Boon Edam Inc., a globally renowned company in security entrances and architectural revolving doors, has announced plans for a significant new expansion of their North Carolina offices, in the United States of America. North America HQ facility In the first quarter of 2022, the company will open a new headquarters, which will be located in downtown Raleigh, North Carolina. The brand-new facility will be home to many of Boon Edam’s office staff, as well as a new showroom and technology ce...
The Security Industry Association (SIA) has named Edison Shen as its new Director of Standards and Technology. In this role, Edison Shen, who previously served as a Programme Manager in the Building Infrastructure and Transportation Systems Divisions, at the National Electrical Manufacturer Association (NEMA), will manage and administer SIA’s standards and technical programme activities, and coordinate with other standards organisations that impact the SIA standards programme of work. Ne...
The 23rd edition of inter airport Europe, the International Exhibition for Airport Equipment, Technology, Design & Services, ended at the Munich Trade Fair Centre in Germany after four show days. A total of 10,000 attendees from the global airport industry met this week to network, discover the latest trends and developments, and source innovative equipment and systems, of which 5,100 were trade visitors. Visitors have come from 79 countries to visit inter airport Europe this year; the most...
The ISASecure Program announced that Johnson Controls, the global pioneer for smart, healthy, and sustainable buildings, has earned the world’s first ISASecure CSA certification for its smart buildings products with YORK YK and YZ centrifugal chillers. Industrial control suppliers can earn ISASecure designations for robust products that are free from recognised liabilities. This certification comes at a time when cybersecurity threats are rising and businesses are considering the potentia...
Allied Universal®, global security, and facility services company, recently announced the acquisition of The Millard Group, LLC, a Morton Grove, Illinois-based commercial facility services company. The terms of the deal were not disclosed. Founded in 1915 under the name Chicago Window Cleaning, The Millard Group is a third-generation family-owned business with a long history in commercial facility services. The Millard Group provides clients with an integrated solution through its full rang...
ADT, the most trusted name in security announced a partnership with DoorDash, the last-mile logistics platform, to provide the Safe by ADT mobile safety solution to its community of millions of Dashers. Safe by ADT will power DoorDash’s new in-app safety toolkit called SafeDash™, allowing Dashers to quickly and easily request professional help by voice or text and receive emergency services to their location anytime they feel unsafe. Safe and secure app “Our commitment to saf...
Essence Group, a technology group developing and supplying wireless security solutions for homes, families, and businesses announced the launch of MyShield, a first-of-its-kind 5G-connected comprehensive intruder prevention system. All-in-one device The MyShield all-in-one device can be used either as a standalone solution connected to 5G CAT-M networks or integrated into any existing security system. It addresses the growing demand for preemptive intruder prevention, boosting the protection of homes and businesses by forcing intruders out of premises before they can harm. Its versatile design makes it ideal for use in a range of residential and commercial settings. The integrated, easy-to-install system includes a passive infrared (PIR) motion detector, a high-definition video camera with recording capabilities for video verification, two-way voice communication, and a proprietary smoke diffuser that fills a room within seconds with a veil of harmless yet disorienting smoke to force intruders out of premises. Cloud-based services platform MyShield provides property owners with the ability to deny intruders the time and opportunity to cause harm" The solution incorporates a cloud-based services platform, including reporting and analytical tools, providing security services providers with the tools to tailor their offerings to meet specific customer requirements. “Unlike standard alarm systems, which afford intruders a window of time to cause damage before a security dispatch arrives, MyShield enables home and business owners to effectively and directly remove them from the premises,” said Dr. Haim Amir, CEO, and Founder of Essence Group. “We are providing property owners with the unique ability to be more proactive and control the situation, by denying intruders the time and opportunity to cause harm. This is intervention at its most effective.” First comprehensive solution While existing solutions tend to be costly, requiring connection to a power source and integration with a local security system, MyShield is battery-powered and includes its own communications channels, enabling simple installation and ease of use. The integrated HD camera and two-way voice capabilities make MyShield the market’s first comprehensive solution enabling end-users to personally detect, verify and force intruders out by activating the smoke shield. Next wave of security innovation “Essence Group has been driving the market shift from security solutions that merely monitor and detect intruders to those that actively intervene to prevent crime from even being committed,” said Ohad Amir, CTO of Essence Group. “With MyShield we are introducing a new concept, designed to provide people with greater peace of mind – intervention as the next wave of security innovation.” Essence Group is the first to introduce this standalone, fully independent intervention solution, utilising the latest 5G infrastructure for IoT applications, having demonstrated its advances in 5G-connected security and personal safety devices at CES 2021. Connectivity to 5G CAT-M networks ensures the highest levels of reliability and accuracy, while also providing peace of mind and a better quality of life to users.
Vectra AI announced the availability of Vectra Detect in the Microsoft Azure Marketplace, an online store providing applications and services for use on Microsoft Azure. Vectra customers can take advantage of the scalability, high availability, and security of Azure, with streamlined deployment and management. AI-driven threat detection and response Vectra creates security-derived, AI-driven threat detection and response that delivers key Zero Trust capabilities for Microsoft 365 and Microsoft Azure customers. A member of the Microsoft Intelligent Security Association (MISA), Vectra created and integrated custom workbooks in Azure Sentinel to streamline incident response across the platform’s ecosystem of tools and enable security analysts and SOC teams to prioritise their investigation and remediation efforts more efficiently. Vectra also partners with Microsoft on its Zero Trust security framework. Vectra Detect built-in web interface enables security analysts to efficiently prioritise their investigations Built-in web interface The Vectra Detect built-in web interface enables security analysts to efficiently prioritise their investigations starting with the most critical, provides an overview of all accounts and hosts exhibiting suspicious behaviour, identifies campaigns involving multiple hosts, and is enabled to break down individual detections for further investigation. Vectra Detect Workbooks for Azure Sentinel offer customers a range of benefits including: Automated incidents in Azure Sentinel based on configurable threat and certainty score thresholds from Vectra Forensic analysis on incidents to identify and pinpoint the devices, accounts, and attackers involved in any given situation Vectra detections direct to enterprise Azure Sentinel workbooks for the immediate attention of SOC teams Azure Sentinel Vectra has created custom connectors and workbooks within the platform to provide high-fidelity alerts" "In enterprise situations, where there is often an ecosystem of tools in use at once, Azure Sentinel is uniquely enabled to provide one single interface for multiple tools,” said Randy Schirman, VP of Service Delivery at Vectra AI. “To further enhance the incident response capabilities of Azure Sentinel, Vectra has created custom connectors and workbooks that can be deployed within the platform to provide high-fidelity alerts with context detailed to accelerate time to detect and time to respond.” Microsoft Azure Marketplace “Microsoft Azure Marketplace lets customers worldwide discover, try, and deploy software solutions that are certified and optimised to run on Azure,” said Jake Zborowski, General Manager, Microsoft Azure Platform at Microsoft Corp. “Azure Marketplace helps solutions like Vectra Detect reach more customers and markets.”
On the occasion of the Milipol 2021 (Milipol Paris 2021) exhibition, the event dedicated to homeland security and safety (taking place from Oct. 19-22, 2021, in Paris, France), Deveryware will introduce its range of security solutions, to support investigators and enhance homeland security. As the European expert in investigation technologies and global security services, Deveryware will present its innovations, specially designed to facilitate police and the Gendarmerie’s investigations. Tools and services for investigations With features, such as judicial geo-location, analysis of phone records, digital forensics for phones, hard drives and any digital device, mobile DNA analysis, etc., Deveryware offers investigators the tools and services to extract and analyse the data, which is necessary for conducting their judicial investigations and solutions that are designed to process digital evidence and accelerate their investigations. Deveryware’s investigation solutions offer: Real-time geo-location of smartphones, trackers (through the DeveryLoc and DeveryLight platforms), Call data record analysis (DeveryAnalytics Telephony Data software), Fight against fraud and financial crime (services of the OAK Branch subsidiary), Digital investigation (solutions and services of TRACIP, Deveryware subsidiary and the 1st French private laboratory for digital forensics). Innovations introduced at Milipol Paris 2021 Deveryware will introduce 3 major innovations at its stand, which are based on its main areas of expertise For those who want to test and manipulate the on-premise search kit and the digital forensics equipment, they will be available at the TRACIP booth (#5R 122) at the Milipol 2021 exhibition. Deveryware will introduce 3 major innovations at its stand, which are based on its main areas of expertise. Call data record analysis - DeveryAnalytics Telephony Data The analysis of telephone investigation data constitutes a major challenge for investigators. Deveryware has developed a unique solution for them, DeveryAnalytics Telephony Data. It notably allows them to: Detect contacts and interactions between individuals, Uncover networks, Save time and enhance investigation capacities. The DeveryAnalytics Telephony Data software was adopted by the French Gendarmerie Nationale in March 2021 and is currently being deployed. Responding to cyber-attack incidents - TRACIP TRACIP, the data recovery and digital forensics expert, offers a unique methodology to clean up and recover data following a cyber-attack (compromised of computers and smartphones, infection of IT stock through ransomware). This process offers several advantages: On-site deployment in a couple of hours thanks to mobile, lightweight infrastructure, Back to normal within a couple of days, Preservation of evidence of the attack for compensation purposes (insurance claims, legal proceedings). GHALE, the next-generation emergency call platform Deveryware has developed GHALE, the platform that revolutionises emergency calls and offers greater connectivity between emergency mobile applications and public safety answering points. Thanks to the development of a new European standard, PEMEA - Pan-European Mobile Emergency Application, GHALE makes it possible to: Use its emergency mobile app, while travelling across Europe Have multilingual and multimedia communications with PSAPs: Location sharing, sending of photos and videos, chat Make video calls adapted to speech/hearing impaired people
Cymulate, the industry pioneer in SaaS-based Continuous Security Validation (CSV) announced the next generation Extended Security Posture Management (XPSM) platform leveraging its native, Offensive Security technology and capabilities to widely support customers security and business needs. The combination of these new capabilities follows several product launches over the last six months and provides end-to-end validation of an organisation's cyber security posture. XSPM incorporates four fundamental pillars tied together with analytics to provide meaningful security posture insights: Attack Surface Management, Continuous Automated Red Teaming, and Breach and Attack Simulation alongside an Advanced Purple Teaming framework. Attack Surface Management (ASM) ASM tools scan domains, sub-domains, IPs, ports, and other assets for internet-facing vulnerabilities Helping organisations understand how hackers might get an initial foothold, ASM tools scan domains, sub-domains, IPs, ports, and other assets for internet-facing vulnerabilities. These functions alongside Open-Source Intelligence (OSINT), which could be used in a social engineering attack or a phishing campaign. Combined with Vulnerability Prioritisation Technology (VPT), these capabilities empower security teams to efficiently prioritise vulnerabilities and mitigation steps, ensuring a shorter time to remediation. Continuous Automated Red Teaming (CART) Moving beyond reconnaissance to answering: "how can an adversary breach my defences?" CART tools attempt to penetrate the organisation by analysing the exposed vulnerabilities and autonomously deploying attack campaigns that penetrate the network. After gaining the initial foothold, an attack subsequently propagates within the network in search of critical information or assets, for example by triggering a well-crafted phishing email. BAS and Advanced Purple Teaming BAS tools launch simulated attack scenarios out of the box, correlate findings to security controls (email and web gateways, WAF, endpoint, etc.), and provides mitigation guidance. These tools are primarily used by blue teams to perform security control optimisation. Advanced Purple Teaming Framework expands BAS into the creation of advanced and custom attack scenarios Advanced Purple Teaming Framework expands BAS into the creation and automation of advanced and custom attack scenarios. These tools easily follow the MITRE ATT&CK framework to model a threat actor, enabling security practitioners to create complex scenarios from predefined resources to custom binaries and executions. Customised scenarios can be used to exercise incident response playbooks, proactive threat hunting, and automate security assurance procedures and health checks. Cymulate’s XSPM platform "With the threat landscape evolving at such a rapid pace, Cymulate's SaaS-based Extended Security Posture Management (XSPM) is better suited to cater to customers' needs," said Eyal Wachsman, CEO, and Co-founder of Cymulate. "We're now continuing our vision to help organisations stay in control of their security posture while minimising resources, as well as allowing security professionals and leaders to know and control their cybersecurity posture in a dynamic environment." The XSPM platform provides out-of-the-box, expert, and threat intelligence-led risk assessments that are simple to deploy and use for all maturity levels, and constantly updated. Deployable within minutes, Cymulate enables security professionals to continuously challenge, validate and optimise their cybersecurity posture end-to-end, across the MITRE ATT&CK framework.
Integrated security manufacturer TDSi announces the arrival of its latest student placement, Vlad Radoi. Vlad has joined the company’s Software Development Team for a twelve-month placement as part of his BSc (Hons) in Software Engineering studies at Bournemouth University. Supporting placement students Vlad is the latest in an ongoing line of TDSi placement students, as Managing Director John Davies elaborated, “As a business, we have a long heritage of supporting apprenticeships and placement students across all parts of our business, so we are always delighted to support a new student.” “Software Development is a key role within the access control and integrated security industry and one which is at the heart of what TDSi does, so Vlad is exactly the type of passionate young trainee professional we look to attract and support, as they enter the world of business as well as the technology of security.” About Vlad Radoi Vlad is looking forward to working directly with the TDSi team Originally from Romania (although he has lived in the UK for over 10 years) and a fan of the McLaren Formula One racing team and Arsenal Football Club, Vlad is looking forward to working directly with the TDSi team, as he stated, “Being at Bournemouth University has been fun and weird at the same time, for the last year and a half my experience has largely been online via Zoom and Teams, due to pandemic restrictions.” “However, I am excited to be getting first-hand experience in a commercial setting with TDSi, there is much to learn, and it will kickstart my career as a software engineer.” Gaining new experience Having started with TDSi at the beginning of August, Vlad is already working closely with the Software Development Team, helping it to enhance its GARDiS Access Control software for example. “At the moment, I am working with the GARDiS API, and whilst it is complex, I enjoy studying the intricacies of it. This role gives me lots of experience working with new frameworks and language, as well as learning how software development works in the real world.” Vlad is looking forward to the year ahead and added, “TDSi is an important player in the security and access control industry, and I look forward to learning a lot more about the company, its software, and software development as a whole.”
Euralarm recently released a Position Paper on the EC proposal for a Regulation on Artificial Intelligence. The Position Paper follows some informal discussions with DG CONNECT and contains proposals on several articles in the Regulation on Artificial Intelligence. Following the release of the Position, Paper Euralarm spoke to Gabriele Mazzini, lawyer of DG Connect, and in the lead for the proposal. First-ever legal framework on AI When asked to briefly explain the Regulation on Artificial Intelligence, also called the Artificial Intelligence Act, Gabriele Mazzini replied that the Artificial Intelligence Act is the result of a process of preparatory work that started in 2018 when a high-level expert group on artificial intelligence was appointed to provide advice to the Commission. The overall aim of the proposal is to make the rules for the development and use of AI consistent across the EU and thereby ensure legal certainty, encourage investment and innovation in AI, and build public trust that AI systems are used in ways that respect fundamental rights and European values. The proposal aims to make the rules for the development and use of AI consistent across the EU In 2020 the Commission adopted a White Paper that was sent out for consultation and got more than 1200 comments. That input helped inform the proposal for the harmonised regulatory framework on AI, which was based on the NLF approach. The AI Act is currently the first-ever proposed legal framework on artificial intelligence. Broad definition The history of Artificial Intelligence goes away back. The term was first used in the 1950s. Gabriele Mazzini explained that based on a recent report by the Commission Joint Research Centre there are more than 50 definitions of AI, making it very complex and difficult to find common grounds. Considering that the greatest majority of EU countries are members of OECD as well as other non-European countries, it was decided to take inspiration from the definition of AI adopted by the OECD in its principles on Artificial Intelligence. Software categories Act distinguishes three categories of AI uses: prohibited AI uses, high-risk AI uses, and systems with transparency risks In the Artificial Intelligence Act, AI is defined in Article 3 and this is supplemented by Annex I, containing a suite of software development frameworks that encompass machine learning, expert and logic systems, and Bayesian or statistical approaches. A software product featuring these approaches and meeting the requirements of the definition stated in Article 3 will be considered AI for the Act. The Act distinguishes three categories of AI uses: prohibited AI uses, high-risk AI uses, and systems with transparency risks. The proposal does not regulate the technology as such, but specific uses. In general, the approach is that the higher the risk, the stricter the rules (risk-based approach). Prohibited uses of AI When asked which uses of AI are prohibited, Gabriele Mazzini replied that there are four main categories. The first two relate to the manipulation of a person’s behaviour or exploitation of a person’s vulnerabilities due to their age, physical, or mental disability. Also prohibited are the uses consisting in forms of social credit scoring by governments. The fourth category relates to real-time remote biometric identification in publicly accessible spaces by law enforcement. An exception is made for certain time-limited public safety scenarios such as serious criminal activities. It is up to the member states if they want to make use of the exception. The AI Act is intended to apply as lex specialis for the rules on the processing of biometric data contained in Article 10 of the Law Enforcement Directive. Also, the uses of remote biometric identification are already regulated by existing law, namely the GDPR. High-risk classification The AI Act also defines high-risk AI uses. Gabriele Mazzini explained that the AI Act considers an AI system high-risk if it is used as a safety component of a product that is covered by existing single market harmonisation legislation and the product is required to undergo a third-party conformity assessment. Mandatory third-party conformity checks will incorporate the AI Act’s requirements after the legislation is passed These mandatory third-party conformity checks will incorporate the AI Act’s requirements after the legislation is passed. In addition, other specifically listed AI systems deployed in several sectors are also deemed to be high-risk to safety or fundamental rights. The Commission can expand this list through a simplified process without new legislation. The Act relies on member state regulators for enforcement and sanctions, but consistency will be ensured by a European-level board. Fruitful cooperation with stakeholders When asked how important the comments and suggestions of stakeholders have been for the drafting of the AI Act, Mr. Mazzini answered that their contributions were very important. It is important to consult and as far as possible have a dialogue with stakeholders during the design of regulatory frameworks. Now the proposal is out to the European Parliament and the Council, which will pursue their debates. Parliamentary committees, responsible for the preparatory work and the Parliament itself meet in public, so stakeholders can follow the discussions on the proposal and make sure that their voice is heard by the decision-makers.
Though many office workers across the globe have found themselves working remotely for the past year, we are seeing a bit of a silver lining, as vaccine rollouts hint at a return to some pre-pandemic sense of normalcy. However, while some of us might opt for a fully-remote work life, others are anticipating a hybrid solution. Even before the pandemic, offices were taking a new, more open layout approach—moving past the days of cubicles and small office configurations. Going forward, offices and other workspaces will be tasked with supporting a hybrid work solution, as well as increasing hygiene measures. Video intercom solution This is where an IP video intercom solution can assist. Below are four ways they can help usher in a smarter, safer work environment: Video intercoms assist in creating a more hygienic work environment - The outbreak of COVID-19 has raised awareness of germs and just how easily a virus can be transmitted by face-to-face contact. Germ barriers are popping up in many aspects of our daily lives, where we were not likely to see them before Unfortunately, the door is also the easiest of these germ barriers to breach As such, we’re becoming accustomed to seeing plexiglass barriers at restaurants, grocery stores, and even coffee shops. However, many don’t realise that one of the best germ barriers is a simple door. Unfortunately, the door is also the easiest of these germ barriers to breach. All it takes is a knock or a doorbell ring to make us open our germ barrier and be face-to-face with whomever is on the other side. Increasing hygiene safety A simple step to increase hygiene safety and visitor security in commercial buildings and workspaces is an IP video intercom. Installing a video intercom will allow staff to see and speak with visitors without breaching that all-important germ barrier. A video intercom system provides a first line of defence, enabling the user to visually confirm the identity of the person on the other side of the door first before granting access. It can also be used to make sure proper procedures are being followed before a person is allowed to enter, such as using hand sanitiser, wearing a mask, and following social distancing guidelines. Basic security needs A major topic of conversation the past year has been how to manage occupancy in all facilities Video intercoms for occupancy management and basic security - A major topic of conversation the past year has been how to manage occupancy in all facilities—ranging from grocery stores and retail shops to restaurants and commercial buildings. Workspaces and offices are no exception. A video intercom provides a quick and convenient method of seeing who, or what, is on the unsecure side of the door before opening. For basic security needs, if a business has a door opening into an alley, a video intercom would be used to ensure no one is waiting outside to force their way in when the door is opened. Personal protection equipment Such solutions can also be used to ensure a person is carrying proper credentials, or wearing proper personal protection equipment (PPE), before entering a sensitive area. For example, if a lab has a room which can only be accessed by two persons at a time wearing specific protective gear, a video intercom could ensure each person is properly equipped, before allowing access that particular room. Additionally, for office or workspaces that have shared common areas, such as a cafeteria, gym or even conference rooms, managing access to these spaces will remain a priority, especially with post-pandemic restrictions in place. Video intercoms are a comprehensive safety and security tool for any workspace Deliveries of packages, work-related materials, or even food are common in any office or workspace. Video intercoms can assist in facilitating safe deliveries by visually and audibly confirming the identity of the individual. The visitor could be your next big client, your lunch delivery, a fellow employee with a faulty access card, or your mail. Video intercoms are a comprehensive safety and security tool for any workspace. Visitor management systems Video intercoms provide a cost-effective solution in small to mid-sized office facilities - One significant advantage of video intercom systems is the variety of applications available. Systems range from simple one-to-one video intercoms, to buzz-in systems, to full-fledged visitor management systems in mixed-use buildings. While they might lack the resources and manpower many enterprises have, small-to medium-sized offices can also take steps to ensure the safety of their staff and customers. Like any business, controlling who comes into the building is a primary way of maintaining safety. Video intercoms work in conjunction with access control systems to provide an identifying view of visitors or employees with lost or missing credentials. They allow staff to both see and hear those on the unsecured side of the door to determine intent before granting access. Most quality video intercoms will provide a clear enough image to allow an identification card to be read by holding it close to the lens, adding another opportunity to verify identity. Touchless intercom activation One major trend is the option of providing a touchless door activation Video intercoms provide a touchless option - Even prior to COVID-19, one major trend is the option of providing a touchless door activation or touchless intercom activation of a video intercom for those without proper credentials. Though touchless isn’t a new solution to the access control market, the pandemic introduced a renewed focus on these types of solutions to provide hygienic access to visitors. For offices and other workspaces looking to make investments into post-pandemic solutions to assist in reopening, touchless can support these efforts. When it comes to smart, secure workspaces, many people think instantly of cameras or monitors, access control, and alarm systems. Proper access credentials However, video intercoms are often the missing piece of a building’s security puzzle. A video intercom provides an identifying view that is not always available from a camera covering a large area. They allow those without proper access credentials a method of requesting entry, and just like cameras, they can be activated by alarms to allow staff to clearly see and communicate. If a workspace or office is important enough to be secure, it’s important enough to be sure of who is there before the door is opened. In 2021, it’s not enough to ensure the physical security of your staff and visitors, but also to ensure they are accessing a hygienic environment. Video intercoms provide that security and peace of mind.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research programme to provide valuable feedback to the GSA Schedule 84 programme and on to the GSA central office. The director of GSA Region 7 Schedules Program, the Schedule 84 Branch Chief and the Category Manager Subject Matter Expert who manages our suppliers' panel gave us their full attention as we discussed the successes of the programme, hot topics, problems and the future. We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort and renewed enthusiasm Innovative review team We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort, renewed enthusiasm and productive changes building upon the successes of 2017. There was high praise for the accessibility to the Schedule 84 staff. Their consistent quick response to questions and concerns, thinking outside the box and supporting the programme by partnering with their contractors was much appreciated. There has been a renewed spirit of partnering to cooperatively bring the best to agency customers. It seems to be working as per the Centre Director sales are growing for GSA Schedule 84. Advocating for the security industry In my experience, business development starts with the Administrator from Region 7 in Ft. Worth, TX. As the annual Schedule 84 Industry Day at the SSAC begins he is shaking every hand and passing out his cards looking folks right in the eye asking, “how can I help you?” They have the best practices and most organised paperwork. The SSAC director has chosen well in her staff and is hands-on in every endeavour to direct things along when challenges occur or to improve the programme. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry It continues with the centre’s CASE Manager encouraging the contractors at events, visiting agency customers and promoting the GSA Schedules Program by helping coordinate the partnering. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry for adding new technology, meeting with industry associations, understanding the complexity and challenges of Homeland Security Presidential Directive 12 (HSPD12) and advocating for the purchasing Physical Access Control Systems (PACS) utilising the appropriate standards and the GSA Program among other innovations. As far as the supplier panel, we gave our GSA Schedule 84 team and leaders high praise for 2018. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List Changes in the GSA programme Some changes this year in certain GSA programmes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) developed to assist with solution procurements. This new SIN was added to Schedules 03FAC, 56, 70, 71, 00Corp, 738X and 84. Under Schedule 84 it is SIN 84-500. GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex Essentially this SIN allows agencies procuring under the aforementioned GSA Schedules’ programmes to purchase and the contractor to add items and services not known prior to the task as a Contract Line Item Number (CLIN) not to exceed 33% of the order. For more information and FAQs on OLMs go to www.gsa.gov/olm. This is not to take the place of “Open Market” items for adding products only that are not listed on a company’s GSA Contract. Physical access control products Previously, GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex for the agencies. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List according to the standards created under FIPS201. These products appear under SIN 246 35-7 after being tested and approved by GSA. To be qualified to install these products under the GSA Program at least one individual from the GSA Contractor company must complete the class and be CSEIP certified before applying for labour SIN 246 60-5. Additionally, the company must demonstrate certain qualifications and have past performance for this type of work. The Security Technology Alliance offers the training class and certification. Certified individuals and approved products are listed at www.idmanagement.gov. Companies listed with SIN 246-35 7 and SIN 246-60 5 may be found by searching at www.gsaelibrary.gsa.gov. Updates to guidance for procurement Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide. The ordering guide posted at www.gsa.gov/firesecurity is a valuable support tool created to assist agencies with understanding the requirements of FIPS201 and procuring a PACS. The guide includes relevant regulations, FAQs, sample systems designs, sample statements of work, a list of key points of contract for additional help and questions. In partnership with GSA and guided by the GSA Ombudsman group, the Security Industry Association and the Security Technology Alliance members and their contractor companies participated in a GSA Reverse Industry PACS Training Day on September 17, 2018. We presented from an industry perspective important fact on PACS system requirements, procurement planning, providing information on resources and further educating with panel discussions, individual presentations and amusing skits to over 300 Government agency staff and acquisition specialists. You can find some of the unedited recording of the PACS Reverse Industry Day Training on YouTube. Some changes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) GSA Schedules Program A hot topic about the GSA programme for 2018 was also an issue for the prior year. The GSA Schedules Program is a streamlined contracting vehicle incorporating specific Federal Acquisition Regulations for more efficiently purchasing commercial items. Companies may apply per a continuous open season for a 5-year contract with three 5-year options to renew. Contractors are vetted for past performance, corporate experience and financial capability. Products and services are considered for offering to Federal, State and Local customers (for Schedule 84) with pricing that is determined to be fair and reasonable through negotiations with GSA. To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor as well as the competition of identical or similar item pricing. The most vocal complaint of concern from the contractors was regarding the consideration of competitor contractors offering identical items with out-of-date pricing or holding a Letter of Supply not authorised by the manufacturer. GSA pricing tool Since the GSA utilises a pricing tool to determine if the pricing offered is competitive, a rogue competitor can cause a pricing action to possibly be rejected due to out of date information even as the manufacturer offers an update of the product. This is an issue on all GSA Contracts that the supplier panel hopes will be reconsidered by GSA policymakers at the central office. Most of us believe the Letters of Supply should only be issued by the manufacturer or with documented specific permission of the manufacturer to a reseller. Manufacturers may want to have a better understanding of the Letter of Supply, how it is considered by GSA and more carefully choose their Government partners for experience and compliance. Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy Overcoming challenges for the security community Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy. GSA eBuy is an online Request for Quotation (RFQ) programme that is for GSA Contract holders only. Agencies will post their requirements by Special Item Number for at a minimum 48 hours. Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract. GSA Participating Dealers may take orders on behalf of a manufacturer if they are authorised under the manufacturer’s GSA Contract. They may also have an online PO Portal to receive orders. But they have no access to GSA eBuy to response to RFQs. Usually, under these arrangements, the manufacturers do not respond directly, so there is a problem using GSA eBuy for opportunities as their GSA Participating Dealers have no access to respond. GSA Schedule 84 leadership In some instances, a contracting officer may allow an emailed quotation. However, with the use of the electronic ordering system, this has become a common problem we hope to bring to the attention of policymakers. Some changes to the programmes may make the presentation of documentation more effective going forwardThe GSA Schedule 84 leadership has been helpful to explain the challenges to the agencies to try and resolve such issues. So, what’s up for 2019? GSA modernisation is coming. There will be improvements to their tools and more consolidations of SINs and more. There have been discussions of a revival of the GSA Expo. The Expo offered training for contracting staff both Government and private industry. Valuable tools for vendor training Equally important is the networking, meetings and the exhibits of the contractors. Expos have been discontinued since 2012 but smaller events have been growing as well as online webinar training. Webinars are valuable tools for GSA and vendor training, but they do not take the place of being able to meet your customers face-to-face. GSA online eOffer and eMod programme have made processing actions more efficient. Some changes to the programmes may make the presentation of documentation more effective going forward. The GSA online website for viewing the items on the GSA Contract and for purchasing items, GSA Advantage could definitely use an update as it has been basically the same for 20 years. Keep an eye on GSA Interact for the latest happenings with GSA.
The drive for learning doesn’t diminish, even in times of a global pandemic. To accommodate the demands of social distancing, more training today happens online. “We have seen unprecedented international demand for our portfolio of online training courses ranging from small installation companies to the largest organisations, across a wide range of sectors,” says Jerry Alfandari, Group Marketing Manager of Linx International Group, a U.K. training firm. “More than ever, businesses are looking to ensure they have the skills in-house to coordinate their response to the changing situation. Individuals are also taking this time to upskill themselves for when we return to ‘normal’ by bringing something with them they didn’t have before. Perhaps unsurprisingly, people are still seeking to better themselves for what will be, eventually, a competitive market.” Expert security training Topics such as CCTV, Access Control, Intruder and Fire Tavcom Training, part of the Linx International Group, provides technical security training delivered by expert tutors on topics such as CCTV, Access Control, Intruder and Fire and also CCTV Control Room and Security Management. Given the practical nature of the courses, the majority have historically been delivered in a state-of-the-art training centre through interactive workshops. However, in order to best protect their staff and learners, and following government guidelines, Tavcom have closed their training centre for the time being. Learners are still able to book into classroom courses for later in the year with a choice of two learning centres now being offered: Hampshire or the recently established training centre in Shipley. For those who prefer to learn online, Tavcom delivers accredited online security training. “Given the situation we are all in at the moment, our online courses have seen an 86% increase in demand over the last several months,” says Alfandari. All online courses offer the same level of support as the classroom courses, with many accredited to BTEC level 3 and 5, catering to professionals of varying skill levels and experience. Improve your professional development “Our online courses remain as accessible as ever, with huge numbers of security systems engineers and professionals seeking to use this [quarantine] time to improve their professional development,” Alfandari says. “We encourage all people to consider the benefits of eLearning and, if they need any advice, to reach out to the Tavcom training team.” It’s more important now than ever before that learners are able to access Tavcom’s online learning programmes and continue in their professional development, he says. To help facilitate learning, the company has discounted 25% off the portfolio of eLearning courses, many of which are BTEC accredited and come with expert tutor support. We are also introducing new interactive ways of teaching traditionally classroom-based courses" “We are also introducing new interactive ways of teaching traditionally classroom-based courses with the aid of Zoom virtual classroom courses, led by our tutors,” says Alfandari. “From the learner’s own home, they will be able to undertake their chosen training course and return to the training centre later in the year to complete the practical assessment.” Skillsets remain in demand Even the most well-prepared organisations with extensive contingency plans have been stunned by the scale and speed of the current situation. Alfandari says: “We are finding especially our Intruder Alarms courses for repair and maintenance engineers have been exceptionally popular; those skill sets remain as in demand as ever in these troubled times.” A sister company, PerpetuityARC Training, offers Security Management BTEC Level 4 and Risk, Crisis and Disaster Management BTEC Level 4 courses that are purposely designed to help businesses and those responsible for security learn how to identify threats, risks and vulnerabilities, and create a comprehensive plan that will enable practical measures to be applied to mitigate the impact. Both courses run via two media: classroom or online and are tutor-supported so learners have a choice according to what best suits their needs and requirements. An online Essential Security Practices course is comprised of 12 modules designed to introduce the essentials of corporate security. Modules can be bought individually or as a whole course and will establish fundamental knowledge of best security practice. “It’s a great starting place if you’re new to security or want to brush up on your expertise,” says Alfandari. Maintaining a security presence is a challenge during a global pandemic. “With people following guidelines by staying at home, we’ve been working hard to drive the message that learning doesn’t stop just because you can’t go out,” says Alfandari. “People may think that because they can’t get to the training centre then they can’t train, but that’s just not the case.” Learning in these unprecedented times Our training centres may be closed for now, but our courses are still very much running" Between Tavcom Training and PerpetuityARC Training, there are more than 20 distance learning courses including ASIS International and The Security Institute, all of which can be accessed at home, at a learner’s own pace. “It’s important that people understand that we’re still here, still available and that we haven’t ‘gone away’,” says Alfandari. “Our training centres may be closed for now, but our courses are still very much running. “ “These are, without doubt, extremely difficult times,” he adds. “We are here for our learners. Our team are working hard behind the scenes to facilitate the best possible learning experience during this time, and we encourage all potential learners to really use this and make the most of it. Whether you want a refresher in security basics or finally to start on that qualification you’ve been putting off, we are here to help you in your professional development.” Rhiannon Limbert, Marketing Coordinator for Linx International Group, contributed to this content.
Kurt Takahashi, the new CEO of Pelco, says he will provide collaborative leadership to help build the Pelco team, work together hand-in-hand with team members, remove barriers and lead the company forward. He brings industry experience and relationships to the new post that will translate into new opportunities. Takahashi joins Pelco from AMAG Technology, where he served as President for the last couple of years. Earlier, he had stints at ADT, Tyco and Quantum Secure, where he was Global Vice President of Sales and Marketing. “This was an opportunity to join a brand that has deep, rich and far-reaching history,” says Takahashi. “I couldn’t resist the opportunity to come into a company such as Pelco and be able to make a difference.” Improving the fundamentals Takahashi acknowledges that Pelco has slipped in the last 10 years from its position as a market-leading brand. To address the situation going forward, the company must “improve fundamental things,” he says. Those fundamentals include keeping the customer first, putting the right people in the right roles, and executing technical support well. Keeping the customer first, putting the right people in the right roles, and executing technical support well “We have to provide customer service from when we receive an order, to acknowledging it, to processing it and shipping the order,” says Takahashi. “Another piece is to deliver revisions to a product in a faster time period and introduce new products to the market in a timely way. In terms of market presence, we learn that people haven’t really heard from Pelco in a while. We have to get in front of integrators and consultants more aggressively than we have in the past.” “It’s up to us to prove that we belong and can sustain and support customers moving forward,” he adds. “We will get new opportunities, but we will need to execute them. If we do that, we will grow.” Brand optimism Takahashi sees more reasons for optimism. “In spite of the problems, we are a big company with thousands of customers, a massive footprint, 10 offices around the world and people in over 40 countries. We are a strong, known brand around the world. These are a great foundation to grow from; we just have to execute better.” These are a great foundation to grow from; we just have to execute better Pelco’s new parent company, Transcom Capital Group, was another reason Takahashi was attracted to the position. He says Transom is led by “amazing professionals” that specialise in “transformational culture and how to diffuse best practices in an organisation.” At Pelco, Transom has already led surveys, workshops and focus groups throughout the organisation to create a vision, mission and values covering how the company wants to present itself in the market. From those values will emanate new process and policy improvements to move the company in the right direction. New visions and missions The company’s new, collectively developed vision is “to make the world safer.” The mission is “to deliver distinctive video solutions and world-class customer experiences.” The company’s new, collectively developed vision is “to make the world safer.” The company’s culture is built on six values: innovation and excellence, customer focus, integrity, respect and recognition, collaboration, and ownership. “We believe this is what will help drive our culture moving forward, and it’s the mindset of all of us as one team with one goal that will give us something to be proud of,” says Takahashi. “As we move into the new era of Pelco, you will see excitement internally and externally,” he adds “Everybody’s really eager to see Pelco come back and be a significant player.” Three horizons to success The idea is to look inward and improve on the current, successful product lines Takahashi sees three horizons that summarise the company’s path to future success. The first horizon is to focus on the fundamentals of what the company does today. The idea is to look inward and improve on the current, successful product lines, such as the VideoXpert video system and on-board video analytics. The second horizon will be to look at ways to advance the current feature set, whether “to build, partner or buy.” Building partnerships will be part of that success, such as the partnerships they are already building with Briefcam and Anyvision. The third horizon will be to expand their innovation, based on feedback from end users, dealers and consultants. “I want to get very deeply connected with our customer base,” says Takahashi. “Are we on the right path? Should we explore other partner relationships? We need to bring those minds together to expand our vision.” The focus should be on solving three business problems – mitigating risk, ensuring compliance and saving money. Looking ahead to ISC West in the spring, Takahashi expects Pelco to emerge as a more proactive company that is eager to engage. “We have a lot of stories to communicate, and we have not been as active as we should,” he says.
As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyse a security event, machine learning can analyse the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with dual purpose,” says Matt Kushner, President of STANLEY Security. STANLEY Security, one of the largest integrators with a global footprint, has positioned itself at the centre of the industry’s transformation by information technology (IT) and the Internet of Things. “Security will become an expanded business partner with corporations,” Kushner comments. In response to the trend, STANLEY is hiring more IT-oriented technicians and salespeople within the IT community and who can “speak at the C-level”, Kushner comments. Sonitrol is the most recognised brand by law enforcement for verified response Data centres, higher education and logistics STANLEY manages very large, multi-national clients. As a consequence, the STANLEY security organisation has some of the best and brightest minds for enterprise-class security. To maintain that level of talent, STANLEY is committed to education. “We bring them into the family and focus on education, such as IT and IoT training. That’s critical in a world where unemployment is less than 3%. Finding good people, growing good people, and retaining good people – we do that exceptionally well at STANLEY,” says Kushner. STANLEY’s strong vertical markets including data centres, higher education, and logistics. They are also strong in multi-location installations (such as banking.) STANLEY has a big footprint throughout North America and Europe. PACOM access control and 3xLOGIC cloud-based solutions In addition to STANLEY’s core integrator business, the company also manages several manufacturing brands such as PACOM access control and 3xLOGIC cloud-based solutions.Mergers and acquisitions have been commonplace in the integrator space Beyond its company-owned integrator locations under the STANLEY brand, the company also owns Sonitrol, the strongest brand in the market for verified response with 65 franchises in North America. Sonitrol is the most recognised brand by law enforcement for verified response. Mergers and acquisitions have been commonplace in the integrator space, and Kushner says that STANLEY is “open and actively looking for properties that fit our commercial growth strategy”. He notes that STANLEY focuses on the commercial side of the market, where there are good margins and continuing growth. They pay less attention to the residential side which is “being heavily disrupted”. Strong partnerships with manufacturers STANLEY has strong partnerships with several manufacturer partners, through which they bring new breakout technologies to market from emerging companies. An example is Evolv Technology, a manufacturer of gun and bomb detection technology. “We see them as a leading provider of the technology, and they are, in my mind, a very disruptive provider,” says Kushner. STANLEY is also collaborating with a company – to be announced – that provides a unique gunshot detection technology, he says. STANLEY is also cooperating with dormakaba to implement Switch Tech, a Bluetooth wireless core that can replace any standard mechanical lock core. Existing locks can be transformed into electromechanical locks in minutes. STANLEY is also developing a tight integration with Lenel’s mobile credentialing system. STANLEY is also cooperating with dormakaba to implement Switch Tech GSX 2019 and ISC West 2020 At the recent GSX 2019 show in Chicago, Kushner says STANLEY heard a lot about cybersecurity, especially customers wanting to make sure they are investing in cyber-hygiene and who are looking to expand into providing cyber protection. “In concert with cyber-hygiene, they are looking for health monitoring or assurance that network devices are operating properly,” he says. “They want to ensure their security platforms are cyber-secure and up to date with the latest software versions.” STANLEY is also a big proponent of cloud offerings, and Kushner hints at a big announcement at the upcoming ISC West show in Las Vegas of additional cloud offerings and/or partnerships. “There will be a variety of new solutions to be introduced, including hosted solutions and applications that benefit both security and that add new value to businesses overall.”
CEDIA, the industry association for the home technology industry, announces a community for Ring Professionals within the association. The new initiative will grant Ring Pros access to a carefully selected educational curriculum and a variety of member benefits. “Our goal at CEDIA is to welcome innovation from all corners of the industry, which is why we’re so excited to work more closely with Ring to expand access to CEDIA benefits and training to pros who are making an impact on the growing residential technology space,” says CEDIA Senior Director Strategic Partnerships Ian Bryant. Training and certification programs For a limited time, Ring Pros can join the CEDIA community as an individual member for $99 to gain access to discounted educational opportunities through CEDIA Academy, a dedicated Ring Pro portal, and exclusive webinar content. Ring Pros will also be able to take advantage of the many benefits a CEDIA membership has to offer, including education and training, certification programs, in-person and virtual events, whitepapers, and more. The first 100 registered Ring Pros to become CEDIA members will also receive a complimentary Amazon Echo Show 5 as a welcome gift. As homes become smarter, customers expect more from smart devices" Making Smart homes “At Ring, we’re committed to supporting pros and giving them the tools they need to succeed,” said Andrew Vloyanetes, GM of Installed Solutions at Ring. “As homes become smarter and residential technology becomes more commonplace, customers expect more from their smart devices. We’re excited to work with CEDIA to provide educational content and other tools so pros can delight their customers and make their homes work harder for them.” CEDIA’s Propel program Ring and other Amazon products will be available through CEDIA’s Propel program, which connects CEDIA members to emerging trends, innovative technology, and special offers. All CEDIA members who order through Amazon business are eligible to receive up to 25 percent off Amazon Echo, Ring, and other Amazon products.
Running a unified locking system for multiple municipal services may bring operational efficiencies. However, if the system is based on mechanical locks, it can also create time-consuming headaches. When keys go missing, for example, or user access requirements change, mechanical security does not have the flexibility to adapt quickly. For this reason, Vincennes city administrators sought a modern, electronic replacement for a master-key system whose lock-chart ran to 4,000 keys. Several locations around Vincennes — among them schools, nurseries, and the Town Hall elevator — relied on this complex locking solution. The costs and risk when keys went missing had become a growing logistical burden. Electronic locking system Vincennes officials tasked their city security director with finding a more responsive solution: An electronic locking system that is easy to install; does not require power to be cabled to every door or lock; and gives municipal staff the ability to tailor access rights for different people, to trace keyholder and lock interactions and to amend or revoke permissions when required. They also needed an established, trusted security partner able to offer all the necessary training and system support. An electronic locking system that is easy to install; does not require power to be cabled to every door or lock “A wired access control system was rejected because it required too much work to bring the power to each door,” says Fabrice Pain, Director at the Municipal Technical Centre. “Now eCLIQ provides us access control without wiring at all.” Interior and exterior doors at buildings including the Hôtel de Ville, 11 nurseries, 12 schools, and the Municipal Technical Centre are equipped with more than 650 programmable, electronic eCLIQ cylinders. Almost 1,000 battery-powered eCLIQ programmable keys have been issued to authorised staff. Solving the lost key problem and reducing thefts With eCLIQ, lost keys no longer threaten building security: They can simply be blacklisted by the city’s central eCLIQ management software, which saves the money spent on replacing mechanical locks. And because every key, lock, or user may be audited at any time, thefts from public property have dropped. The eCLIQ cylinder range brings almost any opening into an access system. Robust, durable eCLIQ locks can protect lifts, machines, mailboxes, cabinets, and more with the same security as sensitive doors. Robust, durable eCLIQ locks can protect lifts, machines, mailboxes, cabinets, and more with the same security as sensitive doors Certified and available in multiple sizes and formats — including the EURO format first patented by an ASSA ABLOY Group brand nearly 100 years ago — eCLIQ cylinders maintain security and regulatory compliance across the city. During installation, no wiring or cabling was needed at the doors. A standard battery inside every programmable eCLIQ key powers the electronics inside the lock. Every authorised building user brings their own power to the door. Security solution Now, the city security team issues granular access to everyone who needs it and only where they need it from a single admin point. The new solution is popular with school and municipal staff, especially since a successful implementation of Vincennes’ integrated Vigipirate plan, in which eCLIQ plays an important role. With eCLIQ, Vincennes has found a security solution to match their image as a young, dynamic, tech-savvy place to live and work. More important still, eCLIQ key-based electronic access control has simplified security management and solved their lost key problem.
Warwickshire College is one of the largest colleges of further and higher education in the Midlands region. Spread over six centres with 1,700 staff and 18,500 students needing support for both administration and learning facilities, Warwickshire College Information Services has a significant number of IT assets that have to be controlled across multiple sites. Challenges with IT asset management It has the twin problems of controlling the IT assets used by its administrative staff and those used by students. In addition, the College has many items of audiovisual equipment, especially those units used in the College's newly extended Leamington centre, where technology is used to promote entrepreneurial skills. Historically, systems used to audit IT Assets were time-consuming and, the College felt, not always accurate. Like many other organisations, the College's original system for managing IT assets was based on printed barcode labels stuck on to equipment. Serial numbers from labels were transcribed manually to spreadsheets creating a record of what equipment was where in the college. Inevitably the audit process of checking labels and updating spreadsheets was both time-consuming and prone to error, causing unnecessary costs and providing inaccurate information on the whereabouts of assets. RFID tagging To help improve the control of their IT assets, Warwickshire College decided to introduce RFID tagging for IT assets. They chose CoreRFID to work with them on selecting and supplying the right technology and applications to deliver their solution and selected Xerafy's Metal Skin series of RFID labels.
Allied Universal®, a security and facility services company, was recently awarded a security services contract for Bernalillo County, New Mexico’s new government headquarters, Alvarado Square. Bernalillo County has relocated its headquarters to the recently renovated and expansion of Alvarado Square at 415 Silver Southwest in Albuquerque, New Mexico. The building, which is scheduled to open, provides offices for over 900 County employees from over 22 County departments, many County-elected officials and the County Commission Chambers. Holiday security services “We are truly honoured to be able to provide phenomenal security services to Alvarado Square as our #1 goal to safeguard this important county property, its employees and visitors,” said Shannon Briner, Business Development Manager, New Mexico, Allied Universal. “Allied Universal’s highly-trained security professionals are ready to respond quickly and effectively in any situation.” Allied Universal will be providing evening, overnight, weekend and holiday security services Since Alvarado Square is operational every day of the year, 24-hours a day, Allied Universal will be providing evening, overnight, weekend and holiday security services. The Alvarado Square security team includes armed and unarmed officers who will be conducting patrol and security scanning duties. The highly trained and qualified security team will utilise technology to support compliance, training, incident trends, analysis, and transparency of service. Licenced security professionals Branch Manager, Todd Freiwald, who has more than 30 years of proven leadership experience in federal law enforcement and similar industries, leads Allied Universal’s operations in New Mexico. The local branch in Albuquerque has provided security services throughout New Mexico since the early 1980s. With support from the El Paso branch, Allied Universal employs more than 500 actively licenced security professionals in the state who secure nearly 300 sites and patrol accounts and approximately 35,000 service hours per week.
Leonardo delivered the first two M-345 jet trainer aircraft to the Italian Air Force, which to-date has ordered 18 units from a total requirement for up to 45 aircraft. The new type of jet trainer aircraft, designated T-345A by the Italian Air Force, will gradually replace the 137 MB-339s which have been in service since 1982. M-345 jet trainer aircraft Marco Zoff, Leonardo Aircraft Managing Director, said “Building on our heritage and expertise in jet trainers, the M-345 will allow our customers to achieve a significant improvement in training effectiveness while at the same time reducing operating costs. This first delivery to the Italian Air Force is a key milestone, the result of a longstanding and productive team working closely together with the operator.” The new M-345 jet trainer aircraft, designed to meet basic and basic-advanced training requirements, will complement the in-service M-346, which is used for advanced pilot training. Integrated training system Leonardo’s integrated training system developed around the M-345 platform is representative of the company’s technological leadership in training pilots to fly current and future generation aircraft. The system benefits from experience with, and technology developed for, the M-346, which includes a ‘Live Virtual Constructive’ capability. This allows aircraft which are flying live training missions to incorporate simulated ‘friend’ or ‘foe’ elements into scenarios, allowing the pilot to be exposed to the full range of possible operational situations. M-345 HET (High Efficiency Trainer) The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots The M-345 is a high-performance aircraft which supports a pilot’s transition from basic trainers to latest-generation fighters. The Italian Air Force’s acquisition of the new aircraft is an important step forward in the modernisation of its fleet, with the M-345 replacing the MB-339A in Air Force’s second and third military pilot training phases. The M-345 has also been chosen as the new aircraft of the Italian Air Force’s acrobatic team, the ‘Frecce Tricolori’. The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots. It also gives trainees the chance to fly an aircraft that features higher performance characteristics than other basic/advanced trainer aircraft currently in service around the world. Delivering high quality training at low cost The performance of the M-345 allows it to carry out the most demanding mission types found in a training syllabus, delivering high quality training at significantly lower cost. The M-345 cockpit architecture is the same as that of frontline fighters. The aircraft is also able to perform operational roles, thanks to an extended flight envelope, with a high-speed maneuvering capability even at high altitudes, modern avionics systems, high load capacity and performance. Health and Monitoring Usage System The M-345 is designed with a long life-cycle and a two-level approach to maintenance The M-345 is designed with a long life-cycle and a two-level approach to maintenance, eliminating the need for expensive general overhauls. The aircraft’s Health and Monitoring Usage System (HUMS) also contributes to a lower cost of ownership. A sophisticated on-board training simulator confers a number of benefits. For instance, M-345 pilots are able to plan maneuvers before live training, allowing for higher efficiency during flight. Mission Planning and Debriefing Station Trainees are also able to fly in formation with other pilots in the air and those training on the ground in simulators, via a real-time data-link. The aircraft’s Mission Planning and Debriefing Station (MPDS) allow trainees to analyse the missions they have just flown. The M-345’s engine is a Williams FJ44-4M-34 turbo fan optimised for military and aerobatic use. The cockpit is based on HOTAS (Hands-On-Throttle-And-Stick) controls and features a glass cockpit with a three-colour MFD (Multi-function Display) touch screen. The aircraft’s heads-up display is mirrored on a fourth screen in the rear seat.
In 2017 alone, 71 prison staff were found to be smuggling contraband into detention facilities in the UK alone. This is a known issue for security officers in prisons around the world, and that is why a major prison in Australia approached UVeye in 2019 about installing intelligent vehicle scanning devices. During 2019 In England and Wales drugs were found 13,119 times in prisons, more than 35 incidents per day, on average. The number of incidents has tripled since 2014, after years of relative stability, with some smugglers taking advantage of new technology, such as drones, to deliver contraband. Self-made devices The value of the UK prison drug market is an estimated £100 million, according to the Prison Officers Association. Drugs aren’t the only issue; weapons are also being smuggled into prisons at increasing rates. Instruments like wrenches and other self-made devices, usually attached to the undercarriage of vehicles coming in and out of the prison, can violate the rules and cause disruptions. Drugs aren’t the only issue; weapons are also being smuggled into prisons at increasing rates This Australian prison has over 100 regular employees coming in and out. Some of their vehicles have been used to deliver messages to the outside world from gang members who are in detention. Whether the prison staff or bus drivers themselves were paid to smuggle materials and objects in or out of the prison, or a criminal from the outside attached phones or drugs to their undercarriage while their vehicle was parked, this was clearly a matter of concern. Access control systems In other prisons which don’t have an automatic system, there are usually manual inspections conducted by a guard holding a mirror to check the undercarriages of vehicles coming in or out. It is clear in the industry that an efficient technological solution is needed. UVeye facilitates the following things: Securing vehicle access control points Full integration to barriers, bollards and access control systems Tightly securing sensitive areas like the apron of the prison Automatic detection of illicit materials under the vehicle on the first pass Driver and passenger fever detection capabilities SUV delivery vehicles Since most vehicles entering and leaving the prison come in and out regularly, there needs to be a quick and easy experience to compare the vehicles and look for attachments or modifications. The system also needs to be versatile enough to detect anomalies in the undercarriages of a wide variety of vehicle types, from private vehicles to SUV delivery vehicles and armoured trucks and buses. Understanding that the quality of inspection and streamlining the entry and exit process is a top priority, the security chiefs of the prison contacted UVeye. They asked for an automatic solution that can compare every vehicle entering or leaving the prison, and that is able to detect any modifications, smuggled devices or illegal weapons entering the facility. High-resolution cameras Helios UVSS by UVeye is setting the global standard for under-vehicle inspection Helios UVSS by UVeye is setting the global standard for under-vehicle inspection. Equipped with five high-resolution cameras, the system can be installed at the access lane of the prison and automatically detect any illicit materials entering or leaving the prison walls. Offering both single- and multi-lane stationary as well as mobile units, Helios has a feature called UVcompare that enables it to recognise vehicles by their licence plate or unique undercarriage fingerprint ID and compare the vehicle to a previous scan. This feature can assist in detecting tiny objects such as letters, paper bags, phones and other contraband. Advanced deep learning algorithms that were developed through training with millions of vehicles allow UVeye to offer its first pass solution, UV Inspect. Providing maximum security Built on a truly intimate understanding of what a wide range of vehicles are supposed to look like in a variety of environmental conditions, UV Inspect can be used for vehicles that have not been previously scanned by a system. UVeye is the only under-vehicle inspection system (UVIS or UVSS) vendor to offer a first verified, first pass solution that greatly increases the effectiveness of security teams. The UVeye team sent its representatives from Singapore for several site visits and worked closely with the construction integrator to provide maximum security and screening for all vehicles coming in and out of the prison. Classifications for items such as tiny paper notes, which in other cases might be considered false positives, were calibrated to be exposed by the system within several seconds, and the security guards will be alerted. Improving staff satisfaction The local staff was trained within several weeks of the installation, and objects like wrenches and boxes were picked up immediately during the early implementation of the system. The queuing time for vehicles entering or leaving the facility is reduced by over 70% As a pass-through system that scans vehicles as they drive over the device at up to 30km/h, the prison’s security team is now able to keep traffic flowing without compromising the quality of its inspections. The speed of inspection with a UVeye undercarriage system is reduced dramatically compared to manual inspection by a guard and keeps the prison staff safe. The queuing time for vehicles entering or leaving the facility is reduced by over 70% these cases improving staff satisfaction. Automated UVSS technology UVeye has simplified the documentation of inspections for the leadership, providing centralised, detailed reports of every vehicle, with the ability to compare past scans, which is often used for different purposes. If there is a case of corruption within staff, the accountability is immediate. Adopting UVeye’s automated UVSS technology has given the prison’s security team a quick and efficient method to monitor all vehicles entering or leaving the facility. In a world where a detention facility’s security is constantly tested, it is important to automate and rely on objective systems that can help prevent smuggled items from reaching the wrong people.
Round table discussion
In-person training sessions were mostly canceled during the worst of the COVID-19 pandemic. However, the need for training continued, and in some cases increased, as the security industry sought to adapt to the changing business climate of a global emergency. So how well did we as an industry adjust? We asked this week’s Expert Panel Roundtable: How has security industry training changed in the last year?
Internet-based training has long provided a less-expensive alternative to in-person classroom time. There are even universities that provide most or all of their instruction online. However, the COVID-19 pandemic has expanded acceptance even more and increased usage of internet-based meeting and learning tools. We asked this week’s Expert Panel Roundtable: How can remote or internet-based training benefit the physical security market?
Traditionally, dealer-installers and/or integrators provide the front line of support to end user customers after a sale. Because integrators assemble and provide the “solution” – often using products from multiple manufacturers – they are most familiar with the total system and can troubleshoot any problems. However, manufacturers may be better equipped to deal with specific problems after a sale and also to provide a variety of resources to end-users. It’s a delicate balance, and the best approach may be dependent on the product or even the market. We asked this week’s Expert Panel Roundtable: What is the role of manufacturers in providing support to end user customers after the sale?