Hikvision’s Miami office co-sponsored an event in partnership with nonprofit Mission 500 and other security industry pioneers to support local students who attend the Title 1 Crosspointe Elementary School in Boynton Beach, Florida. Participants built and donated 700 backpacks filled with school supplies and other essential items. On Friday, Aug. 9, Hikvision Miami logistics and facility manager, Anthony Martinez, and Florida & Puerto Rico sales director, Shane Nikov, convened at Cross...
Paxton welcomes a new Senior Product Manager to the United States team, bringing with him a wealth of knowledge and experience of the access control market. Jeremy Allison will be based in Greenville, SC, and will oversee the development of future products, making sure they meet the demands and expectations of the growing US market. With over 15 years’ experience in CCTV and control systems, Jeremy has worked as a product manager for a security company and has run his own integration comp...
GET Group North America, an innovative developer of mobile ID technology with over 20 years of experience in secure government credentials, announced that its GET Mobile Administrator will enable DMVs and other ID card Issuing Authorities to provide mobile driver's licenses (mDLs) and other forms of mobile identification (mIDs) that comply with global interoperability standards. GET Group NA, with its technology partner Scytales AB, is working with the International Standards Organisation (ISO)...
Securitas UK has been awarded a five-year contract to deliver protective security services for the O2 arena. Home to world class entertainment, the 20,000-capacity venue hosted over 9 million visitors, 168 event days and 194 performances in 2018. Owned by AEG, the O2 arena is a high-profile venue which welcomes visitors from all around the world. The contract with Securitas went live in June. Delivering unrivalled protection Craig Robb, Chief Commercial Officer at Securitas UK commented: &ldq...
DMP names Edward Zachar to the position of dealer development manager in the company’s Los Angeles region. He will be responsible for developing new sales and providing on-going service to the area’s DMP-authorised dealers, helping them grow their businesses. Zachar has had many successful years managing sales teams. Most recently, he worked the last 10 years with Johnson Controls Security Solutions as regional government account manager. He also served Johnson Controls as sales man...
Ho Chi Minh City takes its place at the centre of Asia’s security world this week, as a record 380 exhibitors aim to catch the attention of trade buyers at the 12th edition of Secutech Vietnam. Displaying best-in-class products in the fields of safety, security and fire, the trade fair takes place at the Saigon Convention and Exhibition Centre from 14 – 16 August 2019. According to Ms Regina Tsai, the Deputy General Manager of Messe Frankfurt New Era Business Media Ltd, the fair has...
Morse Watchmans announces that its KeyWatcher Touch Key Management System has once again received LenelS2 factory certification and interfaces with the LenelS2 OnGuard version 7.5 access control security system. “Morse Watchmans has completed required factory testing at LenelS2 to validate the functionality of its interface to the OnGuard system,” said John Marchioli, OAAP product management, LenelS2. “We look forward to their continued involvement in the LenelS2 OpenAccess Alliance Program.” Unique and powerful solution “The collaboration between Morse Watchmans and LenelS2 will provide a unique and powerful solution with comprehensive capabilities within a single framework,” said Joe Granitto, COO, Morse Watchmans. “Using this interface, customers can now sync cardholders with the KeyWatcher Touch Key Management System, allowing them to remove and return assets using OnGuard access levels.” The new interface also allows administration to associate OnGuard access levels with different Key Groups, providing increased key control from within the OnGuard platform. The system’s modular design offers full scalability to enable systems to meet current and future needs.
Ring, whose mission is to make neighborhoods safer, announced Ring for Business to provide business owners with the ability to protect their companies with Ring Alarm and Ring Video Doorbells and Security Cams the same way that homeowners have been doing for years. Small businesses are an integral part of our communities and, thanks to Ring, they now have access to smart, DIY security that’s free from long-term commitments, hidden fees and professional installation. With Ring for Business, businesses across the U.S. and Canada can enhance their security while helping make neighbourhoods safer. Affordable security option for companies Traditional commercial security options are often rigid, expensive and difficult to install"Jamie Siminoff, founder and Chief Inventor of Ring, said: “One in 4 small businesses are impacted by burglary or theft. As an entrepreneur, I know firsthand that business owners put everything they have into their work, and it’s important to protect that. Traditional commercial security options are often rigid, expensive and difficult to install." “Because of this, we noticed some businesses using our devices to monitor and protect their properties. Developing Ring for Business, a more affordable and straightforward security option for companies, was a natural next step in our mission to make neighbourhoods safer – both at home and at work.” Remote monitoring and protection of property Ring for Business empowers customers to monitor and protect their property, across multiple locations, remotely from a single app. A professionally monitored security system that includes Ring’s wired and battery powered indoor and outdoor security cameras, Ring for Business offers affordable, commitment-free, 24/7 monitoring, and 60-day video event recording for unlimited cameras for just $10 per month per location. Battery and LTE cellular backup enable professional monitoring even if the power goes out or broadband is unavailable. With Ring for Business, we spend less time worrying about our building and our security""Ring for Business is super useful because it frees us from being at our business 24/7, and allows us to actually have a life of our own. We're able to travel and go out of town and know that our business is still running perfectly,” said Caroline Winata, Ring for Business customer and Chief Creativity Officer of Giggle & Riot. "With Ring for Business, we spend less time worrying about our building and our security, and more time on our company and our work." Alerts about potential trespassers Every Ring for Business kit is built around Ring Alarm, a smart security system that monitors one’s business and alerts them to potential trespassers or other unwanted activity. Accessories like door and window sensors, motion detectors and sirens can be added to the system and customised based on each business’ specific needs. Layer Ring Security Cams and Video Doorbells to further monitor the property and record important motion events in real-time. Add Key by Amazon to easily lock and unlock smart locks directly from the Live View of any Ring Doorbell or Cam, and eero for faster and more secure Wi-Fi throughout every inch of the business. And, with the launch of the Audio Toggle for all Doorbells and Cams, disable audio recording at home or the office to protect the privacy of family, friends, employees, and customers.
Reliance High-Tech announces a new apprenticeship scheme that will provide several people the chance to carve out a bright new future for themselves. For over 40 years Reliance High-Tech has worked with public and private sector organisations to design, maintain and improve their security systems. Using cutting edge technology the company develops innovative solutions across a wide range of demanding environments. As such, it has gained an enviable reputation for providing customers with the assurance that it has the knowledge and expertise to take on any assignment. With a growing portfolio of clients Reliance High-Tech now has 33 service engineers located across the UK, whose job it is to ensure that all of its customers’ needs are met. Troubleshooting security installations Carl Smith, the company’s head of service explained, “As a result of our success we need to add personnel to our servicing department. We decided that a great way to do this would be to introduce an apprenticeship programme and recruit three people from different areas of the country to join us.” Candidates must have a keen interest in electronics and security technology, and be IT literate “Reliance High-Tech is committed to improving the security sector and our apprenticeship programme will provide the knowledge required to configure, install, maintain and troubleshoot security installations in line with current and future practices. It’s the first time for a few years that we have been in a position to take on apprentices, so this is a really exciting time for us.” Candidates must have a keen interest in electronics and security technology, and be IT literate. The apprenticeship will last for approximately 3 years and individuals will work towards a Level 3 Diploma in Electronic, Security and Emergency Systems. Gaining relevant experience Applicants should also have a full driving licence, as they will be provided with a company vehicle. The apprentice will be mentored by one of Reliance High-Tech’s senior service engineers, who will be able to offer on the job training to the highest standards, while ensuring that they gain relevant experience across a range of vertical sectors. Carl Smith concluded, “Apprenticeships make organisations more effective, productive and competitive, and they are a proven way to train the workforce of the future. I firmly believe that there is a huge amount of talent out there, so we want to hear from young men and women living in Bolton and the surrounding areas, London and the surrounding areas, or along the M4 corridor between Swindon and Bristol, who have the drive and determination to succeed.”
The Milestone Technology Partner Program, which formalises a high level of cooperation between Milestone and manufacturers such as Hanwha Techwin, comes with a rich set of benefits and well-defined requirements. The main objective of the Program which has three levels, with ‘Platinum’ being the highest, is to ensure that mutual end-user clients are able to achieve maximum value from their video surveillance systems. Video surveillance solutions “We are delighted to be acknowledged by Milestone in this way,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “The Platinum Partner accreditation reflects our ability to cooperate with Video Management Software (VMS) developers, such as Milestone, to assist system integrators in providing end-users with easy to implement and easy to operate integrated video surveillance solutions.” “The ability of Milestone’s VMS to support existing, as well as future generations of Wisenet cameras, means they can be controlled and monitored alongside devices and systems produced by other third party manufacturers, as well as integrated with specialist analytics applications.”
Digital Defense, Inc. announces Frontline Network Map, an innovative feature offering IT security and operations professionals enhanced visibility of vulnerabilities and threats found on small, medium, and large networks. Frontline Network Map is accessible within Frontline.Cloud, the company’s SaaS security assessment platform and is being demonstrated at Black Hat 2019 conference currently underway in Las Vegas, Nevada. Risk network segments Through the Network Map capability, Fronline.Cloud users are able to view the relationships and interconnectivity of assets through a variety of clustering algorithms to pinpoint at risk network segments and areas of key vulnerability and active threat. “Our Network Map feature is a powerful tool for information security blue team members to quickly visualise the security of the networks and connected assets for which they defend from cybercriminal attacks,” states Mike Cotton, SVP, Engineering. “Frontline.Cloud users receive an accurate graphic depiction of their risk that enables rapid response to those assets or network clusters that present the greatest exposure.” Learn more about Frontline Network Map by visiting the Digital Defense booth #2411 at Black Hat and request for a demonstration.
SureCloud, a provider of cybersecurity services and cloud-based, Integrated Risk Management solutions, appoints Jon Taylor-Goy as EMEA Sales Manager for the cybersecurity division. Jon will be instrumental in helping drive business growth, as well as establishing complimentary new service lines. Jon’s expertise spans business growth, product development, and go-to-market strategies in the areas of IT risk management and governance. Cybersecurity service offering Jon brings more than 18 years of in-depth experience in IT sales, specialising in cybersecurity, risk, and compliance. Jon worked at NCC Group for 18 years, working his way up to Head of Business Development Prior to joining SureCloud, Jon worked at NCC Group for 18 years, working his way up to Head of Business Development, Risk Management, and Governance, where he formed a key role in the business development function that saw the company grow from 100 staff in one location to more than 2,000 worldwide. “SureCloud has a compelling proposition. Its cybersecurity service offering, Pentest-as-a-Service©, and approach to ongoing customer support sets the company apart from other providers and gives enormous potential for growth,” said Jon. Ever-evolving customer needs “I look forward to forging new customer relationships, developing strong relationships with current clients, and working with colleagues to bring new services to market that will meet ever-evolving customer needs.” Richard Hibbert, SureCloud CEO, said: “Enterprises across Europe are operating in a very challenging environment when it comes to IT security. Their networks are becoming more complex, the attacks they face are growing in number and sophistication, and their compliance obligations regarding data security are increasing. Jon’s work will bring our cybersecurity services, including SureCloud’s Pentest-as-a-Service, to a growing number of enterprises, ensuring that our offering continues to evolve and address the challenges they face.”
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from innovative cyber threats. Security solutions enterprises Organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organisations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organisations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analysing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognise we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organisation's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organisation’s defences, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organisation's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious behaviour Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organisations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behaviour on your network and can prioritise threats for SOC teams for faster remediation. In-depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organisations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organisations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organisations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioural analytics The solution can then know when to remove an adversary before a breakout occurs Behavioural analytics and machine learning capabilities identify known and unknown threats by analysing unusual behaviour within the network. These have the ability to provide an essential first line of defence, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organisations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organisation cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organisations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organisations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organisations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Johnson Controls recently unveiled the findings of its 2018 Energy Efficiency Indicator (EEI) survey that examined the current and planned investments and key drivers to improve energy efficiency and building systems integration in facilities. Systems integration was identified as one of the top technologies expected to have the biggest impact on the implementation in smart buildings over the next five years, with respondents planning to invest in security, fire and life-safety integrations more so than any other systems integration in the next year. As advanced, connected technologies drive the evolution of smart buildings, security and safety technologies are at the center of more intelligent strategies as they attribute to overall building operations and efficiencies. SourceSecurity.com spoke with Johnson Controls, Building Solutions, North America, VP of Marketing, Hank Monaco, and Senior National Director of Municipal Infrastructure and Smart Cities, Lisa Brown, about the results of the study, smart technology investments and the benefits of a holistic building strategy that integrates security and fire and life-safety systems with core building systems. Q: What is the most striking result from the survey, and what does it mean in the context of a building’s safety and security systems? The results show an increased understanding about the value of integrating safety and security systems with other building systems Hank Monaco: Investment in building system integration increased 23 percent in 2019 compared to 2018, the largest increase of any measure in the survey. When respondents were asked more specifically what systems they we planning to invest in over the next year, fire and life safety integration (61%) and security system integration (58%) were the top two priorities for organisations. The results show an increased understanding about the value of integrating safety and security systems with other building systems to improve overall operations and bolster capabilities beyond the intended function of an individual system. Q: The survey covers integration of fire, life safety and security systems as part of "smart building" systems. How do smarter buildings increase the effectiveness of security and life safety systems? Hank Monaco: A true “smart building” integrates all building systems – security, fire and life-safety, HVAC, lighting etc. – to create a connected, digital infrastructure that enables individual technologies to be more intelligent and perform more advanced functions beyond what they can do on their own. For example, when sensors and video surveillance are integrated with lighting systems, if abnormal activity is detected on the building premise, key stakeholders can be automatically alerted to increase emergency response time. With integrated video surveillance, they also gain the ability to access surveillance footage remotely to assess the situation. When sensors and video surveillance are integrated with lighting systems abnormal activity on the premise can automatically be detected Q: How can integrated security and life safety systems contribute to greater energy efficiency in a smart building environment? Hank Monaco: Security, fire and life-safety systems can help to inform other building systems about how a facility is used, high-trafficked areas and the flow of occupants within a building. Integrated building solutions produce a myriad of data that can be leveraged to increase operational efficiencies. From an energy efficiency standpoint, actionable insights are particularly useful for areas that are not frequently occupied or off-peak hours as you wouldn’t want to heat or cool an entire building for just one person coming in on the weekend. When video surveillance is integrated with HVAC and lighting systems, it can monitor occupancy in a room or hallway. The video analytics can then control the dimming of lights and the temperature depending on occupant levels in a specific vicinity. Similarly, when access control systems are integrated with these same systems, once a card is presented to the reader, it can signal the lights or HVAC system to turn on. In this example, systems integration can ultimately help enable energy savings in the long run. Security and life safety systems contribute to help enable greater energy efficiency and energy savings in the long run Q: What other benefits of integration are there (beyond the core security and life safety functions)? Hank Monaco: Beyond increased security, fire and life-safety functions, the benefits of systems integration include: Increased data and analytics to garner a holistic, streamlined understanding of how systems function and how to improve productivity Ability to track usage to increase efficiency and reduce operational costs Enhanced occupant experience and comfort Increased productivity and workflow to support business objectives Smart-ready, connected environment that can support future technology advancements Q: What lesson or action point should a building owner/operator take from the survey? How can the owner of an existing building leverage the benefits of the smart building environment incrementally and absent a complete overhaul? Lisa Brown: Johnson Controls Energy Efficiency Indicator found that 77% of organisations plan to make investments in energy efficiency and smarter building technology this year. This percentage demonstrates an increased understanding of the benefits of smart buildings and highlights the proactive efforts building owners are taking to adopt advanced technologies. There is an increased understanding that buildings operate more effectively when different building systems are connected As smart buildings continue to evolve, more facilities are beginning to explore opportunities to advance their own spaces. A complete overhaul of legacy systems is not necessary as small investments today can help position a facility to more easily adopt technologies at scale in the future. As a first step, it’s important for building owners to conduct an assessment and establish a strategy that defines a comprehensive set of requirements and prioritises use-cases and implementations. From there, incremental investments and updates can be made over a realistic timeline. Q: What is the ROI of smart buildings? Lisa Brown: As demonstrated by our survey, there is an increased understanding that buildings operate more effectively when different building systems are connected. The advanced analytics and more streamlined data that is gathered through systems integration can provide the building-performance metrics to help better understand the return on investment (ROI) of the building systems. This data is used to better understand the environment and make assessments and improvements overtime to increase efficiencies. Moreover, analytics and data provide valuable insights into where action is needed and what type of return can be expected from key investments.
A video analytics system that provides ‘behavioural understanding’ can yield more meaningful and actionable data for a range of applications. In public safety and security, such a system can alert on violent or suspicious behaviours, such as people fighting, vandalism, people with weapons, etc. In advanced traffic surveillance and monitoring, it can provide alerts to vehicle collisions (accidents), traffic hazards or vehicle that aren’t using the road properly, such as a car that stops in the middle of the junction. For enterprise and campus security, it can provide advanced anti-tailgating and detect unauthorised activity. Video surveillance infrastructure viisights was founded by a group of entrepreneurs with track records in developing technology businesses These uses are among the benefits of viisights’ video analytics technology based on behavioural understanding of video content. “It means we can extract more meaningful data from the huge amount of video content that is captured, and we can transform that data to actionable insights that eventually justify the massive investment in video surveillance infrastructure,” says Asaf Birenzvieg, CEO of viisights. Their behavioural understanding systems for real-time video intelligence leverage artificial intelligence technology. viisights was founded by a group of serial entrepreneurs with track records in developing technology businesses. The Israeli company’s founders recognised a growing global need for intelligence to make physical and virtual public areas safer – and realised the role that smart video understanding technology can play. Developing artificial intelligence technologies viisights is committed to developing artificial intelligence technologies that facilitate human-like video understanding, which in turn serves as the basis for fully autonomous video intelligence systems powered by pattern prediction technology. “Behavioural recognition is the future of video analytics and the next generation of the object classification analytics systems that hold the majority of the market today,” says Birenzvieg. viisights has developed a video understanding technology for real-time video processing “To date most video analytics systems still base their product features on static analysis of objects from images using image recognition, even the ones that use ‘AI analytics.’ Products built using such object classification technology are extremely limited.” For example, object classification analytics cannot recognise behavioural events in a video such as people fighting or a car collision because such behaviours can’t accurately be concluded in large scale from analysing a single static image/frame. Video understanding technology viisights has developed a video understanding technology for real-time video processing. The technology can process live video feeds. In addition to recognising a particular object (e.g., person) and its attributes (e.g., red shirt), the system can understand an object’s actions, interactions with other objects (events), the scene being viewed (i.e., crowd is gathering, riots) and the context (a car is driving on the road or on the sidewalk). The main verticals are smart cities, enterprises and campuses, banks and ATM security “Basically, we are able to extract more meaningful data from a live video feed and therefore create actionable insights and greater ROI,” says Birenzvieg. The company focuses mostly on security and safety use-cases. The main verticals are smart cities, enterprises and campuses, banks and ATM security, security guard companies and transportation hubs. The company is working on a new product for in-vehicle monitoring mostly for security, safety, vehicle protection and proper vehicle use; it monitors passengers’ behaviour inside a bus, train, or taxi. The product will come to market next year. Video management system viisights’ video analytics offering is currently optimised for server-side deployment, and the integration architecture is similar to most video analytics systems. From one side it is integrated with the video management system (VMS). They are a Milestone verified partner and soon will be part of Milestone's marketplace. From the other end, it is connected to a command-and-control system for processing the data and presenting the alerts to the end-user. The analytics company makes most sales through system integrators. They have partnerships with big system integrators like Motorola Solutions and NEC and are also working with smaller ones. They are looking to expand their system integrator network, mostly in the USA and Europe. Behaviours can have many variations and they can be very diverse Cloud video surveillance “We will continue to invest in performance and accuracy, meaning higher recall and lower false positive rate,” says Birenzvieg. “Since our major value proposition is in behaviour recognition, behaviour events many times are not clearly defined, which is very different from object classification. Behaviours can have many variations and they can be very diverse.” An example is a simple behaviour like a person falling on the floor. A person can fall on the floor in many ways, but the challenge is to ignore similar behaviours that are not a person falling and that confuse the system, such as a person bending over to tie his shoelaces. With cloud video surveillance becoming a trend, viisights is also looking into offering some of their advanced functionalities in a video-analytics-as-a-service-model.
An interim Federal Acquisition Rule (FAR) detailing how the U.S. Federal government will implement a ban on government use of video surveillance products from Chinese manufacturers has been released just days before the August 13, 2019, deadline for the ban to take effect. The interim rule will take effect immediately; it notes there are "urgent and compelling reasons… to promulgate this interim rule without prior opportunity for public comment". After the interim rule is published in the Federal Register, 60 days will be allowed for public comments to be submitted (tag comments and correspondence ‘FAR Case 2018-017’). The final rule will follow. The agencies issuing the interim rule are the Department of Defense (DoD), the General Services Administration (GSA), and the National Aeronautics and Space Administration (NASA). Banning Chinese video surveillance equipment The interim rule provides details about implementation of Section 889(a)(1)(A) of the NDAA for fiscal year 2019The interim rule provides details about implementation of Section 889(a)(1)(A) of the National Defense Authorization Act (NDAA) for fiscal year 2019, which the President signed into law on August 13, 2018, to take effect a year later. It bans government uses of telecommunications and video surveillance equipment produced by Hikvision and Dahua, among other companies. The interim rule also applies to telecommunications equipment produced by Huawei Technologies Company or ZTE Corp. (or any subsidiary or affiliate). Huawei manufactures HiSilicon chips widely used in video cameras. The interim rule requires inclusion of a clause prohibiting the listed telecommunications and video surveillance services on solicitations and/or resulting contracts that occur on or after August 13, 2019. Contractors who identify covered equipment during the performance of a contract are required to report it within one business day; and to report mitigation actions within 10 business days. The requirement is included in contracts with subcontractors. Identifying telecommunications equipment The rule requires submission of a ‘representation’ with each offer (government bid) to identify any covered telecommunications equipment or services that will be provided to the Government. The interim rule states: “DoD, GSA, and NASA recognise that some agencies may need to tailor the approach to the information collected based on the unique mission and supply chain risks for their agency.” The head of an executive agency can grant a one-time waiver on a case-by-case basis for up to a two-year period There is an option for contractors to "represent annually whether they sell equipment, systems, or services that include covered telecommunications equipment or services". A ‘no’ answer then applies to any contracts during the year. If a contractor answers ‘yes’, they are required to specify that each individual bid does not include the covered equipment. The head of an executive agency can grant a one-time waiver on a case-by-case basis for up to a two-year period. Waivers require a compelling justification, that the equipment be listed/reported, and that a phase-out plan is implemented. The Director of National Intelligence can also provide a waiver. Prohibits purchase of COTS items The interim rule also applies to purchase of commercial off-the-shelf (COTS) items: "Th[e] level of risk is not alleviated by the fact that the equipment or service being acquired has been sold or offered for sale to the general public... nor by the small size of the purchase." It prohibits ‘micro-purchases’ of covered products and services delegated by agency heads. The interim rule covers the NDAA Section 889(a)(1)(A), which is the ‘Chinese ban’ provision. It does not cover the ‘blacklist’ provision [Section 889(a)(1)(B)], which was the subject of a public hearing in July. According to the interim rule: "The prohibition in section 889(a)(1)(B) is not effective until August 13, 2020, and will be implemented through separate rulemaking." The ban also applies to current government installations, and there are questions about whether agencies and departments will comply in time.
After a period of rapid international expansion, the next step for Ajax Systems is to set deeper roots in each market and become more sustainable. The manufacturer of wireless security equipment will continue to extend the range of Ajax products and capabilities by responding to local requests. Smart home management options and automation scenarios will be a significant focus for the next year. Wireless security equipment The systems are resistant to false alarms, regularly update over the air Established in 2011 in Kyiv, Ukraine, Ajax Systems produces wireless security equipment for end users and small-medium-sized businesses. Ajax is a complete eco-system. The devices are ready to work out of the box. There are 24 devices for protecting residential and commercial properties from intrusion, fire, and floods as well as a set of automation modules. Users treat them as gadgets that make their homes smarter. Ajax wireless systems are easier to maintain, configure, and monitor for installers as well as for security companies, according to Ajax. The systems are resistant to false alarms, regularly update over the air, and can be easily expanded to cover premises of any size. IoT-based security systems “Our IoT-product approach to security systems, gadget-like industrial design, and user-friendly interfaces disrupted the market in 2016,” says Valentine Hrytsenko, Chief Marketing Officer at Ajax Systems. “After receiving global recognition in the security market, the company grew 80-fold.” Today, Ajax IoT-based security systems protect more than 200,000 people in 80 countries around the world from break-ins, fires, leaks and other threats. “Our mission is to reshape security and make it a common attribute of every household,” says Hrytsenko. Ajax wireless systems are easier to maintain, configure, and monitor for installers Ajax smart technology Ajax smart technology features a combination of reliable hardware and intelligent software. A proprietary Jeweller two-way radio protocol allows placing devices at a distance of up to 2000 meters from the hub in an open space. The system is encrypted, resistant to jamming and code grabbing. Ajax detectors feature false alarm-preventing algorithms: Haze Flow, ZOE, LISA, SmartDetect. The hubs run on a real-time operating system, Malevich OS that processes the commands and sends the alarms. Ajax Cloud service helps to control the system from anywhere in the world using native apps. Easy and seamless installation Ajax features system scalability, flexible management of administrative rights"Easy installation facilitates Ajax on-boarding. The company says 67% of Ajax users purchase additional security devices within the first six months. And an average system configuration consists of nine items. “We focus primarily on the residential, small and medium-sized businesses,” says Hrytsenko. “In the residential segment, Ajax covers the needs to detect break-ins, prevent fires and floods. Ajax devices are visually appealing to fit any home and business interior seamlessly. For the small and medium-sized business, Ajax features system scalability, flexible management of administrative rights, informative notifications, professional maintenance software, as well as integration of the security camera streams for centralised monitoring.” Route-to-market approach Ajax Systems’ route-to-market approach is two-fold. First, they develop strategic partnerships with the local professional security equipment distributors in each country. From the distributors, Ajax equipment goes to the installers, system integrators, security companies, etc. In addition, Ajax seeks to build brand recognition and actualise the concept of security by weaving it into the daily routine of a general audience. “We form a good understanding of their security needs,” says Hrytsenko. As with any new technology, there is an adoption curve for both B2B and B2C clients. Thus, the educational challenge is persistent for Ajax from country to country. Ajax Systems’ route-to-market approach is two-fold Wireless security systems “On a professional market, new products are often met with understandable suspicion,” says Hrytsenko. However, a huge misconception is that user-friendly equipment is either hard to customise or unreliable. Not true, he says. After testing in five accredited laboratories, Ajax devices successfully earned Grade 2 certification for compliance with the requirements of the international standard EN50131-1:2006. Grade 2 is the highest reliability grade a wireless security system can get.
Ping Identity, the provider of Identity Defined Security, announces its successful completion of the Financial-grade API (FAPI) conformance testing, as part of the process defined by Open Banking Ltd. This builds on Ping Identity’s previous success as the first identity platform to pass all 70 technical security tests, as set by Open Banking Ltd., with zero warnings. The most recent set of FAPI conformance testing evaluated the latest versions of the Ping Intelligent Identity platform, including PingFederate, PingAccess and PingDirectory, within a mock banking environment. Additional technical requirements It switches to an API model with structured data that utilises a token model such as Open Authorisation The inclusion of FAPI within the Ping Identity solution for Open Banking helps allow banks to overcome insecure practices such as screen scraping by using stored user credentials. Instead, it switches to an API model with structured data that utilises a token model such as Open Authorisation. FAPI is a technical specification developed as a multi-industry standard by the FAPI Working Group of OpenID Foundation (OIDF). It leverages OAuth 2.0 and OpenID Connect (OIDC) to define additional technical requirements for the financial industry and other sectors requiring higher security. For banks specifically, FAPI provides various advantages. This includes enabling applications to securely interact with financial accounts, while also enhancing the user’s ability to control security and privacy settings. Secure identity requirements In concurrence with the specification, OpenID Foundation maintains a cloud-based testing suite for conformance testing by banks, certified third-party security providers and platform vendors—such as Ping Identity. The Ping Intelligent Identity platform is used by hundreds of financial services enterprises, including many of the CMA 9 and Open Banking Ltd. itself. Additionally, FAPI is of increasing relevance to the growing number of new fintech start-ups in areas such as investment, wealth management, insurance, payments and even real estate. “This is significant beyond the Open Banking and financial services sector,” explains Rob Otto, EMEA Field CTO, Ping Identity. “Other digitally-focused sectors, with similar secure identity requirements, now have a proven template that can allow them to quickly deploy their own security controls, which have been stringently tested by the largest financial institutions in the UK.”
PerpetuityARC Training, part of the Linx International Group recently delivers a risk and crisis management workshop for Lafarge Egypt (part of the LafargeHolcim Group) in Cairo. The training provided senior managers from across the organisation with the knowledge and skills needed to manage resources during a crisis and operate within the organisation’s crisis management and compliance framework. The intensive programme was built collaboratively between PerpetuityARC Training and Lafarge Egypt and specifically tailored to its operating environment in the construction materials industry. Achieve successful resolution It was great to see them solving problems in a pressured, but safe environment" In a series of practical and theoretical exercises, Linx International Group Director, Angus Darroch-Warren, assessed and enhanced the ability and confidence of participants to apply their new skills to manage complex and evolving crisis scenarios, each requiring close collaboration between team members, in order to achieve a successful resolution. Security Director at Lafarge, Magdy Khorshid, stated: “The course was amazing, very practical and interesting to all and I received much positive feedback from all learners.” Angus commented: “The Lafarge teams engaged fully with the workshop scenarios. It was great to see them solving problems in a pressured, but safe environment, that allowed them to think through issues and respond using identified resources and procedures.” The workshop is the latest collaboration in a five year relationship between Lafarge Egypt and PerpetuityARC Training. During this time PerpetuityARC Training has delivered its security and risk related courses to employees and stakeholders in Egpyt and the UK.
"The safety of others has always been a matter close to my heart", says Hans Wetzlar, Managing Director of IHRE SICHERHEIT Security Service in Bielefeld. It was out of this motivation that he founded his security company ten years ago. Together with his team, he ensures, for example, that visitors to events and trade fairs can move around safely. Mobile ‘video guards’, using Dahua's powerful video surveillance technology, are now contributing to this. Video surveillance system Video surveillance is a new addition to the portfolio of security service providers Video surveillance is a new addition to the portfolio of security service providers. "This enables us to offer our customers a much wider range of services from a single source," says Hans Wetzlar: "Even the sight of a camera can deter potential perpetrators. The inhibition threshold increases. In our experience, this means less damage to property and less theft." And if 'someone dares', the course of events is completely documented. While searching for a reliable video surveillance system, the security expert quickly came across Kruse Sicherheitstechnik in Salzkotten. The idea to develop mobile ‘video guards’ arose from this cooperation. The compact housing of the video monitor contains a great deal of technology: four high-resolution HD cameras are attached to the 6-metre-high trailer, which can record a range of up to 200 metres using motion detectors. Wide-angle fixed cameras "When it comes to technology, we rely on Dahua Technology's products and solutions - and with good reason. The heart of this control station is the DSS server, which receives all signals from the video trailers. The advantage over other providers is that Dahua Technology's licenses are provided free of charge - regardless of whether a 4-channel or a 64-channel recorder," says Tobias Vieth of Kruse Sicherheitstechnik. The Starlight series has very good night vision and a high-performance infrared illuminator Two different camera types are mounted on the trailers: Two wide-angle fixed cameras and two Dahua Starlight series PTZ cameras. They can zoom to certain objects. The Starlight series has very good night vision and a high-performance infrared illuminator - allowing people to be seen from up to 300 metres away. Specialist trade partners "The feedback from our customers is consistently positive. Our video guard allows significantly better surveillance at the best price. With Dahua Technology at our side, we are well prepared for the future," says Hans Wetzlar. Dahua Technology remains on a growth course in Germany, Austria and Switzerland with a comprehensive benefits programme for its specialist trade partners. Reliable on-site support, permanent customer advisors, dedicated project support and technical support from Germany: The comprehensive services contribute to the fact that within a short period of time a three-digit number of specialist trade partners have decided to cooperate with Dahua Technology.
Mul-T-Lock supplies a high-end jeweller in London with CLIQ® locks in order to help the business manage access to cabinets holding valuable items. Stocking bespoke pieces and precious stones, the jeweller was looking for a high-level security solution that allowed sales personnel access to individual glass cabinets, without the worry that if one of the keys got lost or misplaced that they would have to replace the entire suite. Offering maximum security Over 50 CLIQ® cam locks from Mul-T-Lock were installed at the jewellers on each of the cabinets Over 50 CLIQ® cam locks from Mul-T-Lock were installed at the jewellers on each of the cabinets, offering maximum security with the added benefit of audit trail capabilities. These capabilities include the ability to schedule individual access permissions for each key, as well as to provide time-limited access. In the case of this particular jewellers, each member of staff was given access to a selection of cabinets at varying times, with individual permissions set by the administrator (those who manage the security system). For example, access could be set for only business hours, meaning that the cabinet could not be accessed at evenings or weekends. Similarly, each time a user opens a lock, it will be recorded in the system, meaning that the administrator can keep an eye on operations electronically. Careful consultation Specialist Mul-T-Lock integrator, Elelock Systems Ltd specified and installed the CLIQ® locks at the jewellers, after weeks of careful consultation with the business owner to better understand the store’s requirements. One of the biggest concerns for this particular jeweller was the threat of compromised security" Chrys Chrysostomou, Managing Director of Elelock said: “One of the biggest concerns for this particular jeweller was the threat of compromised security if cabinet keys were lost. Mul-T-Lock’s CLIQ® technology means you can revoke access in minutes, whereas with a traditional system you would have needed to replace the whole lock – costing time and money.” Hands-on training “With no cabling the system was easy to configure and install, making it suitable for a variety of applications. The store manager also received hands-on training from ourselves and Mul-T-Lock, alongside the jeweller’s head of IT and security representative.” Suresh Peri, Commercial & Technical Manager at Mul-T-Lock added: “Our CLIQ® system is ideal for retail applications where there are a number of members of staff who need access at varying times, or that require individual permissions for access to high security storage rooms, cabinets or drawers. “Being able to revoke access permissions when a member of staff leaves also allows retailers to uphold their security and reduce ongoing maintenance costs.”
As the largest and busiest commercial port in New Zealand, Port of Tauranga spans 190 hectares and handles in excess of 1500 ships and 840,000 TEU (Twenty-foot Equivalent Units) each year. The port is a bustling import and export gateway which relies on efficient processes and procedures to maintain superior operational activity. Being a large site, with unrivalled sea, road, and rail connections, Port of Tauranga has a strong focus on employing security and safety solutions which enhance and support workflow across the site. In 2004, Port of Tauranga faced new security challenges with the introduction of the International Ship and Port Facility Security Code (ISPS Code). Key security element The new code was developed following the attacks of September 11, 2001 on the United States, and prescribed new measures required by governments, ships, and ports, in order to continue shipping trade with North America. Gallagher’s access control system was installed at 12 road access gates Compliance with the ISPS code was enforced by Maritime New Zealand, giving ports throughout the country until the end of 2004 to become compliant with the new regulations. A key security element for Port of Tauranga to become ISPS compliant was restricting and controlling access on and off the port. Gallagher’s integrated access control solution was selected as the system to deliver this for Port of Tauranga. To manage the variety of entry and exit points, Gallagher’s access control system was installed at 12 road access gates, 4 rail access gates, and over 60 doors across the site. Access Control Solution Providing more than just standard card/reader access control, Gallagher’s Challenge feature gives the port an additional tier of security by utilising video integration. The Challenge solution enables operators the ability to check cardholder identities against a live image being taken at the access point. This feature reduced the number of staffed gates required, resulting in significant ongoing labour savings for Port of Tauranga. With a large number of people coming and going from the port on a daily basis, Port of Tauranga needed a robust system capable of effortlessly managing a large database. While the port has only 170 employees, there are currently 9,000 active cardholders. “A constant flow of trucks throughout the day is essential,” said Mike Letica, Manager of Security at the Port of Tauranga. “Trucks delivering containers cannot be backed up waiting.” The Gallagher access control solution, coupled with Gallagher’s Command Centre software platform, enables Port of Tauranga to restrict entry amongst the 9,000 cardholders to the specific areas they are authorised to work in, through the use of access groups and access zones. Plant washing facility The system provides the functionality for bulk changes to be easily applied to groups, ensuring the port staff’s database administration time is kept to a minimum. More than just controlling access on and off the site, Port of Tauranga needed an auditable trail of exactly who had accessed the site. Another key feature of Gallagher Command Centre being utilised by Port of Tauranga The Gallagher Command Centre platform provided the functionality for tailored reports on who had accessed zones and facilities, and at what time. “Some services available at the port, for example the plant washing facility and diesel pump, are billed back to the user” said Letica. “We needed a simple way of identifying users and this was achieved by having access control cards activate the facilities”. Another key feature of Gallagher Command Centre being utilised by Port of Tauranga is the scheduling function. Port security team Being able to adjust the access control schedule for the road and rail gates in support of peak operating times and statutory holidays provides greater control for the port security team, along with the ability to set schedules in advance. In 10 years, the operational activity at Port of Tauranga almost doubled. From approximately 32,000 trucks per month in 2004, to over 61,000 trucks and 24,000 cars per month in 2014, the volume and tonnage growth has been extensive. Despite both activity growth and site expansion, the Gallagher system has enabled Port of Tauranga to maintain the same number of security staff they had in 2004. Letica has confidence in the Gallagher solution supporting the port’s future expansion, “We believe we have a security system that has not only met our growth needs to date, but is going to continue to meet our needs in the future.”
It is one of Moscow’s most ambitious building projects: the VTB Arena Park was built on the site of the old Dynamo Stadium and revitalises the entire surrounding area with a multi-purpose concept. At an estimated cost of US$ 1.5 billion, the modern VTB Arena Park combines sports, entertainment, commercial and residential facilities. A first challenge arises from the sheer size of the project: The football stadium, known as Dynamo Central Stadium and home to FC Dynamo Moscow football club, hosts league matches with a capacity of over 26,000 spectators. The park’s indoor arena holds more than 12,000 guests during ice hockey matches, basketball games and rock concerts, while the 300,000 square-meter park area also offers retail facilities, a five-star hotel and 1,600-car parking garage. Protecting residential areas Considering the wide range of very different purposes served by these various buildings, it was clear from the project’s inception that a multitude of vendors and providers would be needed to cover all security needs. VTB Arena Park was looking for a partner able to tackle that key challenge From the security manager’s perspective, the main challenge was to ensure that these disparate systems would function together and allowed for central management of a wide array of functions such as: access control for tens of thousands of football fans entering the stadium on match days, monitoring the vast perimeter with its park zones, and protecting residential areas against intrusion. VTB Arena Park was looking for a partner able to tackle that key challenge – integration of all parts into one platform – and chose Bosch as its provider of end-to-end video security and access control. Intelligent video analytics Aside from the project’s complex technical ramifications, there was a particular system design challenge: Residents of the Arena Park should feel at home enjoying the highest quality of living, while the area also needs to accommodate for the influx of thousands of visitors within short periods. As the Bosch experts learned, the multi-purpose character of VTB Park leads to an equally wide range of different security needs among its users. Catering to the video security needs, Bosch installed a total of more than 2,000 video cameras, fixed as well as moving cameras, both indoors and outdoors, to safeguard the vast perimeter of the Arena Park premises and secure the homes and offices. One of the camera types installed for perimeter protection is the AUTODOME IP starlight 7000 HD. This high-definition camera offers excellent low-light performance thanks to starlight technology and also features built-in Intelligent video analytics. Access control systems The video analytics function automatically detects deviations from standard moving patterns The video analytics function automatically detects deviations from standard moving patterns, like a person entering a restricted area, and triggers an alarm that is sent to the control rooms where security staff can then zoom into a scene for closer investigation. As required by VTB Arena, all 2,000 cameras and connected video storage on Bosch recording units are managed centrally via the Bosch Video Management System (BVMS). Another particular challenge consisted of aligning the three different access control systems of the stadium running at the same time. The ticketing system is the first layer of access control, managing the turnstiles that permit entry of thousands of visitors during events with paper tickets. This access control system needed to integrate with the employee access control system that relies on proximity cards (the Access Engine provided by Bosch), as well as a third, offline access control system used at specific stadium facilities. Integrated security system As the Bosch experts in Moscow found out, such an integration was without historic precedent. Because no standard solution existed, the team devised a highly customised set-up managed centrally on the Building Integration System (BIS) from Bosch. “We were fully aware that the multifunctional character of the VTB Arena Park would lead to complexity that could hardly be topped. We needed integration power, a partner who knew how to bind all loose ends into one solution that had never existed before. Creating this one integrated security system catering to all the various purposes has made Bosch our main security partner,” said Alexander Kravchenkov, Deputy Head of Security Systems Maintenance Group IT Department at VTB Arena.
Round table discussion
Driven by technology developments such as voice recognition, smart devices and the Internet of Things, our homes are getting “smarter” all the time. Increasingly, we expect our residential environments to be responsive to our voice commands, whether we are adjusting a thermostat, turning on a light, or lowering the window shade. Smarter home integration yields new opportunities and challenges for home security, too, which contributes an element of safety and protection to the convenience aspects of smart homes. We asked this week’s Expert Panel Roundtable: How are new smart home systems impacting security?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditisation is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
Security systems: Manufacturers & Suppliers
- Dahua Technology Security systems
- Vicon Security systems
- Vanderbilt Security systems
- Bolide Security systems
- Seagate Security systems
- ComNet Security systems
- Bosch Security systems
- VIVOTEK Security systems
- MobileView Security systems
- Videotec Security systems
- Hanwha Techwin America Security systems
- Sony Security systems
- HID Security systems
- LILIN Security systems
- OT Systems Security systems
- BCDVideo Security systems
- MOBOTIX Security systems
- DSC Security systems
- CEM Security systems
- TESA Security systems