A message we’re hearing a lot at ISC West this year is the customer’s growing demand for end-to-end solutions. In the small- to medium-sized business (SMB) segment, especially, there is a strong demand for total solutions that are simple to use and easy to integrate and manage. The most efficient path to achieve such systems is often to install an end-to-end solution from a single supplier, combining access control and video.

Creating Unified Solution By Uniting Product Businesses

“Video gives us a way to grow faster, and the video partner we have chosen offers the features, functionality and flexibility to allow us to grow faster,” says John Kenning, regional CEO of G4S North America and Technology

We’re seeing the trend play out in the arena of mergers and acquisitions (M&As), but two independent companies can also achieve similar results by working together closely, combining their product lines to bring a single, unified solution to the market. An example of that approach, being highlighted at ISC West this week, is AMAG Technology’s new agreement to incorporate Salient Systems’ video products into its Symmetry platform.

AMAG will sell Salient products as the latest, private-labeled additions to its Symmetry product line. Specifically, AMAG is now offering Symmetry CompleteView Video Management System, Symmetry PowerProtect NVR Server Platforms, and Symmetry TouchView Mobile Video Apps for sale right alongside its other Symmetry products, and as part of an end-to-end system. These products are private-labeled versions of Salient’s existing product line, which have been integrated closely to operate as a single system with AMAG’s Symmetry access control products.

Simplified Approach For A Better Future

John Kenning, regional CEO of G4S North America and Technology, describes the agreement as an “OEM arrangement with a deep partnership.” (AMAG is part of G4S Technology, a worldwide manufacturer of security management technology.) The pact will also help the two companies move faster in the future to meet customer demand, to advance technologies, and to embrace opportunities such as cloud services.

“Our strategy is to provide our customer base wanting end-to-end solutions a simpler, consistent and more flexible route to build a combined system for access control and video, using one simple graphical user interface (GUI),” says Kenning. Such a system appeals particularly to the SMB market’s need for an easily integrable system. At the enterprise level, and even for global enterprises, the simplified approach can translate into easier standardization throughout the organization, and easier ordering and vendor management (dealing with fewer vendors).

Kenning lists the energy sector, higher education and healthcare as vertical markets where the approach is gaining traction. “Video gives us a way to grow faster, and the video partner we have chosen offers the features, functionality and flexibility to allow us to grow faster,” says Kenning, noting that, generally, growth is faster in the video segment of the market.  

Win-Win Game

AMAG has already been working with Salient to integrate the companies’ systems, and Kenning says Salient’s rapid growth and new capabilities in networking and managing bandwidth consumption contributed to the decision to private-label Salient video products as part of the Symmetry line. (Network-friendly features of the CompleteView VMS include Dynamic Resolution Scaling, and Smart Search makes it fast and easy to locate a video recording.) The bi-directional interface to Symmetry Access Control enables alarms and events to trigger recordings, and recordings can automatically be associated with access control events. “It’s just a very well-rounded opportunity and product, a very strong fit” he says. “They are growing by leaps and bounds.”

Salient Systems’ benefits from the deal will include access to a new, large and global distribution channel for its products. G4S’ global reach includes some 600,000 employees worldwide. The initial announcement at ISC West relates specifically to AMAG, but the private-labeled Salient products will be available under the Symmetry brand worldwide by the second half of 2015.

AMAG and Salient will work together to provide Level 2 or Level 3 technical support across the access control and video platform, all accessible through AMAG’s customer support system.

Part of the “deep partnership” will be AMAG depending on Salient Systems for future development of the video system, which will free up AMAG resources to be more focused on customer-facing development and additional features and functionality. (AMAG previously private-labeled another company’s video product, but had to tie up its own resources doing development for the product. AMAG will continue to support the legacy product, and has plenty of replacement inventory, but will not develop any new features or functionality, and will eventually manage the product’s end-of-life.)

AMAG will also continue to work with other third-party suppliers through its API (application programming interface), doing additional integrations to meet customer demand, as will Salient.

ISC West will no doubt have plenty more announcements, too – stay tuned.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Larry Anderson Editor, SecurityInformed.com & SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SecurityInformed.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SecurityInformed's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

When Hiring Drivers, Proper Vetting Is Vital For Safety And Compliance
When Hiring Drivers, Proper Vetting Is Vital For Safety And Compliance

Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion.  Safe work environment Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies. Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation.   Adherence to safety protocols Operating in haste typically results in forced errors and mistakes within the business" “This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform. In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers. Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers? Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions.   In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic. Q: What are the elements of safety and compliance involved in onboarding new drivers? Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organizations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity. Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organization, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company. Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference? Employers should also consider State Business Records for potential red flags Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organization’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats. Logically, businesses should consider reviewing Department of Transportation Records, which allow organizations to check whether drivers are licensed and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organization is delinquent or no longer functioning in a given state. Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organization. This includes fraud, bankruptcy, poor business practises, and more. Q: What should be the standard methodology to investigate and collect data on new driver programs? Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first. Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records. You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licensing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process. Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)? Businesses must conduct their operations in a fair, lawful, and transparent manner Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA). When utilizing software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall. Q: How is addressing these issues different in the case of a contracted service versus a company employee? Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation. In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions. Q: What is at risk if companies fail to address these issues? Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise. Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint. When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs. Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements? Enhanced vetting today often includes looking into a contractor’s background or its company Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers. Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more. These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.

Private Security: A Shift In Industry Responsibility
Private Security: A Shift In Industry Responsibility

The role of physical security has expanded and grown rapidly over recent years. Below are some of our observations, particularly throughout the pandemic, and a look towards the changing times ahead.  The new era of physical security The role of private security has shifted dramatically over the last decade and beyond. Historically, the focus was on protecting assets such as property and goods, but more frequently now the sector is being asked to play an even bigger role in protecting the public from physical danger. During the current coronavirus pandemic this has increased to high profile marshalling in city centers and public areas to ensure social distancing is in place, as well as managing people and traffic through COVID-19 Testing Sites. The role of private security has shifted dramatically over the last decade and beyond As these responsibilities have changed so to have the expectations on the industry, which are now wide ranging. However, this is not a new phenomenon, as we have seen how this has specifically impacted on the role of door supervisors in recent years. Whereas this primarily used to be focused on protecting the venues themselves, this role has now expanded with the same door supervisors finding themselves responsible for areas beyond merely the front entrance. Not only are they fulfilling the traditional role, but they are increasingly relied upon to provide welfare and support far beyond the traditional remit. Credit needs to be given to the industry and those within it who have driven these changes, particularly with regards to what can be termed ‘safeguarding’. Whilst mandatory SIA license training includes specific guidance and instruction for 'safeguarding', or how to help vulnerable people, it was instigated by the industry itself. As a result, now the person being refused entry to a venue due (for whatever the reason), now finds themselves often being helped by the door supervisor, for example, by arranging a taxi for them, rather than allowing a young and/or vulnerable person - perhaps separated from their friends, to wander off alone into the night. Pandemic constraints Throughout the pandemic, security operatives are being deployed to provide a positive physical presence to support and instill the importance of social distancing, mask wearing and to ensure the safety of the public. Who would have thought that in 2020 it would be commonplace to see the vast majority of supermarkets, large and small, with an obvious security presence! Filling a void (changing responsibilities) Alongside this, and for some time increasingly private security has been asked to fill a vacuum created by greater demands on policing and consequently they have naturally moved towards contributing to what can be termed 'place management'. The latter was a concept that primarily came about as efforts increased to 'revive' towns and city centers where a safe, welcoming, inclusionary environment was seen as critical to attracting a wider demographic, rather than the dominant economy being centred around night-life, which was seen as the domain of the 'young'. You may have read about efforts to diminish the distinction between the day, evening and night-time economies and replicate what was happening in the large out of town ‘retail’ centers e.g. the Trafford Centre in Manchester. There you can shop, eat, drink, watch a film, bowl almost at any time in the day. Towns and cities have increasingly tried to replicate this, for example asking other venues, such as museums to stay open longer. Responsibilities have also shifted towards enforcing legislation when appropriate, particularly at a local level Consequently, with greater expectations placed on private security operatives today, as well as their traditional role of protecting property and people, their skill set is extending to include a greater emphasis on customer service and being well voiced in welfare issues. Also, responsibilities have also shifted towards enforcing legislation when appropriate, particularly at a local level, which is further evidence of security operatives increasingly taking on duties and responsibilities which have previously always been in the remit of the police or other enforcement personnel. Framework schemes to facilitate this have transited online, and been under public scrutiny, most notably the Community Safety Accreditation Scheme (CSAS). CSAS allows Police Chief Constables to 'allocate' powers to accredited security providers operating in their geographical regions, which whilst it has been in existence for many years isn’t probably widely known about beyond the industry itself. Training must meet the need This leads to the question of training: we need to talk about training and what’s necessary in this new era of security, in line with the increased expectations and responsibilities of the security operative. Where does the role of private security start and stop? All regulated security operatives have been given specific training to gain their SIA license, and many companies operating in the field of large-scale crowd management offer their own bespoke learning and development. Such training can include: Stages and pits (area found in front of the stage) Externals (often outside the footprint of the licensed venues) Directional stewards Roaming response operatives With such courses being optional and unregulated, how do we create an adequate baseline skills base? Whilst some of this training can be accredited and/or included in recognized qualifications it can be the case that security providers have developed their own ‘guidance’, which for some companies is used to respond to emerging risks. The industry being asked to be integral to the pandemic response is an example of where companies are putting together guidance, which may be based on emerging central Government thinking. The science of large-scale events Over the years we have seen a real boom in events. Specifically, large scale (50,000+) music events are no longer restricted to festivals and have been seen as a lucrative source of income, for example, the use of soccer stadia in the closed season, to maximize year round usage. For example, a number of years ago Manchester City Football Club staged the return of Take That resulting in a wider demographic attending events, from your older fan, probably with children the same age as they were when they last saw them live, to young children attending their first live music event and everybody in between. Safely managing these types of 'diverse' event and crowd management has become a science in its own right with many considerations including crowd dynamics, crowd behavior, ingress and egress planning, transport plans and of course, contingency planning for the unexpected. Maintaining public safety – applying the science Consequently, if the overarching aim for any pandemic response is public safety, then the objective for the security industry should mirror this, aiming to maintain complete safety for the public. If the overarching aim for any pandemic response is public safety, then the objective for the security industry should mirror this This should always include managing the flow of people in highly charged environments, now with the added consideration of social distancing in what are worrying times for the average person on the street. Private security has a pivotal role to play as social conventions are rebuilt and the world grasps its new normal. Where you want to gain compliance by cooperation then it needs to be certain that the security operatives are: "the right people, in the right place, at the right time, doing the right things and working alongside the right partners". We believe that this can only be achieved by applying science to these situations, a skill that that is second nature to those who routinely deliver effective security. We need to clarify the role of manned security providers covering the limitations and extent of their responsibilities. This needs to be unanimous across the licensing bodies, employers and public in order for operatives to fulfill the role and an industry benchmark set. Security firms are not the police, BUT it is important to note that their role is integral to keeping people safe.

Zigbee Alliance Developing Project CHIP For Connected Home Over IP
Zigbee Alliance Developing Project CHIP For Connected Home Over IP

Zigbee is a familiar name in the smart home arena, and the Zigbee Alliance is expanding its technology approach to address the challenges of the Internet of Things. As the Internet of Things (IoT) has evolved, the need has become obvious for stronger unity among brands and ecosystems to enable products within smart environments to work together more easily. Working to serve that need is the Zigbee Alliance, which seeks to promote collaboration in the Internet of Things by creating, evolving, and promoting universal open standards that enable all objects to connect and interact. Shifting the Smart home market Their IoT effort took off when Amazon, Apple, Google and the Zigbee Alliance announced an industry working group in December 2019 to take the ‘best of market’ technologies from smart home standards, portfolios and ecosystems and to develop a ‘super spec’ that will be open, inclusive and a significant industry shift in the smart home market. Zigbee Alliance has been for a while now working on openness and interoperability" “Zigbee Alliance has been for a while now working on openness and interoperability, which has led us to the Project Connected Home over IP (CHIP), which is looking to unify the environment, under one technology, one certification program and one logo,” says Chris LaPré, Zigbee Alliance’s IoT Solutions Architect. “It really does fuel IoT possibilities, whether in security or any other sectors.” Project CHIP is a royalty-free connectivity standard that unifies brands and ecosystems into a single smart home automation system that operates any other technology based on Internet Protocol (IP). Simplifying product development The intent is to simplify product development for device manufacturers, broaden consumer choice, and to ensure easy discoverability, deployment and engagement to fuel connected living. “We have noticed that, as the IoT has evolved, there is a stronger need for unity, which is why we are developing Project Connected Home over IP,” says Jon Harros, Zigbee Alliance’s Director of Certification and Testing Programs. “It fits with the Zigbee Alliance’s goal to unify systems, and to focus on everyone using the same application at the top. It unifies that environment, whether you are integrating your system with Amazon Echo devices or connecting to Google Home.” Participating in development of Project CHIP are 125 companies of various types from around the world working together with more than 1,100 of their experts serving across sub-committees to formulate specifications and fine-tune the project. Home system technologies The original Zigbee protocol is used for many applications around the world, including smart homes Although the technology is being developed for the home market, the specifications have been formulated with an eye toward expanding into the commercial market in the future. Development of open, interoperable systems provides greater freedom for consumers to choose among the many technology choices on the market, without being tied to a single brand or ecosystem. Zigbee Alliance certifications and memberships span the globe, with roughly a third in Europe, a third in North America and a third in Asia. Involvement in Europe is slightly higher than the other regions. Alliance members represent manufacturing sites all over the world. Project CHIP is a newer initiative of the Zigbee Alliance, which previously developed Zigbee Pro to enable home system technologies to operate using IEEE 802.15.4 wireless signals on the 2.4GHz radio band over a self-healing true mesh network. The original Zigbee protocol is used for many applications around the world, including smart homes. Certification transfer program Among the strengths of the Zigbee Alliance are years of experience certifying products, which includes testing them and confirming that they comply with the promoted specifications and functionality. The specifications are open standards that are developed in cooperation with all the companies that are Zigbee Alliance members. Another route is the certification transfer program, in which a company chooses a certified white-label product, becomes a member of the Alliance, and then rebrands the product while retaining the certification. “It helps them get products on the market quickly while they build their own knowledge base,” says Harros. “All our work is focused on standardizing the behavior and functionality of products and making sure everyone is following the same standard to get interoperability,” says Harros. “Members all contribute to the standards.”