to see everything that is happening. Mountera® mounting “Besides their well-known image quality, the thing I found particularly surprising about the new Dallmeier Panomera® cameras was how quickly and easily we were able to mount them,” declares Simone Sterza, System Engineer with Italsicurezza. “Just a single Allen key size was needed for all of the main installation and adjustment work. Thanks to the Mountera® mounting system we were able to mount the cameras safely using just one technician, without needing any assistance from a second person.” Helpful extra services It was also a simple matter to integrate the new cameras and the IPS 10000 Recording Server The Dallmeier cameras capture the outdoor area of the Gallerie Mercatali in the resolution specified in the call for tenders. Italsicurezza was able to define this precisely for the entire area of 10,625 m2 using Dallmeier planning software. It was also a simple matter to integrate the new cameras and the IPS 10000 Recording Server into the existing Dallmeier system. Panomera® S8, S4, and single-sensor cameras Accordingly, Veronafiere only needs two Panomera® S8, three Panomera® S4, and two single-sensor cameras to secure the whole outdoor area of the Gallerie Mercatali and keep a reliable watch over everything that is happening over the entire area. To take advantage of the expanded video system from the very beginning, the security personnel at Veronafiere received thorough training from the team of Dallmeier Italy. Privacy & Security by Design These days, the Veronafiere control centre houses just three workstations, with which the authorised security personnel can observe the entire outdoor area of the trade fair site live and access camera recordings. RAID-6 storage ensures high availability of the recordings. To satisfy Italian data protection regulations, the system deletes the recordings of the camera images automatically after seven days. VCA or AI-based video analysis Searches for specific incidents could also be carried out even more rapidly Moreover, the modular nature of the system allows “upgrades on demand”: this means that Veronafiere could also implement Video Content Analyse (VCA) or AI-based video analysis applications to enable automatic reporting of unauthorised access to “sterile areas” (i.e., areas in which people and objects are not permitted to remain). Searches for specific incidents could also be carried out even more rapidly. Video system for safe events “The Dallmeier system”, ends Simone Sterza, “helps to ensure that exhibitors and visitors have an untroubled, enjoyable trade fair experience.”
Round table discussion
Inflation, the rise in prices of goods and services over time, can result from a multitude of factors. It happens when there is more money chasing a limited supply of goods. It happens when the cost of producing and transporting goods increases. It can even happen because expectations of future inflation heighten current demand to avoid higher prices. During and after the COVID pandemic, supply chain disruptions, shifting consumer demand, and government stimulus all contributed to higher inflation throughout the broader economy, including the physical security marketplace. Energy price shocks, particularly oil price spikes in late 2021, also increased inflationary pressures. But what is the situation now? We asked this week's Expert Panel Roundtable: Has price inflation ended (or slowed down) in the security market?
The design of buildings encompasses many elements, from the practical to the aesthetic. Well-designed buildings should be functional, and they can also be beautiful and inspiring. But can security systems and building design coexist and complement each other? We asked this week’s Expert Panel Roundtable: How does building design impact physical security systems -- and vice versa?
Manufacturers make things. That hasn’t changed. Manufacturers today still produce finished goods from raw materials using various tools, equipment, and processes. What is evolving is a greater emphasis among manufacturers on understanding and meeting customer needs. In the security industry and elsewhere, the role of a manufacturer is expanding from a purely production-focused function to one that embraces technology, prioritises adaptability, expands service offerings, and caters to a more demanding customer base. We asked this week’s Expert Panel Roundtable: How is the role of the manufacturer changing in the security market? Is “manufacturer” still the best term to reflect the changing role?
Products
Videos
Security service: Manufacturers & Suppliers
- Bolide Security service
- Dedicated Micros Security service
- Dahua Technology Security service
- VIVOTEK Security service
- Seagate Security service
- NetworX Security service
- Hanwha Vision Security service
- Vigilant Vision Security service
- Vanderbilt Security service
- OT Systems Security service
- Messoa Security service
- HID Security service
- Panasonic Security service
- Tamron Security service
- Nedap AEOS Security service
- LILIN Security service
- AMAG Security service
- Parabit Security service
- Pelco Security service
- Vicon Security service
Honeywell GARD USB threat report 2024
DownloadThe role of artificial intelligence to transform video imaging
DownloadAccess control system planning phase 1
DownloadKey Findings from the 2024 Thales Cloud Security Study
DownloadFacial recognition
Download