Business processing; system integration between access control, intrusion detection, IP video, intercom and fire detection
Round table contributions
They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than for any other market. We asked this week’s Expert Panel Roundtable: What are the security challenges of critical infrastructure facilities?
The world of politics, like the world of security, is an environment of constant change. But do changes in one have an impact on the other? Governments around the world are involved in buying a wide variety of physical security systems, so how those governments operate certainly affects how they spend money on security. But in a broader sense, governments (and the associated political forces at work) also impact how their citizens and those in the private sector view threats and, as a logical extension, the security systems they need to address those threats. We asked this week’s Expert Panel Roundtable: How does the political climate affect spending on security systems?
Consolidation is a reality in the security and video surveillance market. In the last several years, we have seen a variety of mergers and acquisitions (M&As) involving scores of companies of all sizes. But what is the impact of M&A activity on the companies involved, on their customers, and on the industry as a whole? We posed this question to our Expert Panel Roundtable: Do mergers and acquisitions have a net positive or net negative impact on the security market (and why)?
The International Organization for Standardization (ISO) describes standards as guidelines or characteristics for activities or for their results, aimed at achieving the optimum degree of order. They might include product standards, test methods, codes of practice, guideline standards, and management systems standards. In the security marketplace, there are many standards currently used, including those from organizations such as ONVIF, PSIA and ASIS International. Might the value of standardization be extended to new areas in our market? We asked this week’s Expert Panel Roundtable: What new standards are needed in the security marketplace?
Meeting a customer’s expectations is a key component of success for any business, including the physical security market. However, understanding customers’ expectations is a big challenge, which is made even more difficult because those expectations are a moving target. We asked this week’s Expert Panel Roundtable: How are customer expectations changing in the physical security market? Their wide-ranging answers highlight elements from technology expectations to adaptability to change.
As security industry buzzwords go, “convergence” is perhaps the best known and most pervasive. We have been hearing about convergence in our market for almost 20 years. We have heard it’s happening soon. We have heard it’s inevitable. And yet, for all the talk of convergence, it has sometimes seemed there has been more talk than action. We wanted to check in with our Expert Panel Roundtable and get their latest takes on this most enduring of industry buzzwords. We asked this week’s panel: Has convergence happened yet in the physical security market? And what exactly does it mean?
Changes in our industry’s technologies are reflected in the language we use. Over the years, more than one industry trend has been tied to associated buzzwords – for better or worse. As the technologies change, so does the language. We asked this week’s Expert Panel Roundtable: What are the industry’s newest “buzzwords” and what do they reflect about the changing market?
Open systems are great at providing freedom for end user customers. But does the term “open system” mean the same thing throughout the industry? In the bad old days before the introduction and broad acceptance of open systems, security vendors produced proprietary systems that used only their own hardware and software. This locked in a customer to a specific vendor’s product line, and if another vendor offered a better product, the only way to get it was to switch to that vendor’s total solution. Open systems changed all that, in theory allowing the selection of best-in-class hardware, software and other components to meet customer requirements. But is the term “open” understood consistently in the market? We asked this week’s Expert Panel Roundtable: What is an open system? Is there a consensus in the marketplace of the definition of “open?” Although there is mostly a consensus in the panel’s answers, we did notice some variables.
In a fast-moving market like physical security, sharing information is an essential component of growth. However, there often seems to be more information available than an integrator or end user could ever digest and put to use. How does one go about finding the information he or she needs in an environment that can seem to be drowning in information (sometimes the wrong information). We asked this week’s Expert Panel Roundtable to share their strategies and suggestions. Specifically, we asked: What can integrators and/or end users do to stay informed about the fast-changing technology landscape?
IP network dependability matters in physical security and safety applications, given that a company’s assets and people are at risk. There have been strides in the areas of network dependability, fault-tolerance, reliability, and survivability. However, networks (or affordable ones, at any rate) still cannot ensure near-100 percent uptime, which is why system designers acknowledge and plan for the possibility of a network outage. We asked this week’s Expert Panel Roundtable: How can/should an IP networked system adapt when network connectivity is lost?
Will 2016 see faster adoption of video analytics? Will cyber-security have more impact on physical security? Is the market likely to see greater use of cloud-based products and services? Will technology help to drive greater involvement by everyday citizens in public safety initiatives? Could the market focus shift from selling products to selling solutions? We asked this week’s SourceSecurity.com Expert Panel to look ahead to 2016, and these were some of the surprises they see in our industry’s near future. Specifically, we asked this week’s panel: What will be the biggest surprise in 2016 for the security market?
Historically, biometrics applications have often been thought of as specialized, high-tech and used predominantly in governmental markets. Everyday systems have tended toward card readers and keypads, while biometrics have been associated with high-security applications. Today, however, biometrics are much more mainstream. Fingerprint readers, in particular, are as near as our smart phones. Many other biometric applications are also becoming more common in a wide variety of markets. We asked this week’s Expert Panel Roundtable: What non-governmental markets are likely to embrace biometrics? Which technologies will be most popular?
Any business sees its share of highs and low, of flare-ups and lulls. In the security market, several factors can impact general business trends, whether at the macro level or for an individual manufacturer or integrator. The economy is always a factor in the business climate, but are there others? We asked our Expert Panel to assess the impact of another variable – the seasons. Specifically, we asked this week’s Expert Panel: What is the seasonal impact on sales of security technology and systems? When are the highs and lows?
Violence in our schools and colleges often makes headlines, suggesting a growing and scary trend. A consequence of high-profile school shootings and other reports of violence is to increase awareness of the need to ensure safety and security of students, faculty and staff. The events have prompted more than one educational institution to take a second look at their security policies and infrastructure, with an eye toward improvement. But to what effect? Has greater awareness of violence in educational institutions actually led to more security? We asked this week’s Expert Panel: Are schools and universities safer today than ever before? How is technology contributing to keeping educational institutions safe?
Salesmen may face pressure to “seal the deal,” but might an overemphasis on the ABCs of selling (“always be closing”) actually work to the detriment of an unsuspecting customer coerced into buying too much (or the wrong) technology to meet his or her needs? Not likely, according to our Expert Panel, who this week address the topic of salesmanship in the security market. We asked: Can an end user trust a security salesman’s advice? Our responses are overwhelmingly in the affirmative, and there is also some interesting commentary about how effective sales processes should work to the benefit of all parties involved.
Articles by Arjan Bouter
How can security system integrators not just survive but thrive in today’s IT-led market? The key seems to be in training. As increasingly more clients look to integrate access control with IT environments, they want integrators with the specialist skills to achieve this. For integrators that don’t invest in training, the risk is being left behind. Because many security system integrators aren’t providing specialist IT support, manufacturers are now offering services to make implementations and integrations easier. This isn’t a scalable or desirable option for many manufacturers though, they don’t want to become integrators. The result? Manufacturers will be pushed into developing products that can be integrated with IT networks off the shelf. And this isn’t necessarily the best option for end user, manufacturer or integrator. With a growing number of cloud-based security solutions, integrators also face the threat of clients opting for installation-only services. How security system integrators can survive and thrive today It’s not all doom and gloom for security system integrators though. To avoid becoming redundant, or being downgraded to simple access control installers, there’s lots you can do to strengthen your position. Listen carefully Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience One of the first ways you can distinguish yourself from your competitors is by really listening to what your clients want and need. You can then translate this into a security or access control application tailored carefully to them. Many integrators are reluctant to do this, but it’s a great way to demonstrate the depth of your experience and product knowledge. It’s far superior to carrying out a standard implementation, which can leave clients feeling they’ve not been listened to or given good value. Up your IT knowledge TCP/IP has become the standard for communication between devices and central server applications in access control and security in general. So every technician now needs to know how to connect IP devices to networks and configure them in the central application. This is only the tip of the iceberg though, there’s so much more that integrators now need to be proficient in when it comes to IT. From understanding a client’s WAN, LAN and VPN networks to back-up systems, encryption technologies, key management and transparent communication. It’s also important to know how to integrate applications at server level, whether you’re integrating two or more security systems or a HR database. Most integrators have begun to invest in one or two IT experts, but this usually isn’t enough to meet clients’ needs. To really stay ahead, it’s crucial to invest more heavily in IT training and expertise. Choose your portfolio carefully When considering your portfolio, ensure you check the background of each product’s manufacturer Ideally, your portfolio should be small but rich, which is more difficult than it sounds. Choosing products that will scale easily is complex, and you need to consider the potential for increased functionality or connectivity as well as scalability. When considering your portfolio, make sure you check the background and outlook of each product’s manufacturer. You don’t want to select items that are likely to be discontinued in the near future, which can often happen after a manufacturer is acquired, for example. Get in the cloud In the security market, the mid and low segments are already shifting to cloud-based solutions that need neither integration nor IT skills. This leaves you with opportunities for just installation and maintenance services, where profit opportunities are reduced. An alternative is to begin selling cloud-based security services yourself to help you attract and retain clients for the long-term. Give clients added commercial value As competition increases and budgets shrink, offering added value, to new and existing clients, is a vital way to differentiate your business. This will help you to not just defend against competitors but to grow your business and increase your profitability. Configuring access control reports for clients is just one example. It’s relatively straightforward to do but provides really valuable insight into visitor flow. This can then enable them to, for example, staff reception adequately and provide sufficient catering, which all improves the experience for visitors and employees. Providing this kind of consultative service, instantly pushes you up the value chain. Stay agile and well informed To survive and grow as a security system integrator today, the upshot is that it’s crucial to keep pace with the market’s ever-changing trends, technology and client needs. And, to make sure you’re ready to adapt and give clients the services they want, it’s vital to give your people the in-depth training they need.
Many security solutions available today have the problem of being insufficiently open, offering very limited flexibility. Integrating third-party products is practically impossible. Customers therefore very often have to make a long-term bet on just one vendor. Upgrading or expanding security systems is often complex, expensive and time-consuming. But the industry is changing. Initiatives like open standards and cooperation between suppliers are emerging to help companies react faster to changing security demands. For 2016 we see customers facing challenges such as new means of identification, changing regulations and the impact of cyber threats on physical security. Because a security system is always used for the longer term, it is almost certain that new security requirements will be introduced during the service life of the system. Therefore, we believe that an open, software-based security system is getting more important. Introducing Open Standards In IT, the decoupling of hardware and software has been a proven principle for many years, and so has the use of open standards. The paradox is that the use of generic hardware will make it easier to implement open standards, as it only requires development of software, not hardware. The adaptation of these standards offers many benefits to security system customers, the most important of which might be freedom of choice and dealing with future needs. Introducing open standards allow companies to mix and match not only the cameras they need or the card readers that best fit their budget, it also allows them to select the functionality that suits their security policy. As companies want their security always to be well arranged, Nedap believes that making a choice now should not limit them in future. Customers need to be able to meet new requirements without investing in an entire new system prematurely. Not only do they need a security system that is fully equipped to cope with the security requirements of today and tomorrow, they also need a supplier that continuously invests in its product and has an extensive partner network, so that companies are able to adapt their system anytime they need to. See the full coverage of 2015/2016 Review and Forecast articles here
Regular upgrading ensures all systems communicate correctly In the IT world, innovation moves quickly. New versions of software are launched every day to keep business processes running smoothly. So frequent upgrading isn’t even a choice anymore – it’s a must to avoid losing valuable time and data. In this article, Dirk Kappert, IT specialist and CEO of the German company ACEA, explains about the relevance of upgrade assurance and how it applies to physical security as well. Why do companies view it as a necessity to upgrade their IT systems but not their physical security systems? In the IT business, upgrade assurance is very common. Because new software versions are developed every day, you need to upgrade frequently to ensure your systems keep communicating with one other. There’s a clear difference between the worlds of IT and physical security in this respect. For instance, in the world of IT, hardware is less important. This is because software is developed to run on every kind of device. In the world of physical security, hardware still plays a leading role when selecting a system. Although practically all security controllers nowadays are IP-based, they’re still pretty much always dedicated to perform one single functionality, such as access control. This makes many physical security systems inflexible and hard to integrate with IT systems. Why is it relevant for a physical security system to integrate with IT systems? In practice, customers often require smart integrations between IT systems and physical security systems. For example between an access control system and an HR system and intranet. The benefit of this is that you only have to enter a new employee’s personal data, for example, into the HR system and you can automatically import it into your access control system to create a card for them. You don’t have to enter their personal data twice in different systems, so the chance of making mistakes is lowered. What difference does upgrade assurance make? To obtain exchange of data between a physical access control system and other systems such as SQL Server and interfaces, updating an access control system is mandatory. Ninety percent of our customers have a service agreement with us to provide upgrade assurance. We visit them once a year to upgrade all of their software and, very often, we link their access control system to their IT systems. Because if we don’t upgrade their access control along with the rest of their IT systems, it can easily cause miscommunication between systems, meaning their security is compromised. Regular upgrading not only ensures all systems communicate correctly, it means our customers always have the latest new features, so their security is always up-to-date. And what about the ten percent that don’t choose to include upgrade assurance in their service contract? Some customers don’t opt for it at first because they don’t think they need it. But the complexity of today’s IT world has greatly increased. To obtain exchange of data between a physical access control system and other systems such as SQL Server and interfaces, updating an access control system is mandatory. That’s why upgrade assurance in physical security is just as relevant as in the world of IT. What characteristics should a physical security system have to ensure it integrates easily with IT systems? When selecting a physical security system to add to our portfolio of IT solutions, we looked at database structures and the role of software and hardware. When we checked Nedap’s AEOS system, we found its principles are very similar to those in the IT world. For example, the system is based on generic IP-controllers in combination with behavioral software components. This makes it possible to build a system according to a customer’s specific requirements – a bit like Lego. Some time ago, a customer asked us if we could add Airlock functionality to a complex entrance situation. He’d already asked his access control supplier for the cost to develop this and they quoted 40,000 euros. With a system like AEOS, which is based on software components, we could have just configured a software solution that he could adapt himself. This would have cost less than 10 percent of the price. So AEOS is as beneficial to customers as it is to us; maintaining it is easy and cost-effective. We’re truly happy being a certified Nedap Business Partner.
Uncoupling software from hardware allows manufacturers to respond faster to changes Nedap Security Management 2014/2015 Review and Forecast:Threats such as Mifare hacking, the European General Data Protection regulation coming in 2016, and the need for security to integrate with other IT-based systems – these are just some of the challenges security manufacturers and system users have to deal with and respond to. External factors such as these do provoke change in physical security systems, but it’s reactive change. Whereas, in the IT world, innovation and product development occur quickly and proactively. So why do manufacturers of physical security systems have a more reactive attitude towards the changing world? Why does it take external pressure to bring about innovation? Hardware and SoftwareThe physical security industry doesn’t seem to have caught up with the idea that systems should be developed to meet future change. With almost any current physical security solution, dedicated software and hardware combine to provide specific functionality. A change in functionality, therefore, requires both software and hardware development. Such systems don’t allow for fast responses to changes affecting the industry. And they don’t anticipate future needs. From a client’s perspective, systems based on dedicated hardware and software require significant investment for changes to be made, making them inflexible and expansion unnecessarily expensive. Decoupling In The Physical Security IndustryIn IT, the decoupling of hardware and software has been a proven principle for many years, and so has the use of open standards. The latter approach is now being adopted by the physical security industry. Almost all video management systems and cameras, for example, have adopted ONVIF standards. And, from an access control perspective, card technologies and readers are interoperable. Recently, a new standardization protocol was introduced for integrating offline locks within access control systems(Standardized Offline Access Application – SOAA). The paradox is, the use of generic hardware will make it easier to implement these standards, as it only requires development of software not hardware. In IT, the decoupling of hardware and software has been a proven principle for many years, and so has the use of open standards Hardware And Open StandardsThe adoption of these standards offers many benefits to security system users, of which freedom of choice and dealing with legacy might be the most important. Introducing standards allows clients to mix and match not only the cameras they need or the card readers that best fit their budget, it also allows them to select the specific functionality that suits their security policy. The adoption of both generic hardware and open standards will benefit clients significantly and, in fact, transform the industry. Uncoupling software from hardware allows manufacturers to respond faster to changes. Moreover, it will allow for innovation, as the time to get new products and features to market will decrease. This will allow the entire security industry to react to change quicker, and it will also encourage the industry to be proactive and innovative. The adoption of open standards will, ultimately, result in a different type of competition. Openness will make products more transparent and create fair competition focused on added value, unique features, product usability, design and innovative ideas, instead of hardware prices.Physical Security Like IT Networks Nedap believes physical security systems should behave like an IT network and it should be possible to embed it into your existing IT architecture. That’s why 15 years ago, we decided to separate software and hardware on the controller. That means we can both define the functionality of the hardware through the software and also easily adapt that functionality to changing requirements and needs. Just like you would expect from your computer. We continue to develop this security management platform on every level by improving the AEOS software and hardware. Our new cost-effective hardware line, AEOS Blue, puts all the functionality of the AEOS software in your hands. See the full coverage of 2014/2015 Review and Forecast articles here
SourceSecurity.com’s Expert Panel covered a lot of ground in 2017 about a variety of topics resonating in the security market. The most-read Roundtable discussion in 2017 was about a familiar and ongoing debate: What is an open system? Other hot topics that made the Top-10 list of Roundtable discussions included smartphones, buzzwords, standards and product life cycles. Here is a listing of our Top 10 Expert Panel Roundtable discussions posted in 2017, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2017 (including the quotable panelists named below). 1. What is an open system? Is there a consensus in the marketplace on the definition of “open?” "Being truly ‘open’ means going above and beyond when designing your product line, keeping in mind the ability for end-users to easily interface your product with other open-platform solutions. That's why offering an open-platform design must be coupled with the ability to provide exceptional support through training, follow-up and innovation as they are brought to market.” [Mitchell Kane] 2. How are smartphones impacting the physical security market? "The security protocols on phones (such as fingerprint readers and encryption) have become some of the strongest available to consumers and are regularly used to access essential services such as banking. With this level of trust and user convenience from mobile device security, it makes sense to produce physical security systems that also take advantage of it." [John Davies] TDSi's John Davies says it makes sense to produce physical security systems that take advantage of trust and user convenience on mobile devices 3. What is the biggest missed opportunity of security systems integration? "Integrators need to be more savvy on how they can meet their customers’ IT and surveillance goals, from both a technology and services perspective. Being knowledgeable about new innovations can help integrators sell infrastructure, keeping that piece of business rather than losing server sales to a customer’s internal IT department. Integrators are tasked with ensuring surveillance customers can benefit from best practices, and solutions proven in the world of IT offer significant benefit." [Brandon Reich] 4. What are the security industry’s newest buzzwords? "End-to-End Security is a buzzword reflecting how cyber threats are increasing and the importance of ‘the security of security systems,’ especially for companies operating in the critical national infrastructure. Convergence has been a ‘hot topic’ for years, but has it really happened? In order to create true end-to-end security solutions, IT and physical security best practices need to be combined." [Arjan Bouter] End-to-End Security is a buzzword reflecting how cyber threats are increasing, says Arjan Bouter 5. What technology will have the greatest impact in the second half of 2017? "Cloud-hosted access control is poised to have the biggest impact in the second half of 2017. Organisations are looking to decentralise IT management and eliminate the need for overhead costs in hardware infrastructure and ongoing maintenance costs. This decentralisation is driving them to migrate their day-to-day systems to the cloud, and access control is no exception." [Melissa Stenger] 6. Are mergers and acquisitions good or bad for the security industry? “On the ‘pro’ side, consolidation is good for pulling together a fractured market, as vendors try to gain market share by acquiring solutions they may not otherwise have in their portfolio. On the ‘con’ side, however, consolidation restricts or limits innovation as the merged vendors strive to develop end-to-end solutions that reduce customer choices" [Reinier Tuinzing] 7. What new standards are needed in the security marketplace? "Do we need that many new standards, or do we need the industry to embrace the standards that are already in place? I believe that current standards like ONVIF and OSDP are sufficient in what they offer the industry. Members of the security industry just need to start thinking outside the box and realise that it is with standards in place that real industry growth can occur." [Per Björkdahl] 8. What will be the big news at ISC West 2017? "Security solutions that capture greater data and utilise analytics to transform the data into useful information, or business intelligence, will be the talk of the industry at ISC West this year. It’s not just about surveillance or access control anymore, but about who can best assess the end user’s interests and deliver an end-to-end solution that provides a value beyond the technology and a service beyond security.” [Richard Brent] When buying cameras, customers are often lured by lower upfront costs, but may end up paying more in the medium- to long-term because of lower quality, says Oncam's Jumbi Edulbehram 9. Why should a customer continue to buy “premium” surveillance cameras? "When buying cameras, customers are often lured by lower upfront costs, but may end up paying more in the medium- to long-term because of lower quality (requiring costly site visits and replacements), susceptibility to cyber-attacks, or lower quality of integrations with video management systems. Customers should certainly be prudent buyers and make sure that they’re paying for actual reliability/features/functionality rather than simply paying a premium for a brand-name product. When functionality and reliability are important, it always makes sense to ‘buy nice, not twice.’ [Jumbi Edulbehram] 10. What is an acceptable life cycle for a physical security system? "The answer to this question clearly depends on the seat you sit in. Manufacturers, integrators, distributors, consultants and engineers all have extremely different perspectives on this question. As a manufacturer, we design systems to have a lifecycle between 5 and 7 years." [Robert Lydic]
Recently, Nedap has released software version 3.2 of its AEOS security management platform. To anticipate more quickly to emerging risks and threats organizations face nowadays, Nedap launches new software releases of its AEOS integral security management platform regularly. This enables Nedap to offer customers a secure product that always meets the latest requirements, while enhancing reliability and quality. As security systems are becoming more and more integrated, Nedap has invested in open standards and various third party integrations. In just a year time, releasing regularly has resulted into a lot of improvements, adding value for end users by providing better functionality. “We have improved our integral security management platform’s functionalities at various levels. When it comes to access control, we are always the first to support the latest card technologies, including the Dutch Rijkspas program.” states Arjan Bouter, Sales Director at Nedap Security Management. Supports Integrations With Third Party Solutions AEOS enables various integrations with third party solutions, such as the AXIS Network Door Controller A1001 or the Commend intercom. This allows end users to get a complete security solution. Furthermore, the SimonsVoss SmartIntego digital locking system has been integrated. Bouter: “Apart from the SimonsVoss SmartIntego, we also integrate all OSS Standard Offline compliant locks from ASSA ABLOY and Uhlmann & Zacher. As one of the founders of OSS, we’ve implemented this standard for offline locks in our platform. We support both Mifare and Legic cards. This way customers can mix and match offline locks and don’t have to deal with vendor lock-in. It offers ultimate freedom.” Niek Bragt, Channel Partner Manager stresses the importance to facilitate integrator installers. “We have eased the installation of our AEOS system for integrator installers by launching AEOS Blue. This latest generation of the AEOS platform comprises of a powerful hardware line, combined with a simplified software license model. It allows integrator installers to calculate quicker with less risk, win projects on price and at the same time create added value for customers.”
The ASIS Welcome Party, powered by Nedap will take place on 29 March 2015 in Frankfurt, Germany Nedap and ASIS International recently signed an agreement, which states that Nedap is to organize the ASIS Welcome Party on the eve of the 14th ASIS European Security Conference & Exhibition in Frankfurt. ‘Nedap organized the ASIS Welcome Party in The Hague for the first time last year. During the evaluation of this we quickly agreed that Nedap should do this again in Frankfurt,’ said Michiel Gen, Director EMEA & APAC from ASIS International. ‘We noticed that there is a real need among conference visitors to meet each other in an informal setting on the eve of an ASIS European Security Conference & Exhibition. Most people do know each other, but don’t see each other often. What’s more, “new” security professionals attend every year, who are finding their way in the ASIS network. Nedap wanted to facilitate an informal networking opportunity and has been our exclusive partner since last year.’ Arjan Bouter, Nedap Sales Director, added: ‘Today, security professionals are being challenged more rigorously and having the right contacts is indispensable. That is why we are delighted to offer a platform that gives them the opportunity to exchange ideas with each other in an informal setting. The idea of doing this during the ASIS European Security Conference & Exhibition evolved naturally. This year we are delighted to provide this opportunity again in Frankfurt in a surprising and challenging ambiance, close to the hotels and the trade fair.’ The ASIS Welcome Party, powered by Nedap will take place on 29 March 2015 in an accessible networking setting on the eve of the 14th ASIS European Security Conference & Exhibition in Frankfurt.
Nedap has been ASIS' exclusive partner since last year ‘Nedap organized the ASIS Welcome Party in The Hague for the first time last year. During the evaluation of this we quickly agreed that Nedap should do this again in Frankfurt,’ said Michiel Gen, Director EMEA & APAC from ASIS International. ‘We noticed that there is a real need among conference visitors to meet each other in an informal setting on the eve of an ASIS European Security Conference & Exhibition. Most people do know each other, but don’t see each other often. What’s more, “new” security professionals attend every year, who are finding their way in the ASIS network. Nedap wanted to facilitate an informal networking opportunity and has been our exclusive partner since last year.’ Arjan Bouter, Nedap Sales Director, added: ‘Today, security professionals are being challenged more rigorously and having the right contacts is indispensable. That is why we are delighted to offer a platform that gives them the opportunity to exchange ideas with each other in an informal setting. The idea of doing this during the ASIS European Security Conference & Exhibition evolved naturally. This year we are delighted to provide this opportunity again in Frankfurt in a surprising and challenging ambiance, close to the hotels and the trade fair.’ The ASIS Welcome Party, powered by Nedap will take place on 29 March 2015 in an accessible networking setting on the eve of the 14th ASIS European Security Conference & Exhibition in Frankfurt.
Nedap launches AEOS 3.1.4, introducing intercom integration with Commend intercom. As a result of this integration AEOS not only instantly shows who is at the door, but at the same time verifies this person via the intercom. Controlled access can subsequently be given. ‘Giving controlled access is one of the tasks most frequently performed by receptionists and security guards’, says Arjan Bouter, Sales Manager at Nedap. ‘In the Graphical Alarm Handler of AEOS they already had direct control of sensors, doors and cameras and now an intercom has been added to that. With this intercom integration of one of the major suppliers of Critical Communication Systems, the user has full control when providing access. Moreover, for control afterwards, this solution simply provides complete insight into which operator gave access via which intercom, including the accompanying video recordings. Post-event control has never been this easy’. AEOS is an integrated solution for security management that combines access control, video management, locker management and intercom into one platform. By integrating intercom into AEOS, Nedap and Commend offer a comprehensive and compact solution for companies and organizations.
At IFSEC, Nedap will demonstrate the world’s first software based security management platform: AEOS Nedap Security Management, developer and manufacturer of the first software-based security management platform – AEOS, is collaborating with different security professionals at IFSEC to solve security challenges that IFSEC visitors are facing. Security experts such as prominent security consultants and Physical Security Managers from leading organizations, collaborate with Nedap to share their knowledge and experience with visitors during IFSEC. Visitors are invited to discuss and find answers to their security challenges at Nedap’s social hub: stand E1450 in the London ExCeL. “IFSEC is a social event for security professionals to meet, find new ideas and solve challenges - and that’s exactly what we’ll be offering”, says Daryn Flynn, Nedap’s country manager for the UK. At IFSEC 2014 Nedap are collaborating with experienced security professionals to discuss, debate and offer solutions to your challenges. Besides answering questions and sharing knowledge, prominent security experts from Perpetuity Research & Consultancy International, Atkins Consultants Ltd., CHQ Consultants, Canon and Assa Abloy are hosting seminars on the stand to discuss challenges that are current in the industry, e.g.: the convergence of IT and physical security and the value of security to the business. At IFSEC, Nedap Security Management will demonstrate the world’s first software based security management platform: AEOS. AEOS uses generic controllers which can accommodate functionality for access control, intrusion detection, video management and locker management via software. This unique AEOS architecture allows for one truly integrated, flexible platform instead of drivers linking separate servers and systems. "IFSEC is a social event for security professionals to meet, find new ideas and solve challenges - and that’s exactly what we’ll be offering" The new AEOS 3.1 application builds on the usability of AEOS, giving a unified design, while keeping in mind the different users. From the Configuration & Maintenance application to the Identity & Authorization interface – AEOS maps to the way people actually work. This also applies to AEOS Surveillance, this renewed web application gives users a clear overview at all times. This clarity reduces the chance of mistakes, while increasing security and responsiveness. “The response to AEOS 3.0 has been incredible, and we’re excited for clients to experience the new AEOS 3.1 with a clear and consistent design for all applications," said Arjan Bouter, Nedap’s director of sales. “Our clients need to protect their people, property, intellectual assets and reputation. And with AEOS 3.1 we believe customers can focus on what is most important – a secure environment.” The new 3.1 application will be demonstrated at IFSEC, showing visitors the possibilities for managing access control, intrusion detection, video management and locker management on one single platform, within one single application. A team of Nedap experts will be available on stand E1450 to meet with visitors and answer any questions.
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload