Door and Hardware Federation (DHF) has announced that it will be launching a new safety seminar this year at the 2020 FIT Show at the NEC in May. The free seminar is specifically aimed at those with responsibility for automated gates and industrial doors and will take the form of a two-hour session. In addition, the pro-active federation has produced a free ‘owners guide’ entitled: Guidance for owners and managers of Industrial Doors, Garage Doors, Powered Gates and Traffic Ba...
Professional security installers are the essential lifeblood of IFSEC and FIREX International, so they are delighted to announce their long-standing partners SSAIB as the official Installer Partner for the 2020 shows, taking place once again at London’s ExCeL from May 19-21. As the certification body for security and fire alarm installation professionals, manned guarding services and monitoring, SSAIB-approved companies are exclusively invited to IFSEC International and FIREX Internationa...
PSA, a provider of professional systems integrators, announced the addition of Defendify to the partners in its Managed Security Service Provider (MSSP) program. The MSSP program is designed to help systems integrators diversify their service offerings and realise the full potential and benefits of a managed services business model. “Defendify gives our integrators the ability to protect their organisations from cyber threats with a holistic platform at an affordable price,” said Da...
Established in 1950 in a small chapel in downtown San Diego to serve San Diegans experiencing homelessness and poverty, Father Joe’s Villages has since grown to include a comprehensive campus and scattered-site programs that provide comprehensive housing and services to people struggling with homelessness in San Diego. The organisation provides housing to over 2,000 people every night and serves more than one million warm, nutritious meals annually. In addition to offering hope to those e...
Multi-discipline distributor, Oprema has been accredited ISO 9001 certification for their Quality Management Systems (QMS) following a 2-day audit. Established by the International Organisation for Standardisation (ISO), the ISO 9001:2015 standard provides a framework for organisations QMS built around the concept of continual improvement. Quality Management Systems (QMS) An effective QMS in place helps provide focus to a business and allows the organisation to identify key processes Having...
Ojo Technology, a Northern California security systems integrator, has named Chris Krajewski its vice president of services. Previously, he was general manager for the company’s Central Valley office located in Stockton, California. In his expanded role Krajewski will oversee the organisation’s service offerings included training, maintenance and managed and cloud services. His team will work with customers to make sure their systems remain up and running while providing maximum valu...
barox Kommunikation AG, the manufacturer of IT switches, media converters and IP extenders specifically designed for the demands of video networks, is proud to announce that alongside its ISO 9001 certification, it has successfully implemented an ISO 27001 Information Security Management System (ISMS) for data and information security. Designed to help organisations manage their information security processes in line with international best practice, achieving the ISO 27001 Standard was a key objective for barox, where the implementation and management of the secure communication of sensitive information has always been a top priority for the company. The ISO 27001 Standard defines the requirements for the setup and implementation of a documented ISMS Now that the manufacturer of IT switches for video networks has been certified by an independent testing body, the ISO 27001 certification will be utilised to support the company’s drive to guarantee that it continuously improves and rigorously checks its information security safety standards. Customer and product data protection The ISO 27001 Standard defines the requirements for the setup, implementation and continuous improvement of a documented ISMS, and the needs of all parties involved are equally important. In addition, applicable legal and regulatory requirements are taken into account and security mechanisms employed to protect all internal company information. This also includes employee, customer and supplier data, as well as information on product safety: "Our products are used as active components in security and safety-critical systems," explains Angelo Banfi, co-founder and MD of barox. "Therefore it is particularly important for us to protect this security-relevant, customer and project-related data." End-to-end information security Cyber security is high on the barox agenda, especially within the company’s video switch training seminars barox take a holistic view to the safety of their products, where the product characteristics and the communication of product, project-specific parameters and processes, are all required to be handled safely and responsibly. This includes the entire process from production, through to delivery of the products; including physical transport and product storage. "We take the issue of end-to-end information security very seriously,” Angelo confirms. Implementation of cyber security Regular training will maintain the high standards required by barox employees in relation to the requirements of information security. Likewise, cyber security is high on the barox agenda, especially within the company’s video switch training seminars. "We place a great deal of emphasis on supporting our customers to help improve their practical implementation of cyber security,” Angelo continues. “For example, we still see management access passwords for switches left in their factory default setting, so making sure that the security basics are understood is a good platform to advance high cyber security standards.”
Allied Universal®, a security and facility services company in North America, acquires APG Security - a South Amboy, New Jersey - based company offering manned guarding and investigative services on a national level. Terms of the deal were not disclosed. “APG Security’s talented management team has built a reputable business offering top-of-the-line security services on a national level,” said Steve Jones, CEO of Allied Universal. “This acquisition is part of our long-term plan to continue to provide unmatched depth of resources into local markets around the country.” Providing top-notch security solutions For more than 42 years, APG Security has been protecting businesses and people by providing top-notch security solutions. APG Security provides its clients with highly trained uniformed security officers, residential and commercial security, special events. “This acquisition will result in an increase in security service offerings and expanded geographic reach for our clients,” said Dennis M. Kelly, CEO of APG Security. “In addition, Allied Universal will offer our elite team of security professionals more opportunities for career management, trainings and growth.” APG Security was represented by Triabacus in the transaction.
Texecom is delighted to be sponsoring, along with CSL and Hikvision, the new Electronic Security Systems Competition at this year’s WorldSkills UK LIVE on 21–23 November at the NEC in Birmingham. WorldSkills UK and Skills for Security launched the competition to raise awareness of apprenticeship and career opportunities in the security and surveillance industry. Attracting over 70,000 visitors, WorldSkills UK LIVE is the UK’s largest skills, apprenticeships and careers event. Electronic Security Systems Texecom has been a longstanding supporter of engineering apprentice training within the security industry" The event also hosts the National Finals of the WorldSkills UK Competitions which see the UK’s top apprentices and students compete to win Gold, Silver and Bronze in their chosen skill. This year, for the first time, visitors to LIVE will be able to watch apprentices take part in the Electronic Security Systems Competition which has been designed to reflect the role of an Electronic Security Engineer and the high standards that are expected within the industry. “Texecom has been a longstanding supporter of engineering apprentice training within the security industry, and we are delighted to partner with WorldSkills UK and Skills for Security for the launch of this competition,” says Clym Brown, Texecom’s Marketing Director. Electronic security apprentices “Electronic security fundamentally protects people’s lives and livelihoods and as such is a very worthwhile endeavour for young people to consider as a career choice. This new competition will highlight the skills and innovation in the industry to a wider audience, as well as increasing the training level and knowledge base of electronic security apprentices already involved.” As part of its commitment to helping the next generation of security engineers and installers adapt to the digital revolution, Texecom recently launched the Texecom Academy. Designed to help security professionals get ahead of the digital curve, it redefines what it means to be a security professional by providing the skills, tools and mindset that will define the future of security – for installers and their customers.
Milestone Systems has announced releasing the troubleshooting assistant for partners and customers using Milestone XProtect video solutions. Video management systems today are not only used to protect people and assets, but also to help optimise businesses and improve the way people live and work. Milestone open platform VMS Milestone Systems’ open platform video management software (VMS) makes these innovations easily available to a wide range of integrator, consultant, and end-user customers. As a result, more and more businesses and people may need support to maintain, upgrade, and operate their XProtect system. Fortunately, the troubleshooting assistant is now available 24/7 to help users resolve issues and optimise their systems. This complimentary new online tool is a helpful addition to existing Milestone eLearning troubleshooting courses, Knowledge Base articles, and robust User Forum Milestone Troubleshooting Assistant The Milestone Troubleshooting Assistant is a self-help online tool that enables XProtect users to identify causes of issues and guides them through a step-by-step resolution. The Milestone trouble-shooting assistant is an interactive decision tree that provides support in maintaining, upgrading, and troubleshooting many common issues, such as: Being unable to log into the Smart Client Being unable to add a camera Having server performance issues The guide leads users through a branching process where one can select answers to questions that become progressively more specific to their issue. The assistant leverages and compliments the Milestone Knowledge Base articles, User Forum, and more. Accessible with Milestone Support Page The Troubleshooting Assistant is available online, and is also accessible through the Milestone Support Page. Milestone will regularly update the troubleshooting assistant and add more guides to address additional issues as needed.
Genetec Inc., a pioneer technology provider of unified security, public safety, operations, and business intelligence announced strategic new initiatives to support its fast growth in Mexico. To spearhead these new initiatives, long time Genetec sales leader, Alain Bissada, who is currently Senior Director for Canada, is taking on a new expanded role to include Mexico as part of his responsibilities. In this new position, Alain Bissada will be responsible for supporting the company’s wide range of public safety, industrial, enterprise, retail and banking customers in Mexico, and put in place the necessary infrastructure to support its ambitious growth plans. Unified IP security solutions Genetec has been growing its market presence in Mexico at a very rapid pace Genetec is currently undertaking a recruitment campaign to support its growth in the region and is actively looking for a new country manager. The company will be moving to new, modern offices in the Polanco region of Mexico City, featuring a state-of-the-art experience center to showcase its entire range of unified IP security solutions, a sales engineering lab, training facilities, and additional space to accommodate new employees. As the vendor of video surveillance, access control and license plate recognition solutions, Genetec has been growing its market presence in Mexico at a very rapid pace. The company currently has public safety customers in 26 out of Mexico’s 32 states, and hundreds of private customers across a wide range of industries including, manufacturing, logistics, utilities, hospitality and more. Physical security infrastructure investment “Customers are looking for technology solutions that not only enable them to protect people and assets but also help them make the most of their video surveillance and physical security infrastructure investment to improve their operations,” said Alain Bissada, Senior Director, Canada and Mexico. “I look forward to working with our talented team and network of systems integrators in Mexico to support our ambitious plans in the region and to give our customers the support they need to meet their security and business operations needs.”
The highly acclaimed Dubai Health, Safety & Environment Forum returns to Dubai from 24-25 November, with a stellar line-up of confirmed speakers from Ministry of Health & Prevention, UAE, Dubai Municipality, ADNOC, DEWA, Emirates Global Aluminium as well as senior executives from leading international and regional companies. On the agenda for this year’s forum are topical health, safety and environment issues. With a raft of infrastructure and construction developments underway in the UAE in the run up to Expo 2020, safety and sustainability issues will be highlighted by speakers and delegates. Taking place from 24-25 November 2019 at Habtoor Grand Resort, Autograph Collection Dubai, the Dubai Health, Safety & Environment Forum brings together industry experts from across the region; including health and safety professionals, government regulators, policy makers and solution vendors. Monitoring hazardous environments with IoT The forum presents an opportunity for attendees to gain deep insights on policy, strategies and technical expertise Advisory panellists include Raed Marzooqi, head of HSE, Dubai Municipality; Dr Rehab Al Ameri, director of National Accreditation System Emirates Authority for Standardisation and Metrology; Salman Dawood Abdulla, executive vice-president of HSSEQ, Emirates Global Aluminium; Professor Janvier Gasana, chair of department of Occupational Health, Kuwait University; Nasser Al-Buhairi, head of Emergency Unit, Kuwait Oil Company; Dr. Ola Ahmed Mira, Accredited Physician, International Coach Federation. Topics that will be discussed at The Dubai HSE Forum 2019 include wellness and prevention management, challenges to occupational health and safety, changing the construction industry safety mindset in the industry 4.0 era, human factors vs. process safety, the impact of digital transformation on workplace health and safety, mitigating work-related risks using artificial intelligence (AI) and monitoring hazardous environments with IoT (Internet of Things). These topics are crucial for major sectors such as oil and gas, construction, utilities, logistics and transportation, manufacturing, and food and beverage. Strategies and technical expertise The forum presents an opportunity for the attendees to gain deep insights on policy, strategies and technical expertise. Held in association with Vin Technology, Lloyds Register, Clyde &Co, Ideagen, Board of Certified Safety Professionals, JLG, Universal Site Monitoring, and Arasca, the Dubai HSE Forum builds on the success of the highly acclaimed inaugural event that was first held in September 2015. “The forum gives a chance to step out of the daily routine and to think and reflect about the subjects that have been spoken about – to relate experiences to what is going on. It gives the visitors a platform to connect and network,” said Andrew Barker, general manager – Group Health and Safety, Rezayat Group. AI and IoT Soumen Chakraborthy, event producer, Dubai HSE Forum 2019 commented: “While the UAE’s vision and ambition is showcased in events such as Expo2020, there is a need to significantly strengthen the workforce by providing appropriate training in issues related to occupational health, safety and environment. The Dubai Health, Safety and Environment Forum is the perfect platform for safety professionals to explore how new technology such as AI and IoT is transforming their profession. We look forward to delivering an informative, enriching and vibrant fifth edition of the Dubai HSE Forum."
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research programme to provide valuable feedback to the GSA Schedule 84 programme and on to the GSA central office. The director of GSA Region 7 Schedules Program, the Schedule 84 Branch Chief and the Category Manager Subject Matter Expert who manages our suppliers' panel gave us their full attention as we discussed the successes of the programme, hot topics, problems and the future. We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort and renewed enthusiasm Innovative review team We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort, renewed enthusiasm and productive changes building upon the successes of 2017. There was high praise for the accessibility to the Schedule 84 staff. Their consistent quick response to questions and concerns, thinking outside the box and supporting the programme by partnering with their contractors was much appreciated. There has been a renewed spirit of partnering to cooperatively bring the best to agency customers. It seems to be working as per the Centre Director sales are growing for GSA Schedule 84. Advocating for the security industry In my experience, business development starts with the Administrator from Region 7 in Ft. Worth, TX. As the annual Schedule 84 Industry Day at the SSAC begins he is shaking every hand and passing out his cards looking folks right in the eye asking, “how can I help you?” They have the best practices and most organised paperwork. The SSAC director has chosen well in her staff and is hands-on in every endeavour to direct things along when challenges occur or to improve the programme. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry It continues with the centre’s CASE Manager encouraging the contractors at events, visiting agency customers and promoting the GSA Schedules Program by helping coordinate the partnering. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry for adding new technology, meeting with industry associations, understanding the complexity and challenges of Homeland Security Presidential Directive 12 (HSPD12) and advocating for the purchasing Physical Access Control Systems (PACS) utilising the appropriate standards and the GSA Program among other innovations. As far as the supplier panel, we gave our GSA Schedule 84 team and leaders high praise for 2018. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List Changes in the GSA programme Some changes this year in certain GSA programmes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) developed to assist with solution procurements. This new SIN was added to Schedules 03FAC, 56, 70, 71, 00Corp, 738X and 84. Under Schedule 84 it is SIN 84-500. GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex Essentially this SIN allows agencies procuring under the aforementioned GSA Schedules’ programmes to purchase and the contractor to add items and services not known prior to the task as a Contract Line Item Number (CLIN) not to exceed 33% of the order. For more information and FAQs on OLMs go to www.gsa.gov/olm. This is not to take the place of “Open Market” items for adding products only that are not listed on a company’s GSA Contract. Physical access control products Previously, GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex for the agencies. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List according to the standards created under FIPS201. These products appear under SIN 246 35-7 after being tested and approved by GSA. To be qualified to install these products under the GSA Program at least one individual from the GSA Contractor company must complete the class and be CSEIP certified before applying for labour SIN 246 60-5. Additionally, the company must demonstrate certain qualifications and have past performance for this type of work. The Security Technology Alliance offers the training class and certification. Certified individuals and approved products are listed at www.idmanagement.gov. Companies listed with SIN 246-35 7 and SIN 246-60 5 may be found by searching at www.gsaelibrary.gsa.gov. Updates to guidance for procurement Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide. The ordering guide posted at www.gsa.gov/firesecurity is a valuable support tool created to assist agencies with understanding the requirements of FIPS201 and procuring a PACS. The guide includes relevant regulations, FAQs, sample systems designs, sample statements of work, a list of key points of contract for additional help and questions. In partnership with GSA and guided by the GSA Ombudsman group, the Security Industry Association and the Security Technology Alliance members and their contractor companies participated in a GSA Reverse Industry PACS Training Day on September 17, 2018. We presented from an industry perspective important fact on PACS system requirements, procurement planning, providing information on resources and further educating with panel discussions, individual presentations and amusing skits to over 300 Government agency staff and acquisition specialists. You can find some of the unedited recording of the PACS Reverse Industry Day Training on YouTube. Some changes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) GSA Schedules Program A hot topic about the GSA programme for 2018 was also an issue for the prior year. The GSA Schedules Program is a streamlined contracting vehicle incorporating specific Federal Acquisition Regulations for more efficiently purchasing commercial items. Companies may apply per a continuous open season for a 5-year contract with three 5-year options to renew. Contractors are vetted for past performance, corporate experience and financial capability. Products and services are considered for offering to Federal, State and Local customers (for Schedule 84) with pricing that is determined to be fair and reasonable through negotiations with GSA. To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor as well as the competition of identical or similar item pricing. The most vocal complaint of concern from the contractors was regarding the consideration of competitor contractors offering identical items with out-of-date pricing or holding a Letter of Supply not authorised by the manufacturer. GSA pricing tool Since the GSA utilises a pricing tool to determine if the pricing offered is competitive, a rogue competitor can cause a pricing action to possibly be rejected due to out of date information even as the manufacturer offers an update of the product. This is an issue on all GSA Contracts that the supplier panel hopes will be reconsidered by GSA policymakers at the central office. Most of us believe the Letters of Supply should only be issued by the manufacturer or with documented specific permission of the manufacturer to a reseller. Manufacturers may want to have a better understanding of the Letter of Supply, how it is considered by GSA and more carefully choose their Government partners for experience and compliance. Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy Overcoming challenges for the security community Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy. GSA eBuy is an online Request for Quotation (RFQ) programme that is for GSA Contract holders only. Agencies will post their requirements by Special Item Number for at a minimum 48 hours. Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract. GSA Participating Dealers may take orders on behalf of a manufacturer if they are authorised under the manufacturer’s GSA Contract. They may also have an online PO Portal to receive orders. But they have no access to GSA eBuy to response to RFQs. Usually, under these arrangements, the manufacturers do not respond directly, so there is a problem using GSA eBuy for opportunities as their GSA Participating Dealers have no access to respond. GSA Schedule 84 leadership In some instances, a contracting officer may allow an emailed quotation. However, with the use of the electronic ordering system, this has become a common problem we hope to bring to the attention of policymakers. Some changes to the programmes may make the presentation of documentation more effective going forwardThe GSA Schedule 84 leadership has been helpful to explain the challenges to the agencies to try and resolve such issues. So, what’s up for 2019? GSA modernisation is coming. There will be improvements to their tools and more consolidations of SINs and more. There have been discussions of a revival of the GSA Expo. The Expo offered training for contracting staff both Government and private industry. Valuable tools for vendor training Equally important is the networking, meetings and the exhibits of the contractors. Expos have been discontinued since 2012 but smaller events have been growing as well as online webinar training. Webinars are valuable tools for GSA and vendor training, but they do not take the place of being able to meet your customers face-to-face. GSA online eOffer and eMod programme have made processing actions more efficient. Some changes to the programmes may make the presentation of documentation more effective going forward. The GSA online website for viewing the items on the GSA Contract and for purchasing items, GSA Advantage could definitely use an update as it has been basically the same for 20 years. Keep an eye on GSA Interact for the latest happenings with GSA.
PenTesting, also known as “ethical hacking” or “white-hat hacking,” has always been viewed as the “sexy” side of cybersecurity, a task that is far more exciting than monitoring systems for intrusions, shoring up defenses, or performing compliance audits. Numerous security conferences are devoted to the fine art of attempting to hack into systems – with an owner’s full knowledge and permission – and reporting on the results. At an organisational level within businesses, they also value PenTesting under the premise that it allows them to identify security vulnerabilities before cyber criminals can. There are some regulatory requirements like PCI-DSS that require penetration assessments as part of their PCI compliance. However, many organisations have come to over-rely on PenTesting, thinking that if all the issues were identified in a PenTest, they’re good to go. Not only is this not helping them improve their security posture, it is also leaving them with a false sense of security. A penetration test is a simulated, live attack on your environment by a white-hat hacker What is PenTesting? A penetration test is a simulated, live attack on your environment by a white-hat hacker, customised to address specific problem areas, such as web-based applications, mobile applications and infrastructure services like border VPNs and firewalls. The PenTest may include different types of attacks based on the requested scope from an organisation so that the tester attempts to come at each system from all sides, the way a cyber-criminal would. The goal is to identify which systems and data the tester was able to access and how an organisation can address the vulnerabilities that allowed them to get in. The limitations of PenTesting There is great value in performing periodic PenTests, which is why PCI DSS and other security standards mandate them. However, PenTesting has three significant limitations: PenTesting does not provide solutions Let’s be honest: No one likes reading technical reports, but typically, that's the only deliverable provided by a PenTester. The value of a PenTesting report varies wildly based on the scope of the testing, the PenTester’s technical expertise and their writing ability. The tester may miss some things, or not clearly convey their findings. Additionally, a PenTest is a snapshot in time and the PenTester could miss changes in the systems, configurations, attack vectors and application environments. Even if your system “passes” a PenTest, will it crumble in the face of a brand new, more powerful attack vector that emerges a week later? The worst type of “PenTest report” consist of an analyst producing nothing more than the results of a vulnerability scan. Even if the PenTester produces a well-written, comprehensive report filled with valuable, actionable information, it’s up to your organisation to take the action, which leads to the next limitation of PenTesting. The value of a PenTesting report varies wildly based on the scope of the testing, the PenTester’s technical expertise and their writing ability PenTesters only exploit vulnerabilities and do not promote change PenTesting does not highlight the missing links in your organisation's technology stack that could help you address your security vulnerabilities. This is often in the guise of being agnostic to the technologies that exist because their expertise is only offensive security – unless, of course, the performing company has “magic software” to sell you. PenTests also do not help to develop your organisational processes. Additionally, they do not ensure that your employees have the knowledge and training needed to treat the identified fixes. Worst of all, if your in-house expertise is limited, any security issues that are identified during a PenTest aren't validated, which leads to a misrepresentation of their magnitude and severity while giving your team a false sense of security. PenTesters are self-serving Too often, PenTesting pits the assessment team against the organisation; the goal of the assessment team is to find the best way to "shame" the business into remediation, purchasing the testing company’s “magic software”, then call it a day. Once the PenTesters find, for example, a privilege escalation or a way to breach PII, they stop looking for other issues. The testers then celebrate the success of finding a single “flag”. In the meantime, the business is left in a precarious situation, since other unidentified issues may be lurking within their systems. Shifting the paradigm of PenTesting The goal of PenTesters is to find the best way to "shame" the business into purchasing the testing company’s “magic software”, then call it a day Penetration testing can uncover critical security vulnerabilities, but it also has significant limitations and it’s not a replacement for continuous security monitoring and testing. This is not to say that all PenTesting is bad. PenTesting should be integrated into a comprehensive threat and vulnerability management programme so that identified issues are addressed. The purpose of a mature vulnerability management programme is to identify, treat and monitor any identified vulnerabilities over its lifecycle. Vulnerability management programme Additionally, a vulnerability management programme requires the multiple teams within an organisation to develop and execute on the remediation plan to address the vulnerability. A mature threat and vulnerability management plan takes time and is helpful to partner with a managed security services provider (MSSP) to help you in the following areas: Improve your cyber-risk management program so that you can identify and efficiently address vulnerabilities in your infrastructure, applications and other parts within your organisation’s ecosystem on a continuous basis; Perform retests to validate any problems identified through a vulnerability scan or a PenTest assessment; Ensure that your in-house staff has the knowledge, skills and tools they need to respond to incidents. Cyber risk management and remediation is a "team sport." While periodic testing conducted by an external consultant satisfies compliance requirements, it is not a replacement for continuous in-house monitoring and testing. To ensure that your systems are secure, you must find a partner who not only performs PenTesting but also has the engineering and development experience to assist you in fixing these types of complex problems in a cost-effective manner and ensuring that your systems are hardened against tomorrow’s attacks.
Kurt Takahashi, the new CEO of Pelco, says he will provide collaborative leadership to help build the Pelco team, work together hand-in-hand with team members, remove barriers and lead the company forward. He brings industry experience and relationships to the new post that will translate into new opportunities. Takahashi joins Pelco from AMAG Technology, where he served as President for the last couple of years. Earlier, he had stints at ADT, Tyco and Quantum Secure, where he was Global Vice President of Sales and Marketing. “This was an opportunity to join a brand that has deep, rich and far-reaching history,” says Takahashi. “I couldn’t resist the opportunity to come into a company such as Pelco and be able to make a difference.” Improving the fundamentals Takahashi acknowledges that Pelco has slipped in the last 10 years from its position as a market-leading brand. To address the situation going forward, the company must “improve fundamental things,” he says. Those fundamentals include keeping the customer first, putting the right people in the right roles, and executing technical support well. Keeping the customer first, putting the right people in the right roles, and executing technical support well “We have to provide customer service from when we receive an order, to acknowledging it, to processing it and shipping the order,” says Takahashi. “Another piece is to deliver revisions to a product in a faster time period and introduce new products to the market in a timely way. In terms of market presence, we learn that people haven’t really heard from Pelco in a while. We have to get in front of integrators and consultants more aggressively than we have in the past.” “It’s up to us to prove that we belong and can sustain and support customers moving forward,” he adds. “We will get new opportunities, but we will need to execute them. If we do that, we will grow.” Brand optimism Takahashi sees more reasons for optimism. “In spite of the problems, we are a big company with thousands of customers, a massive footprint, 10 offices around the world and people in over 40 countries. We are a strong, known brand around the world. These are a great foundation to grow from; we just have to execute better.” These are a great foundation to grow from; we just have to execute better Pelco’s new parent company, Transcom Capital Group, was another reason Takahashi was attracted to the position. He says Transom is led by “amazing professionals” that specialise in “transformational culture and how to diffuse best practices in an organisation.” At Pelco, Transom has already led surveys, workshops and focus groups throughout the organisation to create a vision, mission and values covering how the company wants to present itself in the market. From those values will emanate new process and policy improvements to move the company in the right direction. New visions and missions The company’s new, collectively developed vision is “to make the world safer.” The mission is “to deliver distinctive video solutions and world-class customer experiences.” The company’s new, collectively developed vision is “to make the world safer.” The company’s culture is built on six values: innovation and excellence, customer focus, integrity, respect and recognition, collaboration, and ownership. “We believe this is what will help drive our culture moving forward, and it’s the mindset of all of us as one team with one goal that will give us something to be proud of,” says Takahashi. “As we move into the new era of Pelco, you will see excitement internally and externally,” he adds “Everybody’s really eager to see Pelco come back and be a significant player.” Three horizons to success The idea is to look inward and improve on the current, successful product lines Takahashi sees three horizons that summarise the company’s path to future success. The first horizon is to focus on the fundamentals of what the company does today. The idea is to look inward and improve on the current, successful product lines, such as the VideoXpert video system and on-board video analytics. The second horizon will be to look at ways to advance the current feature set, whether “to build, partner or buy.” Building partnerships will be part of that success, such as the partnerships they are already building with Briefcam and Anyvision. The third horizon will be to expand their innovation, based on feedback from end users, dealers and consultants. “I want to get very deeply connected with our customer base,” says Takahashi. “Are we on the right path? Should we explore other partner relationships? We need to bring those minds together to expand our vision.” The focus should be on solving three business problems – mitigating risk, ensuring compliance and saving money. Looking ahead to ISC West in the spring, Takahashi expects Pelco to emerge as a more proactive company that is eager to engage. “We have a lot of stories to communicate, and we have not been as active as we should,” he says.
As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyse a security event, machine learning can analyse the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with dual purpose,” says Matt Kushner, President of STANLEY Security. STANLEY Security, one of the largest integrators with a global footprint, has positioned itself at the centre of the industry’s transformation by information technology (IT) and the Internet of Things. “Security will become an expanded business partner with corporations,” Kushner comments. In response to the trend, STANLEY is hiring more IT-oriented technicians and salespeople within the IT community and who can “speak at the C-level”, Kushner comments. Sonitrol is the most recognised brand by law enforcement for verified response Data centres, higher education and logistics STANLEY manages very large, multi-national clients. As a consequence, the STANLEY security organisation has some of the best and brightest minds for enterprise-class security. To maintain that level of talent, STANLEY is committed to education. “We bring them into the family and focus on education, such as IT and IoT training. That’s critical in a world where unemployment is less than 3%. Finding good people, growing good people, and retaining good people – we do that exceptionally well at STANLEY,” says Kushner. STANLEY’s strong vertical markets including data centres, higher education, and logistics. They are also strong in multi-location installations (such as banking.) STANLEY has a big footprint throughout North America and Europe. PACOM access control and 3xLOGIC cloud-based solutions In addition to STANLEY’s core integrator business, the company also manages several manufacturing brands such as PACOM access control and 3xLOGIC cloud-based solutions.Mergers and acquisitions have been commonplace in the integrator space Beyond its company-owned integrator locations under the STANLEY brand, the company also owns Sonitrol, the strongest brand in the market for verified response with 65 franchises in North America. Sonitrol is the most recognised brand by law enforcement for verified response. Mergers and acquisitions have been commonplace in the integrator space, and Kushner says that STANLEY is “open and actively looking for properties that fit our commercial growth strategy”. He notes that STANLEY focuses on the commercial side of the market, where there are good margins and continuing growth. They pay less attention to the residential side which is “being heavily disrupted”. Strong partnerships with manufacturers STANLEY has strong partnerships with several manufacturer partners, through which they bring new breakout technologies to market from emerging companies. An example is Evolv Technology, a manufacturer of gun and bomb detection technology. “We see them as a leading provider of the technology, and they are, in my mind, a very disruptive provider,” says Kushner. STANLEY is also collaborating with a company – to be announced – that provides a unique gunshot detection technology, he says. STANLEY is also cooperating with dormakaba to implement Switch Tech, a Bluetooth wireless core that can replace any standard mechanical lock core. Existing locks can be transformed into electromechanical locks in minutes. STANLEY is also developing a tight integration with Lenel’s mobile credentialing system. STANLEY is also cooperating with dormakaba to implement Switch Tech GSX 2019 and ISC West 2020 At the recent GSX 2019 show in Chicago, Kushner says STANLEY heard a lot about cybersecurity, especially customers wanting to make sure they are investing in cyber-hygiene and who are looking to expand into providing cyber protection. “In concert with cyber-hygiene, they are looking for health monitoring or assurance that network devices are operating properly,” he says. “They want to ensure their security platforms are cyber-secure and up to date with the latest software versions.” STANLEY is also a big proponent of cloud offerings, and Kushner hints at a big announcement at the upcoming ISC West show in Las Vegas of additional cloud offerings and/or partnerships. “There will be a variety of new solutions to be introduced, including hosted solutions and applications that benefit both security and that add new value to businesses overall.”
In addition to providing the Northeast’s largest security trade show, ISC East will include free conference sessions and keynote speeches right on the show floor and several paid workshops. The Nov. 20-21 event at New York’s Javits Center will also include vendor solution sessions from Axis Communications, Hikvision and NAPCO. Wide variety of paid workshops An advantage of the International Security Conference & Exposition in New York is that much of the programming is complimentary to registered attendees, and location of the sessions on the show floor means attendees don’t have to leave the exhibition to take in a session. The paid workshops include technology sessions about cyber terminology for physical security integratorsThe paid workshops include an Active Shooter Workshop and technology sessions about cyber terminology for physical security integrators; and basic installation and configuration of video surveillance solutions. An OSDP (Open Supervised Device Protocol) Boot Camp Short Course will also be offered. As a smaller show, the topics of ISC East conference sessions are broader and of more general interest, rather than organised into focused “tracks” as at ISC West. Attendance at sessions can provide continuing education (CE) credits with organisations that partner with ISC East – one credit for each hour-long session. Attendees can use their Certificate of Attendance from any session to self-report their education hours to relevant industry bodies: ALOA (AEU education credits), ASIS (CPE continuing professional education credits) and NICET (CPD Continuing Professional Development points). An advantage of the International Security Conference & Exposition in New York is that much of the programming is complimentary to registered attendees Keynote sessions at the Main Stage The Main Stage will be the venue for keynote sessions delivered by Deanne Criswell, Commissioner, New York City Emergency Management (on Day 1 – Nov. 20); and Angela Stubblefield, Chief of Staff at the Federal Aviation Administration (FAA) (on Day 2 – Nov. 21). The two SIA Education@ISC East educational theaters on the show floor will be booked up both days with a variety of interesting topics. A new session covers penetration testing for physical security, presented by Michael Glasser of Glasser Security Group. A session on LiDAR (Light Detection and Ranging) sensors will be presented by Frank Bertini, UAV and Robotics Business Manager, Velodyne LiDAR. Another popular topic is Safe Cities, and FLIR will present a session on moving from secured to smart cities with intelligent, connected systems. New addition is Active Shooter Workshop The Active Shooter Workshop is a new addition to the ISC East programme. It has been a popular session at ISC West for three years now. At ISC East, presenters of the workshop will be David LaRose, System Director Public Health, Lee Health; and Ben Scaglione, Director of Healthcare and Security Programming, Lowers and Associates. At the end of the workshop, an additional hour of programming will be the “Stop the Bleed/Save a Life” session presented by Jerry Wilkins, Co-Owner of Active Risk Survival. The Main Stage will be the venue for keynote sessions delivered by Deanne Criswell, Commissioner, New York City Emergency Management, and Angela Stubblefield, Chief of Staff at the Federal Aviation Administration Woman in Security event A Women in Security Forum breakfast event will be held on Nov. 21 (Thursday). It’s the second annual event and this year will focus on diversity and inclusiveness in the workplace of the future. Valerie Anderson, President of Boon Edam, will lead a discussion on “Diversity 2.0: Next Steps for Creating an Empowered Workforce”Moderator Valerie Anderson, President of Boon Edam, will lead a discussion on “Diversity 2.0: Next Steps for Creating an Empowered Workforce”. Panelists are Lisa Terry of Allied Universal, Andrew Lanning of Integrated Security Technologies, Elaine Palome of Axis Communications and Dawne Hanks of Milestone. The Women in Security event is likely to attract up to 100 attendees. SIA’s Women in Security is an active organisation, with monthly meetings and a newsletter that recognises prominent women in the security industry. “It’s really a group for both men and women,” says Mary Beth Shaughnessy, Event Director, ISC Events at Reed Exhibitions. “There are many programmes, recruiting efforts, and professional and networking opportunities. They are a robust group of people who are active in making a difference. It’s important to support women in the security industry, which is 95% male, and to develop a new generation of women to be a part of the industry’s future.” The keynote addresses at ISC East will also highlight two high-profile women.
Body Worn Cameras (BWCs) are transforming policing and security around the globe, helping to create new connected officers who can stream video, access information and collaborate in real-time enabling them to operate safely and more efficiently in the field. Richie McBride, Managing Director of BWC experts Edesix, says "BWCs are now built for a connected world and are being used by officers on the front line to help prevent both criminal and anti-social behaviour when out on patrol.” Importance of body worn cameras in policing Innovative solutions driving creation of connected officers who can stream and access information in real-time He adds, "Technology has transformed policing and security in recent years. New innovative solutions have driven the creation of new connected officers who can stream, access information and collaborate in real-time. BWC captured footage not only provides greater transparency of interactions with the public, but also significantly increases early guilty pleas and saves officers valuable time as they often do not need to attend court”. Richie further said, "Police officers have always been connected, either to the public and communities they serve, or with their colleagues on the street and in the control room. They have shared information and generated insights to help address common problems and protect those with common vulnerabilities. However, digital technology has now enhanced these connections, enabling officers to feel more empowered, supported and secure." VideoBadges enhance police personnel VideoBadges have been utilised by police forces across the UK for some time now. Police forces, such as the Police Service of Northern Ireland (PSNI), have utilised our BWCs since 2016 to enhance the security of both officers and the general public, and to improve training and best practice. There are now 2,500 cameras being used by over 7,000 officers covering approximately 173,000 incidents each year in Northern Ireland. The BWCs are being utilised by Local Policing Teams, Neighbourhood Policing Teams, Tactical Support Groups, Roads Policing Units, Dog Section, District Support Teams and Armed Response Units. Importance of good video evidence Body Worn Video has the potential to improve the quality of evidence provided by police officers" PSNI Superintendent David Moore adds, "Video evidence puts the victims of crime first. The pilot of this technology in Foyle district demonstrated how Body Worn Video has the potential to improve the quality of evidence provided by police officers and thereby increase the number of offenders brought to justice. Video evidence provides a compelling account of events and enables the raw emotion and action from a scene to be replayed in the courts in a manner that could never be captured in a witness statement.” He adds, "It also supports accountability and transparency, both of which are key elements in increasing public confidence in policing. The introduction of this new technology is the latest example of our commitment to these principles as we continue to work together with the community to keep people safe." Head-mounted cameras Armed response and firearms teams are also being equipped with head-mounted cameras due to the fact that chest-mounted cameras could potentially obstruct an officer's view during firearms use. The Metropolitan Police recently began rolling-out 1000 head-mounted cameras, with West Yorkshire Police and North Wales Police following suit.
H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. Its most recent transformation project involved an access control system — for its own offices. H-Farm needed a solution to streamline access management for lots of people at a growing portfolio of sites and buildings. H-Farm experiences rapid turnover of users, both because new businesses join regularly and because they organise up to 300 events every year. Battery-powered locks Any new locks would need to extend an existing Axis system, but without adding complexity for day-to-day administration. To meet their needs, H-Farm selected a combination of Aperio® handles, security locks and escutcheons, each easy to retrofit, so day-to-day work at their busy offices would not be disrupted by intrusive installation. So far, 40 Aperio® Online H100 wireless door handles, 6 Aperio® Online L100 wireless locks and 4 Aperio® Online E100 wireless escutcheons have been fitted across multiple H-Farm locations in northern Italy. All Aperio® battery-powered locks are wireless, so no ugly cabling runs to H-Farm’s doors. Because Aperio® offers wide range of battery-powered devices, H-Farm can choose the precise wireless lock for every application: the L100 lock protects doors with high security demands; robust H100 handles suit interior doors with high traffic. Wireless access control Aperio® H100 enables customers to add doors to their access control solution because cost per door is lower H-Farm interior doors are mostly secured with the new Aperio® H100 wireless handle — Intersec’s Access Control Product of the Year in 2018. The Aperio® H100 packs the flexibility and affordability of Aperio® wireless access control into a slim, cleverly designed door handle. Its standard battery slots inside the handle, ensuring a minimal footprint. ASSA ABLOY’s device design team incorporated electronics into the handle lever on the outside of the door, without jeopardising security. Design has become a major feature of the H100’s appeal. H-Farm wanted devices to blend with the contemporary architecture of their new €101m H-Campus development. “Aperio® wireless access control hardware is solid, nice looking and perfectly fits our environment — solving our access problem,” says Alberto Aldrigo at H-Farm. The H100 and other Aperio® devices are easy to install; for the H100, basically two screws complete the job. Going forward, this will enable H-Farm to quickly bring new buildings into the same access system as they expand to fresh locations. The H100 fits around 90% of target doors with two main models: one for left-handled doors, the other right-handed. “The Aperio® H100 also enables customers to add more doors to their access control solution because the cost per door is lower,” says Tania Amico, Aperio® Sales Manager at ASSA ABLOY Italy. Seamless integration H-Farm managers want to control access to site doors, or bring entirely new premises into their access system The open architecture underpinning Aperio® devices enabled easy online integration with their existing Axis system via PRYSM AppControl. Remote operation from a single, central software interface is seamless, which makes administering the system easy. “The PRYSM AppControl software utilizes the integration Axis completed with Aperio®,” says Piergianni Marana, Key Account Manager at Axis. “And the AXIS A1001 Door Controller is based on open hardware, which makes installing and configuring an Aperio® wireless lock easy and seamless.” An Aperio® RS-485 Hub coordinates up to 8 Aperio® locks within a typical range of 15 to 25 meters, communicating with the admin system via the powerful AXIS A1001 IP Network Controller. One AXIS A1001 Door Controller can manage one wired door and one Aperio® hub, up to 9 doors per hub. AES 128-bit encryption ensures communication between lock and system is secure. Online Aperio® integration gives facility managers real-time status information about their premises. Aperio® locks are wireless, so there was no expensive or time-consuming cabling. The AXIS A1001 uses Power over Ethernet (PoE), which eliminates the need for power cables to the controllers, too. If needs change at a facility — perhaps H-Farm managers want to control access to more site doors, or bring entirely new premises into their access system — it’s quick, efficient and easy for an installer to fit Aperio® locks and integrate the doors with the AXIS Entry Manager control panel. To discover whether your existing security system is ready for wireless Aperio® locks, download a free, fast Compatibility Checker at https://campaigns.assaabloyopeningsolutions.eu/aperio-upgrade
PerpetuityARC Training, part of the Linx International Group recently delivers a risk and crisis management workshop for Lafarge Egypt (part of the LafargeHolcim Group) in Cairo. The training provided senior managers from across the organisation with the knowledge and skills needed to manage resources during a crisis and operate within the organisation’s crisis management and compliance framework. The intensive programme was built collaboratively between PerpetuityARC Training and Lafarge Egypt and specifically tailored to its operating environment in the construction materials industry. Achieve successful resolution It was great to see them solving problems in a pressured, but safe environment" In a series of practical and theoretical exercises, Linx International Group Director, Angus Darroch-Warren, assessed and enhanced the ability and confidence of participants to apply their new skills to manage complex and evolving crisis scenarios, each requiring close collaboration between team members, in order to achieve a successful resolution. Security Director at Lafarge, Magdy Khorshid, stated: “The course was amazing, very practical and interesting to all and I received much positive feedback from all learners.” Angus commented: “The Lafarge teams engaged fully with the workshop scenarios. It was great to see them solving problems in a pressured, but safe environment, that allowed them to think through issues and respond using identified resources and procedures.” The workshop is the latest collaboration in a five year relationship between Lafarge Egypt and PerpetuityARC Training. During this time PerpetuityARC Training has delivered its security and risk related courses to employees and stakeholders in Egpyt and the UK.
Surveillance solutions business Synectics develops and delivers a solution to help enhance safety and security monitoring at Nottingham Trent University. With more than 28,000 students and 3,100 staff to protect, surveillance footage at Nottingham Trent University (NTU) is captured by over 1,300 cameras covering the estate of 75 buildings. Each of the university’s three main campuses has a 24/7 control room and its own security team, ensuring that safety measures enable free movement while protecting the community from both external and internal threats. Integrated surveillance solution Synectics deployed a tailored solution based around its Synergy 3 command A progressive development plan, coupled with the need to optimise legacy technology, meant the university required an integrated surveillance solution that would enable teams based at each control room to monitor and manage footage from both IP and analogue cameras, supporting a gradual transition to digital solutions and full-IP ambitions. In one of the UK’s first cloud-based surveillance contracts, and in collaboration with integrator PFS, Synectics deployed a tailored solution based around its Synergy 3 command and control platform to support NTU’s long-term objectives. Interactive camera map Mark Stacey, Security Systems Operational Manager, NTU, said: “Moving the university onto a sophisticated surveillance monitoring platform has significantly improved the provision of student security, saving our team vital minutes in the event of emergencies.” “As well as supporting both analogue and IP inputs, where many solutions on the market do not, Synectics’ Synergy 3 offers impressive functionality and is easy to use. The ability to import an interactive camera map means we can now bring up footage in just seconds, where operators previously had to spend time manually correlating sensor triggers to the relevant cameras – an enhancement that keeps our students safe in real time.” Cloud-based system “Synectics even created a new feature at our request, which enables us to circle an area of the on-screen map and immediately view up to nine local cameras in that zone. Furthermore, opting for a cloud-based system means we don’t have to look after a physical server, freeing up space and our resources.” The system will help us in our mission to provide an ever-safer environment for our students" “Throughout the process, Synectics has gone the distance to deliver, as highlighted by the tailored training sessions provided for the team and its commitment to support us throughout the life of the system. We’re delighted with the results and sure the system will help us in our mission to provide an ever-safer environment for our students.” Future-proof solutions Martin Bonfield, Sales Manager at Synectics, commented: “We passionately believe that command and control systems should be flexible enough to allow for the evolution of customer needs. Only then can you provide seamless, future-proof solutions that improve safety both now and in the long term.” “Working closely with the team at NTU to understand their needs, the Synergy 3 platform has been designed to ensure they have an intuitive system that saves staff-hours and significantly improves incident response times. Nottingham Trent University is nationally recognised, having received the University of the Year award three years in a row. I’m delighted that we’ve provided them with this leading-edge solution, along with support, and ongoing training, to help safeguard their students, staff, and premises.”
Located in the middle of the deep forests of Småland in the south of Sweden, the Strandudden Gated Community has been designed to provide a safe environment for homeowners who wish to enjoy a high quality of life. The first phase of the development has seen the construction of 18 apartments which have stunning lake views. The materials and features of each apartment have been carefully selected to ensure sustainable energy consumption. When the development is completed, over 100 Wisenet cameras manufactured by Hanwha Techwin, will enable security personnel to closely monitor the movements of people and vehicles as they enter and move around the public areas of the gated community. Ensure strict compliance Equally important, the massive processing power of the chipsets of the open platform cameras means that our client is able to run specialist applications" 6 Wisenet cameras were initially installed during the construction of the apartments. These have been used to ensure strict compliance with the site’s healthy & safety regulations and to keep a close eye on valuable plant and machinery. “We evaluated products from a number of different manufacturers, but the superb quality of the images captured by the Wisenet cameras made it a very easy decision for us to recommend that they should be deployed throughout the Community,” said Henrik Carlsson, CCTV Product Manager for Elajo, one of Sweden’s electrical, mechanical, engineering and energy installation companies who were awarded the contract to manage the project. “Equally important, the massive processing power of the chipsets of the open platform cameras means that our client is able to run specialist applications, such as licence plate recognition (ANPR), in order to control vehicle access to the Community.” High quality images The Hanwha Techwin Europe pre-sales and technical teams have worked closely with Elajo to ensure the best camera types have been specified for each of the carefully chosen camera locations. 6 different Wisenet models have been selected to ensure high quality images can be captured day or night and that there are no blind spots. Among these is the Wisenet IP network PNP-9200RH 4K PTZ dome which has built-in IR illumination. The PNP-9200RH, which is IP66 and IK10 rated for vandal-resistance and outdoor use in the harshest environments, utilises Progressive Scan technology to provide sharp edges on moving subjects and vehicles. The PNP-9200RHs which have been installed at the entrance to the Community are equipped with the Wisenet Group ANPR solution which provides the opportunity to automatically control the movement of white listed cars through barriers via camera relay outputs. Drag and drop tool Images from all 100 cameras will be displayed in the Community’s control room via Wisenet WAVE video management software (VMS) Developed by Hanwha Techwin in partnership with analytics experts, FF Group, the solution uses camera-to-camera IP communication technology to enable up to 4 Wisenet Group ANPR cameras to work together, with data from each simultaneously transmitted to a single web based display. Images from all 100 cameras will be displayed in the Community’s control room via Wisenet WAVE video management software (VMS). An intuitive ‘drag & drop’ tool makes it extremely easy for operators to set up a display of live and recorded images on a single screen or video wall, with customisable layouts and sizes. Other key features include a virtual PTZ which, with just simple clicks of a mouse, enables operators to zoom in to see close up detail of any suspicious activity, whilst motion detection and video analytics support can be configured to generate alerts when user defined incidents occur. Auto-discover feature “Wisenet WAVE has proved to be extremely easy to use and it is a significant bonus that, with minimal training, operators are able to take maximum advantage of its wide range of innovative features,” said Henrik Carlsson. “It has also helped reduce installation costs as it has an auto-discover feature which means connected cameras can be addressed and set up within just minutes.” In addition to the images being displayed in the Community’s control room, should an incident occur that needs a rapid response, security personnel on patrol will be able to remotely view any activity via a smartphone or tablet with the help of the secure Wisenet Mobile App. PNP-9200RH: Wisenet P 4K PTZ IR dome camera PNM-9020V: Wisenet P 7.3 megapixel multi-sensor 180˚ Panoramic camera PNV-9080R: Wisenet P 4K Vandal-Resistant IR dome camera PNO-9080R: Wisenet P 4K IR Bullet Camera QND-7080R: Wisenet Q 4 megapixel IR dome camera XNO-6120R/FNP: Wisenet X ANPR camera
With a mission to provide and maintain good quality homes for Blackpool Council’s tenants and leaseholders, BCH has won a number of awards and accreditations for housing, repairs, customer services and community projects. The safety and security of residents is a high priority for BCH, which is why it has used products from STANLEY Products & Solutions for many years. During this time the primary system was made up of a GDX5 door entry system, along with an Indigo 1000 access control system, which were fully integrated. “We have a policy of continual improvement in the service we provide,” explains Anthony Walker, Mechanical & Electrical Officer at BCH. “Although the previous configuration performed well, I was convinced that the business and operational benefits of remote monitoring and the cloud could be utilised by upgrading the Indigo 1000 with a PAC 512 access control system.” Innovative remote monitoring platform The PAC 512 devices control all aspects of two secure doors, with up to two card readers installed as entry and exit readers on each doorAn upgraded system was specified for a BCH site comprising 80 blocks. It utilises the existing GDX5 front panels, which have been integrated with the PAC 512 controllers to create a highly innovative remote monitoring platform that can be accessed via a PC, tablet or smartphone. This is achieved using a general packet radio service (GPRS) platform, which is a faster and cost-effective means of connecting remote sites via a mobile network. It provides an enhanced service over traditional mobile/landline telephone connections and makes administration of the system more flexible. The PAC 512 devices control all aspects of two secure doors, with up to two card readers installed as entry and exit readers on each door. Each door also has a programmable auxiliary input that may be used for alarm system integration, and an auxiliary output that enables a buzzer or strobe to activate when security is breached or a door is left open. Email alerts during equipment failure In the event of communication loss, the PAC 512 allows all local functionality to continue until the server connection is restored, while the system features an auto-dial or email alert program that, in the event of an equipment failure at one of the locations, sends a notification so that the issue can be quickly rectified. In the event of communication loss, the PAC 512 allows all local functionality to continue until the server connection is restoredExplaining the benefits of using PAC 512, Andrew Burton, area sales manager at STANLEY Products & Solutions, says, “The cloud revolution has had a dramatic effect on the physical security equipment industry. Its development into access control technology means that not only can a system be managed remotely, specific personnel can even be granted or denied access to certain areas at different times, making it not only good for security but also for health and safety. “Furthermore, in the event of a theft or antisocial behaviour, it is possible to pinpoint exactly who was where and initiate appropriate action, using the live events and reporting.” Remote diagnostics and servicing BCH can also access information via the PAC Residential Cloud – helping to further enhance its remote monitoring operation. Remote diagnostics, technical issues and servicing can be carried out, and it’s also possible to remotely view status, set and unset a system and access an event log. For instance, if someone loses a key fob, BCH can access their information, carry out an authorisation check, let them into their abode and, if necessary, deactivate the missing device. It also allows the incumbent installer to remotely access the system’s software to physically input any special information such as extended door release times for specific residents. Programming key fobs remotely BCH worked with STANLEY to generate reports which show when a key fob hasn't been used for a specific period of timeWith a number of vulnerable residents, BCH worked with STANLEY Products & Solutions to generate reports which show when a key fob hasn't been used for a specific period of time. Anthony Walker comments, “If the report indicates non-use of a fob, we can take measures to deactivate it, and/or can send someone over to check on the person concerned and, if necessary, notify next of kin or the relevant authorities. “In extreme circumstances, we can also remotely open doors to allow access to the emergency services. Having the ability to immediately and remotely program fobs has been particularly beneficial to our customers who previously would have had to travel to our offices for this to be completed - saving both time and money and making best use of our resources.” Seamless migration to cloud With a large number of residents, each with their own key fobs, Anthony Walker was keen to avoid any disruption during the upgrade and wanted to ensure that the process was achieved as seamlessly as possible. Configuring the physical hardware was helped by the installation team’s existing knowledge of STANLEY Products & Solutions’ technology. On-site training was also provided by experts from STANLEY Products & Solutions and, on the very rare occasion when there was a problem, a full support and advice package was available. The use of the PAC Residential Cloud meant that the migration of tenant fob information into new system was straightforwardInstalling a new access control system can often result in replacing existing key fobs with new ones – not only is this costly and inconvenient but there is also an administrative burden associated with transferring all the information to the new devices. However, all these issues were circumvented, as the use of the PAC Residential Cloud meant that the migration of tenant fob information into new system was straightforward – so much so that tenants didn't even realise any change had taken place. In addition, having access control data in the cloud means that it is always backed up. Enhanced safety and security BCH’s Anthony Walker considers the installation a total success and concludes, “I initiated this upgrade project because I firmly believed that it would improve tenant satisfaction and make our overall operation more efficient.” He further added, “I’m delighted that both of these objectives have been achieved and that STANLEY Products & Solutions’ access control technology has improved security, safety and protection across our estate.”
Round table discussion
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?
The retired police officer who takes a cushy job as a security director is almost a cultural cliché. Like any cliché, the idea has roots in the real world, where police departments have often been a rich source of the security industry’s leadership talent. Former military personnel often find their way to the security industry, too, and realise that the familiar elements of discipline and command structure translate well. We wondered about the impact of this historic trend and whether it is changing as the security industry itself evolves. We asked our panel: What effect has the traditional recruitment of corporate and institutional security leaders from the law enforcement and/or military communities had on the security marketplace? Is the tradition changing and why?