Change is happening at MOBOTIX, and the German company wants to get the word out. “This company has been around since 1999, and people still give us a blank stare because they don’t understand what’s behind the curtain,” says Joe Byron, Vice President Sales Americas, MOBOTIX CORP. “As we gain visibility, people really want to know ‘what’s going on over there?’

There’s a lot going on. A new CEO, Thomas Lausten, who joined the company last year, is a former Milestone employee who brings with him the Milestone philosophy of open systems. It’s a culture shift for MOBOTIX, which has historically favored closed systems.

We needed a new leader to take us to the next level,” says Byron. “Thomas brings an open-platform mentality. He listens to a variety of opinions – from end users, architects and engineers, and MOBOTIX employees – before formulating a smart decision. That will take us to the next level.MOBOTIX has been well ahead of the industry’s technology curve, and several early innovations have recently become more common

The MOBOTIX Ecosystem

Over the years, MOBOTIX has developed a unique “culture” that has many rabid devotees; some say it’s the security industry’s version of tech giant Apple. “MOBOTIX has many loyalists, who are enthused about the products and the culture,” says Byron. “We can build on that with a new level of products, more excitement and a new direction.”

In addition to a new CEO, MOBOTIX will soon have a new chief technology officer (CTO), Hartmut Sprave, who will be joining this summer. Providing “fresh eyes on the subject” and an outside perspective from the IT industry will drive further innovation. “We don’t want to be on the bleeding edge, but on the cutting edge, and know the audience and its needs and challenges,” says Byron.

MOBOTIX’ existing technology mix provides a foundation as the company makes the transition. In some cases, MOBOTIX has been well ahead of the industry’s technology curve, and several early innovations have recently become more common. An example is MOBOTIX’ decentralized system approach with edge-based recording.

Tradeshow Successes 

Products highlighted by MOBOTIX at the recent ISC West show included the M16 AllroundDual Multisensor IP camera, S16 DualFlex IP camera and the Q26 Hemispheric 360-degree panoramic IP camera for indoor and outdoor applications. MOBOTIX Management Center (MxMC) 1.8 can change the camera settings on 80 cameras at a time. MOBOTIX IP Video Door Stations can interface with iOS and Android smartphone apps.

We have had so many things in place over so many years that people haven’t known about,” says Byron. He argues that MOBOTIX’ emphasis on technology development sets it apart from some camera companies in the U.S. market.

Joe Byron, Vice President of Sales, and Ashley Grabowski, Regional Marketing Manager, at MOBOTIX USA
Joe Byron, Vice President of Sales, and Ashley Grabowski, Regional Marketing Manager, at ISC West 2018 

People have been let down in the U.S. market with cameras that have been over-marketed, over-reaching and have little substance,” he says. The German engineering of MOBOTIX products and systems provides an antidote to the technology void, he says. “They are looking for the substance, and that’s what we have,” says Byron.

What was missing – until now – was the “layer of integration” with other systems in the market, contends Byron. That separated MOBOTIX from the rest of the industry.MOBOTIX offers cybersecurity features that pre-dated the current industry obsession, such as HTTPS/SSL encryption in recording and playback video

But now we are an open platform, and we have these features sets and are the best of both worlds,” he says. “We can align with technology products and bring MOBOTIX to the masses. It’s a matter of listening to customer challenges and formulating a path to meet those challenges.”

The fruits of that open system approach were on display at ISC West. The MOBOTIX booth featured integrations with ClearSite, Omnicast by Genetec, Konica Minolta and Mx-MSP by APB Technology. Other MOBOTIX technology partners include Avigilon, Bosch, Exacq, Gallagher, IndigoVision, Lenel, Milestone, Pelco by Schneider Electric, Salient Systems, Verint and Video Insight (Panasonic).

Targeting Local Markets

Another change under the new leadership is more flexibility to address the needs of local markets. “We need to be aware of our audience in the Americas,” says Byron, “and how approaching the market and the product mix may be different. We have the ability to create what we need here to be successful.”

One particular concern in the Americas market is cybersecurity, and MOBOTIX offers cybersecurity features that pre-dated the current industry obsession, such as HTTPS/SSL encryption in recording and playback video. “We already have it, but we have never broadcast it to the masses,” says Byron. “We have the substance but haven’t communicated it.”

Looking to enter the government market, for example, MOBOTIX faces the important requirement to be “IA compliant.” The company qualifies as IA (information assurance) compliant but just needs to go through the process of getting the “rubber stamp.”

We have so much under the hood when it comes to our products,” says Byron. He says MOBOTIX’ Internet of Things (IoT) approach can meet any end user challenges. “We can be all things to all people, if they truly get to know us. We just need to develop a vehicle to allow customers to communicate with us: What is the challenge? Nine times out of 10 we can meet that challenge with one of our cameras.

Download PDF version

Author profile

Larry Anderson Editor, SecurityInformed.com & SourceSecurity.com

An experienced journalist and long-time presence in the US security industry, Larry is SecurityInformed.com's eyes and ears in the fast-changing security marketplace, attending industry and corporate events, interviewing security leaders and contributing original editorial content to the site. He leads SecurityInformed's team of dedicated editorial and content professionals, guiding the "editorial roadmap" to ensure the site provides the most relevant content for security professionals.

In case you missed it

What Is The Value Of Remotely Monitoring A System's Health And Operation?
What Is The Value Of Remotely Monitoring A System's Health And Operation?

When is it too late to learn that a video camera isn’t working properly? As any security professional will tell you, it’s too late when you find that the system has failed to capture critical video. And yet, for many years, system administrators “didn’t know what they didn’t know.” And when they found out, it was too late, and the system failed to perform as intended. Fortunately, in today’s technology-driven networked environment, monitoring a system’s health is much easier, and a variety of systems can be deployed to ensure the integrity of a system’s operation. We asked this week’s Expert Panel Roundtable: How can remote monitoring of a security system’s health and operation impact integrators and end users?

Importance Of Establishing Security Standards For K12 School Security
Importance Of Establishing Security Standards For K12 School Security

As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security Industry Experts The Partner Alliance for Safer Schools (PASS) is one of the organizations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organizations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritize Safe School Environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organizations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts  Some of these organizations recognize their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilize, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack Of Consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings. A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right Protection Equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive Security Plan Quantifying and mitigating risk are the jobs of security professionals and school administratorsA risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay Adversarial Behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorized visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier Target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security. It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety And Security Components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms Layered Security While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2  Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.

What Is The Changing Role Of Training In The Security Industry?
What Is The Changing Role Of Training In The Security Industry?

Even the most advanced and sophisticated security systems are limited in their effectiveness by a factor that is common to all systems – the human factor. How effectively integrators install systems and how productively users interface with their systems both depend largely on how well individual people are trained. We asked this week’s Expert Panel Roundtable: What is the changing role of training in the security and video surveillance market?