The Z-Wave Alliance, an open consortium of leading global companies deploying Z-Wave, is announcing a new program with IoT services provider, PlumChoice to deliver an exclusive level of support options for Alliance members. The program will give members access to US-based trained and certified technicians who can assist their customers with the integration, installation and support of their smart home products. The ConnectedHome Expert program for Z-Wave Alliance members delivers an exclusive choice of three-level support options

ConnectedHome

The ConnectedHome Expert program for Z-Wave Alliance members delivers an exclusive choice of three-level support options, including benefits such as access to technicians who can understand and fix issues remotely, connectivity options to fit unique customer needs and weekly or monthly standardized reports. According to a 2018 consumer study by iQor, one in three consumers experience issues setting up or operating their connected devices. This program will help manufacturers assist their customers with troubleshooting and general product setup, resulting in an improved overall customer experience, reduced risk for customer attrition and increased brand loyalty.

One of our biggest goals as a member organization is to provide resources to help our ecosystem succeed in its markets,” stated Mitchell Klein, Z-Wave Alliance Executive Director, “This new effort with PlumChoice will give our members access to something the entire smart home industry needs more of: technical support for our end users.The team at PlumChoice has the ability to deliver multi-lingual support by certified technicians with 24x7 support

Smart Home And IoT Support

The team at PlumChoice has the ability to deliver multi-lingual support by certified technicians with 24x7 support available to any smart home provider. Their approach enables experts to resolve end user issues by providing advice, step-by-step guidance, or complete assistance including explanations that make sense for customers with solutions that work. PlumChoice has a history of providing first rate IoT technical support services on behalf of leading brands”

PlumChoice has a history of providing first rate IoT technical support services on behalf of leading brands,” said David Shimoni, PlumChoice President and CEO, “With the ConnectedHome Expert program, the combination of PlumChoice and the Z-Wave Alliance will provide the highest level of quality care available for their smart home and business application partners.

This program is available to Z-Wave Alliance members only; to learn more about the benefits associated with the ConnectedHome Expert Program, visit z-wavealliance.org/connectedhome-expert or contact Greg Galat at ggalat@plumchoice.com, or in the Z-Wave Alliance Pavilion, booth #30078 at ISC West. A special introductory meeting for this program will be held for Alliance members who will be attending the ISC West event in Las Vegas, April 11-13.

Download PDF version

In case you missed it

Highlighting The Importance Of Security Integrations And Alliances
Highlighting The Importance Of Security Integrations And Alliances

Most technology companies have one goal in mind: to provide customers with high-quality, affordable products that can efficiently help streamline operations. Whether it's surveillance cameras, video management software, access control technology or any other type of security device, today's leading organizations invest in expertise in these product segments and strive to produce the highest quality solutions. To effectively fulfill this task, technology providers are always searching for emerging components to make their products and services even stronger. Oftentimes, a key aspect necessary to build a comprehensively robust solution involves finding like-minded partners that share a common goal and are willing to work together to create an integration that increases insight and intelligence.The interoperability between systems, devices and different types of applications should be intuitive and fast Key Factors For Security Integrations A basic factor in a partnership is openness. For an integration to perform seamlessly for the end user, the platform through which the technologies converge must follow standard protocols, easily operate with other platforms, allow freedom and customization, and provide adaptability. The interoperability between systems, devices and different types of applications should be intuitive and fast, enabling more time to be spent on analyzing critical data and responding to security events. The puzzle of a complete security solution contains many pieces, and it's often necessary to fuse together aspects from various providers to create a best-in-breed technology offering. When organizations collaborate, the end result is a simplified solution with an increased level of value. As threats become more severe and complex, customers demand solutions that combine different security and business elements into a single interface that can address a wide variety of risks.  A unified security system requires a strong collaboration between technology providers and integrated solutions Interconnected Security Devices Users used to only look at specific security devices - such as cameras or door alarms - as each having a strong, autonomous purpose, but now, every device plays an important interconnected role. And the progression of the Internet of Things (IoT) has made this transition even easier, as maintaining a consistent and uniform communication and interconnectivity between devices has now become the norm. The IoT has also made it so that partnerships must not only exist between manufacturers, but also within the customer's organizational structure. Although exceptionally beneficial, the IoT brings with it an increased amount of cyber vulnerabilities. As security systems are networked to increase flexibility, the door is opened to a number of potential threats that could compromise the entire enterprise. This risk highlights the need for an internal partnership and knowledge sharing between a company's physical security professionals and its IT team. IT experts should be pulled into security decisions and positioned as collaborative partners to assist with software updates, data safety protocols and solving complex network challenges, ultimately leading to a more cyber secure solution.Partnerships are beneficial to both the companies involved and their customers Knowledge Sharing And Learning Aside from cybersecurity, the latest prominent security attacks and events have focused primarily on soft targets, such as schools, concerts or shopping malls. This has caused many technology providers to venture into different vertical markets, and strong partnerships streamline this crossover. Innovators can extend their geographic reach and purpose through integrations with other like-minded manufacturers or integrators to add new levels of functionalities. Of course, a partnership cannot operate properly and to the best of its ability without a core component: learning. In today's evolving business and risk environment, knowledge is critical. A shared knowledge base can open up new opportunities and lead to the strengthening of security across many levels. A truly powerful, unified security system requires a strong collaboration between technology providers and integrated solutions. Partnerships are beneficial to both the companies involved and their customers, and the results created through these alliances can reach far beyond a user's expectations, offering enhanced flexibility and extensive safety options.

What Are The Security Challenges Of The Hospitality Market?
What Are The Security Challenges Of The Hospitality Market?

Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?

How SecuriThings Boosts Cybersecurity Across Multiple IoT Devices
How SecuriThings Boosts Cybersecurity Across Multiple IoT Devices

As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorized access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a challenge, and the fragmented structure of the video surveillance market contributes to that challenge. A variety of companies are involved in manufacturing, integrating, installing and operating video systems, and cybersecurity threats can enter the picture at any stage. “It’s not always clear who is responsible,” says Yotam Gutman, vice president of marketing for SecuriThings, a cybersecurity company. “However, the only entities who can ensure cybersecurity are the security integrator and the service provider. They will bear the financial pain and are willing to pay for cybersecurity. An extra $1 or $2 per camera per month is not expensive.” SecuriThings’ “lightweight software agent” runs in the background of video cameras, sending information to an analytics system in the cloud IoT Device Security Management At the recent IFSEC trade show in London, SecuriThings unveiled its IoT Device Security Management (IDSM) approach to enable integrators to ensure cybersecurity. Founded in 2015, the company has around 20 employees in Tel Aviv, Israel, and operates a sales office in New York City. SecuriThings’ “lightweight software agent” runs in the background of video cameras, collecting metadata on camera processes and connections and sending information back to an analytics system in the cloud. Drag-and-drop deployment enables a camera to begin generating data within seconds and requiring only two mouse clicks. The cloud system analyzes data, pinpoints abnormalities, identifies new users, detects multiple entry attempts and tracks other camera processes to identify any cyberattacks. It monitors all devices, gateways, users and APIs to detect threats in real-time and mitigate the threats based on a pre-determined security policy. Machine learning tools also analyze more subtle activities that can indicate insider abuse. For example, a user support center can identify if cameras are being accessed improperly by employees, thus preventing insider abuse. Certified Vendor Agnostic Software SecuriThings is working with camera manufacturers and video management system (VMS) manufacturers to certify operation of its software agents with various camera models and systems. Working through integrators, such as Johnson Controls, is the fastest route to market, SecuriThings has determined. The system can be added after the fact to existing installations for immediate monitoring and remediation, or it can easily be incorporated into new systems as they are launched. “We have a strong sales team in the United States focusing on bringing the technology to more local and national integrators,” says Gutman. Certification ensures SecuriThings’ software agent can be installed in most modern camera models without negatively impacting operation; the software is vendor agnostic. Another eventual route to market is to work with camera manufacturers to install the SecuriThings software agent in cameras at the factory. In this scenario, the system can easily be “clicked on” when cameras are installed. The SecuriThings cloud system generates a dashboard that tracks system activities to identify any cybersecurity threats IoT Security Operations Center SecuriThings operation is transparent to the VMS, and the company works with VMS manufacturers to ensure the code operates seamlessly with their systems. Cloud analytics generate a dashboard that tracks system activities, and/or a managed service monitors the system and notifies customers if there is a problem. “We monitor it from our IoT Security Operations Center, a fully managed service that ensures the real-time detection and mitigation of IoT cyber-threats,” says Gutman. “We found that end-customers don’t have the manpower to monitor the system, so our experts can guide them.”Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable" A benefit for camera manufacturers is the ability of a system like SecuriThings to “level the playing field” on issues of cybersecurity, says Gutman. The approach provides a higher level of cybersecurity confidence for integrators and users, including those using cameras that have previously had cybersecurity problems such as “back door” access. SecuriThings has certified its software for use with Hikvision cameras and is in the process of certifying with Dahua, says Gutman. “Western manufacturers say their products are more secure, but we can help all camera manufacturers prove that they are just as secure,” says Gutman. “Integrators and users can log into a device and see all the activity.” Securing Connected Devices From Cyber Threats Beyond video, SecuriThings’ products target the full range of connected devices in the Internet of Things (IoT). The SecuriThings security solution enables real-time visibility and control of IoT devices deployed in massive numbers in smart cities, physical security, building automation, home entertainment and more. Video surveillance is an early focus because of market need, an opportunity to gain traction, and the critical nature of security applications. But the challenges are much broader than video surveillance. “We are seeing similar risks to other devices,” says Gutman. “Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable. If you can disable the access control system, you can cause a lot of problems.” Other connected devices that could be at risk include building automation and heating and cooling (HVAC) systems.