PSA, the consortium of professional systems integrators, announces the addition of Tyco Cloud to its Managed Security Service Provider Program (MSSP). Tyco Cloud is a cloud-based physical security management suite from Johnson Controls developed for video surveillance, access control, intelligence, and integration services on an open and modern micro services architecture. “Tyco Cloud has more than 20 years of experience providing cloud-based security services,” said Tim Brooks, PSA...
Integrated security manufacturer TDSi is pleased to confirm its continued programme of Table Talks sessions for its partners and end users. TDSi began hosting these regular sessions during the Lockdown phase of the COVID-19 pandemic, to deliver technical and informational content to interested parties. TDSi’s Table Talks are free online discussion and training sessions with a Roundtable of its key technical and commercial team members. Each session features TDSi’s security experts,...
Paxton Access is introducing free customised learning course, new products and a brand-new guide to assist installers in helping their customers ensure their buildings are COVID-secure. The initiative has been designed in line with the CDC and OSHA best practices and recommendations. In a new, 45-minute webinar, Paxton will show installers how to match their security offering with the ‘practical considerations of how to operate safely in the workplace’. A globally renowned manufactu...
In order to implement AI vision solutions, specialist knowledge, development effort and investment in computer hardware and storage technology are usually required. With cloud computing and specialised training services such as IDS NXT lighthouse, the process becomes much easier: neural networks can be trained individually and at the push of a button, without the need to set 978YIDS NXT ocean, the training software helps to make deep learning accessible to everyone. With the release of IDS NXT...
DMP is happy to announce the addition of Collin Brady to the West sales team. With his home base in San Diego, Collin is strategically placed to serve and support the DMP-authorised dealers in Southern California as their new Dealer Development Manager (DDM). This territory includes San Diego, Orange and Riverside counties. Video surveillance solutions Collin's career in the security industry has been distinguished by his high performance and tenacity. In his most recent position, he consisten...
Creative Realities, Inc., a renowned provider of digital marketing solutions, announced a reseller programme to support broader distribution of its Thermal Mirror solution. CRI moved quickly to anticipate and meet the growing need for thermal screening solutions as businesses resume normal operations following the COVID-19 shutdown. Since introducing its Thermal Mirror solution several weeks ago, CRI has expanded its partner programme to make its thermal screening solution more broadly availabl...
Tavcom Training, a part of Linx International Group, the world’s renowned provider of accredited security systems training courses, has announced that its popular distance learning course, CCTV over IP Networking has been awarded a BTEC Level 3 accreditation by Pearson. CCTV over IP Networking course The CCTV over IP Networking course is suitable for individuals with little or no prior knowledge of IP networks, and provides the information required to be able to install, repair and maintain a wide array of electronic security systems, such as CCTV, access control, intruder alarms, and fire alarm detection systems. Delivered through Tavcom Training’s bespoke online learning platform, the course can be committed to at the learners’ own pace with the backing of their own support tutor and comes with formal CPD points upon completion. With several accredited distance learning courses already under its belt, the business is thrilled with the latest expansion of its accredited portfolio. BTEC Level 3 accreditation attained Andrew Saywell, Business Development Manager for Tavcom Training stated, “Tavcom Training is committed to supporting professionals. When it comes to progressing your security career, we’re seeing accreditation is becoming more and more necessary and have been taking steps to make that even more achievable for people.” Andrew adds, “The BTEC Level 3 accreditation of our CCTV over IP Networking course is a key stepping stone in reaching that goal, one that also reflects our learners’ needs for professional recognition and integrity in the technical security field.” Option of non-accredited learning route We want our learners to be in control of their learning journey and professional development" In keeping with the belief that learners should be able to govern their own learning path, professionals undertaking the CCTV over IP Networking course will have the opportunity to opt for the non-accredited route if they so choose. Andrew further stated, “Accessibility remains the key for us. We want our learners to be in control of their learning journey and professional development. To reflect this, learners will still have the option to follow the non-accredited route on this course and achieve a Tavcom Training Certificate as an alternative, a recognition that carries weight alone.” Multiple learning options available As if the option of accreditation wasn’t enough, all of Tavcom Training’s online courses are now 25% off until the 30th June, 2020 using the code Tavcom25. Andrew concludes, “As the world’s renowned technical security training provider, Tavcom Training is working hard to provide security professionals with many routes in order to continue their professional education. We couldn’t be prouder that we’ve added yet another internationally recognised accreditation to our portfolio.”
As educational pioneers continue the challenging conversation about what the new normal will look like for students across the nation, Allied Universal®, a security and facility services company in North America, is helping school administrators and campus safety departments plan and prepare for students returning to school. Allied Universal’s more than 7,500 campus Security Professionals safeguard nearly 700 schools/universities nationwide. Over last several months, Allied Universal’s K-12 and higher education experts have been sharing best practices, guidance and tools to help schools provide a safe and secure environment for all students and faculty. Kiosk screening technology This guidance includes the following: Support ‘no touch’ entry into buildings, dissemination of personal protection equipment (PPE) and disinfecting supplies and social distancing requirements to keep staff, students and parents safe. Allied Universal’s CARE Ambassadors are available to help ease return to school anxieties and are available to welcome, inform and educate students and parents on all aspects of the return to school initiatives. Conduct distance temperature screening with a broad range of solutions such as handheld, fixed or semi-permanent thermal screening imaging and robotic and kiosk screening technology. Assist with traffic control, provide improved management of drop-offs and pickups, and support ingress and egress locations around school buildings. Help mitigate further risks with advanced technologies such as Allied Universal’s HELIAUS® platform, LiveSafe®’s Mobile Safety and Security App, access control and remote video monitoring solutions. Resuming peer-to-peer learning Institutional stakeholders are asking questions about what the ‘new normal’ will look like for our students" “Institutional stakeholders are asking questions about what the ‘new normal’ will look like for our students, while, at the same time, our educational leaders are balancing budgets and dealing with lay-offs and staffing decisions while continuing to provide a high quality academic experience for students across the country,” said Stephen R. Aborn, Director of Higher Education at Allied Universal. “We are here to support and offer a variety of solutions to keep all school campuses safe during the COVD-19 pandemic.” Recently, the Centres for Disease Control and Prevention (CDC) provided recommendations on how to keep the communities safe while resuming peer-to-peer learning. Decreasing spread of the virus The CDC released this guidance to inform a gradual scale up of operations with the ultimate goal to decrease further spread of the virus. “We recognise the hard work of our education leaders and support their mission of furthering learning and education to all students in a safe environment,” said Mahsa Karimi, Education Manager at Allied Universal. “It is our #1 goal to provide our education partners with the safety resources and tools they need so they can focus on what they do best—to continue to teach and inspire our students.”
On Tuesday, June 9, 2020 at 2:00 PM Eastern Time (US & Canada), Genetec, together with Université Laval, one of the top research universities in Canada, and Axis communications will host a webinar that will look at: The importance of on-campus video surveillance and current trends in the education industry The areas of interest within a school setting that require surveillance and the considerations schools must take when implementing solutions Analytics, hardware, and software that will aid in effective access control and management of on-campus video How to find and implement scalable solutions to aid in the protection of campus grounds in today’s climate What considerations campus security professionals need to take into account before implementing security solutions or adding to their pre-existing solution Members of the press are welcome to attend. If they would like to register, they may go to the registration page on Genetec website or contact the company for more information.
On Wednesday, June 10, 2020, at 2:00 PM Eastern Time (US & Canada), BOMA (Building Owners and Managers Association), Genetec and Related Companies will host a webinar called: “Back to Work: How technology can keep your occupants and your building safe.” During this one-hour event, the panelists will discuss policies and best practices for implementing a coordinated and unified security vision within a multi-stakeholder property management model and how to get back to work in light of COVID-19. Agenda How to implement and use technology to manage occupancy, elevators, access control and cleaning procedures in facilities How to secure the security operations, including topics related to security and privacy How to improve the security of corporate assets, people and information through the video surveillance, visitor management, and evidence management systems How to evolve the practice to manage the convergence between physical security and IT How to generate additional revenue by partnering with the tenants and leveraging their existing security technology Members of the press are welcome to attend. If they would like to register, they can go to the BOMA registration page or contact the company for more information.
PAC & GDX, the providers of access control and door entry solutions, have announced details of a new series of eight free-to-attend online technical training tutorials. Electronic Security Fundamentals begins on 28th May and will be hosted by renowned industry expert and PAC & GDX technical trainer, Joe Cieszynski. The sessions aim to provide electronic security engineers with guidance and tips on a range of subjects that will enable them to optimise the effectiveness of the technology they configure on a daily basis. Electronic Security Fundamentals builds on the success of PAC & GDX’s previous series of tutorials. Joe Cieszynski explains, “Back in March we decided to provide a welcome source of continuing professional development (CPD) during lockdown by hosting online training sessions. They proved to be an immediate hit, with the number of attendees exceeding all our expectations. By listening to attendee comments and feedback, and analysing frequently asked questions to our tech support team, we have gone on to develop a new series of 30 minute long sessions to explore other topics.” Subjects of electronic security systems Each session takes place on a Thursday at 14:00 BST and the series kicks off with a look at the problems caused by back EMF in electromagnetic locks, and the methods used to suppress it. During the following weeks subjects including earthing in electronic security systems, how IPv4 addresses work, the functions of gateway routers, how routers and network cards use subnet masks to determine network addresses, configuring IP devices, and the theoretical aspects of RS485 data bus topology will all be covered. The final tutorial on 23rd July looks at the common power supply types used in electronic security systems, and how to identify fault conditions that result from defective power supplies. In order to provide maximum value to attendees, Electronic Security Fundamentals has been carefully configured not to be a PAC & GDX sales exercise. Instead, it will explain the generic electronic, networking and technology principles that apply to commonly used access control and door entry solutions, irrespective of manufacturer. This knowledge and understanding will be also applicable when working with all types of CCTV, fire detection and intrusion detection technologies. Fundamentals of Installing and integrating products Through his engaging presentational style, Joe Cieszynski intends to make the tutorials both light-hearted and informative. He concluded, “The subjects I’ll cover in the Electronic Security Fundamentals series have been specifically chosen to assist those installing and integrating products and systems and maximise their potential. Not only will this help them to do their work faster, more accurately and with an understanding of the technology that underpins them, it also ensures greater customer satisfaction. I would therefore urge all electronic security engineers to join me.”
Exabeam, the Smarter SIEM™ company, announces updates to the Exabeam Partner Program, including the rollout of a formalised practice for managed security service providers (MSSPs) and managed detection and response (MDR) providers, both key segments of its partner ecosystem. The program will provide structure and support for multiple MSSP and MDR provider business models for its managed service practice, which contributed to 12% of the company’s overall business revenue in 2019. The enhanced program includes custom, flexible pricing models, training and accreditation, dedicated account and technical management teams, customised go-to-market and support. Partner-focused software company Coupled with the Exabeam Security Management Platform (SMP), the program will empower managed service partners to expand their offerings whether they resell, manage or host Exabeam deployments for their customers. “The Exabeam Partner Program supports a rich diversity of security-focused partners, including solution providers, professional services firms and managed service providers,” said Ted Plumis, Vice President of channels, business and corporate development, Exabeam. “We’ve seen strong growth in recent years from our service provider partners who are leveraging Exabeam in multiple deployment models to serve our joint customers. We are excited to make this sizable investment and offer dedicated resources to this important partnership segment, further demonstrating our commitment to being a 100% partner-focused software company.” Incident response automation MSSP and MDR partners can utilise the Exabeam SMP to help customers lower operational costs MSSP and MDR partners can utilise the Exabeam SMP to help customers lower operational costs and increase the productivity of SOC analysts associated with providing detection and response capabilities. Offered in the cloud or on-premises, the Exabeam SMP provides a data lake, behavioural analytics, case management, security orchestration and incident response automation, which drastically reduces time to investigate and contain threats by 51 percent. In addition, its analytics feature uses data science to identify employees’ behavioural patterns and abnormalities that may be indicative of security threats, in contrast to outdated signature-based detection methods. These providers can also leverage the Exabeam SaaS Cloud platform, which reduces SIEM deployment, maintenance and operational overhead by delivering the Exabeam SMP as a hosted cloud service, for their entire customer base, from small and mid-sized companies to the largest enterprises. Enhanced access to training programs Exabeam’s next-generation SIEM approach has brought more than 30 MSSPs to its longstanding partner program since its founding in 2013, spanning 17 countries in North America, Latin America, EMEA, Asia Pacific and Australia. MSSP partners around the world are strong supporters of the Exabeam program: “Many of our customers use Exabeam Data Lake or Exabeam Advanced Analytics, which gives our analysts a comprehensive view of the timeline of an attack, helping us scope security incidents more quickly, as well as providing more streamlined access to a customer’s security signals,” said Justin Bajko, co-founder and vice president of strategy and business development at Expel. “We’re supportive of Exabeam’s efforts to provide its partners -- and our joint customers -- with greater customisation opportunities, more flexibility and enhanced access to training programs.” Integrated managed security solution Our customers leave nothing to chance by choosing a fully integrated managed security solution from our team" “As a leading European MSSP, our customers leave nothing to chance by choosing a fully integrated managed security solution from our team,” said Garath Lauder, director at Cyberseer. “The Exabeam SMP Integrated into the Cyberseer ASPECT automation platform optimises the protection we provide our customers while giving our SOC analysts the visibility they rely on to resolve acute security problems immediately.” “At CyZen, we pride ourselves on delivering thoughtful and practical guidance that brings our customers peace of mind when it comes to securing their organisation from cyberthreats,” said Jake Lehmann, managing director at CyZen. Cost effective solution “By partnering with Exabeam and leveraging the Exabeam SaaS Cloud Essential offering, we are able to deliver on our mission while providing a cost effective solution for our customers.” “We conducted an exhaustive review of solutions in the marketplace, and we're excited to help Exabeam’s launch in the Latin America market,” said Carlos Alanis, CEO at Banyax. “We found the flexibility we required in the Exabeam product and discovered pricing models that have allowed us to achieve success across our customer segments, from small to mid-size businesses up to larger organisations with thousands of users,” added Jorge Melendez, CFO at Banyax.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research programme to provide valuable feedback to the GSA Schedule 84 programme and on to the GSA central office. The director of GSA Region 7 Schedules Program, the Schedule 84 Branch Chief and the Category Manager Subject Matter Expert who manages our suppliers' panel gave us their full attention as we discussed the successes of the programme, hot topics, problems and the future. We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort and renewed enthusiasm Innovative review team We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort, renewed enthusiasm and productive changes building upon the successes of 2017. There was high praise for the accessibility to the Schedule 84 staff. Their consistent quick response to questions and concerns, thinking outside the box and supporting the programme by partnering with their contractors was much appreciated. There has been a renewed spirit of partnering to cooperatively bring the best to agency customers. It seems to be working as per the Centre Director sales are growing for GSA Schedule 84. Advocating for the security industry In my experience, business development starts with the Administrator from Region 7 in Ft. Worth, TX. As the annual Schedule 84 Industry Day at the SSAC begins he is shaking every hand and passing out his cards looking folks right in the eye asking, “how can I help you?” They have the best practices and most organised paperwork. The SSAC director has chosen well in her staff and is hands-on in every endeavour to direct things along when challenges occur or to improve the programme. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry It continues with the centre’s CASE Manager encouraging the contractors at events, visiting agency customers and promoting the GSA Schedules Program by helping coordinate the partnering. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry for adding new technology, meeting with industry associations, understanding the complexity and challenges of Homeland Security Presidential Directive 12 (HSPD12) and advocating for the purchasing Physical Access Control Systems (PACS) utilising the appropriate standards and the GSA Program among other innovations. As far as the supplier panel, we gave our GSA Schedule 84 team and leaders high praise for 2018. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List Changes in the GSA programme Some changes this year in certain GSA programmes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) developed to assist with solution procurements. This new SIN was added to Schedules 03FAC, 56, 70, 71, 00Corp, 738X and 84. Under Schedule 84 it is SIN 84-500. GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex Essentially this SIN allows agencies procuring under the aforementioned GSA Schedules’ programmes to purchase and the contractor to add items and services not known prior to the task as a Contract Line Item Number (CLIN) not to exceed 33% of the order. For more information and FAQs on OLMs go to www.gsa.gov/olm. This is not to take the place of “Open Market” items for adding products only that are not listed on a company’s GSA Contract. Physical access control products Previously, GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex for the agencies. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List according to the standards created under FIPS201. These products appear under SIN 246 35-7 after being tested and approved by GSA. To be qualified to install these products under the GSA Program at least one individual from the GSA Contractor company must complete the class and be CSEIP certified before applying for labour SIN 246 60-5. Additionally, the company must demonstrate certain qualifications and have past performance for this type of work. The Security Technology Alliance offers the training class and certification. Certified individuals and approved products are listed at www.idmanagement.gov. Companies listed with SIN 246-35 7 and SIN 246-60 5 may be found by searching at www.gsaelibrary.gsa.gov. Updates to guidance for procurement Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide. The ordering guide posted at www.gsa.gov/firesecurity is a valuable support tool created to assist agencies with understanding the requirements of FIPS201 and procuring a PACS. The guide includes relevant regulations, FAQs, sample systems designs, sample statements of work, a list of key points of contract for additional help and questions. In partnership with GSA and guided by the GSA Ombudsman group, the Security Industry Association and the Security Technology Alliance members and their contractor companies participated in a GSA Reverse Industry PACS Training Day on September 17, 2018. We presented from an industry perspective important fact on PACS system requirements, procurement planning, providing information on resources and further educating with panel discussions, individual presentations and amusing skits to over 300 Government agency staff and acquisition specialists. You can find some of the unedited recording of the PACS Reverse Industry Day Training on YouTube. Some changes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) GSA Schedules Program A hot topic about the GSA programme for 2018 was also an issue for the prior year. The GSA Schedules Program is a streamlined contracting vehicle incorporating specific Federal Acquisition Regulations for more efficiently purchasing commercial items. Companies may apply per a continuous open season for a 5-year contract with three 5-year options to renew. Contractors are vetted for past performance, corporate experience and financial capability. Products and services are considered for offering to Federal, State and Local customers (for Schedule 84) with pricing that is determined to be fair and reasonable through negotiations with GSA. To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor as well as the competition of identical or similar item pricing. The most vocal complaint of concern from the contractors was regarding the consideration of competitor contractors offering identical items with out-of-date pricing or holding a Letter of Supply not authorised by the manufacturer. GSA pricing tool Since the GSA utilises a pricing tool to determine if the pricing offered is competitive, a rogue competitor can cause a pricing action to possibly be rejected due to out of date information even as the manufacturer offers an update of the product. This is an issue on all GSA Contracts that the supplier panel hopes will be reconsidered by GSA policymakers at the central office. Most of us believe the Letters of Supply should only be issued by the manufacturer or with documented specific permission of the manufacturer to a reseller. Manufacturers may want to have a better understanding of the Letter of Supply, how it is considered by GSA and more carefully choose their Government partners for experience and compliance. Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy Overcoming challenges for the security community Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy. GSA eBuy is an online Request for Quotation (RFQ) programme that is for GSA Contract holders only. Agencies will post their requirements by Special Item Number for at a minimum 48 hours. Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract. GSA Participating Dealers may take orders on behalf of a manufacturer if they are authorised under the manufacturer’s GSA Contract. They may also have an online PO Portal to receive orders. But they have no access to GSA eBuy to response to RFQs. Usually, under these arrangements, the manufacturers do not respond directly, so there is a problem using GSA eBuy for opportunities as their GSA Participating Dealers have no access to respond. GSA Schedule 84 leadership In some instances, a contracting officer may allow an emailed quotation. However, with the use of the electronic ordering system, this has become a common problem we hope to bring to the attention of policymakers. Some changes to the programmes may make the presentation of documentation more effective going forwardThe GSA Schedule 84 leadership has been helpful to explain the challenges to the agencies to try and resolve such issues. So, what’s up for 2019? GSA modernisation is coming. There will be improvements to their tools and more consolidations of SINs and more. There have been discussions of a revival of the GSA Expo. The Expo offered training for contracting staff both Government and private industry. Valuable tools for vendor training Equally important is the networking, meetings and the exhibits of the contractors. Expos have been discontinued since 2012 but smaller events have been growing as well as online webinar training. Webinars are valuable tools for GSA and vendor training, but they do not take the place of being able to meet your customers face-to-face. GSA online eOffer and eMod programme have made processing actions more efficient. Some changes to the programmes may make the presentation of documentation more effective going forward. The GSA online website for viewing the items on the GSA Contract and for purchasing items, GSA Advantage could definitely use an update as it has been basically the same for 20 years. Keep an eye on GSA Interact for the latest happenings with GSA.
PenTesting, also known as “ethical hacking” or “white-hat hacking,” has always been viewed as the “sexy” side of cybersecurity, a task that is far more exciting than monitoring systems for intrusions, shoring up defenses, or performing compliance audits. Numerous security conferences are devoted to the fine art of attempting to hack into systems – with an owner’s full knowledge and permission – and reporting on the results. At an organisational level within businesses, they also value PenTesting under the premise that it allows them to identify security vulnerabilities before cyber criminals can. There are some regulatory requirements like PCI-DSS that require penetration assessments as part of their PCI compliance. However, many organisations have come to over-rely on PenTesting, thinking that if all the issues were identified in a PenTest, they’re good to go. Not only is this not helping them improve their security posture, it is also leaving them with a false sense of security. A penetration test is a simulated, live attack on your environment by a white-hat hacker What is PenTesting? A penetration test is a simulated, live attack on your environment by a white-hat hacker, customised to address specific problem areas, such as web-based applications, mobile applications and infrastructure services like border VPNs and firewalls. The PenTest may include different types of attacks based on the requested scope from an organisation so that the tester attempts to come at each system from all sides, the way a cyber-criminal would. The goal is to identify which systems and data the tester was able to access and how an organisation can address the vulnerabilities that allowed them to get in. The limitations of PenTesting There is great value in performing periodic PenTests, which is why PCI DSS and other security standards mandate them. However, PenTesting has three significant limitations: PenTesting does not provide solutions Let’s be honest: No one likes reading technical reports, but typically, that's the only deliverable provided by a PenTester. The value of a PenTesting report varies wildly based on the scope of the testing, the PenTester’s technical expertise and their writing ability. The tester may miss some things, or not clearly convey their findings. Additionally, a PenTest is a snapshot in time and the PenTester could miss changes in the systems, configurations, attack vectors and application environments. Even if your system “passes” a PenTest, will it crumble in the face of a brand new, more powerful attack vector that emerges a week later? The worst type of “PenTest report” consist of an analyst producing nothing more than the results of a vulnerability scan. Even if the PenTester produces a well-written, comprehensive report filled with valuable, actionable information, it’s up to your organisation to take the action, which leads to the next limitation of PenTesting. The value of a PenTesting report varies wildly based on the scope of the testing, the PenTester’s technical expertise and their writing ability PenTesters only exploit vulnerabilities and do not promote change PenTesting does not highlight the missing links in your organisation's technology stack that could help you address your security vulnerabilities. This is often in the guise of being agnostic to the technologies that exist because their expertise is only offensive security – unless, of course, the performing company has “magic software” to sell you. PenTests also do not help to develop your organisational processes. Additionally, they do not ensure that your employees have the knowledge and training needed to treat the identified fixes. Worst of all, if your in-house expertise is limited, any security issues that are identified during a PenTest aren't validated, which leads to a misrepresentation of their magnitude and severity while giving your team a false sense of security. PenTesters are self-serving Too often, PenTesting pits the assessment team against the organisation; the goal of the assessment team is to find the best way to "shame" the business into remediation, purchasing the testing company’s “magic software”, then call it a day. Once the PenTesters find, for example, a privilege escalation or a way to breach PII, they stop looking for other issues. The testers then celebrate the success of finding a single “flag”. In the meantime, the business is left in a precarious situation, since other unidentified issues may be lurking within their systems. Shifting the paradigm of PenTesting The goal of PenTesters is to find the best way to "shame" the business into purchasing the testing company’s “magic software”, then call it a day Penetration testing can uncover critical security vulnerabilities, but it also has significant limitations and it’s not a replacement for continuous security monitoring and testing. This is not to say that all PenTesting is bad. PenTesting should be integrated into a comprehensive threat and vulnerability management programme so that identified issues are addressed. The purpose of a mature vulnerability management programme is to identify, treat and monitor any identified vulnerabilities over its lifecycle. Vulnerability management programme Additionally, a vulnerability management programme requires the multiple teams within an organisation to develop and execute on the remediation plan to address the vulnerability. A mature threat and vulnerability management plan takes time and is helpful to partner with a managed security services provider (MSSP) to help you in the following areas: Improve your cyber-risk management program so that you can identify and efficiently address vulnerabilities in your infrastructure, applications and other parts within your organisation’s ecosystem on a continuous basis; Perform retests to validate any problems identified through a vulnerability scan or a PenTest assessment; Ensure that your in-house staff has the knowledge, skills and tools they need to respond to incidents. Cyber risk management and remediation is a "team sport." While periodic testing conducted by an external consultant satisfies compliance requirements, it is not a replacement for continuous in-house monitoring and testing. To ensure that your systems are secure, you must find a partner who not only performs PenTesting but also has the engineering and development experience to assist you in fixing these types of complex problems in a cost-effective manner and ensuring that your systems are hardened against tomorrow’s attacks.
The drive for learning doesn’t diminish, even in times of a global pandemic. To accommodate the demands of social distancing, more training today happens online. “We have seen unprecedented international demand for our portfolio of online training courses ranging from small installation companies to the largest organisations, across a wide range of sectors,” says Jerry Alfandari, Group Marketing Manager of Linx International Group, a U.K. training firm. “More than ever, businesses are looking to ensure they have the skills in-house to coordinate their response to the changing situation. Individuals are also taking this time to upskill themselves for when we return to ‘normal’ by bringing something with them they didn’t have before. Perhaps unsurprisingly, people are still seeking to better themselves for what will be, eventually, a competitive market.” Expert security training Topics such as CCTV, Access Control, Intruder and Fire Tavcom Training, part of the Linx International Group, provides technical security training delivered by expert tutors on topics such as CCTV, Access Control, Intruder and Fire and also CCTV Control Room and Security Management. Given the practical nature of the courses, the majority have historically been delivered in a state-of-the-art training centre through interactive workshops. However, in order to best protect their staff and learners, and following government guidelines, Tavcom have closed their training centre for the time being. Learners are still able to book into classroom courses for later in the year with a choice of two learning centres now being offered: Hampshire or the recently established training centre in Shipley. For those who prefer to learn online, Tavcom delivers accredited online security training. “Given the situation we are all in at the moment, our online courses have seen an 86% increase in demand over the last several months,” says Alfandari. All online courses offer the same level of support as the classroom courses, with many accredited to BTEC level 3 and 5, catering to professionals of varying skill levels and experience. Improve your professional development “Our online courses remain as accessible as ever, with huge numbers of security systems engineers and professionals seeking to use this [quarantine] time to improve their professional development,” Alfandari says. “We encourage all people to consider the benefits of eLearning and, if they need any advice, to reach out to the Tavcom training team.” It’s more important now than ever before that learners are able to access Tavcom’s online learning programmes and continue in their professional development, he says. To help facilitate learning, the company has discounted 25% off the portfolio of eLearning courses, many of which are BTEC accredited and come with expert tutor support. We are also introducing new interactive ways of teaching traditionally classroom-based courses" “We are also introducing new interactive ways of teaching traditionally classroom-based courses with the aid of Zoom virtual classroom courses, led by our tutors,” says Alfandari. “From the learner’s own home, they will be able to undertake their chosen training course and return to the training centre later in the year to complete the practical assessment.” Skillsets remain in demand Even the most well-prepared organisations with extensive contingency plans have been stunned by the scale and speed of the current situation. Alfandari says: “We are finding especially our Intruder Alarms courses for repair and maintenance engineers have been exceptionally popular; those skill sets remain as in demand as ever in these troubled times.” A sister company, PerpetuityARC Training, offers Security Management BTEC Level 4 and Risk, Crisis and Disaster Management BTEC Level 4 courses that are purposely designed to help businesses and those responsible for security learn how to identify threats, risks and vulnerabilities, and create a comprehensive plan that will enable practical measures to be applied to mitigate the impact. Both courses run via two media: classroom or online and are tutor-supported so learners have a choice according to what best suits their needs and requirements. An online Essential Security Practices course is comprised of 12 modules designed to introduce the essentials of corporate security. Modules can be bought individually or as a whole course and will establish fundamental knowledge of best security practice. “It’s a great starting place if you’re new to security or want to brush up on your expertise,” says Alfandari. Maintaining a security presence is a challenge during a global pandemic. “With people following guidelines by staying at home, we’ve been working hard to drive the message that learning doesn’t stop just because you can’t go out,” says Alfandari. “People may think that because they can’t get to the training centre then they can’t train, but that’s just not the case.” Learning in these unprecedented times Our training centres may be closed for now, but our courses are still very much running" Between Tavcom Training and PerpetuityARC Training, there are more than 20 distance learning courses including ASIS International and The Security Institute, all of which can be accessed at home, at a learner’s own pace. “It’s important that people understand that we’re still here, still available and that we haven’t ‘gone away’,” says Alfandari. “Our training centres may be closed for now, but our courses are still very much running. “ “These are, without doubt, extremely difficult times,” he adds. “We are here for our learners. Our team are working hard behind the scenes to facilitate the best possible learning experience during this time, and we encourage all potential learners to really use this and make the most of it. Whether you want a refresher in security basics or finally to start on that qualification you’ve been putting off, we are here to help you in your professional development.” Rhiannon Limbert, Marketing Coordinator for Linx International Group, contributed to this content.
Kurt Takahashi, the new CEO of Pelco, says he will provide collaborative leadership to help build the Pelco team, work together hand-in-hand with team members, remove barriers and lead the company forward. He brings industry experience and relationships to the new post that will translate into new opportunities. Takahashi joins Pelco from AMAG Technology, where he served as President for the last couple of years. Earlier, he had stints at ADT, Tyco and Quantum Secure, where he was Global Vice President of Sales and Marketing. “This was an opportunity to join a brand that has deep, rich and far-reaching history,” says Takahashi. “I couldn’t resist the opportunity to come into a company such as Pelco and be able to make a difference.” Improving the fundamentals Takahashi acknowledges that Pelco has slipped in the last 10 years from its position as a market-leading brand. To address the situation going forward, the company must “improve fundamental things,” he says. Those fundamentals include keeping the customer first, putting the right people in the right roles, and executing technical support well. Keeping the customer first, putting the right people in the right roles, and executing technical support well “We have to provide customer service from when we receive an order, to acknowledging it, to processing it and shipping the order,” says Takahashi. “Another piece is to deliver revisions to a product in a faster time period and introduce new products to the market in a timely way. In terms of market presence, we learn that people haven’t really heard from Pelco in a while. We have to get in front of integrators and consultants more aggressively than we have in the past.” “It’s up to us to prove that we belong and can sustain and support customers moving forward,” he adds. “We will get new opportunities, but we will need to execute them. If we do that, we will grow.” Brand optimism Takahashi sees more reasons for optimism. “In spite of the problems, we are a big company with thousands of customers, a massive footprint, 10 offices around the world and people in over 40 countries. We are a strong, known brand around the world. These are a great foundation to grow from; we just have to execute better.” These are a great foundation to grow from; we just have to execute better Pelco’s new parent company, Transcom Capital Group, was another reason Takahashi was attracted to the position. He says Transom is led by “amazing professionals” that specialise in “transformational culture and how to diffuse best practices in an organisation.” At Pelco, Transom has already led surveys, workshops and focus groups throughout the organisation to create a vision, mission and values covering how the company wants to present itself in the market. From those values will emanate new process and policy improvements to move the company in the right direction. New visions and missions The company’s new, collectively developed vision is “to make the world safer.” The mission is “to deliver distinctive video solutions and world-class customer experiences.” The company’s new, collectively developed vision is “to make the world safer.” The company’s culture is built on six values: innovation and excellence, customer focus, integrity, respect and recognition, collaboration, and ownership. “We believe this is what will help drive our culture moving forward, and it’s the mindset of all of us as one team with one goal that will give us something to be proud of,” says Takahashi. “As we move into the new era of Pelco, you will see excitement internally and externally,” he adds “Everybody’s really eager to see Pelco come back and be a significant player.” Three horizons to success The idea is to look inward and improve on the current, successful product lines Takahashi sees three horizons that summarise the company’s path to future success. The first horizon is to focus on the fundamentals of what the company does today. The idea is to look inward and improve on the current, successful product lines, such as the VideoXpert video system and on-board video analytics. The second horizon will be to look at ways to advance the current feature set, whether “to build, partner or buy.” Building partnerships will be part of that success, such as the partnerships they are already building with Briefcam and Anyvision. The third horizon will be to expand their innovation, based on feedback from end users, dealers and consultants. “I want to get very deeply connected with our customer base,” says Takahashi. “Are we on the right path? Should we explore other partner relationships? We need to bring those minds together to expand our vision.” The focus should be on solving three business problems – mitigating risk, ensuring compliance and saving money. Looking ahead to ISC West in the spring, Takahashi expects Pelco to emerge as a more proactive company that is eager to engage. “We have a lot of stories to communicate, and we have not been as active as we should,” he says.
As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyse a security event, machine learning can analyse the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with dual purpose,” says Matt Kushner, President of STANLEY Security. STANLEY Security, one of the largest integrators with a global footprint, has positioned itself at the centre of the industry’s transformation by information technology (IT) and the Internet of Things. “Security will become an expanded business partner with corporations,” Kushner comments. In response to the trend, STANLEY is hiring more IT-oriented technicians and salespeople within the IT community and who can “speak at the C-level”, Kushner comments. Sonitrol is the most recognised brand by law enforcement for verified response Data centres, higher education and logistics STANLEY manages very large, multi-national clients. As a consequence, the STANLEY security organisation has some of the best and brightest minds for enterprise-class security. To maintain that level of talent, STANLEY is committed to education. “We bring them into the family and focus on education, such as IT and IoT training. That’s critical in a world where unemployment is less than 3%. Finding good people, growing good people, and retaining good people – we do that exceptionally well at STANLEY,” says Kushner. STANLEY’s strong vertical markets including data centres, higher education, and logistics. They are also strong in multi-location installations (such as banking.) STANLEY has a big footprint throughout North America and Europe. PACOM access control and 3xLOGIC cloud-based solutions In addition to STANLEY’s core integrator business, the company also manages several manufacturing brands such as PACOM access control and 3xLOGIC cloud-based solutions.Mergers and acquisitions have been commonplace in the integrator space Beyond its company-owned integrator locations under the STANLEY brand, the company also owns Sonitrol, the strongest brand in the market for verified response with 65 franchises in North America. Sonitrol is the most recognised brand by law enforcement for verified response. Mergers and acquisitions have been commonplace in the integrator space, and Kushner says that STANLEY is “open and actively looking for properties that fit our commercial growth strategy”. He notes that STANLEY focuses on the commercial side of the market, where there are good margins and continuing growth. They pay less attention to the residential side which is “being heavily disrupted”. Strong partnerships with manufacturers STANLEY has strong partnerships with several manufacturer partners, through which they bring new breakout technologies to market from emerging companies. An example is Evolv Technology, a manufacturer of gun and bomb detection technology. “We see them as a leading provider of the technology, and they are, in my mind, a very disruptive provider,” says Kushner. STANLEY is also collaborating with a company – to be announced – that provides a unique gunshot detection technology, he says. STANLEY is also cooperating with dormakaba to implement Switch Tech, a Bluetooth wireless core that can replace any standard mechanical lock core. Existing locks can be transformed into electromechanical locks in minutes. STANLEY is also developing a tight integration with Lenel’s mobile credentialing system. STANLEY is also cooperating with dormakaba to implement Switch Tech GSX 2019 and ISC West 2020 At the recent GSX 2019 show in Chicago, Kushner says STANLEY heard a lot about cybersecurity, especially customers wanting to make sure they are investing in cyber-hygiene and who are looking to expand into providing cyber protection. “In concert with cyber-hygiene, they are looking for health monitoring or assurance that network devices are operating properly,” he says. “They want to ensure their security platforms are cyber-secure and up to date with the latest software versions.” STANLEY is also a big proponent of cloud offerings, and Kushner hints at a big announcement at the upcoming ISC West show in Las Vegas of additional cloud offerings and/or partnerships. “There will be a variety of new solutions to be introduced, including hosted solutions and applications that benefit both security and that add new value to businesses overall.”
Iris ID, a provider of iris recognition technology, announces it will provide its biometric recognition technology to the County of Los Angeles to make its prisoner release process safer, more accurate and efficient. Iris ID’s OU7S-AK camera module will be part of 163 Livescan stations in 114 law enforcement locations throughout the county. The new criminal booking solution will bring iris-based identity authentication capabilities to a system that previously relied on fingerprints and photos to enrol and identify individuals arrested in the nation’s most populous county. Identification of all criminals arrested The Los Angeles County Sheriff’s Department is one of 64 law enforcement agencies in the county that are part of the Los Angeles County Regional Identification System (LACRIS), which is the entity responsible for the identification of all criminals arrested in the county. Tim Meyerhoff, director, Iris ID, said the company’s contactless iris-based technology was part of an FBI-funded pilot project began in 2015. “The Iris ID system will allow for a more accurate release of individuals as a person’s iris is much less susceptible to damage than their fingerprints,” he said. Automated fingerprint identification system “With more than 300,000 bookings annually, the Los Angeles County Sheriff’s Department is always interested in eliminating the improper release of any individual.” The iris capture technology is part of a larger contract to be overseen by South Carolina-based DataWorks Plus which will also supply central servers, supporting software and implementation and support services. The contract will be paid for using funds from the state Automated Fingerprint Identification System. Program implementation will begin after July 1, the start of the county’s 2020-2021 fiscal year. Full deployment is expected to be completed within six months.
Southeastern Rail Network operates train services between London, Kent and parts of East Sussex. It is one of the busiest networks in the country, transporting 640,000 passengers each weekday on its 392 trains, which are temporarily housed in 12 depots situated around South-East England. Some of these depots are unmanned, and therefore require intelligent security solutions. Bosch Security System’s Integration Partner, Taylor Technology Systems, were tasked with upgrading the entire video surveillance system across the 12 depots. The legacy analogue surveillance system had come to the end of its service life and was overdue for an upgrade. A state of the art IP based system was required to deliver upon the clients requirements for all the depots to be fully monitored 24/7. Tracking train arrivals departures A fully integrated solution was required that could provide all of this while also reducing costs An upgrade to an IP camera solution can provide vastly improved image quality, wider coverage and wireless capability, along with Intelligent Video Analytics and high levels of data security encryption. The primary challenge that needed to be solved by the video surveillance solution was securing the 5 unmanned depots. Some of these sites had previously been subject to thefts due to unauthorised entry via the main entrances. All access gates therefore needed to be monitored 24/7, ensuring that all personnel, or vehicles, entering the sites are tracked and reported. This includes all deliveries to onsite buildings as well as tracking all train arrivals and departures. A fully integrated solution was required that could provide all of this while also reducing costs. High clarity video in low-light levels A critical factor was that the video surveillance solution had to be able to work unimpeded throughout the night. The installed video technology therefore needed to provide high clarity video in low-light levels, whilst also still ensuring that the Intelligent Video Analytics worked as required. The camera portfolio installed across the 12 depots included FLEXIDOME IP starlight 7000 VR, DINION IP starlight 7000 HD and AUTODOME IP starlight 7000 HD cameras. These cameras are all equipped with Bosch’s Intelligent Video Analytics solutions ensuring that the most relevant video data can be precisely applied to the requirements of the train depots. Network surveillance systems Some surveillance cameras are using a digital trip wire to identify movement at perimeters These analytics solutions allow video surveillance to go further than just security applications, using statistics in the form of metadata for purposes such as perimeter control and vehicle tracking. Using Camera Trainer, a built-in machine learning capability, surveillance cameras can also be taught to recognise and detect stationary objects or certain situations instead of being triggered by motion alone. As an integral part of this end-to-end Bosch solution, all recording from the depots is remotely managed using DIVAR IP all-in-one 7000 recorders – an all-in-one recording, viewing and management solution for network surveillance systems. To combat unauthorised entry to unmanned sites, the IP cameras are using Intelligent Video Analytics to prevent security breaches before they occur. Some surveillance cameras are using a digital trip wire to identify movement at perimeters. In-built Intelligent Video Analytics If movement is detected, an alert is sent to security personnel who are able to view the recording and respond straight away. Intelligent Video Analytics from Bosch are able to differentiate between genuine security events and false-triggers, meaning that security alerts are dependable and reliable. In-built Intelligent Video Analytics went further in this application; to monitor train movements, track deliveries inside the depot and provide access to staff. Taylor Technology Systems carried out the installation and configuration of this solution The AUTODOME IP starlight 7000 HD cameras were installed on gantries over train tracks and were the ideal PTZ solution, as they can continue tracking while panning, tilting or zooming. All cameras with starlight technology continue to deliver full intelligent analytics at night and in low light levels. The cameras installed around the depots are able to provide colour filtering down to 0.0077 lux or deliver detailed monochrome images where other cameras show no image at all. Expert installation and integration Taylor Technology Systems, a member of our Installer and Integrator Partnership Programme, carried out the installation and configuration of this solution. They expertly delivered the installation project at active depots while keeping the legacy system working. The team worked with Southeastern to arrange complex line blockages so they could install the equipment safely without affecting the day-to-day operation of the railway. To complete the project, engineers from Taylor Technology Systems completed comprehensive training courses on the Bosch Video Management System, allowing seamless management of the digital video across IP Networks. This ensured that the Bosch technology was installed exactly to specification. Ensuring site safety The Taylor Technology engineers worked to a professional high standard by ensuring site safety" Taylor Technology Systems have been awarded a Bosch Outstanding Achievement Award for their work on this project. “Taylor Technology Systems deployed a full suite of servers and IT equipment with Bosch CCTV Platform across several sites to ensure security was enhanced due to end of life equipment. With full in-depth training, the Taylor Technology engineers worked to a professional high standard by ensuring site safety was paramount during the 6 month project that was on time and within budget", says Steve Martin, Project Manager, Southeastern With built-in analytics in all cameras, this end-to-end Bosch solution lowered costs for the end-user. Installation, configuration and maintenance were also eased, as pre-configured default settings can be used in applications such as vehicle tracking and perimeter detection. The guaranteed top build quality from Bosch, combined with expert installation, ensures that this is a long-term solution for Southeastern.
Valdosta Regional Airport in Valdosta, Georgia offers three daily commercial flights to and from Atlanta Hartsfield-Jackson International Airport, along with general aviation. The airport contains three runways, two of which are used by commercial aircraft. The airport offers ground transportation, free parking, a Subway restaurant, and many other services such as hangar space and flight training to name a few. Previously, Valdosta Regional Airport operated a legacy Matrix access control system. The proprietary system, including the readers, panels and software, was outdated, making it difficult and expensive to obtain replacement parts. Building automation systems Looking for an open solution, Valdosta Regional Airport turned to Allcom Global Services for their expertise and upgraded to AMAG Technology’s Symmetry SR Retrofit Access Control system with HID readers. “Symmetry integrates into various video, intrusion and building automation systems,” said Kevin Cioffi, vice president, Allcom Global Services. Valdosta has more freedom to research competitive pricing and alternative options" “By choosing an open system, Valdosta has more freedom to research competitive pricing and alternative options. We are thrilled they have chosen Allcom. We gutted all the circuit boards and changed them to the Symmetry panels,” said Tim Register, operations manager/airport security coordinator, Valdosta Regional Airport. “We kept the antennas and how the data was transmitted. All the mounts stayed the same; we just swapped in Symmetry and it worked.” Integrating different technologies Symmetry controls access to the perimeter of the airport including the vehicle access gates and all outside doors facing the Security Identification Display Area (SIDA). The SIDA includes all areas that have access to the commercial apron and tarmac. The SIDA also requires a reader with a PIN-plus-card swipe to open, which make up 75% of the airport’s readers. The remaining Airport Operations Areas (AOA) require only a proximity card swipe to open, which are mostly internal doors and the main entrance. Thirty-two new HID proximity card readers were installed in total. To get the open system the airport required, Valdosta Regional Airport replaced older panels with Symmetry SR panels. As the Symmetry system changes or expands, integrating different technologies or adding more readers will be easy and less expensive. More economical approach The simple job of creating a badge for a user was cumbersome and time consuming with their old system The security operators found Symmetry much easier to learn and use, saving money and hours in training time. The simple job of creating a badge for a user was cumbersome and time consuming with their old system. With Symmetry, badges are created on demand, onsite, with no hassle or extra charge. “Symmetry provided us a more economical approach to facilitate the same thing we used to do with a more expensive, proprietary system,” said Register. “It is much easier to create a badge with Symmetry.” Life flight helicopter Airport authority employees, TSA, airline employees, fixed based operators, life flight helicopter and fixed wing aircraft are all protected by Symmetry. In addition to the perimeter, Symmetry controls access to all work areas within the airport and to the hangars located inside the perimeter fence. “An incident happened one Sunday morning where a car hit a pole and brought the power down,” said Tim Register. “If we were operating the Matrix system, it would have been down for hours. Our Symmetry system was only down minutes.”
Body Worn Cameras (BWCs) are transforming policing and security around the globe, helping to create new connected officers who can stream video, access information and collaborate in real-time enabling them to operate safely and more efficiently in the field. Richie McBride, Managing Director of BWC experts Edesix, says "BWCs are now built for a connected world and are being used by officers on the front line to help prevent both criminal and anti-social behaviour when out on patrol.” Importance of body worn cameras in policing Innovative solutions driving creation of connected officers who can stream and access information in real-time He adds, "Technology has transformed policing and security in recent years. New innovative solutions have driven the creation of new connected officers who can stream, access information and collaborate in real-time. BWC captured footage not only provides greater transparency of interactions with the public, but also significantly increases early guilty pleas and saves officers valuable time as they often do not need to attend court”. Richie further said, "Police officers have always been connected, either to the public and communities they serve, or with their colleagues on the street and in the control room. They have shared information and generated insights to help address common problems and protect those with common vulnerabilities. However, digital technology has now enhanced these connections, enabling officers to feel more empowered, supported and secure." VideoBadges enhance police personnel VideoBadges have been utilised by police forces across the UK for some time now. Police forces, such as the Police Service of Northern Ireland (PSNI), have utilised our BWCs since 2016 to enhance the security of both officers and the general public, and to improve training and best practice. There are now 2,500 cameras being used by over 7,000 officers covering approximately 173,000 incidents each year in Northern Ireland. The BWCs are being utilised by Local Policing Teams, Neighbourhood Policing Teams, Tactical Support Groups, Roads Policing Units, Dog Section, District Support Teams and Armed Response Units. Importance of good video evidence Body Worn Video has the potential to improve the quality of evidence provided by police officers" PSNI Superintendent David Moore adds, "Video evidence puts the victims of crime first. The pilot of this technology in Foyle district demonstrated how Body Worn Video has the potential to improve the quality of evidence provided by police officers and thereby increase the number of offenders brought to justice. Video evidence provides a compelling account of events and enables the raw emotion and action from a scene to be replayed in the courts in a manner that could never be captured in a witness statement.” He adds, "It also supports accountability and transparency, both of which are key elements in increasing public confidence in policing. The introduction of this new technology is the latest example of our commitment to these principles as we continue to work together with the community to keep people safe." Head-mounted cameras Armed response and firearms teams are also being equipped with head-mounted cameras due to the fact that chest-mounted cameras could potentially obstruct an officer's view during firearms use. The Metropolitan Police recently began rolling-out 1000 head-mounted cameras, with West Yorkshire Police and North Wales Police following suit.
H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. Its most recent transformation project involved an access control system — for its own offices. H-Farm needed a solution to streamline access management for lots of people at a growing portfolio of sites and buildings. H-Farm experiences rapid turnover of users, both because new businesses join regularly and because they organise up to 300 events every year. Battery-powered locks Any new locks would need to extend an existing Axis system, but without adding complexity for day-to-day administration. To meet their needs, H-Farm selected a combination of Aperio® handles, security locks and escutcheons, each easy to retrofit, so day-to-day work at their busy offices would not be disrupted by intrusive installation. So far, 40 Aperio® Online H100 wireless door handles, 6 Aperio® Online L100 wireless locks and 4 Aperio® Online E100 wireless escutcheons have been fitted across multiple H-Farm locations in northern Italy. All Aperio® battery-powered locks are wireless, so no ugly cabling runs to H-Farm’s doors. Because Aperio® offers wide range of battery-powered devices, H-Farm can choose the precise wireless lock for every application: the L100 lock protects doors with high security demands; robust H100 handles suit interior doors with high traffic. Wireless access control Aperio® H100 enables customers to add doors to their access control solution because cost per door is lower H-Farm interior doors are mostly secured with the new Aperio® H100 wireless handle — Intersec’s Access Control Product of the Year in 2018. The Aperio® H100 packs the flexibility and affordability of Aperio® wireless access control into a slim, cleverly designed door handle. Its standard battery slots inside the handle, ensuring a minimal footprint. ASSA ABLOY’s device design team incorporated electronics into the handle lever on the outside of the door, without jeopardising security. Design has become a major feature of the H100’s appeal. H-Farm wanted devices to blend with the contemporary architecture of their new €101m H-Campus development. “Aperio® wireless access control hardware is solid, nice looking and perfectly fits our environment — solving our access problem,” says Alberto Aldrigo at H-Farm. The H100 and other Aperio® devices are easy to install; for the H100, basically two screws complete the job. Going forward, this will enable H-Farm to quickly bring new buildings into the same access system as they expand to fresh locations. The H100 fits around 90% of target doors with two main models: one for left-handled doors, the other right-handed. “The Aperio® H100 also enables customers to add more doors to their access control solution because the cost per door is lower,” says Tania Amico, Aperio® Sales Manager at ASSA ABLOY Italy. Seamless integration H-Farm managers want to control access to site doors, or bring entirely new premises into their access system The open architecture underpinning Aperio® devices enabled easy online integration with their existing Axis system via PRYSM AppControl. Remote operation from a single, central software interface is seamless, which makes administering the system easy. “The PRYSM AppControl software utilizes the integration Axis completed with Aperio®,” says Piergianni Marana, Key Account Manager at Axis. “And the AXIS A1001 Door Controller is based on open hardware, which makes installing and configuring an Aperio® wireless lock easy and seamless.” An Aperio® RS-485 Hub coordinates up to 8 Aperio® locks within a typical range of 15 to 25 meters, communicating with the admin system via the powerful AXIS A1001 IP Network Controller. One AXIS A1001 Door Controller can manage one wired door and one Aperio® hub, up to 9 doors per hub. AES 128-bit encryption ensures communication between lock and system is secure. Online Aperio® integration gives facility managers real-time status information about their premises. Aperio® locks are wireless, so there was no expensive or time-consuming cabling. The AXIS A1001 uses Power over Ethernet (PoE), which eliminates the need for power cables to the controllers, too. If needs change at a facility — perhaps H-Farm managers want to control access to more site doors, or bring entirely new premises into their access system — it’s quick, efficient and easy for an installer to fit Aperio® locks and integrate the doors with the AXIS Entry Manager control panel. To discover whether your existing security system is ready for wireless Aperio® locks, download a free, fast Compatibility Checker at https://campaigns.assaabloyopeningsolutions.eu/aperio-upgrade
PerpetuityARC Training, part of the Linx International Group recently delivers a risk and crisis management workshop for Lafarge Egypt (part of the LafargeHolcim Group) in Cairo. The training provided senior managers from across the organisation with the knowledge and skills needed to manage resources during a crisis and operate within the organisation’s crisis management and compliance framework. The intensive programme was built collaboratively between PerpetuityARC Training and Lafarge Egypt and specifically tailored to its operating environment in the construction materials industry. Achieve successful resolution It was great to see them solving problems in a pressured, but safe environment" In a series of practical and theoretical exercises, Linx International Group Director, Angus Darroch-Warren, assessed and enhanced the ability and confidence of participants to apply their new skills to manage complex and evolving crisis scenarios, each requiring close collaboration between team members, in order to achieve a successful resolution. Security Director at Lafarge, Magdy Khorshid, stated: “The course was amazing, very practical and interesting to all and I received much positive feedback from all learners.” Angus commented: “The Lafarge teams engaged fully with the workshop scenarios. It was great to see them solving problems in a pressured, but safe environment, that allowed them to think through issues and respond using identified resources and procedures.” The workshop is the latest collaboration in a five year relationship between Lafarge Egypt and PerpetuityARC Training. During this time PerpetuityARC Training has delivered its security and risk related courses to employees and stakeholders in Egpyt and the UK.
Round table discussion
Traditionally, dealer-installers and/or integrators provide the front line of support to end user customers after a sale. Because integrators assemble and provide the “solution” – often using products from multiple manufacturers – they are most familiar with the total system and can troubleshoot any problems. However, manufacturers may be better equipped to deal with specific problems after a sale and also to provide a variety of resources to end-users. It’s a delicate balance, and the best approach may be dependent on the product or even the market. We asked this week’s Expert Panel Roundtable: What is the role of manufacturers in providing support to end user customers after the sale?
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?
The retired police officer who takes a cushy job as a security director is almost a cultural cliché. Like any cliché, the idea has roots in the real world, where police departments have often been a rich source of the security industry’s leadership talent. Former military personnel often find their way to the security industry, too, and realise that the familiar elements of discipline and command structure translate well. We wondered about the impact of this historic trend and whether it is changing as the security industry itself evolves. We asked our panel: What effect has the traditional recruitment of corporate and institutional security leaders from the law enforcement and/or military communities had on the security marketplace? Is the tradition changing and why?
Automatic vehicle identification: State of the industry 2020Download
How analytics engines mitigate risk, ensure compliance and reduce costDownload
11 considerations for embedded system RFID readersDownload