Access control manufacturer Inner Range will be rewarding lucky visitors to its stand with a drone every day of IFSEC International (June 18-20). Delegates who watch a demonstration of an Inner Range product will be invited to enter their details into the manufacturer’s flagship product, Integriti, and the system will randomly select a winner at the end of each day. Winners will receive a Holy Stone Mercury 3 racing drone, which can travel at 45km an hour and transmit HD video and aerial...
PAC & GDX, providers of access control and door entry solutions, are showcasing the range and depth of their innovative technology on Stand IF2930 at IFSEC International 2019. From a single door installation to a fully integrated network based system, the company’s extensive portfolio provides unbeatable reliability and robust functionality, at a price point that enables installation in a diverse range of residential and commercial buildings. In order to provide integrators and end us...
TAKEX Europe Ltd., renowned Japanese manufacturer of active and passive infrared perimeter intruder detection sensors, is slated to showcase their latest addition to their beam sensor family at this year’s IFSEC international at ExCel London, 18-20 June 2019. TAKEX detection sensors TAKEX detection sensors have been protecting people and property for more than 55 years, safeguarding domestic, commercial, and industrial premises and high-level Royal, Government, and military organisations...
Frontier Pitts will be exhibiting at the IFSEC Exhibition at Excel, London between the 18th and 20th of June 2019. Frontier Pitts will be showcasing a fully operational Secured by Design accredited LPS1175 Automatic Bi-folding Gate SR2 on the stand. This is the first automatic Bi-folding Speed Gate on the market to achieve Secured by Design accreditation and LPS1175 Security Rating! Many clients had been installing unrated Security Gates that had not been tested alongside LPS1175 security rate...
At IFSEC International 2019, Hikvision, the global supplier of innovative video surveillance products and solutions, will help launch the pioneering Secure by Default initiative, and unveil a host of its new product and technology developments. Secure by Default is a set of minimum requirements which for the first time will provide a guarantee for users that network video security products are as secure as possible in their default settings out of the box. Secure by Default will be launched by...
DICE Corporation announced the launch of an all new Video Verification App at the Electronic Security Expo (ESX) in Indianapolis last week. The Video Verification App is a completely mobile browser-based tool used in conjunction with DICE’s CloudEye cloud video recording solution. If an event triggered by an alarm system occurs, app users have more control of how alarm center interaction is handled by viewing live video surveillance and other essential account information. Video Verificat...
Matrix aims at increasing the networking opportunities by explaining decision makers the application of latest telecom and security solutions at the International Police Expo. The event organised on 19th and 20th July’19 gathers high level professionals of defence forces and gives them an overview of technologically advanced solutions. From telecom domain, Matrix will be showcasing enterprise meeting solution - PARISAT meeting server at the event. The conferencing server is engineered for 15 video and 150 audio participants enabling police force to collaborate from different locations and solve critical situations at the earliest. At the event, Matrix will exhibit pure IP Solution - PRASAR UCS that enables armed forces’ personnel to connect wirelessly from remote locations. Multiple connectivity options Matrix will showcase its aadhaar enabled biometric device Matrix Unified Communication Server – SARVAM UCS will also be highlighted at the event. Equipped to support radio ports and in-skin GSM connectivity, the solution enhances connectivity between field personnel helping them manage emergency situations effectively in less period of time. Matrix will also showcase its GSM and VoIP gateways that allows police and defence forces to make an easy switch to the modern network while retaining their existing infrastructure. Matrix will showcase its aadhaar enabled biometric device. It’s the only Linux based device available in Indian market with card and finger authentication. The device comes with multiple connectivity options like Wi-Fi, PoE, Ethernet and i.e. our Aadhaar based authentication device is purposely designed for marking attendance of government employees and is the only embedded device available in Indian market currently. Time-attendance solutions Matrix will be showcasing enterprise grade access control and time-attendance solutions engineered with features such as auto push events to server, automatic fingerprint distribution, instant notification, 300+ customised reports generation, scheduler services including backup and more. Furthermore, access control being the prime requirement in terms of security, Matrix will present its standalone access control solution with license free environment, whereby a single panel can handle up to 255 doors and 25,000 users. Get a glimpse into the cutting-edge Matrix biometric solutions with multiple credentials such as face, fingerprint, palm vein, RFID card and PIN options at International Police Expo. Matrix will also be showcasing an enterprise-grade video management system designed, engineered and built specifically for growing multi-location organisations. The entire solution focuses on automating processes and enhancing efficiency of organisations. Real-time security Matrix will be showcasing its new extreme series of Network Video Recorder (NVRX) at the event Matrix will also be showcasing a new range of audio compatible and compact professional series IP cameras powered by SONY STARVIS series sensors with EXMOR technology. This gives the cameras an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimisation, video analytics such as intrusion detection, perimeter security, loitering detection and many other features. Furthermore, Matrix will be showcasing its new extreme series of Network Video Recorder (NVRX) at the event. This NVR is equipped with 4K decoding capacity and characteristics like cascading (up to 20 NVRs), camera-wise recording retention, TCP notifications for remote locations and database level integration. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for real-time security. Products’ features and applications “We are enthusiastic about explaining our latest products’ features and applications to the key people of the defence industry. We will give brief insight on how our solutions can help the armed forces serve the society in a better way”, said Jatin Desai, Marketing Manager. Matrix cordially invites everyone to visit them at Stall Number: 21, International Police Expo 2019, Pragati Maidan Delhi on 19th and 20th July to have a sneak peek at the future of Telecom and Security solutions.
Sensor manufacturer, OPTEX Europe, returns to IFSEC during its 40th anniversary in 2019 to showcase two new solutions with visual verification at their heart: the enhanced version of its LiDAR range; and innovative RADAR technology Firstly, OPTEX provides a way to upgrade its best-selling 12m outdoor intrusion sensors to an app-based visual verification solution by introducing a Wi-Fi 180° day/night camera. The VXI-CMOD will send home and business owners immediate notification of an intrusion when it occurs, and a dedicated app provides access to the live view with sound, as well as the access to recorded pre and post event footage. Secondly, the intelligent visual verification solution for monitored alarm systems will be launched at IFSEC for the UK market. It consists of an innovative hardware, the OPTEX Bridge and a performant software package powered by CHeKT that takes separate intruder and ONVIF compliant CCTV technologies installed on the same site, but acting independently, and ‘bridges’ them to create one, seamless, integrated monitored solution. Intruder alarms can now effectively be visually verified. Display of compact surveillance radars Both REDSCAN series feature extended detection range, up to respectively 30m and 100mThe company will also be showcasing the enhanced short- and long-range LiDAR sensors. Both REDSCAN series now feature extended detection range, up to respectively 30m and 100m. The REDSCAN RLS-2020 is also now Grade 3 compliant opening up new opportunities for indoor applications. To detect and track people, vehicles, and drones in wide open areas, OPTEX will display compact surveillance radars manufactured by its business partner Spotter RF. “OPTEX is excited to be returning to IFSEC in the year of our 40th anniversary,” says Masaya Kida, Managing Director of OPTEX EMEA. “While we are proud of our heritage, we know that we can never stand still, and so we continue to design and innovate new products and solutions for an ever-changing world. Our management, sales, technical, marketing teams will be all present at the show to demonstrate the new sensors and visual verification solution as well as discuss any new opportunities.”
Suprema ID, global provider of biometrics and ID solutions, has announced that it will launch the new FAP30-compliant BioMini Slim 3 fingerprint scanner, at ID4Africa 2019 in South Africa on 18 - 20 June 2019. BioMini Slim 3 fingerprint scanner The new BioMini Slim 3 comes with the world's slimmest optical sensor. With the FAP30 compliant wider platen, the scanner now captures wider area of fingerprints which leads to better accuracy. The sensor's slim form factor also allows extra flexibility in design when loaded in the mobile devices. Featuring Suprema's latest deep-learning based LFD (live fingerprint detection) technology, the new BioMini Slim 3 effectively prevents spoofing with fake fingerprints with various materials including rubber, silicon, film and paper. Furthermore, BioMini Slim 3 is also equipped with Multi-Dynamic-Range technology that enables users to capture high-quality fingerprints under harsh environments and under direct sunlight up to 100,000 LUX. BioMini Slim 3 is designed to offer the best fingerprint authentication performance over dynamic environments" Fingerprint authentication technology "The new BioMini Slim 3 has been designed to provide the best reliable fingerprint authentication performance over dynamic environments such as outdoor and mobile situations. At Suprema ID, our commitment is to provide the best product beyond market expectation with the highest user's convenience and security," said Bogun Park, CEO at Suprema ID. At the show, Suprema ID will present full demonstrations of its BioMini series FBI-certified fingerprint authentication scanner as well as Suprema ID's new Android-compatible RealScan-G10 and RealScan-D scanners.
Matrox announces that the Alliance for IP Media Solutions (AIMS) Pro AV Working Group will be at InfoComm 2019 (booth 375) to promote the real-world benefits of open standards for AV over IP and interoperability within the pro AV space. AIMS will be presenting an education session, and the AIMS booth will be hosting educational presentations, and multi-vendor interoperability demonstrations that showcase the benefits of the SMPTE ST 2110 standard. The AIMS Pro AV Working Group’s mission is to define an open-standard approach to addressing the pro AV world’s move towards IP media. SMPTE ST 2110 is already the de facto accepted standard for broadcast — the goal in the pro AV space is for vendors to work together in the same way towards a single standard. Ensuring future-proofed interoperability When everything is based on a single open standard, users are able to mix and match the best products to suit the customer’s needs"“When everything is based on a single open standard, users are able to mix and match the best products to suit the customer’s needs,” says David Chiappini, vice president of research and development, Matrox Graphics Inc. “We have seen this approach work in the broadcast field with SMPTE ST 2110. It was built over many years by hundreds of stakeholders — from manufacturers, end users, and service providers — working towards a common goal. It is important to use the same strategy of education, engagement, and cooperation to ensure truly future-proofed interoperability.” Demos and presentations At the AIMS booth (375), the Matrox X.mio5 Q25 network interface controller (NIC) card will be used in an end-to-end, multi-vendor interoperability demonstration to showcase the SMPTE 2110 standard in action. The AIMS booth will also host several presentations geared towards the adoption of a single set of media-over-IP protocols. Andre Testa, director of ASIC/FPGA engineering at Matrox, will kick off each day’s sessions, presenting ‘Who is AIMS and What is SMPTE 2110?’, which will be followed by other AIMS members speaking on the adoption of open standards for AV over IP. When: Wednesday June 12 & Thursday June 13 Time: 10 a.m. – 3:15 p.m. Where: Booth 375 When: Friday, June 14 Time: 10 a.m. – 11:30 a.m. Where: booth 375 Presentations will be repeated several times during the show. Benefits of AV-over-IP infrastructures AIMS members will also be hosting a panel session titled ‘Audio and Video Streaming Using Established Standards’. Show attendees are encouraged to attend to discover the benefits of truly flexible, scalable, and interoperable AV-over-IP infrastructures. AIMS members will speak on the following: “The Origins of Audio Over IP and the Need for Standards,” Richard Zwiebel, Vice President, Systems Strategy, QSC “There’s Nothing to Be Afraid of With SMPTE ST 2110,” Andrew Starks, Director of Product Management, Macnica “The Open Standards-Based Method for AV Over IP,” Scott Barella, Chief Technology Officer at Pesa and Deputy Chairman of AIMS ProAV Working Group “Next-Gen IP for Networked Media — Collision or Convergence?” Karl Paulsen, Chief Technology Officer, Diversified When: Tuesday, June 11 Time: 1-3 p.m. Where: Room W304E (Session IS020)
From June 11th to 13th Gradiant has an important appointment in London. For a few days, the city is becoming the capital of identity recognition technologies to transact in a seamless, yet secure manner. Identity Week is the largest technology fair focused on the concept of identity in Europe and this year brings together more than 3,000 international industry actors in three world-class events: Digital:ID, Planet Biometrics and Security Document Week. Forensic and face recognition solutions In this international scenario, Gradiant is showing forensic technologies and face recognition solutions at booth D28 (Digital: EXPO, ExCel London) to automate digital onboarding and Know Your Customer (KYC) processes in a reliable way, as well as prevent document fraud on Internet. Providing security when we need access to personal data is fundamental in order to incorporate technology into the day-to-day activities we carry out in the actual digital society. Facial recognition is positioned as one of the most reliable techniques to incorporate into user registration processes Facial recognition is positioned as one of the most reliable techniques to incorporate into user registration processes, both to register new customers and to provide secure access to personal data in digital onboarding processes (electronic identification of the customer that allows the remote goods and services contract). Most of the time, these processes require to verify that the ID document - ID, passport or driver's license - registered in the system matches with the user's identity in an unmistakable way; but it is also important to incorporate other techniques that collect more information about the client and analyse possible manipulations carried out in the identity document, in order to ensure secure remote client's discharge. Valida by Gradiant forensic tool “In London we are going to show Valida, our forensic tool to detect manipulations in digital documents. In January we received our second selection to present this solution at the CES in Las Vegas and we continue to show it at MWC in Barcelona and RSA in San Francisco,” explains Daniel Ramos, International Business Development Manager at Gradiant. "Now it's time to bring Valida to the UK, to Identity Week, where the world's leading document security vendors come together.” Valida by Gradiant’s main goal is to evaluate the authenticity of digital documents to prevent fraud in online user verification, digital on boarding and Know Your Customer (KYC) processes. This technology developed by Gradiant, in collaboration with atlanTTic research center of Universidade de Vigo, allows companies to offer an extra level of security in this operations, as it automatically analyses any type of identity document (and other PDF and JPEG files such as payroll, invoices, receipts, etc.) to detect possible spoofing attacks and forgeries in the data present in these files. faceIDNN facial recognition technology Gradiant is also showing in London faceIDNN to verify user’s identity by comparing the face with the photograph in his/her ID In addition to forgery detection technology for digital documents, Gradiant is also showing in London faceIDNN to verify user’s identity by comparing the face with the photograph in his/her ID, driver’s license or passport. Using both images, techniques developed by Gradiant verify in real time if they belong to the same person. The company’s experience in facial recognition has allowed to develop techniques for anti-spoofing attacks, as well as guaranteeing verification despite significant appearance changes have happened against the photo in the ID card, or if the person has aged. faceIDNN has been co-funded by Xunta de Galicia (Galician Regional Government) by Ignicia Programme (IN8555A IGNICIA Proba de Concepto) Biometric technologies In order to complement this verification, Gradiant has developed biometrics of signature, voice and video (liveness detection) to be incorporated in the processes of digital onboarding as a second authentication factor, in order to prove the customer is who he claims to be. “Our solution focuses on taking advantage of digital onboarding process in order to collect other types of information that provide us with a higher level of security in their verification, such as their signature, voice or video," says Ramos. "We have these three biometric technologies and we can implement them together or separately.” More and more businesses are born 100% digital and more traditional ones are joining the digitised world. Some of these businesses need to verify the identity of their customers remotely and ensure. This is the case of banks, which currently can register new customers without them physically going to bank offices. Biometric verification solutions These entities have a legal obligation to know the identity of their customers as required by the 4th European Anti-Money Laundering Directive In addition, these entities have a legal obligation to know the identity of their customers as required by the 4th European Anti-Money Laundering Directive, in order to comply with the Know Your Customer (KYC) and Anti-Money Laundering (AML) requirements. This European directive aims to prevent problems such as corruption, illegal financing, and money laundering, among others, to combat illegal transactions in the digital environment. Gradiant's biometric verification solutions are a complete choice to ensure security through face, signature or voice customer identification and to prevent fraud in digital files. These solutions can also be effective in sectors such as gambling (to identify if users are old enough to access these services), sharing economies (where there is a digital transaction between at least two people), dating, telcos, insurance, e-commerce and hotels.
CNL Software, globally renowned Physical Security Information Management (PSIM) software firm, is pleased to announce that it will be showcasing the latest enhancements to its IPSecurityCenter PSIM solution as an ecosystem partner on the MOBOTIX stand IF1330 at IFSEC International 2019. MOBOTIX is a global manufacturer of high-quality intelligent IP video systems and sets standards for innovative camera technologies and decentralised security solutions with the highest level of cybersecurity. IPSecurityCenter PSIM solution CNL Software will demonstrate how its PSIM technology helps increase situational awareness, integration and management of vast estates of sensors, systems and devices as well as a wide range of enhancements to enable large-scale federated systems to support critical national infrastructure. With over 15 years of development, IPSecurityCenter leads the PSIM market with its features With over 15 years of development, IPSecurityCenter leads the PSIM market with its features, performance and sophistication and boasts a continuous development program that recently added advanced biometric authentication to the platform. Ever-increasing global IoT devices Every year billions of dollars are spent developing new technology to help reduce new threats as they emerge. And this means more data. By 2025 there will be 75 Billion Internet of Things (IoT) devices online, that is almost 10 devices for every person. CNL Software will discuss what this means for the industry and how security professionals can help to prepare for more information inside of the control room. “We are delighted to partner with MOBOTIX at IFSEC and look forward to meeting with their extensive ecosystem to discuss how we can build on our technical partnership," says Adlan Hussain, VP Marketing - CNL Software. "One of our strengths is our ability to work with leading technologies within the security, life safety and facilities management industries. We have developed an open platform and adopted an open approach to working with our partners which enables the creation of cutting-edge solutions that leverage data to solve complex security challenges.” Mission-critical security systems Providing a single view of all of an organisation's mission-critical security systems, IPSecurityCenter helps increase emergency preparedness, deliver intelligence to the point of need and provides process guidance to enhance security responses. Beyond the timesaving and efficiency benefits of automation, IPSecurityCenter enables processes that are essential to any modern security department; including scheduled reporting, dashboard overviews, incident logs, continuous process improvement initiatives, training drills, system healthcare checks and much more.
Thousands of security professionals gathered Nov. 14-15 at the Javits Center in New York City to explore new products, solutions and technologies, network with security luminaries and obtain high-quality industry education. ISC East, sponsored by the Security Industry Association (SIA), is the Northeast’s largest security industry event; more than 7,000 security professionals attended or exhibited at this year’s conference. Following day 1 of ISC East, SIA gathered industry luminaries and experts for SIA Honors Night, an annual event featuring a cocktail reception, a gala dinner benefiting Mission 500, engaging entertainment and an awards ceremony recognising industry leaders. Sold-out event SIA Honors Night 2018 was a sold-out event held at the Current at Chelsea Piers. The awards presented at SIA Honors Night 2018 were: SIA Progress Award (presented by SIA’s Women in Security Forum) – Eddie Reynolds, president and CEO, iluminar Inc. Women in Biometrics Awards (co-founded by SIA and SecureIDNews and co-presented with sponsors FindBiometrics, IDEMIA and SIA’s Women in Security Forum) – Kelly Gallagher, senior account manager at NEC Corporation of America; Lisa MacDonald, director of the Identity Management Division in the Office of Biometric identity Management at the U.S. Department of Homeland Security; Colleen Manaher, executive director of U.S. Customs and Border Protection; Lora Sims, senior biometric examiner at Ideal Innovations, Inc.; and Anne Wang, director of biometric technology research and development at Gemalto Cogent SIA Insightful Practitioner Award – Guy M. Grace, Jr., chair of the Partner Alliance for Safer Schools Steering Committee and director of security and emergency planning for Littleton Public Schools in the Denver suburb of Littleton, Colorado Jay Hauhn Excellence in Partnerships Award – Larry Folsom, co-founder and president, I-View Now George R. Lippert Memorial Award – Pat Comunale, retired security industry veteran, former member of the SIA Board of Directors and former CEO and president for Tri-Ed Distribution, an Anixter company Standout keynotes SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States Honors Night guests enjoyed keynote remarks from Bonnie St. John, a Paralympic ski medalist, Fortune 500 business consultant, Rhodes scholar, former White House official and best-selling author. St. John discussed her journey to become the first African-American ever to win medals in Winter Olympic competition despite having her right leg amputated at age five and shared her top lessons from mentors and her advice for cultivating resilience. SIA Honors Night also highlighted Mission 500, a charity that advocates for children and families living in extreme poverty in the United States; each year, SIA Honors Night raises funds for Mission 500. SIA presented 26 engaging education sessions through the SIA Education @ ISC East program, including two standout keynotes and four hands-on workshops. Hundreds of conference attendees participated in these sessions, with impressive speakers like Valerie Thomas, ethical hacker and executive consultant at Securicon; Pierre Bourgeix, president at ESI Convergent; Scott Swann, president and CEO of IDEMIA National Security Solutions; and Jumbi Edulbehram, regional president – Americas, Oncam. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event Confronting emerging threats Highlighted education sessions at this year’s conference included: Friend or Foe? Technology Disruption and the Physical Security Industry, a keynote address by Philip Halpin, senior vice president and head of global security at Brown Brothers Harriman, one of the country’s oldest and largest privately held financial firms 21st Century Best Practices: Reporting From the Front Lines on How Law Enforcement and the Security Industry Are Confronting Emerging Threats, a keynote address by James A. Gagliano, a retired FBI supervisory special agent, CNN law enforcement analyst and adjunct assistant professor at St. John’s University Cybersecurity professionals ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo Additional cutting-edge topics covered in the education sessions included the move to smart cities, convergence in the security industry and the use of artificial intelligence in video analytics. ISC East 2018 was co-located with two additional conferences – Infosecurity North America and Unmanned Security Expo. SIA sponsored Infosecurity North America’s Keynote Stage, the central hub of the event, which featured a presentation from world-famous hacker Kevin Mitnick, insights from Dave Hogue of the National Security Agency’s Cybersecurity Threat Operations Center, a discussion on the cyber skills shortage gap and ways to attract, develop and retain talented cybersecurity professionals and more. Handle sensitive data Additional events at ISC East 2018 included: A breakfast presented by ISC Security Events and SIA’s Women in Security Forum featuring a panel discussion celebrating women in security and supporting the participation and advancement of women in the industry Paid hands-on workshops providing cutting-edge information and valuable insights on the most current business trends, technologies and new developments in security Free exhibitor product training sessions sharing live, in-depth demonstrations A meeting with SIA’s Data Privacy Advisory Board, which provides information and best practices to help SIA members handle sensitive data in a safe and secure manner to protect the personally identifiable information of their employees, partners and customers from potential breaches
Artificial intelligence and machine learning are the rage in tech right now and not surprisingly, many cyber companies are beginning to automate an increasing amount of their operations. Some of this is great, particularly when it assists cybersecurity professionals to automate mundane tasks and focus more of their attention on higher level analysis. But so far, machine learning is more hype than helpful for cybersecurity, but that does not mean you can’t automate some tasks to keep your organisation safe. Effective machine learning applications At its most basic, machine learning technology is supposed to enable cybersecurity companies to predict the nature of future attacks based on past behaviour, similar to how Netflix displays what you want to watch based on what you’ve previously viewed. According to Jack Gold, president and principal analyst at J. Gold Associates, this innovation can assist cyber companies to transition away from a “signature-based” system to detect malware. Instead, he sees more companies adopting a machine learning approach that aims to analyse past incidents in a broader manner and aggregate information from a multitude of sources. Machine learning technology is supposed to enable cybersecurity companies to predict the nature of future attacks Specifically, some machine learning applications for cybersecurity are effective at doing the following: detecting malicious activity, helping security officers determine what tasks they need to complete in an investigation process, analysing mobile endpoints, decreasing the number of false positive threats, automating repetitive tasks like interrupting ransomware, and potentially closing some zero-day vulnerabilities. A number of tech giants have invested in these capabilities recently, including Google, which is employing machine learning to help protect Android mobile endpoints. Amazon also bought a startup called harvest.AI to help it aggregate and better understand data located on the S3 cloud storage service. Limitations of AI for cybersecurity That said, the signal-to-noise ratio for threat intelligence-type automation events isn't effective for most organisations at the moment. The reality is automating threat intelligence - or in other words, identifying adversaries automatically - is difficult to execute within an organisation because every company’s threats, vulnerabilities, and risks are unique. Ultimately, machine learning can help cybersecurity outfits, but it can’t replace many important functions. In an article for Forbes, Alexander Polyakov explains well why machine learning’s applications for cybersecurity are limited. He writes, “There will always be a person who tries to find issues in our systems and bypass them. Therefore, if we detect 90% [of] attacks today, new methods will be invented tomorrow.” Cybersecurity outfits can pair their human intellect with machine technology to catch hackers before they do too much damage Put in another way, there is a reason that machine learning is very good at predicting events like the weather. As McAfee CTO Steve Grobman described at McAfee MPOWER, their annual security conference, the weather abides by laws of physics. So even with phenomena such as global warming, the weather will largely act in the future based on how it has been in the past. Pairing human intellect and machine technology Cyber attacks, meanwhile, are the complete opposite. Hackers become smarter, and are always one step ahead of cybersecurity officers, inherently and frequently shifting their strategies so that CISOs will not detect them. For all the incidents machine learning technology can identify, which is helpful, there will always be sophisticated attacks that no machine learning algorithm will be able to find. It is also worth stating a simple fact: Humans hack. While they may use fancy technology to deploy these attacks, it is a human-led effort. Therefore, at the highest level, cybersecurity officers will be the only force able to stop hackers from penetrating critical networks. Machines don’t fully understand us. Only humans can still (and probably always) comprehend hackers’ larger strategy. Instead, cybersecurity outfits can pair their human intellect with machine technology to sort through data faster and catch hackers before they do too much damage. No cybersecurity company should be led by robots -- and that’s a good thing.
The physical security industry is rapidly changing, ever evolving, and one that is growing faster than most other sectors of the greater global market. The latest research shows that the forecasted growth rates will be a compound average growth rate (CAGR) of 7.2% and a total market revenue opportunity of $41.27B through 2022. These economic indicators make the industry a very attractive investment for entrepreneurs and for investment from large corporations from other industries. At ISC West 2018, this was extremely evident as there was a palpable buzz from technologies such as artificial intelligence (AI), machine learning, cloud-based video management systems and cloud-based access control systems. New market entrants such as Amazon, and a seemingly increased interest and investment from the likes of Intel, IBM, and even Microsoft were present and contributed strongly to the buzz of the industry’s largest tradeshow.The global managed security services market is projected to reach nearly $40.97 Bn, with a CAGR of 16.6% over the next five years Need for education and enhanced security With the increased profile of the industry, one can clearly see that the physical security industry is expanding globally to new consumers; bringing with it an increased need to further secure products and services with comprehensive physical and cybersecurity protocols and the need for education. This convergence of physical security and cybersecurity will create new industry leaders that will emerge to lead a new segment of the combined market through strong investment and leadership. According to a report published from Allied Market Research (AMR), the global managed security services market is projected to reach nearly $40.97B, with a CAGR of 16.6% over the next five years. Correlating these two market data points, the forecast for the physical security market is expected to have nearly 18% of the total market opportunity comprised of cloud services at nearly $7B. Sharing security service best practices In September 2017 at the Cloud+ Conference in Austin, Texas, the leaders of the Access Control as a service (ACaaS) and Video Surveillance as a Service (VSaaS) markets, converged to share industry trends, observations of customer adoption, best practices in implementation and service, financial models, and several in-depth discussions on securing physical security of cloud implementations through cybersecurity. The physical security market will have nearly 18% of the total market opportunity comprised of cloud services These cybersecurity discussions absolutely dominated every discussion with the clear message that as a cloud service provider, manufacturers and integrators must continue to create robust and scalable cybersecurity offerings to protect customer data and facilities. Interestingly, an analysis of all of the past cyber breaches was presented by keynote speaker Dean Drako of Eagle Eye Networks, who, through a powerful visual diagram, noted that all existing breaches in the physical security industry were entirely on manufacturer provided hardware solutions; VMS physically installed on customer premises, and camera specific vulnerabilities across multiple providers.Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to core physical security engineering expertise Cloud versus non-cloud services The insight that one was able to glean from this information and, that of a greater analysis of cybersecurity hacks across all industries, was that manufacturers and providers of cloud services were more secure and reliable by orders of magnitude than non-cloud solutions. The reason for these phenomena also became glaringly evident; the security protocols of a cloud service provider is central to the business’s value proposition and as such should be addressed across all levels of manufacturing, implementation, and customer utilisation. Conversely, non-cloud deployed products rely on field implemented cyber strategies from integrators and end users which often expose lack of skills, education and budget to fully secure these physical security products. Ensuring successful deployment As a SaaS service provider, the technical personnel makeup results in an expansion of staff and expertise. Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to core physical security engineering expertise to ensure that the product developed can be successfully implemented and deployed.Implementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware. These new jobs in the physical security industry will astronomically expand as the market continues to grow $6 Bn in a little over 4 years providing new opportunities to existing and new personnel to enter the industry. As a leader in access control hardware and an ACaaS provider, ISONAS has taken it upon themselves to implement a process to ensure that their customers can easily implement their products and gain great peace of mind in regard to the security of the solutions. Data security strategies Implementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware. This means employing high-level, seasoned cloud deployment experts to create a strategy in our AWS infrastructure and all ancillary supporting technologies to minimise attack surfaces, create complex, proprietary associations in a multi-layered and multi-tiered connection throughout the application and lastly ensuring that all communication to and from customers’ devices are encrypted and secured. Implementing a process to protect customer’s data records and facilities begins with mapping out a strategy to secure software and hardware Once implemented ISONAS took it upon themselves to validate the infrastructure and the customers experience by subjecting the environments to 3rd party penetration tests. Addressing cyber threats These tests, taken up quarterly, ensure a customer that the latest in cyber threats are being addressed and that the manufacturer is providing the latest solutions available in the market.Integration implementation personnel should gain greater knowledge in networks and cybersecurity best practices for their solutions An added benefit is that customers gain the scalable benefits of enterprise corporate cybersecurity protocols at a fraction of the cost of implementing these on their individual premises. As an industry, however, it is not simply the responsibility of the cloud service provider to ensure that the customers data in video and access control are being protected. It is also incumbent on the integrator to ensure that the installation and implementation of the products and solutions are deployed in an educated and skill-based manner. Knowledge of networks and cybersecurity best practices The products and services utilised must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply. Nearly all manufacturers of these products are working diligently to ensure that the integrator has all of the tools at their fingertips to ensure a successful implementation. However, it will remain important that the integration implementation personnel gain a greater knowledge in networks and cybersecurity best practices for their solutions.The products and services utilised must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply In most cases, this will mean additional jobs for new higher-level personnel, access to additional services to provide to end users, and an elevation of networking and security expertise within their business. Expanding the reach of physical security These new-found skills and expertise will likely bleed into new markets and expand the reach of the traditional physical security market. It truly is an exciting time to be a part of a rapidly expanding market in the physical security space and to watch the industry react to the growing need for cybersecurity within products and services. In the next four years, there will be new innovations, new investments, and new winners and losers in products and services. It seems clear that those integrators and manufacturers who have begun to create the strategies and products for tomorrow will be well ahead of those who are not actively addressing the need for SaaS products, yet the window to opportunity remains wide open.
IFSEC Global, like any large trade show, can be daunting for attendees. At big shows, there can be hundreds of physical security manufacturers and dealers vying for your attention. As the scope of physical security expands from video surveillance and access control to include smart building integrations, cybersecurity and the Internet of Things (IoT), there is an increasing amount of information to take in from education sessions and panels. With IFSEC Global approaching next week, we present eight hints and tips for visitors to make the most out of trade shows: 1. Outline your objectives As the famous saying goes, “Failing to plan is planning to fail!” Once you know your objectives, you can start to research who is exhibiting Before you plan anything else, ensure you know what you need to achieve at the show. By clearly noting your objectives, you will be able to divide your time at the show appropriately, and carefully choose who you speak to. If there is a particular project your organisation is working on, search out the products and solutions that address your security challenges. If you are a security professional aiming to keep up with the latest trends and technologies, then networking sessions and seminars may be more appropriate. 2. Bring a standard list of questions Prepare a list of specific questions that will tell you if a product, solution or potential partner will help you meet your objectives. By asking the same questions to each exhibitor you speak to, you will be able to take notes and compare their offerings side by side at the end of the day. This also means you won’t get bogged down in details that are irrelevant to your goals. 3. Do your homework Once you know your objectives, you can start to research who is exhibiting and decide who you want to talk to. Lists of exhibitors can be daunting, and don’t always show you which manufacturers meet your needs. Luckily, most trade show websites provide the option to filter exhibitors by their product category. Once you know your objectives, you can start to research who is exhibiting and it may be easier to download the floor plan to your phone/tablet Many exhibitions also offer a downloadable floor plan, grouping exhibitors by product category or by relevant vertical market. It may be easier to download the floor plan to your phone/tablet or even print it out, if you don’t want to carry around a weighty map or show-guide. 4. Make a schedule Once you have shortlisted the companies you need to see, you can make a schedule that reflects your priorities. Even if you are not booking fixed meetings, a schedule will allow you to effectively manage your time, ensuring you make time for the exhibitors you can’t afford to miss. When scheduling fixed meetings, keep the floor plan at hand If the trade show spans several days, aim to have your most important conversations early on day one. By the time the last afternoon of the show comes around, many companies are already packing up their booth and preparing to head home. When scheduling fixed meetings, keep the floor plan at hand to avoid booking consecutive meetings at opposite ends of the venue. This will ensure you can walk calmly between stands and don’t arrive at an important meeting feeling flustered! 5. Make time for learning If you’re on a mission to expand your knowledge in a given area, check the event guide beforehand to note any education sessions you may want to attend. Look for panels and seminars which address the specific needs of your project, or which will contribute to your professional growth. This is one of the best opportunities you will have to learn from industry leaders in the field. Be sure to plan your attendance in advance so you can schedule the rest of your day accordingly. Check the event guide beforehand to note any education sessions you may want to attend and be sure to plan your attendance in advance 6. Keep a record Armed with your objectives and list of questions, you will want to make a note of exhibitors’ responses to help you come to an informed decision. If you’re relying on an electronic device such as a smartphone or tablet to take notes, you may like to consider bringing a back-up notepad and pen, so you can continue to take notes if your battery fails. Your record does not have to be confined to written bullet points. Photos and videos are great tools remind you what you saw at the show, and they may pick up details that you weren’t able to describe in your notes. Most mobile devices can take photos – and images don’t need to be high quality if they’re just to refresh your memory. 7. Network – but don’t let small talk rule the day It may seem obvious, but don’t forget to exchange business cards with everyone you speak to It may be tempting to take advantage of this time away from the office to talk about anything but business! While small talk can be helpful for building strong professional relationships, remember to keep your list of questions at hand so you can always bring conversations back to your key objectives. Keeping these goals in mind will also help you avoid being swayed by any unhelpful marketing-speak. It may seem obvious, but don’t forget to exchange business cards with everyone you speak to, or even take the opportunity to connect via LinkedIn. Even if something doesn’t seem relevant now, these contacts may be useful in future. Have a dedicated section in your bag or briefcase for business cards to avoid rummaging around. 8. Schedule time for wandering With your most important conversations planned carefully, there should be time left to explore the show more freely. Allowing dedicated time to wander will give you a welcome break from more pressing conversations, and may throw up a welcome surprise in the form of a smaller company or new technology you weren’t aware of. Allowing dedicated time may throw up a welcome surprise in the form of a smaller company or new technology you weren’t aware of Security trade show checklist Photo Identification: As well as your event pass, some events require photo identification for entry. Notebook and pen: By writing as you go, you will be able to compare notes at the end of the day. Mobile device: Photos and videos are great tools to remind you what you saw at the show, and may pick up details you missed in your notes. Paper schedule and floor plan: In case batteries or network service fail. Business cards: Have a dedicated pouch or pocket for these to avoid rummaging at the bottom of a bag. Comfortable shoes: If you’re spending a whole day at an event, and plan on visiting multiple booths, comfortable shoes are a must!
The focus of the global security industry will shift to London this month for IFSEC International, Europe’s ‘integrated’ security event focusing on the latest technologies and the opportunity to learn from the industry’s top leaders and experts. IFSEC will be held from 18-20 June, 2019, at ExCel London, welcoming 27,000 security directors and managers, installers, integrators and distributors. The exhibition at IFSEC may not be as large as previous years, and several big players are conspicuously absent. Even so, there will be plenty of innovation on display, including big exhibitors such as Avigilon, Axis, Dahua, dormakaba, FLIR, Genetec, Hanwha Techwin, HID Global, Hikvision, IDIS, and Uniview. Exhibitions will likely reflect a continuing shift in emphasis away from individual products and toward integrated solutions, including some end-to-end solutions provided by single manufacturers. Also, likely to be abundantly evident at IFSEC will be a trend toward manufacturers who partner together to provide integrated solutions. For example, look for some manufacturers to host other manufacturers at kiosks within their stands. Texecom will explain the value of training and digital services and their impact on the future of the industryValue of security training Emphasis will continue to be on the practical aspects of using technology: Throughout the show floor, designated technicians wearing ‘Show Me How’ badges will provide demonstrations of products and solutions on display at the various stands. Texecom will explain the value of training and digital services and their impact on the future of the industry. The Loss Prevention Certification Board (LPCB) Attack Testing Zone features LPCB’s security experts conducting live attack tests on a range of perimeter and façade security products, as well as safes, security enclosures and padlocks. More than 35 hours of seminar sessions will cover timely topics such as ‘Future Proof your CCTV Networks’, ‘Social Media and Internet Security’ and ‘AI and Machine Learning for Security’. Security topics at the Keynote Arena This year, topics will include video analytics, AI, machine learning, GDPR, Brexit and security in smart citiesThe new programme will replicate last year’s successful changes. The Keynote Arena will again be placed at the heart of IFSEC, sponsored by Western Digital. The Keynote Arena will host influential speakers and real-life case studies to inspire attendees. Topical issues will take front and centre, from cybersecurity to ethical and legal challenges to extremism. This year, topics will also include video analytics, AI, machine learning, GDPR, Brexit and security in smart cities. The Future of Security Theatre will present CPD-accredited sessions and presentations that share a vision of the industry’s future and answer burning questions about critical topics, technologies and issues. Education partner Tavcom will present the programme of education dedicated to the ideas, products and innovations driving the industry’s development. The Converged Security Theatre will highlight new approaches that combine cyber and physical defences to tackle dangerous security threats. Included will be real-time technical solutions enhanced by artificial intelligence, powered by Vidsys and partners. Participation by government organisations The Government Pavilion will feature representatives from government bodies such as JSaRC, DIT, and DSOFor the third consecutive year, The Government Pavilion will feature representatives from government bodies such as JSaRC (Home Office & Counter Terror Unit), the Department of International Trade (DIT), and the Defence & Security Organization (DSO). New this year will be participation by the British Transport Police. IFSEC 2019 will again present a snapshot of how manufacturers from across video, access control and intrusion detection are continuing to innovate and collaborate to stay competitive in the challenging market. Innovations first unveiled in the spring at the ISC West 2019 show in the United States will be promoted anew for the European and global markets. IFSEC will be co-locating with FIREX International, a dedicated fire safety event that attracts 18,000 fire prevention and protection professionals; the FACILITIES Show highlighting building management and workplace technologies; and the Safety & Health Expo, dedicated to innovative health and safety products. IFSEC attendees can access the Smart Buildings Expo, the Workplace Wellbeing Show, and the Sprinkler & Suppression Presentation Area within the co-located events.
The Electronic Security Expo (ESX) will be held at the Indiana Convention Center, June 3-6, in Indianapolis. The show focusses exclusively on the electronic security and life safety industry, including companies that service the connected Internet of Things (IoT) space for homes and businesses. The ESX Main Stage will highlight inspirational presentations from motivational speakers, Dr. Rick Rigsby and Kevin Brown. In addition, there will be a founder of a drone security company and an Entrepreneur-in-Residence from Kleiner Perkins for OpenXchange, and a Secret Service agent for the Closing Keynote. Sharing best practices and trends In breakout sessions, colleagues and business thought leaders will share best practices, trends and opportunities that helped their own companies and careers, so that others might replicate their successes or minimise their failures. These sessions are aimed at propelling attendees to reimagine their business models and go-to-market strategies, says George De Marco, Chairman of ESX and Managing Partner for DECO Ventures LLC. Examples of breakout sessions include: CounterPoint Forum – “False Alarm Dispatches - A Real Threat or a Nuisance to the Industry?” “Top 3 Ways to Grow Your Video RMR” “5 Faster, Smarter Ways to Improve Cash Flow” “Artificial Intelligence Real Time Video Monitoring Solutions” Promoting security professionals’ growth Our goal is to develop next-gen methods that deliver industry content and promote professional growth"“Each year, we challenge ourselves to raise the bar of the educational sessions and main stage events,” says De Marco. “One of the ways is introducing new faces and voices for the peer-developed and peer-driven educational sessions that offer best practices and identify trends, opportunities and challenges for industry professionals to consider today and in the future. Our goal is to develop next-gen methods that deliver industry content and promote professional growth as the industry pivots to the future.” New entrants and disruptors are challenging traditional go-to-market strategies, causing traditional companies to rethink how they rise above the noise in a changing competitive landscape and handle new consumer buying behaviours, says De Marco. Exhibitors at ESX Exhibitors that support ESX include Interlogix (Diamond sponsor), Napco (Platinum sponsor), Alula and DMP (Gold sponsor), and ADI, Altronix, Bold Group, Essence, ICT, Quick Response, Resideo, Secura key, Security Central and WeSuite (Silver sponsors). ESX seeks to connect exhibitors with the influencers and decision-makers from companies that represent a cross section of dealers, integrators and monitoring companies in North America. The exhibit hall will be the focal point for exhibitors to showcase their latest technology in the city’s impressive convention centre. The exhibit hall will be the focal point for exhibitors to showcase their latest technology in the city’s convention centre “We recognise individuals and companies during the Opening Celebration that help propel the industry forward and at our VIP Event at the Indianapolis Motor Speedway,” says De Marco. “During the day, there are meals around the Main Stage sessions which gather attendees around the table for casual conversation before the presentation begins.” Indianapolis, home of the Indy 500, is a unique location that has a lot to offer the attendees of ESX. A special night at the Indianapolis Motor Speedway will invite a limited number of guests to share great food and drinks, to experience a trip around the track in an official pace car, and to ‘kiss the bricks’, a speedway tradition. Centrally located in the US, Indianapolis is a convenient convention destination for travel, whether flying or driving. Connecting with peers and colleagues Another benefit of the show is the cross-section of companies represented in the industry, whether large, medium or small There are also networking opportunities throughout the week. The Pub Crawl, an attendee favourite, is a night where long-time friends gather, and new friendships are made. “This is where the real conversations happen between peers and colleagues about real problems of running and growing a company, and solutions that can make a difference,” says De Marco. Another benefit of the show is the cross-section of companies represented in the industry, whether large, medium or small players. This enables professionals to come together to connect with their peers and colleagues, allowing for deep discussions on how to grow their people, revenues and profits, including mentoring opportunities that encourage leadership development, says De Marco. The subject of finding qualified employees is top of mind for almost every industry today, especially the security industry. Sessions that address hiring and managing employees for industry professionals include “Hiring from Outside the Monitoring Industry: Surprising Resources for Great Operators” “Maximise New Employees: Why Onboarding is Critical to Their Success” “5 Tips for Effective Employee Performance Evaluations” Helping attendees to reinvent their business “Our focus is primarily on the attendee, helping them connect with suppliers, colleagues and opportunities that reimagine their businesses, so they can be stronger competitors,” says De Marco. “If we can provide the right knowledge to inspire or transform the attendees to take meaningful action or implement change that helps them remain relevant, we believe we have succeeded.” There will be an undercurrent of sadness at ESX this year because the industry recently suffered a loss. George Gunning, former CEO of USA Alarm Systems and one of the founding members of ESX, passed away in February. “We would be remiss if we didn’t recognise his contributions and influence on the industry and ESX over the years,” says De Marco. Another founding member of ESX who has passed away is John Murphy, formerly CEO of Vector Security.
Apstec Systems (Apstec) announces that its Human Security Radar (HSR) system will be deployed at the Palexpo Exhibition and Congress Centre in Geneva to improve safety and security for the International Motor Show 2019. Asptec’s HSR system is the world’s first fully automatic real-time mass people screening solution. Held over a period of ten days, the Geneva International Motor Show is one of the automotive industry’s flagship events and attracts large numbers of visitors every year. The organisers are anticipating up to three-quarters of a million visitors over the duration of this year’s event, with capacity reaching 150,000 attendees a day during peak times. Largest conference centres The Palexpo is one of the largest conference centres in Europe, and as such has a duty of care to its visitors HSR is uniquely well suited to managing this level of throughput and providing a high level of security without causing disruption to the flow of visitors into the venue, or negatively impacting their experience. Two HSR systems will be deployed for the show, each capable of screening up to 10,000 people per hour. The Palexpo is one of the largest conference centres in Europe, and as such has a duty of care to its visitors. Traditional security checkpoints or manual searches, which scan one individual at a time, are not suited to large venues and public places, leading to queues and delays. Although security is still paramount, attention has moved towards the need to add a critical level of defence that doesn’t impede visitor experience. Cost-effective solution HSR was designed to address this challenge, and offers a practical and cost-effective solution to security screening in high footfall scenarios. The first fully automated, real-time mass screening solution, HSR provides seamless security to protect public places from terrorist attacks. Developed by specialists in the fields of radio physics, electronics and software engineering, the walkthrough system has been built in conjunction with authorities and ‘end users’ in security and counter-terrorism. HSR screens for mass casualty threats including improvised explosive devices concealed on the body or in body-worn bags, and firearms wherever they are carried, without the need for an operator to inspect suspect materials. It leverages centimeter wave technology, meaning it can discriminate explosives from benign materials, with a high degree of accuracy. Security screening The Palexpo’s deployment of HSR is the latest major implementation of this new technology Gregory Labzovsky, CEO, Apstec, explained: “Until recently, it’s been almost impossible to secure public spaces in a simple and cost-effective way, with existing approaches to security screening proving to be impractical, inconvenient and expensive to operate. HSR enables venue owners to close a critical security capability gap without impacting the experience of their patrons. We’re delighted to be working with The Geneva International Motor Show to enhance safety for thousands of motoring exhibitors and enthusiasts.” The Palexpo’s deployment of HSR is the latest major implementation of this new technology. The system has been installed in some of the world’s busiest airports, as well as in sports stadiums, entertainment venues, mass transport hubs and networks.
Siklu Inc., a global provider of millimeter-wave solutions, announced that it has been selected by the City of Cambridge, England, to provide wireless connectivity for the city’s CCTV surveillance system in its town centre. The Siklu EtherHaul radios deployed in Cambridge City Centre replace the 5.8 GHz wireless technology previously used by the city for its CCTV network. Wireless mmWave technology Cambridge City Centre is a commercial and historic district that is adjacent to Cambridge University, making it a high traffic area for traditional 5 GHz wireless networks that are used by businesses, university departments and residents. Siklu radios bypass the congested 5.8 GHz spectrum wireless frequency by using the millimeter wave spectrum to transmit information across Cambridge’s CCTV networks, providing an interference-free and secured communication infrastructure for the city. “Siklu’s millimeter wave technology eliminated the camera latency issues that the previous wireless infrastructure presented,” said Ron Johnson, the owner of Videcom Security, which installed the Siklu radios for the city. “The CCTV network in the city centre is now so robust that we have been able to install additional cameras in the area for more comprehensive security coverage without sacrificing fibre-like network speed, reliability and stability.” Secure network communication The public CCTV system shared by Cambridge and several other cities in the district monitors 254 cameras total, 24 hours a day and 365 days a year to monitor public events, thwart crime, manage traffic and provide residents and businesses with a safe place to live and work. Unlike legacy wireless networks whose wide beams can be vulnerable to interception, the Siklu radios deployed in Cambridge’s CCTV system use ultra-narrow beams in the 60GHz millimeter wave spectrum to transmit information across the network securely, making the radios inherently secure from interceptions and hacking. As a result, sensitive information can be transmitted across the network securely. “As technology advances and physical security requires more and more security and reliable network bandwidth, Siklu can offer cities like Cambridge the infrastructure needed to keep city centres and other areas safe,” said Eyal Assa, Siklu’s CEO. The Siklu EtherHaul mmWave product line will be showcased at IFSEC as part of Milestone Systems’ stand #E750, where Siklu will also conduct a live demonstration.
More than one hundred years after the first race, ACO (Automobile Club de l’Ouest, or roughly translated, the Automobile Club of the West), creator and organiser of the famous 24 hours of Le Mans, has selected the leading integrator of a secure and traceable access control solution, LOCKEN for its fast and reliable security system. 24 hours of Le Mans Behind the tireless car tracks, there is a set of intricate and complex facilities. In close proximity to the entrance, which welcomes more than quarter of a million spectators, there is a Museum, about 40 restaurants, 20 shops, a medical centre, security stations all along the circuit, paddocks, where more than 10,000 competition tyres are stored, and of course the stands for each of the 60 competitors. This accounts for hundreds of different access points, requiring a variety of permissions, which must be closely controlled and monitored by ACO. Access rights are extensive for ACO employees, and some of the circuit’s customers, such as Porsche, which operates a modern building on the track side, while competitors and special guests have limited rights. The Porsche Experience Centre allows fans to try out its cars, all year round, on an allocated part of the circuit. With approximately 800,000 visitors hosted on the site each year, ACO has to account for 300,000 accesses, 53,000 of which must be managed during the competition, or the equivalent of 1,800 accesses controlled per day in June. LOCKEN’s Cyberlock solution The specific requirements for access to its enclosure led ACO to focus on the management of access rights, to ensure perfect traceability for all stakeholders. The scope and diversity of facilities, which total several hundreds of crossing points, requires a secure, yet flexible solution. The system already handles 544 points on the site, with 407 different keys to enable access LOCKEN’s Cyberlock solution is based on unique key-centric technology, which provides the highest possible levels of security and efficiency, with the power delivered by a re-chargeable digital smart key and innovative software (including traceable data). Key-centric access management is built with the user in mind, it is based around three elements, a smart key, digital cylinders, and a unique software suite, providing robust access control. A trial phase, over several years, has allowed ACO to confirm the reliability and ease of use of the technologies, and LOCKEN to illustrate its enhanced capabilities. The system already handles 544 points on the site, with 407 different keys to enable access. Enhanced access control solutions Toze Coelho, who is in charge of access within the operational management at ACO, comments: "In 2016, we equipped the sports module, which is at the heart of the race, dedicated to the management of safety - monitoring by cameras/monitors - where instructions are given to the commissioners positioned along the track. This space is highly sensitive, equipped with multiple networks, and is prohibited to the public.” “Our aim is to extend this process to provide full access control, and we are particularly keen to equip the Museum of the 24 hours of Le Mans with the LOCKEN solution." By contributing to the security of the 24 hours of Le Mans circuit, LOCKEN has positioned itself as a leading player in providing enhanced access control solutions to international venues and events.
Technical furniture manufacturer Thinking Space Systems have improved the working environment of CCTV operators at Blackburn with Darwen Council, with custom designed control room furniture recently installed within their new CCTV hub. Thinking Space were awarded the contract to provide control room furniture for the brand-new CCTV hub at Blackburn with Darwen Council. Accommodating four operators and two supervisors, the cool blues and greys for the interior for the room were matched by Thinking Space with their ergonomic furniture, to create a calm and peaceful environment for this 24/7 monitoring station. Of particular interest in this project was the 11 metre spanning Evolution media wall manufactured and installed by Thinking Space. Perfect alignment was key in ensuring the correct sight lines for operators and an aesthetically pleasing finish for the 33 large flat screens, mounted in a configuration of three rows of eleven. Thinking Space used laser positioning technology to achieve an accurate solution. Blackburn with Darwen Council CCTV hub The hub was officially opened in March 2017 with Thinking Space invited to the proceedings. Based in King George’s Hall, Blackburn, the new control room monitors over 240 cameras across East Lancashire in a bid to cut crime and make cost savings. Opening the new facility, which had been in operation since the previous month, Assistant Chief Constable Mark Bates and Council leader Mohammed Khan from Blackburn with Darwin Council led the proceedings, hailing the complete project as a resounding success. Peter Wareing, CCTV Services Manager for Blackburn with Darwen Council explained why communications between all parties ensured its success. “Thinking Space worked closely with both myself and our CCTV installers from day one, providing me with 2D and 3D images of the finished product, allowing me to better convince Partners of the finished article. As the project progressed, Thinking Space were in regular contact with me to ensure that I was receiving exactly what I needed” explained Peter. “The build and install went smoothly, something a project manager looks forward to! The finished article really looks the part and provided that wow factor, with sight lines all taken account of and Operators able to provide an excellent service in comfort.” See their furniture demonstrations at Stand H1125, IFSEC International from 20-22nd June.
Navi Mumbai officials have the benefit of operating in a modern environment, maximising Qognify’s Safe City solution Qognify, the provider of big data solutions for physical security and operations, announces the successful implementation of its market-leading Safe City solution in Navi Mumbai, a planned township that was established to handle the population overflow from the overcrowded and ever-growing city of Mumbai. Together with CIDCO (City and Industrial Development Corporation, the agency established for managing the new city) and system integrator WIPRO, Qognify has designed an integrated and holistic solution that helps Navi police to maintain law, order and safety. As a planned township, Navi Mumbai officials have the benefit of operating in a modern environment, allowing to maximise Qognify’s Safe City solution. At the core of the solution are Qognify Situator, an advanced Situation Management platform, and Qognify’s Video Management Solution, which controls the hundreds of surveillance cameras throughout the city. Safe City solution functions With the solution’s implementation, the city has gained the ability to improve traffic management, deter criminal activity, effectively manage response to events, and resolve investigations efficiently: A central command center is using the platform to monitor entry and exit points of the city, toll points, traffic junctions, accident prone road sections, subway and railway stations, schools, key residential areas, open markets, and key utility infrastructure areas such as electrical substations and the main water supply lines. Special “Emergency Communication Boxes” act as “panic buttons” and allow people to generate alerts and communicate directly to the control room in case of emergency. Qognify’s video management solution provides high quality video feeds. Smart integration with Agent Vi’s video analytics solutions enables immediate detection and extraction of security and safety incidents from surveillance cameras throughout the city. This integration enables the triggering of real-time, automatic alerts of incidents in Qognify Situator, that in turn, generates the appropriate operating procedure and response plan for the operators to act upon. "The Navi Mumbai security program goes far beyond a CCTV system" Situator provides a unified, operational view of the city by integrating all the components of the solution, while providing advanced collaboration capabilities for field personnel who are able to send real time images as well as videos to the control room with the type of the incident at hand and the GIS coordinates of the field respondent. Navi Mumbai security program “The Navi Mumbai security program goes far beyond a CCTV system,” said Mr. Soma Vijayakumar, CIDCO. “It is a smart solution that integrates video, emergency response, traffic control, license plate identification and more. Qognify is the core important element of this platform, providing a solution which is among the most modern and advanced available anywhere.” “Navi Mumbai has embarked on a remarkable program which will enhance the safety and security of its citizen, visitors and assets,” said Moti Shabtai, Qognify’s President. “We’re proud to be a part of this multi-solution, multi-agency project that fulfils the vision of the city authorities to provide a security and safety to its constituents.” Qognify will be featuring its security and operations solutions in booth 9101 at ISC West, April 5-7 in Las Vegas.
Hikvision will showcase its cutting edge video surveillance solutions at ISC West 2016 in Las Vegas, booth 14059 Hikvision USA, the North American leader in innovative, award-winning video surveillance products, has partnered with the Sunset Plaza Hotel in Los Angeles to provide a security solution for round-the-clock surveillance. Located on the bustling Sunset Strip, the hotel had a great need for versatile, user-friendly cameras and recorders that allowed their staff to keep an eye on the premises at all times. A variety of Hikvision models now protect the hotel guests and serve as powerful tools to keep hotel operations running smoothly. 24-hour video surveillance The hotel had outgrown their legacy analogue system and was hoping to upgrade to cameras that provided broad coverage and high-quality images in a variety of interior and exterior environments. It was also important that the interface for the security system was easy for employees to learn. “We wanted something that we could use from an operational standpoint and from a safety standpoint,” explained Brenda Elias, Operations Manager for the Sunset Plaza. Ms. Elias turned to Constantin Paul Bunea, the founder and CEO of Darkcad Tec, who had been serving as systems integrator for the hotel for ten years. After considering the options available on the market, he felt confident that Hikvision was the brand that would meet their needs. “I selected Hikvision cameras because the quality is very high, third party integration is easy, and the company provides excellent technical support.” Mr. Bunea stated. Versatility and scalability of Hikvision products Darkcad Tec installed over twenty Hikvision IP cameras throughout the hotel, each well suited for a specific function. The DS-2CD2332-I turret, with Hikvision’s patented EXIR infrared technology, is being used in the parking garage, boasting image quality clear enough to make out license plates. A 3 MP fisheye camera, the DS-2CD6332FWD-I, allows for a 360° view of the main entrance. Cameras such as the DS-2CD2132F-I dome are being used at other hotel entrances, where HD real-time video is essential. This surveillance system is but one example of Hikvision products providing benefit to hotels all across North America. “The versatility and scalability of Hikvision products make them well-suited for a wide range of vertical markets,” stated Jeffrey He, President of Hikvision USA and Hikvision Canada. “We are pleased to serve our customers in the hospitality industry as they seek to provide safe and enjoyable experiences for their guests.” Hikvision at ISC West 2016 To learn more about Hikvision’s cutting edge video surveillance solutions, see them in person at ISC West in Las Vegas, booth 14059, April 6-8.
Round table discussion
The reviews are in, and ISC West was another hit. Brisk attendance and a comprehensive lineup of the industry’s top companies and products contributed to another successful show for Reed Exhibitions. Our Expert Panel Roundtable, who have attended many such events, added their own reflections to the industry’s post-ISC glow. We asked this week’s Expert Panel Roundtable: How successful was ISC West 2018 for security industry exhibitors and visitors?
A big trade show, such as the upcoming ISC West, has a lot to offer for attendees. How, can attendees maximise the value they get out of ISC West? For advice, we go to our Expert Panel Roundtable, all seasoned veterans of many big trade shows. Specifically, we asked the panel: How can attendees get the most out of a big trade show like ISC West?
A busy trade show abounds with new products and expanded features, colorful signage and blinking video screens, all competing for attention from busy attendees. It’s a microcosm of how the security marketplace – or any market, for that matter – sells its products. But what happens if the reality turns out different to the sales pitch? What happens when product or system performance doesn’t quite live up to the claims? Some would call that hype, and it can lead to disillusioned and frustrated customers. We asked this week’s Expert Panel Roundtable: What is the negative impact of hype in the security marketplace?