Honeywell WIN-PAK® SE With Galaxy Dimension And 'Performance' DVR Integration
Honeywell WIN-PAK® SE With Galaxy Dimension And 'Performance' DVR Integration

WIN-PAK® SE Service Pack 2 with HRDP Performance Series and Galaxy Dimension integration offers a single interface that combines access control and video with intrusion. The software can control and manage employee or customer access to designated or restricted areas in many types of facilities and businesses. The integrated solution is ideal for areas such as small office buildings, employee and delivery doors, pharmacies, off-licences, day care facilities, warehouses, restaurants and hospitals."Our latest version of WIN-PAK SE now enables customers to integrate with HRDP Performance Series Digital Video Recorders (DVRs) and Galaxy Dimension intrusion panels as a cost-effective, entry-level security integration platform," said René von Franquemont, access control product marketing manager for Honeywell Systems Group EMEA. "It combines Honeywell's latest innovative security products into a powerful, comprehensive security solution for customers."WIN-PAK SE allows users to manage three separate systems through a single, easy-to-use software interface, which not only saves time and money, but also improves the level of security by eliminating user code sharing. Other benefits of the integrated WIN-PAK SE with HRDP DVR and Galaxy Dimension system include:Fast and easy setup - A step-by-step installation wizard makes setup quick and easy.Retrieve recorded video quickly - The seamless integration with Honeywell HRDP DVRs facilitates easy identification, retrieval and playback of events and alarms.Greater sales opportunities for installers - Because it provides a three-in-one solution, installers are able to offer end-users substantial enhancements to existing systems or significantly improve the operation of new security systems by reducing training and labour.Incremental revenue advantages - The new WIN-PAK SE software provides installers with the opportunity to add digital video and/or intrusion functionality to existing access installations as customer needs change, creating additional revenue and increased customer retention."It takes a unique software interface to effectively harness the power of our intrusion panels," said Drew Aitken, product marketing manager for Honeywell Security and Communications EMEA. "WIN-PAK SE with HRDP and Galaxy Dimension integration delivers this power in a big way. By tying together Honeywell's premier products of access, intrusion and video, it offers a versatile solution that meets customer needs of today without sacrificing the needs of tomorrow."For further information click here

Add to Compare
Honeywell Releases New Features To Popular Pro-Watch Access Control System
Honeywell Releases New Features To Popular Pro-Watch Access Control System

Honeywell recently released several software enhancements to its widely used Pro-Watch® security management system. The Pro-Watch 3.81 software upgrades are designed to simplify installation and ease of use, as well as reduce costs and maximize system efficiency. The upgrades include:   Software-based licence keys that eliminate the need for a hardware USB dongle to ensure the integrity of the licence and maintain compatibility with virtualisation and other IT-centric solutions. Inclusion of the S-Net protocol on the PW-6000 provides a smooth migration path from legacy Star I controllers to current technology, which allows end users to leverage existing security investments. Virtualisation support with VMware and Microsoft Hyper-V, which enables an organization’s IT staff to host Pro-Watch as a virtual server, which reduces server management expenses and service interruptions.   Additionally, Pro-Watch 3.81 features open integration with the Honeywell Software Development Kit (HSDK), which enables increased interoperability between Honeywell technologies and products from third-party manufacturers who participate in the Honeywell Open Technology Alliance (HOTA) programme. The compatibility of Pro-Watch with the HSDK allows easy integration with larger building control systems such as heating, ventilation and air conditioning (HVAC) and other building management technologies to drive energy savings.  Pro-Watch also integrates various security components including visitor management, IP and video surveillance, intrusion, and communications such as intercom and mass notification technology.   “We understand that cost containment, enhanced profitability and return on investment are all important for our customers,” Aymet said. “Pro-Watch offers an open architecture platform that offers advanced levels of integration and greatly increases our customers’ ability to achieve their financial goals.”   Pro-Watch is available to certified Honeywell Integrated Security Integrators only.

Add to Compare
Reliance High-Tech Selects Honeywell Technology For New Managed Access Control Offering
Reliance High-Tech Selects Honeywell Technology For New Managed Access Control Offering

Reliance High-Tech - an Elite member of the Honeywell Systems Integrator Programme - has selected Honeywell's WIN-PAK™ PRO Central Station software to power its new managed access control solution. The service, which will be hosted by the dedicated Reliance Monitoring Centre in West Yorkshire, will potentially generate significant additional monthly recurring revenues for Reliance through the provision of ongoing remote managed access control services to its customers. Remote managed access control presents the ideal security solution for both Small to Medium Enterprises wishing to install access control for the first time, as well as existing access control customers who want to switch from a locally based system to a more cost effective and flexible remote managed solution. The WIN-PAK™ PRO Central Station remote managed access control software from Honeywell will reduce installation and service costs for both Reliance High-Tech and its customers in a number of ways including removing the need for dedicated on-site PCs at customer premises, reducing end-user training requirements and facilitating remote servicing. The scalability offered by remotely managed access control will also allow Reliance High-Tech to quickly and easily adapt security solutions, depending on its customers' needs. As part of the service, Reliance High-Tech monitoring specialists will be able to remotely open and close doors on request, create customised security reports for customers and respond to on-site alarms, alerting emergency services where necessary. Customers can also access the system remotely at any time through a secure web portal if they need to add/delete badges or view the latest reports in real time. Initially set up to provide CCTV and access control support for its customers, the BS5979 Cat II Reliance Monitoring Centre quickly diversified its services to include command and control, lone worker protection and asset tracking. The centre works in accordance with ISO270000 for data protection, and has a separate mirrored centre 60 miles away for contingency purposes. This latest move to extend the offering to include remote managed access control came in response to a growing customer demand for the innovative service. Reliance High Tech's long standing relationship with Honeywell made the task of choosing a technology partner for the service a simple one. "Reliance High Tech has been installing Honeywell WIN-PAK™ technology for many years and our teams are extremely familiar with the strong technical capabilities, user friendly interface and database management functionality of the range," said Dan Thomas, sales and marketing director, Reliance High-Tech. "The addition of WIN-PAK™ PRO Central Station to our access control portfolio helps our customers to save money by reducing manpower and using technology more intelligently to enhance security.""In today's security environment, many organizations seek the protection provided by a comprehensive access control solution but do not want the financial burden of hosting the system locally," said Daniel Wan, UK marketing leader, Honeywell Systems Group. "Outsourcing security functions to experts such as Reliance High-Tech offers an excellent solution and allows organizations to take advantage of the very latest security technology from trusted brands like Honeywell, while simultaneously reducing overhead costs incurred."

Add to Compare
Honeywell Releases Latest Version Of WIN-PAK® SE 2.0 And WINPAK® PE 2.0 Security Management Solutions
Honeywell Releases Latest Version Of WIN-PAK® SE 2.0 And WINPAK® PE 2.0 Security Management Solutions

WIN-PAK combines access control, digital video and intrusion into one powerful system that improves scalability, capability and control of your security solution. WIN-PAK can be used to programme, operate and report access control events and is available in standard and professional editions: WIN-PAK SE 2.0 Single user (Standard Edition) with basic video integration: The single user software supports advanced access control and basic video including Rapid Eye, Fusion or HRDP Series DVRs. Depending on the application, choose Galaxy integration as an option.WIN-PAK SE 2.0 Five user (Standard Edition) with advanced video integration: The five user software supports advanced access control including advanced video support for Fusion and HRDP Series DVRs. Depending on the application, choose Galaxy integration as an option.WIN-PAK PE 2.0 (Professional Edition): The unrestricted user software supports advanced access control, including advanced video including Rapid Eye, Fusion or HRDP Series DVRs and Galaxy integration.Functions that have traditionally been tied together through physical relays and input devices are now controlled logically. Full-scale system management of single or multiple locations is possible - you can move, control or share resources across multiple locations simply by logging on to a system.WIN-PAK is easy to install and programme using Quick Start Wizards, which also offer advanced reporting capabilities that customers are demanding. Users can create customized reports or choose from a variety of predefined reports. E-mail capability has been added to allow reports and events to be sent via e-mail. Reports and events can be shown as easy-to-read text that provide all the content and detail that customers require.WIN-PAK SE/PE 2.0 offers complete enhanced Digital Video Integration to Honeywell Rapid Eye, Fusion and HRDP "Performance Series" Digital Video Recorders. Integration allows video to be linked to both access control and Galaxy intrusion events and alarms. Video clips can easily be recalled through the software, based on time or event. With integration, users can have complete camera control, including pan, tilt and zoom, and can verify live users with stored images using the video verification option.Integration with Honeywell Galaxy intrusion panels allows multiple Galaxy panels to be managed by WIN-PAK SE/PE, using floor plans and control maps to allow easy monitoring and control of most of the Galaxy functionality.

Add to Compare
Honeywell Launches New Release Of Global Security Management System
Honeywell Launches New Release Of Global Security Management System

Honeywell's Pro-Watch® 3.80 Security Management Suite simplifies overall system management through enhanced Microsoft® compatibility. Pro-Watch 3.80 includes several new advanced features made possible through improved integration with Honeywell's MAXPRO®VMS (Video Management System) and various third-party systems.Pro-Watch 3.80 supports user upgrades to new Microsoft® versions of Windows® Server 2008, SQL Server® 2008, and Windows 7. This provides a convenient way to set up groups in Windows using database privileges to streamline the manual steps involved in installation. Pro-Watch 3.80 leverages existing network infrastructure by using standard network protocol to communicate to all system components to help a facility manage access control, alarm monitoring, video badging, digital video, video surveillance and visitor management systems.Integrating with MAXPRO VMS allows Pro-Watch 3.80 to intelligently determine the capabilities of each analog or digital video device across various sites, allowing video management of any component through a unified configuration and user interface. Operators can drag and drop cameras from the Pro-Watch hardware tree into MAXPRO VMS and can use advanced features such as subject pursuit to select a central camera with a single mouse-click to track a target through a set of sequential cameras.Pro-Watch 3.80 also features enhanced integration with Honeywell's Galaxy® Dimension GD-264 and GD-512 intrusion panels to ensure a seamless security experience for end users with fewer accidental alarms and resulting fines. If a user is granted access to a building but does not have the authority to disarm the system, the integration can deny access and prevent a false alarm. In addition, critical areas are automatically armed upon exit of personnel.An advanced badging option combines badge holder and card data into easy-to-use views with access permissions by card. Advanced badging makes it easy to train badging staff and HR, and built-in saved ‘favorite' searches, audit views, and compliance reports help those individuals more effectively manage badges.Pro-Watch 3.80 also enables active monitoring and surveillance of large buildings or campuses with enhanced maps. This advanced feature includes intercom support that provides the operator with an additional layer of environmental awareness. Each door in Pro-Watch can be associated with both an intercom and a camera, allowing the dispatcher to utilize real-time video for visual verification while simultaneously communicating over the intercom. For voice functionality, the command interface facilitates operator interactions with remote intercom stations directly from the operator's personal computer. A dispatcher can interact with intercom stations via a toolbar shortcut, context-sensitive menus in the hardware tree accessed with a simple right-click, or via intercom icons added to maps."Pro-Watch is a business management tool for those who want to know who's in their buildings and tracking who's coming and going," said René von Franquemont, access control product manager, Honeywell Security Group. "It offers superior integration with third party products such as Novell and SAP to streamline mustering, visitor management, and other HR functions to help organizations interact more effectively with personnel in their buildings in real-time."Pro-Watch is available via Honeywell Integrated Security Authorized Integrators in four scalable editions (Lite, Professional, Corporate and Enterprise) that allow system expansion without changing the user interface or database structure. Visit Honeywell's homepage.

Add to Compare

Access control software - Expert commentary

Home Monitoring At The Edge: Advanced Security In The Hands Of Consumers
Home Monitoring At The Edge: Advanced Security In The Hands Of Consumers

Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customizable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customize devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarized, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analyzing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyze massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyze massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognize residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorized person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.

Top Things You Need To Include In Your Construction Site Security Checklist
Top Things You Need To Include In Your Construction Site Security Checklist

One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at. However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson. Improving the security of construction sites It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public. Investing in adequate resources for construction site security can prevent several issues, including: Theft of expensive tools and construction equipment Cybersecurity breaches leading to loss of sensitive information such as invoice data Arson resulting in loss of life and property Vandalism of construction site property Trespassing by unauthorized parties and exposure to construction site dangers Risks of injuries that can result in litigation and legal claims Identifying security issues Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorized personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur. Having a dedicated security team in place is a good first step in bolstering a construction site’s security For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them. Construction site security checklist To guide you, here is a sample template that you can use to form your own construction site security checklist.  SECURITY COORDINATION  YES   NO  1. Does the site have designated security coordinators?     2. Are the security coordinators available for contact during non-business hours?     3.  Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies?     4. Does the construction site have a written security plan, including procedures for specific scenarios?     5. If so, are construction site employees aware of the security plan?       GENERAL MACHINERY  YES   NO  1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.)     2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.)     3. Does the project have a list of the names of operators handling the machinery?     4. Are all the machinery fitted with immobilizers and tracking devices when appropriate?     5. Are all the machinery stored in a secure area with a proper surveillance system?     6. Are the keys to the machinery stored in a separate, secure area?      TOOLS AND OTHER EQUIPMENT  YES   NO  1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.)     2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.)     3. Are tools and equipment fitted with tags and tracking devices when appropriate?     4. Are tools and equipment stored in a secure place?      INVENTORY CONTROL  YES   NO  1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen?     2. Are there procedures in place for checking materials that go in and out of the construction site?     3. Is there a set schedule for checking materials and equipment?     4. If so, do the records show that the schedule is followed strictly?     5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc)      CONSTRUCTION SITE PERIMETER  YES   NO  1. Is there a physical barrier in place to secure the site?     2. Is the number of gates kept to a minimum?     3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site?     4. Are security warnings displayed prominently at all entry points?     5. Are entry points adequately secured? (With  industry-grade padlocks, steel chains, etc.)     6. Is there an alarm system?     7. Is the locking system integrated with the alarm?     8. Is the site perimeter regularly inspected?     9. Are “NO TRESPASSING” signs displayed prominently along the perimeter?      LIGHTING AND SURVEILLANCE  YES   NO  1. Is there sufficient lighting on the construction site?     2. Is there a dedicated staff member assigned to check if the lighting is working properly?     3. Is the site protected by CCTV cameras?     4. Are there signs posted on site indicating the presence of security cameras?     5. Are there motion detection lights installed on-site?      INTERNAL CONTROLS  YES   NO  1. Is there a policy on employee theft?     2. Are employees aware of the policy?     3. Are employees required to check in and check out company properties when using them?     4. Are staff members encouraged to report suspicious activity?     5. Is there a hotline employees can call to report security lapses and breaches?      SITE VISITORS  YES   NO  1. Are visitors checking in and out?     2. Are vehicles entering and exiting the site recorded?      CYBERSECURITY  YES   NO  1. Are the construction site’s documents and other sensitive data stored in the cloud securely?     2. Does the company have a strong password policy?     3. Are asset-tracking data accessible online?     4. Are confidential documents and data regularly backed up?     5. Are employees well-informed about current cyberattack methods such as phishing?     Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties.  Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.

How To Build An Insider Threat Program
How To Build An Insider Threat Program

Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.

Latest Honeywell news

Addressing The Latest In Fire Safety And Disaster Prevention In Taiwan And APAC At Fire & Safety, Secutech 2020
Addressing The Latest In Fire Safety And Disaster Prevention In Taiwan And APAC At Fire & Safety, Secutech 2020

Fire & Safety, concurrently held with Secutech Taiwan 2020, will have international and local manufacturers showcasing products and solutions for best practices in fire safety for various verticals as well as effective disaster prevention and mitigation technologies. Countries from the APAC region is expected to see an increase in fire safety demands as increase in infrastructure developments requires both in pass and active fire safety equipment. Government regulation also plays a major role in the increase demands as strict laws and regulations will require many buildings to implement certain standards in fire safety technologies. Fire safety and disaster management technologies The smart factory sector will include instrument testing equipment, personal protective equipment and more The global value of disaster and emergency management is predicted to see an increase from USD 107 billion in 2019 to USD 148.5 billion by 2024 with a CAGR of 6.8 percent. The increase will be due to unpredictable natural disasters from climate change as well as potential man-made incidents that could fuel the events. APAC region will be amongst the fastest growing market with governments demand to implement top of the line technologies for disaster managements. When Fire & Safety begins in April, it will have no shortage of products for enhancing fire safety. The smart factory sector will include instrument testing equipment, personal protective equipment, safety and management of plant / park intelligent perimeter protection and plant disaster prevention (earthquake / fire explosion). Visitors will expect to see companies including 3M, Draeger, DuPont, Honeywell, Johnson Controls, LHD, Moxa, Rotarex and UTC. Flood protection equipment Medical institutions will also be a highlight for fire safety protection. Visitors will see a range of products such as waterway sprinkler, fire alarm system, evacuation equipment, ventilation and smoke exhaust, fireproofing material, smoke prevention elevator, building door and window installation sensing system, intelligent bedside care system and personnel safety positioning. Exhibitors will consist of Ching Gu Electronics, HEX Safety, Horing, Red Bridge, RIHSI, SAFE, Sheng Yang and Wizmart. Secutech International will have several sections within the fair for showcasing products and solutions for safe and smart cities Lastly, a number of disaster prevention and mitigation equipment will be on display, including earthquake early warning system, flood protection equipment, disaster relief drone, fire rescue vehicle and fire extinguishing equipment. Onsite there will also be an earthquake simulation zone where visitors can see live demonstration of technologies being utilized for earthquake situations. Showcasing Technologies for a Safe and Smart City Secutech International will have several sections within the fair for showcasing products and solutions for safe and smart cities. The show will consists of Smart Building, Smart Factory, Safe City, Mobility, Fire Safety & Disaster Prevention and Information Security sections. The business matching programs will return to offer a unique and effective one-on-one service to introduce exhibitors to VIP buyers. In 2019, Secutech successfully arranged 319 business matching sessions, connecting exhibitors with key distributors, systems integrators, property developers and contractors in the APAC region.

Our Top-10 Click-Worthy Articles in 2019 Highlighted Changing Industry Trends
Our Top-10 Click-Worthy Articles in 2019 Highlighted Changing Industry Trends

The physical security industry is moving fast. Evolving risks, new technologies and business changes all converged and had a profound impact on the industry in 2019. Looking back at our top articles of the year – as measured by those that received the most “clicks” at our website – provides a decent summary of how the industry evolved this year. Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2019 that generated the most page views. They are listed in order here with a brief excerpt. 1. Schneider Electric to Sell Pelco to Private Equity Firm Schneider entered exclusive negotiations with Transom Capital Group, a U.S.-based private equity firm, to sell the Pelco business unit. Pelco is a security industry stalwart and global specialist in the design, development, and delivery of end-to-end video surveillance solutions and services including cameras, recording and management systems software. 2. High-Tech Drones, Robots and Counter-Drone Solutions on Display From robots to drones to counter-drone solutions, a range of new technologies [was] displayed at ISC West 2019. The Unmanned Security Expo [included] a dedicated complimentary education theater for attendees offering sessions on a range of topics. Also included [were] demos of the best UAVs (unmanned aerial vehicles), UGVs (unmanned ground robotics and vehicles) and autonomous systems on the market. 3. Hikvision and Dahua Banned from Buying U.S. Exports In effect, inclusion on the “entities” list restricts the export of equipment to the two companies because of their alleged involvement in “human rights violations and abuses” related to a Chinese government campaign of repression, mass arbitrary detention, and high-technology surveillance against minority groups. Hikvision and Dahua have contracts to sell equipment that provides video surveillance capabilities in the Xinjiang Uighur Autonomous Region (XUAR) of China. 4. The many faces of today's facial recognition technology Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future. From street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights. 5. Security Industry Trends to Be Led by Focus on Cyber Security In 2019 With a more open, connected environment come cyber-risk and data privacy concerns – which is why, in the Security Industry Association’s 2019 Security Megatrends, cybersecurity’s impact on the physical security industry ranks number one on the list. Cybersecurity is affecting all areas of the industry landscape, from security implementation to attracting top talent to the workforce. 6. Open Supervised Data Protocol (OSDP): The Gold Standard for Access Control Installations The Open Supervised Data Protocol (OSDP) is now the industry’s gold standard for physical access control installations. It was designed to offer a higher level of security with more flexible options than the aging, de facto Wiegand wiring standard. OSDP, first introduced in 2011 by the Security Industry Association (SIA), continues to evolve with significant manufacturer input. 7. Honeywell Embracing AI, Reinvesting in Video Portfolio Although uses for artificial intelligence (AI) are still emerging in security, Honeywell sees an important role for AI in building a connected system to ensure the safety and security of a building, and more importantly, its occupants. AI allows end users to go beyond monitoring activity on a surface level to really understand the scene – from who exactly is in the area to what they might be doing. 8. A Secured Entrance Is the First Defense Against an Active Shooter What the majority of venues [of recent active shooter incidents] have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. 9. Debunking the Myths of the Security of Access Control Systems One of the areas where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smart cards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. 10. At Chubb Fire and Security, Ethics is a Core Concept with Practical Impact Ethics discussions begin for employees at Chubb when they join the company; clear instructions about ethics are included as part of employee induction. There are nine modules of ethics training during employee orientation, and a discussion with an Ethics and Compliance Officer is part of the onboarding process.

Honeywell Expands Reader Offering With OmniAssure Touch Against Credential And Identity Attacks
Honeywell Expands Reader Offering With OmniAssure Touch Against Credential And Identity Attacks

Honeywell is expanding its OmniAssure access control reader product line with the launch of the OmniAssure Touch access control solution. OmniAssure Touch provides advanced security against credential cloning and reader tampering, increases operator productivity when deploying cellphone credentials, and is interoperable with a range of credential technologies and panel communication protocols. The passive intent access control readers help people get into an area faster – just with the touch of a finger – no swiping of a card or a phone is necessary. “Our customers want the latest in security and protection against growing credential and identity attacks,” said Frédéric Haegeman, business leader for Honeywell Commercial Security, Europe and Novar GmbH. Access control solution  “With OmniAssure Touch, users benefit from advanced security and an adaptable platform that strengthens access control in their building. Our goal is to develop a comprehensive access control solution suite so that every user can identify a solution that works best for their business.” OmniAssure Touch provides: Ultra-secure protection: protects against credential cloning and replay attacks with technology that is fully compliant with OSDP Secure Channel Protocol (SCP) and the latest DESFire EV2 encryption standards; readers wipe encryption and certificate data when device tampering has been detected with all form factors available with a capacitive touch keypad for two-factor authentication Exceptional adaptability: features hassle-free, user-friendly cellphone credential capabilities that eliminate the need to present a phone to the reader; easy migration from legacy prox to smart and cellphone technologies; as well as configure reader settings in the field via cellphone app Integrated security suites A comprehensive solution: saves time by deploying cellphone credentials directly through Honeywell’s WIN-PAK, WINMAG and Pro-Watch integrated security suites, revokes cellphone credentials in real-time, and transforms the way people interact with your building using the Honeywell Vector Occupant App Easy to configure: leverages the Honeywell Utility app which allows installers to configure the readers in the field or wherever they use the app making installation and configuration easier and faster Reliable read/write cards OmniAssure Touch is ideally suited for enterprise and critical infrastructure environments across a wide variety of industries including defense, education, pharma, utilities and financial. The Honeywell suite of OmniAssure readers incorporate smart card technology to manage access control, logical (PC) access, storage of biometric templates, parking, ePurse and many other applications requiring reliable read/write cards.