Wireless security
Videx Security, a pioneer in door entry and access control solutions, has announced the launch of its latest innovation, the XPROX-MF-SA panel mount reader. This new addition to the popular MiAccess offline proximity access control system enhances its versatility and convenience for users. The XPROX-MF-SA features the industry-standard UK window size of 40 mm x 40 mm, making it an ideal choice for both new installations and retrofitting onto existing entry panels, including those from thir...
The delegates of Euralarm’s Services Section have elected Dave Wilkinson as Vice-Chair of the section. He follows in the footsteps of Brian Cunningham. Robert Thilthorpe, Chair of the Services Section, stated, “I’d like to thank Brian for his efforts as the previous Vice-Chair and I am sure that Dave will be given the support that our delegates have always given Brian and I, to help us to move the Services Section to the next level." Development of service standards Thiltho...
Pioneering cyber security and investigations consultancy S-RM has announced the appointment of Kelly McManus as Global Business Development Lead, Insurance and Legal, as part of its growing global cyber offering. As part of her new role, McManus will focus on developing S-RM’s Insurance and Legal relationships in the US and UK. McManus joins S-RM as a cyber specialist in both sectors, having gained experience during her previous role at Kroll where she was responsible for developing and m...
Detection Technology, a global pioneer in X-ray detector solutions, has expanded its global footprint by establishing a service and production facility in greater Delhi, India. This move is designed to enhance customer experience by offering local service, quicker response and delivery times, and cost-effective solutions, all while maintaining the company’s high standards of quality. Range of modular detector "We are excited to expand our operations into the growing Indian market...
Axis Communications, a pioneer in network video, has announced it has achieved SOC 2® (System and Organisation Controls) Type 1 attestation for the cloud-based solutions Axis Cloud Connect platform and AXIS Device Manager Extend. The SOC 2 audit, performed by an independent third-party auditor, verifies that Axis has implemented robust security controls and practices that meet the stringent criteria set by the American Institute of Certified Public Accountants (AICPA). Design of the s...
DigiCert, a pioneering global provider of digital trust, announced the availability of its Common Mark Certificate, a new type of certificate designed to help organisations enhance the security and value of their email communications. For organisations with logos protected under prior use–rather than registered trademarks-Common Mark Certificates enable the enhanced brand recognition and email deliverability benefits that come from displaying the sender's logo in the recipient’...
News
The United States Department of Homeland Security (DHS) announced that it will distribute USD 210 million in Nonprofit Security Grant Program (NSGP) funds through the Federal Emergency Management Agency as the second tranche of additional funding that the Biden-Harris Administration secured to protect faith-based institutions and nonprofit organisations against targeted attacks. This funding will be made available in a Notice of Funding Opportunity to be published in late October. Priority of the Administration The USD 210 million in other funds are a portion of the USD 390 million that were had in the fiscal year 2024 The USD 210 million in additional funds are a portion of the USD 390 million that were included in the fiscal year 2024 National Security Supplemental, a key priority of the Administration as it continues to intensify its efforts to combat the dramatic increase in hate crimes and other forms of targeted violence against faith-based institutions and nonprofit organisations. The first tranche was made available in June 2024. In total for fiscal year 2024, the Administration has secured USD 664 million for the NSGP, more than double last year’s USD 305 million appropriation. Nonprofit Security Grant Program “Now, when we continue to live in a heightened threat environment, the security-enhancing grant funds we provide to non-profit organisations are more critical than ever,” said Secretary of Homeland Security Alejandro N. Mayorkas. “The additional Nonprofit Security Grant Program funds we are announcing today will enable non-profit institutions, including faith-based organisations that are increasingly targeted, to equip themselves with the personnel, technology, and other resources needed to enhance their security and continue to safely contribute to their communities. We urge eligible institutions to apply for these potentially life-saving funds. We are grateful to Congress for making them available.” NSGP funding The rise in hate crimes and other forms of targeted violence has increased sharply since the October 7, 2023 The rise in hate crimes and other forms of targeted violence has increased sharply since the October 7, 2023 terrorist attacks against Israel. In light of the changing threat environment, the NSGP has become an even more important resource to faith-based institutions and nonprofit organisations to strengthen their security posture. In 2024, over 3,200 faith-based and other nonprofit organisations were awarded over USD 454 million in NSGP funding to purchase security cameras, additional warning and alert systems, gates and lighting, access control systems, and training programs for staff. DHS’s multi-pronged strategy The distribution of grant funds is one element of DHS’s multi-pronged strategy to protect communities and their institutions from targeted violence. DHS regularly communicates with over 2,000 state, local, tribal, territorial and campus law enforcement officials and with the leadership of all national-level law enforcement associations. The DHS Centre for Faith-Based and Neighbourhood Partnerships distributes security resources to over 70,000 faith partners to share resources to enhance safety in local communities, including faith-based communities. Some examples of DHS work Releasing the “Resources and Information for Faith and Community Pioneers Regarding the Israel - Hamas Conflict” webpage in October 2023, which continues to be updated with threat assessments pertaining to the homeland and all relevant resources to keep faith-based communities and institutions safe; Distributing the Protecting Places of Worship online resources, which they provided to synagogues, religious schools, mosques, community centres, and other nonprofits in partnership with the FBI; Providing Protective Security Advisors in every state to guide and advise faith communities on how to most effectively secure their facilities with existing resources; Releasing the Physical Security Performance Goals to help houses of worship and other faith-based organisations enhance their security; and Tasking the Faith-Based Security Advisory Council with providing recommendations on improving DHS grants and resources, and implementing those recommendations into the NSGP through the Protecting Places of Worship initiative, an effort co-led by DHS, the Department of Justice and the White House Office of Faith-Based and Neighbourhood Partnerships. Providing virtual workshops for faith and community sectors during the 3rd annual Protecting Places of Worship Weeks of Action in September 2024. DHS, DOJ and other federal partners dedicated national weeks of action to encourage faith-based and community organisations to safeguard people and places of worship through partnerships with local emergency managers and first responders. Administration’s success Funding of the Nonprofit Security Grant Program has been a priority for the Biden-Harris Administration. Historically, applications to access the competitive program have far exceeded the funds available. The Administration’s success in securing USD 390 million in supplemental funding – resulting in total funding for the program that is more than double last year’s appropriation – will enable previously-unfunded yet at-risk houses of worship, religious schools, and nonprofit organisations to implement new security measures to protect their congregations, students and teachers, employees and members, and their broader communities across the country. The Notice of Funding Opportunity will be published in late October.
SecurityCEU.com, a pioneering provider of online continuing education and systems integration training, announced the launch of its groundbreaking Frontline Project Management® Training course. This innovative program is specifically designed to meet the unique needs of Project Managers in the systems integration sectors. Biggest challenges For over two decades, the Frontline Project Management® Training course has consistently demonstrated its value, with thousands of participants benefiting from its proven approach. However, one of the biggest challenges faced by Systems Integrators has been the difficulty of taking their Project Managers away from their daily responsibilities to attend training. Hybrid learning model New course uses a hybrid learning model, mixing self-paced online modules with live virtual sessions To address this, SecurityCEU.com has introduced a new hybrid format that allows Project Managers to complete the majority of the course content online, at their own pace. This is followed by a hosted, virtual four-hour workshop, replacing the traditional two-day in-person format. The new course employs a hybrid learning model, combining self-paced online modules with live virtual sessions. The online portion is approximately 10 hours long. This approach allows system integration professionals to enhance their project management skills without extended time away from their critical roles. Hybrid approach "Our Frontline Project Management Training® addresses a significant gap in the systems integration industry," said Connie Moorhead, CEO at SecurityCEU.com. "There are other project management courses on the market, but ours is the only one to take a hybrid approach giving students the best of both online and instructor-led worlds.” Flexible hybrid program Sawaya's expertise ensures that parties gain practical skills directly usable to their daily work The course is led by industry veteran Nadim Sawaya, whose extensive experience in systems integrators project management brings real-world insights to the curriculum. Sawaya's expertise ensures that participants gain practical skills directly applicable to their daily work in systems integration projects. “This flexible hybrid program is a game-changer, making it easier than ever for Systems Integrators to provide their Project Managers with best-in-class project management training without disrupting their essential day-to-day operations,” said Sawaya. Maximising learning outcomes Effective project management can significantly impact a company's bottom line in the systems integration industry. With project managers potentially generating around $1,000 per day for their employers, the need for specialised training is evident. SecurityCEU.com's course offers a cost-effective solution that minimises disruption to ongoing projects while maximising learning outcomes. Aspects of project management The comprehensive curriculum covers crucial aspects of project management, including: Project Manager and Team Responsibilities Defining Project Scope and Objectives Planning and Implementation Strategies Project Closing and Evaluation Techniques Real-world scenarios Participants will have access to practical tools and resources, enhancing their ability to apply learned concepts in real-world scenarios. Students receive a certificate upon successful completion of the content, adding value to their professional credentials in the competitive systems integration market. This course is a stepping stone to full certification to be offered by SecurityCEU.com in the Spring of 2025. Frontline Project Management® Training Frontline Project Management® Training is available at an introductory price of USD 650 The Frontline Project Management® Training is now available at an introductory price of USD 650 for the online portion of the course, and the two-day instructor-led portion. This makes the course an accessible investment for individual professionals and systems integration firms looking to enhance their project management capabilities. Project management skills "Specialised project management skills are more crucial now than ever before," added Moorhead. "This course empowers systems integrators professionals to deliver projects more efficiently, ultimately pioneering to improved client satisfaction and stronger bottom lines for integration firms." Systems integration professionals interested in elevating their project management skills can enrol or learn more about the Frontline Project Management® Training.
RGB Spectrum®, an industry pioneer in mission-critical video for real-time decision support, announces that the New Iberia Police Department (NIPD) is enhancing public safety with a new, cutting-edge real-time crime centre (RTCC). The facility is designed to provide a comprehensive view of citywide activities. At the core of the RTCC is RGB Spectrum’s Zio® W4000 video wall processor. The feature-rich Zio W4000 supports 4K 60Hz resolution end-to-end and accommodates a mix of local baseband, IP video, and web-based inputs. Video and critical data The processor aggregates video and critical data from all sources for display on a Samsung 140" all-in-one LED screen, ensuring operators have a clear and comprehensive view of the city’s surveillance feeds. "With state-of-the-art technology, including sound and enhanced vehicle and person identification, the new systems have already helped solve crime in the area," said Captain Leland Laseter of the New Iberia Police Department. NIPD plans NIPD plans to deploy nearly 500 advanced surveillance cameras across 125 locations Supported by $1.6 million in state funding, NIPD plans to deploy nearly 500 advanced surveillance cameras across 125 locations, creating a safer environment for residents. The strategic placement of these cameras, with each location featuring four devices, will deliver a 360-degree view of key areas, significantly enhancing the department's ability to monitor and respond to crime effectively. Integration of RGB Spectrum These feeds will be available on the video wall to provide decision-makers with enhanced situational awareness. NIPD is committed to leveraging innovative technology to strengthen community safety. It sets a benchmark for modern policing in Louisiana. The integration of RGB Spectrum’s advanced visualisation and control solutions represents a significant step toward, creating a safer community for New Iberia residents.
Iris ID, the global pioneer in iris recognition technology announced Jose R. (Ricky) Garcia as Business Development Director, Latin America. Ricky has more than 20 years of experience driving increased revenue and cost efficiencies for global high-end technology companies in LATAM. Biometric solutions Ricky diversified sales experience including with startups will propel Iris ID multimodal biometric technology as a solution for National ID projects, Access Control systems and more within the region. Previously, Ricky has worked with companies like Honeywell, Sharp Electronics and Kyocera Documents Solutions. His in-depth industry knowledge and strong business acumen will be key in helping Iris ID deliver innovative iris and face multimodal biometric solutions to a growing LATAM market. Iris recognition technology “We are excited to welcome Ricky to the Iris ID family. He is a proven pioneer with expertise managing and working with multicultural organisations. With Ricky’s help, we look forward to establishing iris recognition technology as the go-to biometric solution in LATAM and introducing our new products,” said Mohammed Murad, Vice President, Global Sales and Business development. Jose R. (Ricky) Garcia has an Associate of Arts in Marketing from Louisiana State University and a Bachelor of Arts Marketing from Sacred Heart University in San Juan, Puerto Rico. He is also fluent in Spanish, Portuguese and English.
Many businesses, both large and small, have capitalised on the trend of rapid technology adoption, but an organisation's barrier to growth and predictable cash flow lies within its corporate walls: an efficient accounts payable (AP) process. The correct transformation in AP processes can offer a seamless alternative to high processing costs, tedious data entry and misplaced invoices, allowing businesses to reap the benefits of financial agility. Lack of process visibility The lack of process visibility was also a potential cause for concern in achieving compliance Espria, the pioneering managed service provider, was responsible for processing an average of 50 invoices daily—around 12,000 per year. However, the manual process lacked the control to store these invoices in secure places, resulting in inefficient extractions, the input of the appropriate data and delayed authorisation for payments. The lack of process visibility was also a potential cause for concern in achieving compliance with certain governing bodies. Receiving and processing invoices With 20% of these invoices being invoiced in hardcopy and the rest digitally, adding the correct nominal code and other relevant data was strenuous. It equated to nearly 90 hours to obtain the necessary authorisations each week. Furthermore, it became difficult to process invoices due to the differing (in situ and offsit) locations of relevant employees, creating a time-consuming and constrained workflow with a bottleneck in receiving and processing invoices. All of which risked late supplier payments, reduced credit limits and ultimately, service levels. Implementing DocuWare Espria has been running DocuWare for over 4 years to successfully streamline their invoice systems Recognising the inefficiencies associated with their manual AP processes, Espria worked alongside the DocuWare team to implement a system that achieves better workflows with their invoice operations. As a managed service provider that continually tests any solutions in-house to ensure their suitability before offering them to valued customers, Espria has been running DocuWare for over four years to successfully streamline their invoice systems and create a new Document Management System for this process. The implemented solutions focused on critical areas to tackle disorganised systems and inaccuracy, replacing the legacy AP system with an automated, streamlined service that allows invoices to go through an entire workflow with incredible speed. Cloud-based system With employees working both on and off-premises, a cloud-based system reduces any delays and enhances flexibility for all employees while remaining cost-efficient. DocuWare's seamless integration with SAGE accounting software allowed for easy creation of CSV files to keep projects on time and maintain profitability with project finances. Intelligent indexing and capabilities Espria implemented a monitored mailbox and user scans to centralise all invoices within the system To reduce disorganisation with invoice submission, Espria implemented a monitored mailbox and user scans to centralise all invoices within a managed system, eliminating digital chaos. DocuWare detects invoices and related documents, applying Intelligent Indexing and prioritising any urgent invoices to achieve an organised system that is easily navigated. These capabilities also allow for the automatic extraction of required data such as invoice number, date, supplier name, value, and supplier code and the creation of invoice layouts based on new suppliers added. Automated approvals Approval from the relevant bodies extends the time taken to complete invoice transactions. However, the DocuWare/AP process mitigated the need for manual intervention by processing large volumes of transactions and marking each invoice as urgent or confidential as necessary. This speed and accuracy translated to timely payments and became crucial for maintaining smooth operations and keeping suppliers happy with consistent credit levels. Secure digital storage Organising all necessary files within the new document management system implemented by DocuWare resulted in centralised documents that reduced filing chaos while ensuring GDPR compliance and minimising the risk of non-compliance penalties. The system also maintains detailed, auditable records that are essential during financial audits or reviews. Batch scanning Batch scanning was designed to streamline and automate the accounting workflow Batch scanning was designed to streamline and automate the accounting workflow, allowing Espria to process multiple invoices in a single pass. Scheduling payments in batches leads to better cash flow management and an improved understanding of company outgoings. This scalability also means that as business transactions grow, the Espria payment system can grow with it, handling more without a significant increase in cost or complexity. Error mitigation The newly implemented RAG (Red, Amber, Green) system reduced the likelihood of errors in invoices by checking for accuracy, with the capacity for manual adjustments to 'teach' DocuWare and refine the process according to the company's needs. As well as supporting accurate account management, real-time reporting provided Espria with analytics for informed decision-making and strategic planning with consistent data accuracy for approvers to check previous invoices for variance through historical reviews. Results Espria was able to aggregate its AP processes, reporting and workload control into a single location By implementing DocuWare, Espria were able to aggregate its AP processes, reporting and workload management into a single location that provided scalability, security and efficiency. It mitigated the loss of hard copy invoices while also reducing manual errors, labour and improving data integrity. The DocuWare AP system significantly reduced paper consumption with 90% of invoices approved on the same day, saving 81 hours per month. This not only eased the burden on AP staff but also reassured them with the reduction of manual errors, allowing them to focus on more dynamic priorities, such as client relationships and timely supplier payments. Other strategic initiatives The new system enhances operational efficiency while supporting hybrid working, ensuring business continuity and staff satisfaction. With less time, employees and resources needed to manually process invoices, Espria now has more space to evaluate how to use its budget. It can also empower its staff to redirect those resources to other strategic initiatives that will drive growth and profitability.
DigiCert, a pioneering global provider of digital trust, has announced the results of the inaugural DigiCert® Quantum Readiness Awards. Cloudflare, the pioneering connectivity cloud company, won the prestigious honour, while Migros, one of the largest retail companies in Switzerland, and DXC Technology, a pioneering global technology service provider, were selected as finalists by the judges. Cloudflare's journey The awards ceremony took place during DigiCert’s World Quantum Readiness Day, a virtual event dedicated to raising awareness about the threats quantum computing poses and steps companies should take now to prepare. Cloudflare's journey towards post-quantum cryptography excellence started with experimentations in 2017, to deploying advanced algorithms to its services in 2022, to providing broad post-quantum encryption support for free by default across its products and services to help customers secure their websites, APIs, cloud tools, and remote employees against future threats. Cloudflare’s strategy Cloudflare’s strategy of forming a true task force to facilitate the company-wide transition to secure Cloudflare has set a benchmark in the industry. Their proactive community-first approach, which includes open-sourcing implementations and extensive collaborations with industry partners, has significantly contributed to global standardisation efforts. Cloudflare’s strategy of forming a dedicated task force to facilitate the company-wide transition to secure both internal and external connections against quantum threats, showcases a commitment to innovation and security. Cloudflare's leadership Cloudflare's leadership in this field was further underscored by its commitment made at the 2023 Summit for Democracy, to make post-quantum cryptography available for free, solidifying its role as a pioneer in promoting a safer Internet for the future. "Cloudflare recognised early on that it was necessary to get our systems ready for the undefined time at which quantum computers would become a threat to cryptography," said John Graham-Cumming, Chief Technology Officer at Cloudflare. "We made a commitment to post quantum readiness in 2017 through the work of our Research team. We began working, doing experiments, and the result is this Quantum Readiness Award and the fact that all of our customers have post quantum cryptography available today." Expert panel of judges This year's honourees were selected by an expert panel of judges, including: Blair Canavan, Director, Alliances – PQC Portfolio, Thales Tim Hollebeek, Industry Technology Strategist, DigiCert Dr. Ali El Kaafarani, CEO, PQShield Bill Newhouse, Cybersecurity Engineer & Project Lead, National Cybersecurity Centre of Excellence, NIST Alan Shimel, CEO, TechStrong Group Hugh Thompson, Chairman, RSAC. Current encryption standards “Quantum computing presents both an unprecedented opportunity and a significant threat to the current encryption standards that enable security, trust and online privacy. It is encouraging to see many of the applicant companies leaning into this very important transformation to quantum agility in order to protect data and infrastructure,” said Dr. Hugh Thompson, RSAC Chairman and Quantum Readiness Award judge. “On behalf of the judging panel, we are excited to see Migros, DXC Technology, and of course, the winner, Cloudflare recognised for their efforts in acting with haste on this critical move to quantum-resistant cryptography." DigiCert Quantum Readiness Awards Most firms (61%) report being unprepared for the threat posed by quantum computing Most enterprises (61%) report being unprepared for the threat posed by quantum computing. The DigiCert Quantum Readiness Awards recognises organisations that are at the forefront of safeguarding digital security in the quantum era. These pioneers are setting an example for what it means to be quantum-ready, demonstrating exceptional innovation in addressing quantum challenges. Quantum computing technology DigiCert Quantum Readiness Awards underscore the importance of collaborative efforts in developing robust defences against the looming quantum threats. As quantum computing technology continues to advance, DigiCert remains committed to supporting organisations worldwide in their journey toward quantum preparedness.
Expert commentary
As the backbone of community welfare, healthcare facilities cater to crucial public needs from emergency care to specialised medical treatments, and due to its position as a significant facet of the world's critical infrastructure, the healthcare sector faces a multitude of challenges in ensuring patient and visitor security, managing high traffic, and safeguarding sensitive data. Medical sites, such as large hospitals and urgent care clinics, see a wide variety of patients, medical staff, administrative teams, and visitors throughout the day. In addition to protecting patients, visitors, and staff, healthcare environments must protect medical and patient data, ensure immediate response to urgent medical events, and maintain 24/7 operations. Security challenges Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability Addressing the security challenges presented by 24/7 availability and high patient and visitor traffic calls for a merging of technology, processes, and security strategies that go beyond what a typical security infrastructure would look like. Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability, accessibility, and integration capabilities. These advancements address the multifaceted demands of healthcare organisations, ensuring seamless around-the-clock operations while prioritising patient care and safety. Enhancing operational efficiency to save lives Cloud-based access control solutions have revolutionised how healthcare security professionals approach collaboration within medical facilities. These solutions offer unparalleled accessibility and insight into patient and visitor security information and access logs, improving coordination among security teams and leading to more accurate monitoring and response to developing medical events. By managing and operating access control solutions via the cloud, healthcare facilities can implement effective physical security measures while ensuring seamless collaboration among staff to deliver the highest medical care possible to patients across facilities. Physical access controls Cloud-based access control systems allow users to securely access and manage physical access controls Cloud-based access control systems allow multiple users to securely access and manage physical access controls and visitor management data simultaneously, enabling them to keep track of patient movements as they are transferred throughout the facility or between different facilities. For larger hospitals or medical campuses with multiple facilities hosting access controls via the cloud empowers users with the ability to find patients and patient data in an instant, as well as opening the door to collaborate with teams separated by long distances, ensuring all team members have access to the information they need to continue saving lives. Scaling the way to top-notch care Healthcare institutions are constantly growing and changing in response to evolving industry regulations and standards, and the access control solutions these organisations rely on should be able to scale to meet their changing needs. To ensure their access control systems can keep up with these growing demands, healthcare security professionals can invest in access control solutions hosted in the cloud to avoid the tedious hardware constraints that come with traditional on-premises solutions. Cloud solutions offer significant levels of scalability, enabling healthcare organisations to adjust their storage requirements and computing resources based on changing requirements on the fly. This capability for flexibility ensures users can manage large amounts of data without significant upfront investments in hardware. Cloud-based access control solutions Cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access In addition to compliance with changing regulations, cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access control platform across a growing campus or multiple buildings. Larger healthcare facilities typically consist of multiple sites of varying sizes across diverse landscapes, each with distinctive security needs. Systems hosted in the cloud provide scalability and flexibility for user organisations, allowing security teams to modify or expand upon their security infrastructure as needed without spending on costly new hardware. This adaptability is crucial for helping address varying risks over multiple sites, providing security personnel the flexibility they need to ensure patient safety over long distances. Ease of use for security teams To truly understand the value of a cloud-based access control system, healthcare security professionals must consider the long-term savings and ROI these solutions provide by bolstering operational efficiencies and enabling unprecedented scalability. These systems ensure compliance with changing standards and deliver a simplified user experience across platforms, prioritising security and ease of use for security teams across the healthcare sector.
Security manufacturers throw around the term “scalable” a lot these days, but few dive into what scalable really means for modern organisations and their security programs. Achieving true scalability, or as I like to refer to as “expandable with a purpose,” takes planning and coordination from security pioneers alongside the broader organisation. Implementing a flexible strategy is critically important in the age of advancing analytics and intelligence-driven technology. So what exactly do we mean by “scalable”? "Scalable" refers to the capability of a system, process, or technology to handle growth or increased demand without compromising performance, efficiency, or quality. To put it simply, scalability refers to the ability of a solution to expand or adapt to accommodate larger workloads, higher volumes of data, or increased complexity without requiring significant changes to its underlying architecture or design. It’s not enough to create a “fix it and forget it” security program. Not only do the needs of the organisations shift, but growth (or even shrink) is inevitable. How to Approach Growth Pioneers must be prepared to adapt their strategies and approaches to manage security risks For many security pioneers, growth has a trickle-down effect. Expansion through mergers and acquisitions or organic growth, in addition to decreases in facility or employee count, directly impacts the security program. Whether it’s an increase or decrease in size, workload, or scope, these pioneers must be prepared to adapt their strategies and approaches to efficiently manage security risks while maintaining operational efficiency. Here are some ways security pioneers can approach growth: Assess the here and now: Begin by looking at the current state of your security program, including the resources, capabilities, processes, and technology infrastructure. Understanding existing strengths, weaknesses, and areas for improvement can help inform planning for the future. Align with the business: This might be one of the most important considerations to make, but ensuring security pioneers understand the organisation’s growth objectives, priorities, and risk tolerance levels is critical to the success of a security program. The most successful security pioneers will be able to align security strategies with business goals to ensure security investments and planning are enabling the company’s growth initiatives. Invest in scalable solutions: Invest in solutions that offer flexibility and can adapt to the changing needs of the organisation. Closed systems that can’t integrate fully with new technologies will severely limit the security team’s ability to seamlessly manage the security portfolio. Optimize processes: Reviewing security processes and workflows – or investing in a platform that can streamline this for you – can improve efficiency and effectiveness for your security team. Identifying opportunities for automation and standardisation can allow for scaling as business needs change. Collaborate across departments: Preparing for growth initiatives requires extensive communication across departments, including leadership teams, human resources, legal, IT, facilities, and many other stakeholders ensure that security priorities, challenges, and requirements are effectively communicated and integrated. Adopting these approaches helps put security teams in the driver’s seat, effectively managing periods of growth and change without compromising the safety and security of the organisation. Technology considerations As security pioneers navigate investments in new technologies that achieve some of the approaches listed above, such as aligning strategy with business goals, optimising processes, and cross-departmental collaboration, there are several considerations to make. Looking at how technology can support (or even hinder) future growth. For example, when making a buying decision around access control systems, security pioneers must consider the number of users, number of credentials, server requirements, facilities, hardware end points, and software features. As these items are being addressed in an RFP or in conversations with a vendor, security pioneers must ask themselves, “Is there a scenario where my program will outgrow the system’s capabilities in any of these areas?” If so, the answer might be to select a different solution. Security pioneers must consider interoperability. We talk a little about this above, but the importance here cannot be overstated: integration is key. The ability to leverage multiple point solutions, such as access control systems and video surveillance cameras – regardless of manufacturer – provides growing companies with the ability to scale quickly and more efficiently than ever before. Centralising the ability to pull these solutions into a single security operations management platform allows security pioneers a better view of their security programs in a current – and even future – state. Cloud-based solutions can provide the ultimate scalability factor, providing flexibility and accessibility advantages compared to traditional on-premise systems. Cloud-based, or Software-as-a-Service (SaaS) platforms, can easily scale up or down based on changing needs, accommodate distributed environments, and provide remote access and management capabilities, making them well-suited for scalable physical security deployments. Data-driven insights and analytics can drive decision-making beyond security, making technology investments that provide these critical. Automated workflows, event-triggered alerts, and AI-driven analytics can streamline security processes, improve threat detection capabilities, and reduce manual intervention, enabling security teams to manage larger environments more efficiently. Centralised management of technology investments can create cohesion for security teams. Centralised management and monitoring of physical security systems across multiple locations or facilities enables personnel to efficiently oversee and control security operations, access controls, and incident response activities. Being able to manage security in a single platform provides security pioneers with the ability to assess staffing levels, streamline training, allocate resources effectively, and scale to additional sites and/or solutions as needed. Tasked with building a security program that can adapt to the changing needs of the organisation, security pioneers must consider a number of factors when setting strategy. First and foremost, taking a close look at the existing program to identify strengths and weaknesses, then truly assessing the technology and processes in place, is the best way to move forward and future-proof the organisation.
For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common K12 security pain points There’s no one-size-fits-all solution in school district security. School districts may have big plans to implement upgraded security systems but to set out on the right foot, pioneers must have a clear vision of their long-term strategy. When embarking on their security journey, education pioneers often wonder where to start and what exact steps are they need to be taking to identify and address weaknesses. Local K12 and government pioneers are promoting and mandating security assessments to uncover safety gaps on campuses and mitigate these risks with advanced technology solutions. Not only do assessments provide detailed, customisable roadmaps for district pioneers, but they also recommend technologies and funding opportunities to help close threat gaps. K12 school districts are mainly vulnerable to cyber-attacks due to the sensitive nature of student records In today’s climate, schools face a growing number of physical and digital security threats. From a cybersecurity standpoint, K12 school districts are particularly vulnerable to cyber-attacks due to the sensitive nature of student records. However, only one-third of these districts have adequate staffing to address threats effectively. In addition, according to a recent survey from Johnson Controls and Forrester Consulting, security decision-makers are having trouble receiving actionable insights. Nearly two-thirds of respondents said that they struggle to receive information from all necessary systems regarding their security threats. To gain more clarity into what school districts need in terms of security tools and threat mitigation, implementing system-wide monitoring and optimisation can be invaluable. This approach enhances equipment and operational efficiency, while providing necessary resources and expertise for critical patch updates across all systems, strengthening their overall security posture. Achieving a well-rounded security program In the past few years, AI technology has emerged as a trending solution and is generating considerable attention. While the allure of implementing cutting-edge technologies is undeniable, it’s important to recognise that a robust security program hinges on solid access control. Access control technology provides administrators with the means to oversee and regulate entry into facilities, serving as the foundation for basic physical security. The technology helps administrators and staff control access to multiple areas from web-enabled devices, even during lockdowns which is crucial in emergency situations. School district pioneers should utilise available digital risk assessment tools to uncover threat areas Once basic security controls are in place, school districts must address their next set of security pain points and identify which solutions meet their specific needs. This involves identifying and prioritising the highest need and most cost-effective investments that will have the greatest impact on enhancing security measures. To accurately determine which security solutions are needed for a specific environment, school district pioneers should utilise available digital risk assessment tools to uncover threat areas and determine levels of priority. By focusing on these priority areas, districts can allocate their resources and efforts where they are needed most, ensuring maximum effectiveness in mitigating risks and vulnerabilities. Securing funding before approaching deadlines A major challenge for school districts surrounding campus security is identifying and securing the necessary funding to implement solutions aligned with their goals. Leveraging available funding sources is critical, especially considering certain programs are approaching their deadline, like the Elementary and Secondary School Emergency Relief (ESSER) fund. Announced during the pandemic, ESSER is a funding program that has allocated nearly $190 billion in aid to U.S. public school districts to fund projects benefitting the well-being of occupants. Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024 Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024, when schools must attribute all of their funds to assigned contracts. Following this date, pioneers will need to complete all ESSER spending by January 2025 unless approved for an extension into March 2025. As ESSER wanes, school districts are acutely aware of the fiscal cliff in budgets through 2025. However, many states are ramping up grant funding to close the deficit gap. Administrators should become familiar with these grant opportunities at a local and state level. Get started on security plans The time for school district pioneers to act is now. While the safety and well-being of students and staff are always top priorities, it’s crucial to acknowledge that a lack of insight into necessary security upgrades and available funding options will leave districts behind the curve. Seizing the final months of ESSER funding presents an ideal window to address security pain points and build a safer future for K12 facilities. Looking beyond ESSER, pioneers must proactively seek out and leverage other funding avenues to help ensure the continuity of their security efforts and maintain a proactive stance in safeguarding healthy and safe educational environments.
Security beat
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defences against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defences. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasises the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognising the need for continuous improvement and adaptation to evolving threats. Recognising the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognise the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defences. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defence against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorised infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defences of our nation’s critical infrastructure.”
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
Frontline Communications, a division of Pierce Manufacturing, Inc., an Oshkosh Corporation business, announced the delivery of a C-40X-2 mobile command vehicle to the Loudoun County Sheriff’s Office in Virginia. The vehicle was featured at the National Sheriffs’ Association (NSA) Conference in Oklahoma, showcasing its state-of-the-art options and upgrades, making it an essential asset for the Sheriff's Office. New mobile command vehicle Sold through Frontline Communications dealer Atlantic Emergency Solutions, the new mobile command vehicle is built on a Peterbilt 548 chassis and measures 38’ 8” in length and 12’ 6” in height. It includes two slide-outs and a 20kW generator, providing ample power for its extensive features. The vehicle is equipped with two entrances, a spacious rear interview room/workstation area, and a forward conference room with seating for eight, ensuring a versatile and functional environment for various operations. Step Up Strategy Major Craig Schleiden of the Loudon County Sheriff’s Office stated, “This vehicle represents a significant advancement in our ‘Step Up Strategy’ to enhance safety, service, technology, efficiency, and professionalism." "The integration of this mobile command unit to our Frontline Communications/Pierce fleet will enable us to better serve our community and improve our collaborative efforts with federal, state, and local law enforcement agencies.” Key features of the new mobile command vehicle Side and rear entrances. 360-degree backup camera system. Four 15k BTU rooftop air conditioners. 100A shore power upgrade. 20’ electric awning. Will-Burt 42’ mast with matching shroud. Exterior monitor compartment with 43" anti-glare monitor. The vehicle's technology includes: Axis perimeter camera system with 16-channel recorder. AvL 1.2m Ku-band VSAT and Winegard Trav'ler DirecTV. Wireless PA system and Firecom radio intercom system. Extron 16x16 video switcher with Frontline Communications touchpad controller. Eight 24" monitors, four 22" monitors, and one 65" Ultra HD monitor. Dual thermal/HD Color Pan Tilt Zoom mast camera. Two PCs, eight docking stations, and a printer. Trendnet 52-port network switch and 5G network with Cradlepoint cellular router. Innovative features “This project highlights our commitment to providing law enforcement with one of the most advanced mobile command units available,” said Steve Williamson, vice president of sales with Frontline Communications. “Having the vehicle in our booth at the NSA Conference allowed us to directly engage with a broad span of representatives from many organisations and discuss its innovative features. We’re proud to support the Loudoun County Sheriff’s Office as they enhance their capabilities to ensure the safety and well-being of their community.”
With a stock of over 13,000 apartments and an ambitious new residential development programme, GWW has been helping to make Wiesbaden affordable for a broad range of population groups over more than 70 years. Digital access is helping them meet the needs of the future with confidence and flexibility. Being the city’s largest provider of housing goes hand in hand with an aspiration to make a measurable contribution to living together in an urban environment. GWW’s corporate culture Social involvement is an integral part of GWW’s corporate culture and for its 200 employees Social, voluntary and civic involvement is an integral part of GWW’s corporate culture and for its 200 employees. To date, multiple projects have been initiated, supported and promoted, focusing on integration, participation and prevention, as well as various dimensions of sustainability. When digitalising access for their multi-residential housing sites, they sought an easy-to-install solution with devices that work wirelessly and without batteries. Broad range of devices To simplify specification and procurement, they searched for a manufacturer able to offer a broad range of devices to protect the entrances, communal and technical doors of all residential buildings. And of course, for maximum user convenience and inclusivity, door devices must be easy to operate for all age groups. Manage a multi-residential property from anywhere The reliable solution is characterised by a robust, compact build with durable and secure components GWW chose ASSA ABLOY and its eCLIQ electronic locking system, which offers modern management and full flexibility. The reliable solution is characterised by a robust, compact build with durable and secure components. For users, it’s familiar — working just like a traditional lock and key. All eCLIQ cylinders are wireless and battery-free. Power is supplied by the battery in the key. Thus, doors with CLIQ® cylinders can always unlock without their own power supply. eCLIQ Connect key Another major factor in GWW’s choice was that authorisations can be set and changed flexibly in the CLIQ Web Manager, accessible from anywhere with an internet connection. Lost keys can be deactivated immediately. Time and room restrictions can also be defined, to grant cleaning staff access at specific times, for example. GWW issues different eCLIQ keys depending on user requirements. For example, the eCLIQ Connect key can receive new access authorisations remotely and at short notice: the keyholder simply updates their own key by making a Bluetooth connection between it and their Connect mobile app. Residential housing management Greater efficiency helps multi-residence providers to improve their service and boost resident satisfaction In many multi-residential and ‘multi-family’ housing developments across Europe, digital management is already streamlining daily operations. Greater efficiency helps multi-residence providers to improve their service and boost resident satisfaction. Digital access becomes a seamless experience for the resident and a reputation enhancer for the housing provider. It delivers both parties a concrete ROI. Digital access system With a digital system, managing service providers is also simpler. Each one can carry access credentials that fit their precise time-period and location requirements. For example, cleaners may be admitted five mornings a week. Their programmable credentials only unlock site doors during this window. Permissions automatically expire after an agreed period, saving building managers time and hassle.
The project, a collaborative effort between two Australian government entities—Zoos Victoria and Parks Victoria, aimed to monitor seals on protected haul-out structures in the middle of Port Phillip Bay. Zoos Victoria, a world-pioneering zoo-based conservation organisation, is dedicated to fighting wildlife extinction. With four zoos—Healesville Sanctuary, Kyabram Fauna Park, Melbourne Zoo, and Werribee Open Range Zoo—Zoos Victoria provides unique and immersive experiences that attract visitors from around the world. Their zoos inspire animal lovers of all ages, strengthening the connection between people and wildlife to protect the future of animals and their homes. Use of surveillance technology Australian government initiative the innovative use of surveillance technology in wildlife conservation Parks Victoria, on the other hand, is the state government authority responsible for managing parks, reserves, and other protected areas in Victoria. Their collaboration on this project underscored their shared commitment to wildlife conservation and environmental stewardship. This Australian government initiative highlighted the innovative use of surveillance technology in wildlife conservation and demonstrated the potential for VIVOTEK cameras to be utilised in various industries beyond security. Why choose VIVOTEK VIVOTEK was chosen for its high-quality reputation, powerful products, and great quality. The company offers Speed Dome cameras connected to AI servers for advanced features and applications. The partnership with Zoos Victoria, a highly reputable organisation with government endorsement, further solidified VIVOTEK's position as a pioneering security brand committed to sustainability. VIVOTEK's impressive Zoom and IR range ensures clear and detailed images even in challenging environments. The cameras also deliver impressive image quality, providing sharp and crisp footage for enhanced surveillance. Additionally, VIVOTEK's cameras are housed in weather-proof IP66-rated, vandal-proof IK10, and NEMA 4X-rated housing, ensuring durability and reliability in various weather conditions. Furthermore, VIVOTEK's commitment to quality is highlighted by its global five-year warranty, providing customers with peace of mind and demonstrating the brand's dedication to customer satisfaction. Challenge The remote location necessitated a standalone system powered by solar energy, with 4G LTE The project faced numerous challenges due to its unique location and the requirements of the security system. The cameras were not installed within the confines of the zoo but rather on haul-out structures in the middle of Port Phillip Bay, where the Marine Response Unit operates to rescue distressed seals from the wild. The remote location necessitated a standalone system powered by solar energy, with 4G LTE connectivity and a large lithium power pack to ensure continuous operation. Additionally, the cameras needed to withstand the harsh marine environment, ensuring they were capable of operating in extreme conditions. They also needed to provide high-resolution, real-time video feeds over long distances to the shore, where the Marine Response Unit operates. Reliable security system The PTZ camera had to be of high enough resolution and zoom to detect entanglements like fishing line and rope, as well as any injuries sustained by the seals. This required a robust and reliable security system that could endure the challenging conditions of the marine environment while delivering clear and detailed footage for effective monitoring and response. The system also had to be remotely controlled and managed, adding to the complexity of the installation and maintenance. These challenges required innovative solutions to ensure the success of the wildlife monitoring and preservation project. Solutions VIVOTEK provided a wide solution in this project, integrating advanced Speed Dome cameras VIVOTEK provided a comprehensive solution in this project, integrating advanced Speed Dome cameras with AI-powered systems to enhance wildlife conservation. The solution involved the installation of Speed Dome cameras, the SD9384-EHL professional IR speed dome camera (PTZ), on the haul-out structures. Connected to a proprietary server-based AI system, these cameras were trained to detect entanglements, wounds, and monitor seal health, providing real-time vision to the Marine Response Unit for prompt medical callouts. By providing real-time vision to the Marine Response Unit, the system facilitated prompt medical callouts, enhancing wildlife conservation efforts. VIVOTEK's commitment With its versatile features, including 5MP resolution, 200M IR illuminators, and 30x optical zoom, the SD9384-EHL camera exemplifies VIVOTEK's dedication to providing cutting-edge solutions for various industries. Moreover, the camera's robust design, protected by IP66, IK10, and NEMA 4X certifications, ensures reliable operation in extreme weather conditions, further emphasising VIVOTEK's commitment to quality and durability. The utilisation of Speed Dome cameras connected to AI servers allowed for advanced monitoring capabilities, surpassing traditional surveillance norms. This breakthrough in security technology showcased VIVOTEK's commitment to innovation and sustainability. This project demonstrated how security technology can be applied differentially, focusing not just on security but also on animal protection and conservation, highlighting VIVOTEK's cameras as versatile tools applicable in various industries, including medical, wildlife preservation, and scientific research. Feedback VIVOTEK's dedication to leveraging cutting-edge technology for the advance of wildlife conservation VIVOTEK's collaboration with Zoos Victoria and Parks Victoria for the seal monitoring project exemplifies its commitment to innovation and ESG principles, highlighting its ability to collaborate with government agencies and prestigious organisations for meaningful projects that contribute to wildlife preservation. The success of this project serves as a testament to VIVOTEK's position as a pioneering provider of advanced security solutions with a focus on making a positive impact on the environment. The project showcased VIVOTEK's innovative AI technology, which played a crucial role in monitoring seal health and detecting potential threats, underscoring VIVOTEK's dedication to leveraging cutting-edge technology for the betterment of wildlife conservation. Advanced security solutions As a result, it received positive feedback for its contribution to wildlife preservation and conservation efforts, with the system's efficiency in monitoring seal health and detecting distress signals being praised by the Marine Response Unit and other stakeholders. Overall, this project underscores VIVOTEK’s role as a pioneering provider of advanced security solutions, committed to making a positive environmental impact through meaningful government collaborations.
OPTEX, the pioneering global sensing manufacturer, has specified and installed its compact and intelligent REDSCAN RLS-2020 LiDAR laser sensors at the new luxury five-star Londoner hotel in Leicester Square. Part of the Edwardian Hotels London group, The Londoner, which opened in September 2021, is billed as the world’s first super boutique hotel. It has 350 rooms across 16 storeys including six basement levels, featuring six concept eateries, a private members club, a cinema, a wealth of meeting and event space and an entire floor dedicated to health and wellness equipped with a gym, pool and spa. Existing security system The hotel has six restaurant & bar areas in total with expensive whiskeys, wines and other drinks on display 24/7 with no shutters or coverings. Given the cumulative value of the drinks behind each bar, the hotel needed to find a security solution to keep its valuable stocks protected. The solution needed to be accurate and reliable, and capable of integrating with the hotel’s existing security system, as well as being aesthetically discrete. REDSCAN RLS-2020 laser sensor OPTEX specified and installed its REDSCAN RLS-2020 laser sensor in the ceiling at each of the seven bars OPTEX specified and installed its REDSCAN RLS-2020 laser sensor in the ceiling at each of the seven bars. The RLS-2020 sensors provide a customisable ‘virtual’ wall or plane that cannot be seen by the naked eye with a 95-degree detection area of 20x20m or 30m radius detection range. The laser technology works by analysing the speed, size and distance of the objects detected, meaning they track the objects within the detection area and understand the ratio size/distance of the object. This provides the ability to accurately detect a specific size of object either at distance or close up. In the event of any movement being detected, a security alarm is raised, and alerts are immediately sent to the 24-hour on-site security control room. OPTEX laser sensors Darren Carter, Group Director of Safety, Security and Sustainability at Edwardian Hotels London, says OPTEX has provided the ideal solution: “We’ve worked with OPTEX for a number of years, and installed their technologies at a number of our other hotels in the group." “For this new and hugely exciting project, there was nothing else on the market that met our brief. The OPTEX laser sensors are a simple, yet highly effective solution, providing the very highest level of detection that easily integrate with our wider security operation at the hotel.” Partnership with Darren Ben Linklater, OPTEX Commercial Director, says OPTEX’s LiDAR technology delivers the greatest accuracy of detection: “We are constantly working to improve our technology to provide the highest quality sensing solutions,” he says. “Working in close partnership with Darren and his team, we were able to provide a highly accurate detection solution that met their requirements. We are proud to have worked on such a prestigious project, with the Londoner set to become one of the world’s most talked about hospitality experiences.”
Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world’s most famous tavern,” explains its Security Manager, Robert Graßl, adding “The whole world goes in and out. Security is very important.” Bavarian Duke Wilhelm V commissioned Munich’s original Hofbräuhaus in 1589, initially as a brewery to supply the Wittelsbacher Hof. Moved at the end of the 19th century and severely damaged during World War II, it underwent reconstruction in 1958. It now attracts tourists and city locals, seating up to 3,000 guests indoors and a further 400 in the beer garden. Access rights management Digital devices and low-impact skills were needed to assure compliance with origin protection Although the building is an important heritage monument, it requires 21st-century digital access to keep site users safe and streamline day-to-day operations. They wanted fast, secure access rights management for employees and service providers – including up to 100 waiters working each shift – within a unified system that could authorise access at both the Hofbräuhaus and their food production facility in Brunntal. Of course, inobtrusive digital devices and low-impact installation were a necessity to ensure compliance with heritage preservation regulations. Digital access for a famous heritage building Many electronic access products and technologies are not appropriate for historic buildings. An eCLIQ key-based digital access solution is different: eCLIQ cylinders are compatible with the strict monument preservation requirements at the Hofbräuhaus. They have a flush fit, so don’t even appear to be part of an electronic locking system. With wireless installation at the doors, devices blend with the building interior. “We can exchange a mechanical cylinder 1:1 with an eCLIQ cylinder without having to modify anything on the door or install cables,” confirms Miriem Hammoudi, Business Development Manager at ASSA ABLOY Sicherheitstechnik GmbH. ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys for Hofbräuhaus managers to issue to relevant staff and service contractors. Easy operation for flexible, cost-efficient management Every eCLIQ key has an integrated chip and is programmable individually for the keyholder Every eCLIQ key has an integrated chip and is programmable individually for the keyholder. The versatility of eCLIQ is demonstrated when a key is lost: Access authorisations are removed rapidly – simply by reprogramming cylinders – ensuring security is maintained. The eCLIQ system also helps manage workflows for service providers, such as cleaners: Their access is enabled on a time-limited basis. A standard battery inside each programmable electronic key powers the cylinder or padlock on insertion – and encrypts data transfer between cylinder, key and system – so no external power source or wiring is needed. Scalable web-based platform The Hofbräuhaus team manages their system via a flexible, scalable web-based platform, CLIQ Web Manager: “I can program keys from anywhere or also block them quickly if a key has been lost or if someone is no longer allowed to enter,” says Robert Graßl. He adds, “And I can install any cylinder in any door by adjusting the length. I don’t have to carry extra stock which is really cost effective.” New master key system With the hosting solution chosen, access data is stored securely at ASSA ABLOY, accessible anytime and from any location, which is an ideal configuration for managing large systems or multiple locations. Their system is easy to expand anytime – future-proofing Hofbräuhaus access. “The situation before the new master key system was installed was problematic,” says Robert Graßl, adding “Keys were distributed and nobody knew who held them. Now, everyone carries only one key programmed with details of where and when they can enter. It’s perfect.”
Achat Hotel in Bochum, Germany offers comprehensive meeting and conference services, including both accommodation and catering. Due to the ever-increasing demand for interactive meeting amenities, the hotel chose and implemented the Dahua DeepHub Business Solution, providing integrated AI-powered conference and meeting capabilities for its guests. Challenge The 5 flexible and combinable meeting rooms of the Achat Hotel in Bochum can accommodate various types of events, creating a high demand for these facilities. In order to be able to successfully hold forward-thinking events in the digitalised era, such as hybrid events that integrate both in-person and online participants, the hotel needs a modern and user-friendly digital conference solution. Solution "With DeepHub from Dahua, we have found the exact solution," explains Jorge Melendez, Sales Manager at Achat Hotels, adding "We installed a 98-inch DeepHub in our largest conference room. DeepHub impressed us above all with its ease of use. It has both a Windows and an Android interface, so our guests who are familiar with computers or smartphones can use it intuitively straight away. With online sharing and connection via a dongle, our guests don't need to download any software." He continues, "Meetings start faster and participants can focus on the essentials. The 98-inch DeepHub is large and bright enough. In a conference room for 80 people, everyone can see everything clearly without the need to darken the room. The wireless connection makes setting up a meeting incredibly easy. The handwriting function is also excellent – converting handwriting to printed text without any delay in writing is extremely useful." Latest DeepHub Meeting software Nina De Rosa, Director of Achat Hotel in Bochum, said: "The built-in camera makes it easy to make video calls via platforms such as Teams and Zoom. The integrated speakers are of high quality and do not generate background noise. The latest DeepHub Meeting software is very popular with our guests. Especially for those who organise seminars and workshops in our hotel, DeepHub Meeting is extremely convenient." She adds, "It is not only an optimised online conference software, but also offers a variety of practical tools for teamwork, discussions and brainstorming. Online participants can also use the free DeepHub Meeting app to take part in the on-site seminar and get actively involved." Results The Dahua DeepHub Business Meeting Solution has elevated the conference rooms, event venues, and other facilities of the Achat Hotel in Bochum, taking it to the next level. It not only changed the way the hotel holds meetings, but also significantly enhanced the experience and satisfaction of their guests. Markuz Metz, Technician at Achat Hotel in Bochum, said, "Dahua provides robust and easy-to-move stands with wheels for each DeepHub. We have just purchased a second 86-inch DeepHub. During the European Championship soccer season, we were able to move the DeepHub onto the terrace in the evening so that our guests could watch soccer matches together." He adds, "And the same device is used for workshops and seminars during the day. We can even set up the DeepHub in the bar. It's not just a screen, but also an interactive platform that offers our guests many entertainment options."
Round table discussion
Direct costs such as purchase price and maintenance are important elements in the total cost of ownership (TCO). However, there are others. Elements such as opportunity costs of lost revenue or hidden costs of energy consumption and environmental consequences can also impact the measure of TCO. Costs of training, integration, support, and scalability can also be examined. Considering the security industry impact of TCO, we asked this week's Expert Panel Roundtable: How does/should total cost of ownership (TCO) impact the decision-making process when choosing technologies for security?
By linking human resource (HR) systems to physical security, access control systems can automatically update permissions based on employee changes, such as promotions, terminations, or department transfers. In fact, connecting HR and information technology (IT) systems to physical security can provide many significant benefits in terms of access control, incident response, compliance, cost savings, and employee experience. We asked this week’s Expert Panel Roundtable: How can organisations integrate physical security with other systems, such as IT and HR?
The most common wearable device deployed by security professionals is the body-worn camera. Traditionally used by law enforcement professionals, these devices are finding more and more uses in the corporate security world, and even impacting issues such as customer service. However, the term “wearables” also encompasses a range of other devices, including many worn by consumers. We asked this week’s Expert Panel Roundtable: How are wearable technologies impacting the security market?
Products
White papers
Access control: The enterprise buyer's guide
DownloadA step-by-step checklist for choosing an intercom system
DownloadThe wireless access control report 2023
DownloadCybersecurity in keyless access management
DownloadWireless Access Control eBook
DownloadWireless security: Cut costs without cutting corners
DownloadMaking your surveillance cyber secure
DownloadHow to keep students safe on campus
DownloadNetwork Security Redefined: IP-Enabled Access Control
DownloadMobile Access - What you need to know
DownloadThe evolution of cards and credentials in physical access
DownloadVideos
Wireless security: Manufacturers & Suppliers
- ASSA ABLOY - Aperio® Wireless security
- Honeywell Security Wireless security
- CLIQ - ASSA ABLOY Wireless security
- DSC Wireless security
- Climax Technology Wireless security
- Ajax Wireless security
- Dahua Technology Wireless security
- Senstar Wireless security
- Visonic Wireless security
- Vanderbilt Wireless security
- ASSA ABLOY Wireless security
- OPTEX Wireless security
- Pyronix Wireless security
- Bosch Wireless security
- Verkada Wireless security
- RISCO Group Wireless security
- Kantech Wireless security
- D-Link Wireless security
- Paxton Access Wireless security
The 2024 state of physical access trend report
DownloadThe security challenges of data centers
DownloadSecurity practices for hotels
DownloadHow to solve the disparate systems challenge
DownloadFacial recognition
Download