Electronic access control, integrated security systems
Round table contributions
The security industry is full of individuals who call themselves consultants. It’s a term that is thrown around rather loosely, and in some situations the term can be roughly translated as “between jobs.” But “real” consultants provide real value to their clients in a variety of subject matter specialties. We asked this week’s Expert Panel Roundtable: What role should consultants play in the security technology buying decision?
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
Cybersecurity continues to be a major theme in the physical security industry, but effective cybersecurity comes at a cost. Higher cost is contrary to another major trend in the market: lower product pricing, which some have characterized as a ‘race to the bottom’. Chinese manufacturers, whose products tend to have lower prices, have been the target of cybersecurity concerns and even a government ban. So what is the overall impact of cybersecurity on pricing trends in video products? We asked this week’s Expert Panel Roundtable: Are cybersecurity concerns slowing down the ‘race to the bottom’ (i.e., the dominance of lower-cost cameras)?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Employee turnover is a problem for many companies, especially among younger employees who have not developed the philosophy of employer loyalty that was common in previous generations. Nowadays, changing jobs is the norm. The idea of spending decades working for a single employer seems almost quaint in today’s economy. However, excessive employee turnover can be expensive for employers, who are looking for ways to keep their brightest and best employees happily toiling away as long as possible. We asked this week’s Expert Panel Roundtable: How can the physical security market promote better employee retention in a competitive employment environment?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Physical security technologies operate successfully in many different markets, but in which markets do they fall short? Physical security is a difficult challenge that can sometime defy the best efforts of manufacturers, integrators and end users. This is especially the case in some of the more problematic markets and applications where even the best technology has to offer may not be good enough, or could it be that the best technology has not been adequately applied? We asked this week’s Expert Panel Roundtable to reflect on instances when the industry may fall short: Which segments of the physical security industry are most under-served and why?
There is no expectation of privacy in a public space. That’s the premise on which most video surveillance applications are justified. But new concerns about privacy, specifically the General Data Protection Regulation (GDPR) in Europe, are changing expectations. And what if a camera must be positioned where a private area happens to be within its range? Fortunately, there are technology approaches to solving these dilemmas, as our Expert Panelists explain. We asked: What new technologies are helping video systems overcome concerns about privacy?
Artificial intelligence (AI) is a current buzzword in the physical security market – and the subject of considerable hype. However, AI sometimes get negative press, too, including dire warnings of its potential and eventual impact from some of our most prominent technology thinkers. We decided to take the issue to our Expert Panel Roundtable with this week’s question: What are the negative impacts and/or new challenges of AI for physical security?
The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?
The beginning of the school year and upcoming seasonal changes remind us that demand for security systems, like almost everything else, is seasonal to some extent. Making improvements to educational facilities during the summer months – including installation of security systems – is the most obvious example of seasonal demand, but there are others. We asked this week’s Expert Panel Roundtable: Which vertical markets for security are impacted by seasonal changes in demand?
By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the form of smarter video cameras and other devices that store and/or process data locally. We asked this week’s Expert Panel Roundtable: What’s new “on the edge” of security and video surveillance systems?
Video cameras are everywhere, and hundreds more are installed every day. Our society appears to be reaching a point of perpetual surveillance. It certainly feels as if we are always being watched even though it is not yet the case. But as cameras are becoming more common than ever, we are also entering a new era of privacy concerns and sensitivities, as evidenced by GDPR and other such initiatives. We presented this quandary to this week’s Expert Panel Roundtable: Surveillance cameras can go anywhere, right? Where is it “not OK?”
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
Finding the exact right technology to solve an end user’s problem is challenging, but the rewards are great when an integrator gets it right. A wide range of available product types, price levels and added features increases the likelihood of identifying a technology to solve any problem. But with so many technology and product choices in the marketplace, identifying that one solution can be akin to finding a needle in a haystack. We wondered whether a vast range of product choices is always a good thing. We asked this week’s Expert Panel Roundtable: Are security integrators and end users overwhelmed by “too many choices” related to security equipment and systems? How can they make sense of it all?
Articles by John Davies
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable Advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorized user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted Part Of Security Network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorized user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorized individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security By Location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal Items Using QR codes seem to be a simple but reliable identity and access control authentication optionMobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost Savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated Technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading Existing Security Systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid Systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organizations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing The Benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
The way we purchase services and products is changing. The traditional concept of buying and owning a product is giving way to the idea that it is possible to purchase the services it offers instead. This approach has come from the consumer realisation that it is the outcome that is important rather than the tools to achieve it. For example, this approach is evident with the rise of music streaming services as opposed to downloads or physical products. With the physical security industry becoming ever more integrated – and truly open systems now a reality – there is every reason to assume this service-lead trend will come to dominate the way our industry interacts with its clients as well. Interest In Service-Based Security There is a significant change of mindset that the security industry needs to embrace before a large-scale move to Security as a Service can take place. Like many technology sectors in the past, security providers have focussed on ‘shifting boxes’ as their definitive sales model. This approach was especially prevalent when proprietary systems were the mainstay of the security industry. Essentially, if the customer wanted more services they simply bought a new product. This was a straightforward and economic sales approach for manufacturers and installers alike.The security industry needs to embrace a change of mindset before a move to SaaS can take place The flexibility of integrated and open technology has changed the way consumers view their purchase, so it shouldn’t be any surprise that there is increased interest in a service-based approach. Customer choice equates to a change of focus and interest, with physical products being eclipsed by the benefits of the overall solution. We have already seen these changes in other technology areas, notably with smart devices and general IT systems. Cloud-based services put the onus on the result rather than which device the user chooses. This approach is even starting to manifest in areas that couldn’t have been predicted in the past, such as the car industry for example. Consumers are focusing more on the overall costs and convenience of buying a car over the specific specification of the vehicle. Equally, urban dwellers don’t necessarily want the hassle and expense of owning and parking their own vehicle anymore. If you don’t use it every day, it can make more sense to rent a vehicle only when you travel beyond public transport. For these consumers the car has become a service item for a specific journey. Benefits For End Users At the heart of this approach is the simple equation that consumers have a need and suppliers need to provide the most cost-effective, and easiest, solution. At the same time, the security operator may not necessarily want to know (or care) what specification the system has, they just want it to perform the task as required. By discussing with consumers, we can ensure we work even more closely with them to provide the expert support they need and deserve Most security buyers will identify the specific business needs and their budget to achieve this. This is where a service approach really comes into its own. Customers need expert advice on a solution for their requirements which takes away the stress of finding the right products/systems. In the past there was always a risk of purchasing an unsuitable solution, which could potentially be disastrous. The other issue was having to budget for a big capital expenditure for a large installation and then having to find further resources once an upgrade was due when systems went end of life. Most businesses find it far easier to pay a sensible monthly or annual fee that is predictable and can easily be budgeted for. A service model makes this far easier to achieve. Great Opportunities As well as the benefits for end users, there are considerable benefits for security providers too. Rather than simply ‘shifting boxes’ and enduring the inevitable sales peaks and toughs this creates; a service sales model allows manufacturers and installers to enjoy a more stable business model. You don’t have to win new business with every product, but rather sell ongoing services for a set period. Its highly likely that the whole security industry will start to take this approach over the next few years. Manufacturers are already well aware of this shift in customer expectations and are changing their approach to meet demands.There are major opportunities on offer in return for a change of perspective in the security industry With the service and leasing approach already firmly entrenched in other industries, this is well proven in a consumer market. The airline industry is a great example. Manufacturers understand that airlines need flexibility to upscale and downscale operations and therefore whole aircraft and even individual key components (such as engines or seating) can be leased as required. Using this approach, airlines can concentrate on what customers demand and not worry about the logistics of doing this. Manufacturers and leasing businesses provide assurances and guarantees of service time for aircraft and engines, taking care of the servicing and maintenance to ensure this delivery. This approach is just as well suited for the provision of security systems. Servicing The Future Security Market Undoubtedly there are major opportunities on offer in return for a change of perspective in the security industry. However, this will involve substantial changes in some quarters to ensure the business model is aligned with the market. Overall, the security industry needs to not only develop the right systems for the market, but also to deliver them in the right way as well. This will ensure we work even more closely with customers to provide the expert support they need and deserve.
The threat of international terrorism has changed the way the domestic security industry thinks about protection, just as much as it has for national security services. While violent attacks and terrorism were once predominantly aimed at government, military or political establishments, an uncertain global political climate means the ability to rapidly lock down facilities has risen to the top of any organization’s security wish list. In reality though, just how easy is it for most organizations to lock down their facilities at a moment’s notice? While all security systems aim to secure people and property from attacks or theft, the ability to enact a full access lockdown very much depends upon not only the individual components, but also the intelligent solutions used to oversee them. The security industry’s foresight in moving towards much closer systems integration has already gone a long way towards making rapid lockdown easier to implement and manage. However, we still need to encourage and educate our customers on the potential for working in partnership with their neighbors, to present a united front against threats. Connecting The Dots Those of us in the security sector can do a lot towards raising customer awareness of the potential for using a lockdown facility. Undoubtedly PSIM is now commonplace for many security operators and this is ideal for implementing lockdown procedures. CCTV and intruder alarms are perfect for automatically triggering access control at any required time. It is all too easy for some organizations to make the dangerous assumption that they are at low risk from intruders or attacks If a security operator is already using these solutions, it is relatively easy for them to employ lockdown using the right situation control software. However, security providers also need to be aware of customers’ installations which lack this essential joined-up thinking. All businesses and organizations can be a potential target for attacks and we have a responsibility to make sure security investments are being used to their full potential to prevent this. Being able to automatically trigger an instant lockdown response is key. Reaction times in these instances can literally make the difference between life and death. Project Griffin Scheme Attacks in recent years have highlighted a broader issue - terrorists and criminals may target geographical areas as much as individual sites or organizations. Recognizing this tactic, and to help combat this threat, the UK Government runs the Project Griffin scheme which aims to encourage businesses and organizations to think and act together to prevent and tackle threats. We need to ensure our customers have the right solutions in place to aid this approach. These not only help to minimize their own threats, but also make it much easier for various security teams to work in collaboration with, or in consideration of, their neighbors and the local and national security services. Anticipating Potential Threats A big change in the way security operators think and react in recent years has been the understanding that potential threats can materialize and become real very easily and quickly. Essentially, you can never over-plan to deal with threats! The recent trend of terrorist attacks has been to target places with large gatherings of people It is all too easy for some organizations to make the dangerous assumption that they are at low risk from intruders or attacks. However, if a facility requires security, then the site is definitely at risk of an attack. The recent trend of terrorist attacks has been to target places with large gatherings of people, such as stadiums, bars/restaurants and entertainment venues etc. The rationale behind this is that these sites attract large numbers of people and require easy public access – which is exactly what makes them an ideal target for terrorism. Traditional High Security Users These types of sites can learn a lot from the security deployment and tactics utilized by traditional users of high security, such as prisons, hospitals, rail stations or airports. Undoubtedly many large public spaces now deploy a degree of PSIM or fully integrated security technology, which ensures that these systems and access control measures will already be successfully collaborating. It still requires careful planning to achieve the right lockdown regime, however. This is an area where security experts can really make a big difference. Installing the right lockdown protocol is as much about design as implementation – understanding how intruders will move around a facility and what areas will prove to be crucial in repelling or containing them. It is important that we demonstrate the importance of understanding the full picture, how technology can be used in conjunction with business plans and security protocols, and how this is something that hugely benefits from the input of professional expertise. Communication Is Vital As well as containing and defending against security threats, any lockdown process also needs to effectively manage the situation and communicate with staff and visitors that could be vulnerable to it. While technology is vital in this equation, the human element cannot be underestimated. It is always essential to align the implementation of any security systems with staff training - both security teams and all the other departments In all the excitement, the triggering of a lockdown can also potentially cause a lot confusion, especially for visitors. Therefore, it is always essential to align the implementation of any security systems with staff training – both security teams and all the other departments. Security operators need to prepare the whole organization for a lockdown in much the same way as a fire or other emergencies. As security professionals, we need to stress to our clients the importance of fully training and briefing staff on what will happen and how they need to play their part when there is an intrusion or lockdown. Working In Partnership With a noticeable blurring of the lines between domestic and defense security, the security industry is in a prime position to take the lead and show the market how beneficial our expertise can be in protecting people and assets. Terrorism and violent attacks are a sad reality throughout an unsettled world, but integrated security systems are widely available and often already in place to help tackle these threats head-on. This technology has been designed to help organizations make the most of their security investments, it just needs the right advice and planning to make it lockdown a formidable ally and powerful determent against threats. For advice on planning against and preventing terrorism threats, please visit the UK Government’s National Counter Terrorism Security Office website here. Infographic: How To Prepare For Active Shooter Incidents
There has never been closer integration between physical and logical security systems, so there has also never been greater importance when it comes to defining and maintaining the security culture within an organization. Unfortunately, with increasingly complex security protocols required on a daily basis (and used by every employee), a security regime can easily become lax through apathy – which offers the perfect opportunity for potential intruders to take advantage. While security technology is rapidly evolving, it is essential that the team it protects do so as well. It is vital that you maintain an effective security culture within a business or organization. Naturally the details will vary between organizations, but the common goal for all is to impress upon the team just how important security is. This will safeguard their jobs, the security of fellow workers and clients, and even in some cases, their personal safety. All-inclusive Security Culture In many organizations this will be a top-down approach – after all, if the company leaders don’t practice what they preach then why should the rest of the team? Human nature tends to shy away from complicated processes, especially if the benefits aren’t fully realized or explained. An apparently trivial lapse of security protocols can have big and damaging real-world consequences Clarity and honesty on the potential pitfalls and consequences of failing to secure the business can be a powerful tool in demonstrating the importance to the team. Legislation and legal ramifications, along with potential damage to the business in terms of reputation are all powerful messages. Equally, for an organization in healthcare or education, the protection of vulnerable people is also an important security consideration. An apparently trivial lapse of security protocols can have big and damaging real-world consequences. Frequently Communicated Security Protocols The ways to build up a good security culture are as individual as the organization it serves, but undoubtedly training and reminders are cornerstones of this. An important time to impart this to employees is when they join the organization, but equally it is vital to ensure the rest of the staff get a refresh on a regular basis too. This could be in the form of regular emails or internal messages in whatever form the staff prefer to receive them. Regular refresh seminars or presentations can work particularly well for businesses that regularly meet together anyway. Regular refresh seminars or presentations on an organization’s security regime can work particularly well for businesses that regularly meet together Involving Team Members In The Security Regime Another approach is to train key team members as evangelists who can then encourage their colleagues to follow best practice on a constant basis. The benefit here is that the team doesn’t just embrace the security regime when reminders are launched – they are encouraged to do so all the time. This makes potential failings less likely. The logistics of all this are totally up to the organization and the way it works – but it’s important to stress that security is of concern for everyone in the business and needs to be approached in full unity. Practical Steps To Enhance Security Many practical steps are actually relatively simple to implement. Here are some seemingly obvious things to consider which often get overlooked: Strong passwords – It is easily done – you choose a password which is either short or fairly obvious! Anyone who is trying to access secure systems or areas will undoubtedly try all the obvious passwords first. Worse still, it’s very easy to keep using the system default password. Choose a password which can’t be easily guessed and if possible add numbers or other characters to make it even tougher to crack. Have a highly secure password admin – Inevitably people will forget their passwords from time to time so its sensible to nominate a highly trusted person or team to be able to access or renew these when needed. Don’t write down passwords then leave them in full view – Again this is easily done, but having all your passwords on a post-it note on your desk is not at all secure! If it must be written down, make sure it is hidden and locked away from prying eyes – or even leave yourself a coded reminder or question so the note is only useful to you. Change passwords regularly – Using the same password for months, if not years, makes it much more likely to be stolen. Worryingly, you may not even have a warning if the intruder doesn’t use it immediately. Set a company-wide policy that passwords get changed on a regular basis and stick to it. Maintain anti-virus and software updates – These are tasks that can easily be overlooked, but it’s important to ensure software protection is as tight as the physical security around your assets. Network Security Against Outside Devices The Bring Your Own Device (BYOD) trend is another potential security worry. As a ‘back door’ for intruders, allowing staff to use their own devices, with unknown security and network access capabilities, is a potential headache. It’s important that strict security policies also cover BYOD components – and if this is not possible, it may be prudent to limit their access to your data and facilities. It may seem ironic, but the more complex security systems get, the more important it is to cover the basics Even with mobile equipment belonging to your organization, the use of other Wi-Fi and open access networks can be an unknown quantity and potentially lead to insecure points in your security network. It may be the case that only encoded data should be passed across these networks. Again, limiting their use or the data that can be shared across them is a prudent measure in the security policy. Covering Basic Security It may seem ironic, but the more complex security systems get, the more important it is to cover the basics. There is no point having the most up-to-date systems in place only to let the whole thing down with an incomplete or lacking security policy in place. When access control consisted of just a simple lock and key it would have made no sense to lock the door and then hang the key on the outside wall right next to it! This is what a poor security policy (or failure to follow it properly) boils down to. Intruders will always look for that chink in the armor, so why make it easy for them?
If all the components within a security and wider IT network have the ability to interact together, they can offer so much more than their individual capabilities The widespread use of open protocol systems is one of the most important developments in the security and safety sector for decades. With a heavy reliance upon various security softwares (even for physical security), using open systems has gone from being a desirable selling point to a necessity in the security industry in only a few years. As well as the obvious security advantages, there is potentially a whole new world of opportunities for operators, which has come to fruition with the arrival of the Internet of Things (IoT) – but at the same time, there are additional factors that need to be considered, which may not have been an issue in the past. Widespread Need For Open Protocols It may seem obvious at first glance, but this is a valid question – why does the security industry and its customers need open protocols? Put simply, if all the components within the security and wider IT network have the ability to interact together, they can offer so much more than their individual capabilities. This is certainly something which has transformed the way organizations think about their security systems and how they work in the wider context of their business systems. "Producing compatible systemsmakes it simpler and cheaper forcustomers to choose, purchaseand use the most efficientcomponents for their needs" Modern security software solutions offer a great deal of functionality and we have seen their integration transform the way security systems are developed and used. From passive, yet rather elaborate electronic doors/locks and basic CCTV over the past few decades, we now have intelligent AI and connected surveillance systems with inbuilt analytic capability which not only match, but usually outperform a human operator performing the same role. Lower Costs Another key factor in the popularity of open protocol networks is cost. Producing compatible systems makes it simpler and cheaper for customers to choose, purchase and use the most efficient components for their needs. Equally, for manufacturers and suppliers it is more cost-effective to produce standardized products. IoT is going a long way towards driving demand and the security industry has sensibly taken this on board, catering heavily for these market forces. Within the security industry itself there have also been interesting and helpful developments. The IEC (International Electrotechnical Commission) recently adopted ONVIF Profile A and C as the de-facto new international standard for access control – which will offer a truly universal benchmark for security software and hardware integration. Greater Choice Naturally open protocols also provide greater choice, offering the ability to ‘mix and match’ different components to find the most suitable and bespoke solution. This could be specialist components from a niche provider, general items that happen to fit the budget requirements or even legacy systems that the operator cannot justify scrapping. On the face of it, it may seem that older legacy systems will struggle to cope with this, but actually the flexibility of an open protocol approach means this is not necessarily the case. Modern integrated open protocol systems are often able to ‘bridge the gap’ in a way that proprietary systems simply would have failed to do in the past. It is somewhat ironic that developments in the latest technology may actually make it possible for some older systems to continue being used beyond their expected lifespan! Open protocols provide greater choice, offering the ability to ‘mix and match’ different components to find the most suitable and bespoke solution Data Mining And Analysis With open protocol systems the benefits go beyond the just the security provision. If an intelligent system is able to learn the behaviours and trends of people and property within its remit, it can predict patterns and from this help to increase efficiencies across the whole organization and its facilities. By mining the data from security systems it is possible to get a detailed picture of any controlled area and the activity going on within it. This is a powerful tool for any organization, giving an instant snapshot of people movement or the use of resources, just as much as monitoring for security threats. Additional Benefits A good example of this data analysis in practice, is the widespread integration of security with IT Infrastructure, power, lighting, heating and ventilation systems. Because access control, CCTV and intruder detection can equally check the real-time occupancy of a designated area, these sensors can advise when the correct persons are attempting to log on to the network, when environmental systems are not required thus intelligently lowering energy consumption where possible and ensuring secured access to the organizations IT network. "The ability to assess the situation makes security components the ideal ‘eyes and ears’ of more intelligent automated systems" This ability to assess the situation makes security components the ideal ‘eyes and ears’ of more intelligent automated systems. This technology is now being used to assess and report on people traffic in busy office spaces - with the allocation of hot desking assets, and space in lifts being a recent application, for example. Security and detection systems can ascertain who is entering the space, where they need to go and then direct them to the most appropriate route for their destination, be that a lift, hot desk unit or meeting room. These systems can just as easily be employed for Health and Safety – restricting access to dangerous areas or monitoring the movement and welfare of lone workers. With asset tagging, valuable items can also be monitored for movement around a facility (or indeed in and out of it). As IoT continues to grow there are many intriguing and potentially useful options waiting to be utilised. Maintaining Security While the integration potential is almost limitless, there also needs to be a note of caution. If a network can potentially incorporate any number of elements the security function needs to understand this and ensure it is not compromised. On some level this may mean restricting access for certain components or effectively partitioning the security elements of the network. This is not to say security cannot share a network and its benefits, just that the practicalities need to be considered. Another consequence of this is that security providers and operators will need to be even more aware of how their whole organization works (right down to a granular level) when it comes to further open protocol integration. This may seem somewhat daunting, but with the right planning and respect for its needs and benefits, the development and evolution of open protocol systems is set to continue being a key driving force for the security industry - offering many more benefits than disadvantages. Save Save Save
Stringent security policies are necessary in an organization to prevent incidentsof misplaced trust leading to an attack from intruders Trust is a word closely associated with both physical and logical security, after all, knowing who to trust is a key part of any security policy. However, when trust is wrongly assumed it rapidly becomes a key problem and a significant weakness in the security regime. Often the weak link is human nature itself. This means that to begin to guarantee effectiveness it’s vital to have the right policies in place and to ensure that staff follow them, however draconian they may seem to the people operating and being subjected to them. Testing Security In The Real World A good example of misguided trust was recently documented. A so-called ethical hacker was employed to test the security regime of a client company. The management deliberately kept the operation a secret from the security team and staff at the business, to assure the accuracy of the results. Initially the hacker tried to gain access through online channels, which proved to be well guarded and highly secure. The next step was for the hacker to enter the business facilities personally. This is where psychology played its part, the perpetrator kept up a friendly appearance and politely asked the reception team if he could use the toilet facilities, whereby the person behind the desk happily allowed him access to a non-public area. Bear in mind this was a complete stranger with no security credentials who had walked in off the street! Perhaps the most disturbing part of the story is what happened next - the hacker left two USB keys in the toilet area for staff or visitors to find. On each drive he had included a specially designed piece of software that would auto-run and execute once accessed via a computer, stealing login credentials from the user and covertly sending them to the hacker. This effectively offers open access to the most secure parts of the company’s network! Inevitably, somebody who found the drives tried them in their computer and the hacker was informed shortly afterwards. One example of misguided trust saw a hacker leave a USB in a company building. When an unsuspecting employee used it, malware was added to the company computer Human Nature As A Weakness To Security Policy What the example above really highlights is just how much human nature can play its part in the way security is upheld (or broken) in the real world. The hacker explained that his other choice may have been to hand the USB keys in to the reception and simply to say he had found them in the restrooms – which would, in all likelihood, have resulted in a similar outcome. It is debatable whether the staff were complacent or simply used misguided judgment on what appeared to be a harmless visitor, albeit an unexpected one. The fact the hacker didn’t appear to be personally involved with this potential threat perhaps lowered the guard of the reception and security team still further. Of course those individuals that recovered the USB keys weren’t in any way coerced into using them, but curiosity got the better of them and the fact the uploaded malware gave no indication it was present (literally just silently taking security data) meant the company could have suffered some serious problems had it been for real. Misuse Of Authorized Access The consequences of misplaced trust in a secure environment can be severe, particularly with physical and logical security being so closely tied together now. It’s all well and good having impenetrable external IT security in place, but if this level of vigilance isn’t continued on the premises it can leave worrying vulnerabilities. The example above shows how apparently good-natured assistance can be taken advantage of, but of course legitimate access can be misused by intruders in other ways too. The attacks on the Paris offices of Charlie Hebdo in January 2015 are a prime example of authorized access being hijacked, when an employee was threatened and forced to enter a code to help the terrorists gain entry and attack other members of staff. Other examples include the ‘passback’ of security tokens between individuals (to gain multiple entry) and tailgating of unsuspecting members of staff as they enter secured areas. In a highly secure facility the protection measures need to anticipate these potential intrusion methods and provide solutions to combat them. Tightened security policies can also prevent cases of people sharing accesscredentials and tailgating – both of which can be serious access security risks Security Measures For Countering Intruder Attacks The most important lesson to be learned from all of these examples is that the culture of security within an organization is vital - the entire team needs to be vigilant and involved. This culture needs to be regularly assessed and, if needs be, revised to close any gaps or potential loopholes of vulnerability. It is also not good practice to purely rely upon the intuition of staff, security or otherwise. In the ethical hacker example, there was no reason for staff to be suspicious but that is exactly how the planned attack succeeded. This is where a stringent and water-tight security policy is so important. Rather than making a judgment, staff follow procedure and a stringent policy will tell them not to simply plug an unknown USB stick into a company device or network! Added to this, staff won’t feel the same pressure to be a ‘Good Samaritan’ to unknown visitors – policy is policy and nobody will feel guilt for denying access in these circumstances. The layout of security measures within a business facility is also very important. The reception area should be inviting (as the name suggests) but it should also show a strong defense to those not authorized to enter. Access control systems also need to be resilient, with automated monitoring for signs of tailgating and people counters to alert the security team of any abnormalities. Equally, its good practice to ensure these measures extend inside the secure areas of the facility too, just in case intruders gain access through another entry point. Making Trust Trustworthy Despite the potential problems from wrongly assuming trust, it is still an essential element of all business transactions and excellent security recognises this. Taking the personal element out of security allows it to be more robust and to ensure trust is proven, rather than simply being assumed. Often the deadliest threats to security are the least obvious ones.
2014 has been a year of significant growth for TDSi TDSi 2014/2015 Review and Forecast:In 2014 we saw continued growth at TDSI, largely through unprecedented interest in integrated IP security systems. Asian markets have continued to be very buoyant, although there have continued to be some flat spots geographically, such as Europe. Compared to other technology markets, security has grown very quickly since the recession, and TDSi has enjoyed double-digit growth. Manufacturers have invested heavily in new products, especially IP and open architecture platforms, either through development or strategic acquisitions. Access control has moved out of the shadows as the “poor cousin” to video systems and has achieved a higher growth rate – which I believe will continue for at least the next three to five years along with greater symbiosis of IP security and ID management. Looking ahead to 2015, trends such as biometrics will continue to grow rapidly. Some markets believe traditional security lacks the strength to deal with theft or security breaches. Biometric systems beef up security and manage the whole process more efficiently. Some ineffective early biometrics systems left customers reticent, so the security industry needs to educate the market on the benefits, such as robust service, accuracy and user convenience. TDSi has had many significant successes in 2014 including double-digit growth figures, increased staff across all our departments (including sales and marketing) and new offices opened in Poland and Australia. A significant challenge is still in finding and recruiting the right staff to drive our expansion, particularly in the software and engineering fields. The UK education system struggles to produce enough engineering graduates. Being based in Dorset, we also find that a lot of engineering talent is drawn to London, even though we have some excellent higher education training on the south coast. There is a lot of unrealized potential in the security market, driven by evolving technology such as the Internet of Things. Software also offers excellent ROI for operators, suppliers and manufacturers. Some technologies may take a few more years to mature, but now is the time to start investing in development. There has never been a better time to be building success in the security market. See the full coverage of 2014/2015 Review and Forecast articles here
Integrated security manufacturer TDSi is pleased to announce it will be launching its new GARDiS Controller on stand SE32 at The Security Event 2019, which is being held at the NEC in Birmingham from 9th – 11th April. The new controller is the latest development in TDSi’s recently launched fully integrated GARDiS range, following the release of its base software at the end of 2018. John Davies, Managing Director of TDSi commented, “We are proud to be showcasing our latest products and services at The Security Event 2019 – specifically a working test model of our brand new GARDiS controller. This promises to be an exciting new event that will benefit from the central location at the NEC Birmingham, which has a broad appeal to visitors from across the UK and beyond.” GARDiS is designed to give powerful, yet highly user-friendly and fully-integrated security, utilizing cloud-based softwareJohn adds, “Also, the timing of The Security Event couldn’t be better as it coincides with a number of GARDiS product releases we have planned for 2019. Visitors to the event will be able to gain a broader insight into the exciting GARDiS range.” ONVIF Compatible Door Controller The new 2-door ONVIF compatible, PoE powered and web-enabled GARDiS door controller is the successor to TDSi’s well-established EX Series controller range. GARDiS is designed to give powerful, yet highly user-friendly and fully-integrated security, utilizing cloud-based software. Minimal training is required to install or use the system, reducing inconvenience and frustration along with time and associated costs. GARDiS is also a practical demonstration of TDSi’s commitment to offering a true ‘Security as a Service’ offering to the market. Reduces The Capital Costs The GARDiS software requires just a single installation for a fully web-based security and access control solution that runs as a service"John Davies elaborated, “The GARDiS software requires just a single installation for a fully web-based security and access control solution that runs as a service. This approach drastically reduces the capital costs associated with any security project, allowing the operator to pay a regular manageable fee, in return for the latest upgrades and solutions, to enjoy industry-leading security and safety protection.” John concluded, “Why not join us on Stand SE32 in Birmingham! The friendly and highly knowledgeable TDSi team will be on hand to offer general and specific project advice for installers, specifiers and security end-users. The Security Event promises to be a great opportunity to learn and understand about what the industry has to offer over the next 12 months.”
The Security Event has built a platform which is truly designed by the industry, for the industry, with game-changing collaborations with manufacturers, distributors, service providers, associations and industry leaders, industry media and complementary events. Spearheading this approach, a truly outstanding group of global companies has been selected from a range of disciplines to help shape this game-changing new exhibition. The Security Event is proud to have support of its ten founding partners - Anixter, ASSA ABLOY, Avigilon, Comelit, Dahua, Honeywell, TDSi, Texecom, Tyco and Videcon. Comelit managing director Francesca Boeris commented: “Comelit are extremely excited to become a founding partner of The Security Event 2019. The events concept and UK focus aligns perfectly with Comelit’s aims moving forwards.” Notable Security Experts The Security Event will delivery exactly what the commercial security market has been waiting for" Andy Croston, Owner/Director at Videcon Ltd echos this sentiment, “As one of the first Founding Partners to come on board we saw the huge potential of this exhibition from the very beginning. We’re certain The Security Event will delivery exactly what the commercial security market has been waiting for”. As Dahua’s UK & Ireland head of operations Ben Perkins puts it, The Security Event “Gives Dahua the opportunity to get in front of the UK market.” The event has already created a buzz within the industry and is expected to welcome over 6,000 visitors across the three days. Along with notable security experts and respected industry bodies, the event will also host around 100 security brands, including the 10 founding partners. Engaging With Security Professionals For these companies to come on board as founding partners reaffirms the goals of The Security Event as a concept, with a vision to create a dedicated platform that levels the playing field, enabling exhibitors, installers and end users alike to reconnect. “We believe The Security Event is exactly what the UK security industry needs and are excited to come on board as a founding partner” says Gareth Ellams, ASSA ABLOY Group Sales Director. He continues, “At ASSA ABLOY, we are looking forward to the opportunity to engage directly with security professionals as well as end users, to present our solutions.” The Security Event is proud to host a tailored education program, featuring professionally accredited seminars, designed specifically for UK security professionals in the trade and their end users. Innovation Theatre To Host Seminars All ten founding partners will be welcomed into our Innovation Theatre hosting seminars on a broad range of disciplinesDelivered across three theatres, industry bodies, technology leaders and renowned experts will provide the latest industry developments and technology updates. As well as participating in the exhibition itself, all ten founding partners will be welcomed into our Innovation Theater hosting seminars on a broad range of disciplines. Location is of huge importance to The Security Event and was a key deciding factor for many of the founding partners also. Gordon Morrison, Sales Director, Access & Video, GB, Tyco Security Products recognizes that, “The opportunity to take an active role as a Founding Partner in an industry event at the location that so many of our customers consider ‘home’ was extremely welcome”. John Davies, TDSi Managing Director also says: “We look forward to meeting our partners and customers in the heart of the Midlands again in 2019.” Excellent Opportunity To Showcase Products The Security Event will be the first time a major security exhibition has been held at the NEC Birmingham for more than five years and many feel the NEC has always been the true home of UK Security. Texecom marketing director Clym Brown agrees: “We’re partnering with The Security Event because it gives us the chance to reconnect with our installer base in the Midlands and North of the country.” This event provides an excellent opportunity to showcase our security portfolio and enhance our relationships with installers"Mick Goodfellow, GM Honeywell Security EMEA also expresses his delight at joining: “This event provides an excellent opportunity to showcase our security portfolio and in a location that allows us to enhance our relationships with our installer base.” Connecting With Integrators Jarod Booth, Strategic Relationship Manager of Anixter shows his support “There is a gap in terms of opportunities to connect with integrators, end-users and installers outside of London and the South of England, and we feel that the location of The Security Event will help bridge that gap.” With 10 of the world’s most recognized security brands supporting the development and launch of the first edition, the industry can be assured that The Security Event will be the place to do business going forward.
John Davies, Managing Director of TDSi commented, “Our Poole facility is at the heart of TDSi’s UK and international operations, the vital hub for our worldwide distribution, sales and support. As such, Nicky has an important role in ensuring TDSi continues to offer top-class service to our customers and partners.” Best security solutions Nicky also commented, “I am very pleased to be joining the TDSi team and to be overseeing our key Poole facility. TDSi’s team has built a highly impressive brand and well-deserved reputation over the years for delivering the best security solutions, so it is exciting to be taking on this key role.” Nicky’s career has seen her take on responsibility as Office Manager / PA for a prominent propertyBefore joining TDSi, Nicky’s career has seen her take on responsibility as Office Manager / PA for a prominent property and construction surveying services organization, covering a wide variety of tasks including HR, Finance and PA to the Chief Executive. More recently, she has also worked for a Housing Association, supporting the directorial team and helping vulnerable adults across the South West. Long-serving employees Living and working in the area, Nicky has a strong connection to the region beyond her professional career, including her football allegiance, “I am a season ticket holder at AFC Bournemouth, passionately attending all home games and traveling around the country supporting the Cherries at their away fixtures.” Nicky concluded, “TDSi has a highly professional but relaxed and friendly atmosphere, with a high number of long-serving employees as a testament to this. I am excited to be part of the team and to be supporting the company in its continued growth and evolution.”
Integrated security manufacturer TDSi will be appearing with distribution partner IPTEC on Stand SA-B27 at Intersec Dubai 2019, from 20th-22nd January. TDSi will be showing its newly released GARDiS software, along with the EXgarde Enterprise integrated security management solution, its range of controllers and discussing its forthcoming incorporation of Bluetooth Low Energy readers and mobile credentials into the TDSi product portfolio. John Davies, Managing Director of TDSi commented, “Intersec Dubai is always a key event at the beginning of the year and we are very excited to be showcasing our new GARDiS software in the region for the first time in 2019. It was launched just last month for download and is the second part of the GARDiS range of products more of which will be released in due course.” Understanding Latest Security Technology IPTEC’s expertise offers a great opportunity for visitors to discuss their specific requirements and to get a better understanding of the latest security technology"John continued, “We are also honored to be appearing as part of the IPTEC stand this year. As an expert local distributor, IPTEC’s expertise offers a great opportunity for visitors to discuss their specific requirements and to get a better understanding of the latest security technology on offer, such as our fully integrated systems.” Held in Halls 1 – 8 at the Trade Centre Arena and Sheikh Saeed Halls 1 – 3 at the Dubai International Convention & Exhibition Centre, Intersec attracts exhibitors and visitors from across the Middle East, Asia and beyond. It is also an important indication of what to expect in the security market in 2019. Offering Best Support And Services To Users John added, “The security market in the Middle East has witnessed renewed growth since the event last year, particularly from governments looking to invest further in infrastructure. It’s a significant export market for TDSi and we rely heavily on our local partners such as IPTEC to ensure we can offer end users the best possible support and services.” Intersec Dubai highlights market demands and trends for the coming year, something which is highly important to TDSi as John Davies concluded, “This event gives us a greater understanding of the needs and demands from this very important security market. If you are attending the event, come and visit myself and the team on Stand SA-B27, we will be delighted to discuss your specific requirements and give you a demonstration of our powerful and highly flexible product range.”
The security marketplace is talking about a lot of different subjects. Our website’s Expert Panel Roundtable discussions in 2018 reflected some of the “hot topics” in the industry. The very most-clicked-on Expert Panel Roundtable discussion in 2018 was about privacy issues and GDPR’s impact on physical security systems. Other hot topics that made the Top-10 list of roundtable discussions included obstacles to adoption of mobile credentials, what’s new “on the edge,” and the value of physical security data. Here is a listing of the Top 10 Expert Panel Roundtable discussions posted in 2018, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2018 (including the quotable panelists named and linked below). 1. How do privacy issues and GDPR impact physical security systems? "GDPR specifically restricts the capture and use of EU residents’ personal data and is in direct conflict with the adoption of artificial intelligence (AI) platforms to track individual activities. The challenge for manufacturers will be to design solutions capable of capturing valuable information for security or business intelligence purposes while simultaneously anonymizing retained data.” - Peter Strom, March Networks 2. What are the security challenges of the hospitality market? "The primary challenge the hospitality industry faces is the fine balance between the delivery of exceptional customer service and maintaining a safe and secure environment. The industry sees a range of threats, including theft, terrorism and natural disasters, and more modern risks, such as those related to cybersecurity, liability and compliance." - Jumbi Edulbehram, Oncam 3. Where is it inappropriate to install video cameras? "The most obvious examples would be in bathrooms or bedrooms, but the more interesting cases are those that are not so obvious – such as religious institutions like a church or a mosque. An increase in the boldness of would-be thieves has led to a recent rise in surveillance outside of houses of worship." - Stuart Rawling, Pelco by Schneider Electric 4. What technology will impact security most in the rest of 2018? "The hottest trend we are currently seeing in 2018 is the continued adoption of intelligent devices and automation into the security framework. We have embraced a model where our software and hardware components continually get smarter and easier for security and IT teams to manage and deploy." - Stuart Tucker, AMAG Technology 5. What are the obstacles to adoption of mobile credentials for access control? "Mobile credentials have been slow to take off because legacy readers traditionally did not have Bluetooth or NFC capacity. However, upgrade kits will soon be available from some access control vendors, and customers will be able to easily upgrade their readers." - Derek Arcuri, Genetec 6. What’s new “on the edge” of security and video surveillance systems? "As more powerful in-camera chipsets are developed, edge devices are capable of even more powerful analytics that can inform operators in real-time of events requiring attention. Part of this significant evolution is from a form of artificial intelligence (AI) called deep learning." - Paul Kong, Hanwha Techwin America 7. Are integrators and end users overwhelmed by too many choices? "Being proactive in tracking new developments and networking with like-minded professionals are critical. Find out what your colleagues are using or testing, and get their feedback on what is working well, especially if their organization is similar to yours. Join local groups, attend industry conferences, and connect on social media to compare notes on emerging technologies." - Brandon Reich, Pivot3 8. What role does social media play in promoting security? "Social media can help us reduce false police dispatches by drawing in a personal circle of people that can validate an alarm, whether it be a neighbour looking out their window to see what’s going on, or a family member that knows your travel plans and is taking care of your house." - Wayne Jared, 3xLOGIC 9. How should your security company measure total cost of ownership (TCO)? “When looking at TCO you need to consider the obvious initial capital cost – compared to alternatives – and also the operational costs across the lifespan of the systems, across one, three and five years. On top of this, though, security can add additional value through integration.” - John Davies, TDSi 10. What is the value of physical security data? "While active protection is the primary job of a security system, the data generated by today’s networked solutions can provide a wealth of intelligence to help organisations optimize both their security strategies and their business operations.” - Mark Perkins, Boon Edam
Integrated security manufacturer TDSi is proud to announce the launch of its new GARDiS Access Management Software. The powerful solution is available for free download to registered users, directly from the TDSi website. The GARDiS Access Management Software is a new user-friendly solution which improves secured accessibility. It offers ease of installation and features a user-friendly interface that has been developed specifically to accommodate many varied users, from security installers to IT managers. Optimal Security As A Service Model John Davies, Managing Director of TDSi commented, “The launch of our GARDiS software is only just the introduction to our exciting new GARDiS range. The software will be followed by a complete selection of GARDiS hardware products, all of which are designed to fully integrate with the latest in cloud-hosted security solutions.” John added, “We believe the GARDiS range will be a significant game-changer in the way security systems are installed and operated. With rapid and simple deployment and the provision of a stringent security solution, it also provides the perfect Security as a Service (SaaS) model, which will transform the way the industry operates in the future.” Highest Levels Of Security Competence The range is designed to offer the highest levels of security competence and effectiveness to provide full peace of mind The GARDiS range has been developed in close consultation with customer feedback, which requested a simple and straight-forward to use platform. As well as being easy for end-users to utilize, the range is also designed to be easy to install and maintain, which also benefits installers. At the same time, the range is designed to offer the highest levels of security competence and effectiveness to provide full peace of mind. The user interface has been designed to minimize confusion, ensuring anyone can install it and rapidly use its powerful features. Due to its minimalistic design and browser-based application approach, switching between the various functions is a smooth process, with little or no-load times. Benefits Of The GARDiS Software GARDiS is also supported by an intuitive help system that stores and presents short video demos. These demonstrate how to perform tasks from a user’s point of view, to minimalise the time spent contacting customer support. The considerable benefits of the new GARDiS software include: A single installation with simplified system set-up and registration A full Web-based application with flexible but totally secure access Software as a Service benefits (reducing capital costs and aiding budgeting) Minimal training requirements (intuitive to use)
Integrated security manufacturer TDSi is pleased to announce the appointment of Greg Little as Technical Support Engineer. Greg will be providing First and Second Line support to TDSi’s customers, for both engineering and sales support – with a specialization in IP networking and CCTV. John Davies, Managing Director of TDSi commented, “We are delighted to welcome Greg back to the TDSi team, as he was previously our Sales Support & Estimator for five years. With a highly impressive track record of technical knowledge and expertise, Greg is the perfect professional to support TDSi’s customers with any technical or sales bid enquiries.” Modern Security Systems With the level of technical integration required by modern security systems, technical support is a key service provided by the TDSi team. Reflecting upon his new role, Greg stated, “Every installer needs to know they can pick up the phone and get competent, timely and professional support when installing or fault-finding on site.” Greg has a distinguished security career, including 21 years at Chubb Security and two years as Technical Supervisor at Network Security Greg has a distinguished security career, including 21 years at Chubb Security (14 as a Service Engineer, seven as Technical Support Engineer) and two years as Technical Supervisor at Network Security, where he trained to become Fire Industry Association (FIA) and Gent qualified, before returning to TDSi. Dispersed Security Projects John Davies added, “We were excited to invite Greg back to TDSi in his new role, which is a vital part of TDSi’s support team. We are proud to offer our partners and customers the highest levels of technical advice and support whenever required, and Greg is a key part of our ongoing commitment to deliver this.” TDSi is also pleased to announce the appointment of new Warehouse Operative Dominic Alexander at its Headquarters in Poole, Dorset, UK. Dominic is a key member of the team that processes and ships TDSi’s extensive range of products to its partners and customers around the world. Dominic commented, “We manage the logistics and movement of products from our UK manufacturing plant, to our warehouse in Poole and onwards to globally dispersed security projects. It’s great to be part of a team that helps people stay safe and secure all around the world.”
Integrated security manufacturer TDSi is pleased to announce the appointment of Richard Money as Distribution Channel Manager. In his new role, Richard will be a central point of contact for TDSi’s Distribution Partners including ADI, Norbain, EET Europarts, Advanced Access, Enterprise Security Distribution and Anixter. Reflecting upon his new role, Richard commented, “I am excited to be joining the TDSi team. The company has a fantastic range of products that will suit any environment, and all budgets so there is tremendous scope to work with our distributors and grow our mutual business.” John Davies, Managing Director of TDSi also commented, “We are delighted to welcome Richard to this highly pivotal role. TDSi’s products are exclusively sold through our partners and we are committed to ensuring we offer the best support and assistance to facilitate this. Richard is the prime point of contact for our distribution partners - be it for stock enquires, pricing or connecting them with our vast network of expert installer customers.” Richard has over 20 years’ worth of security experience, having joined the industry in 1997 Veteran In The Security Industry Richard has over 20 years’ worth of security experience, having joined the industry in 1997 working at Clarke Instruments Ltd promoting and selling medium to high security electric strikes, turnstiles and barriers. In 2001, he joined Gardiner Security in its access control division and stayed there for 10 years, during which time the company was bought out by ADI Global (part of Honeywell) and Richard became an Account Manager selling access control, intruder and CCTV products. In 2011, Richard moved to ACT (Access Control Technology), an Irish manufacturer of access products, as a Senior Account Manager. He worked with ACT for seven years until he made the move to Inner Range before joining TDSi. Richard concluded, “I have gained a broad experience of the security sales industry during my career and look forward to sharing my expertise that with TDSi’s distribution partners. The UK market is an energetic one, so I am available to help our distributors fully meet the demands and needs of our customers from TDSi’s extensive range of products.”
Integrated security manufacturer TDSi will be introducing its new GARDiS software to the European market at Security Essen 2018 in Germany. Mica Negrilic, International Business Development Manager at TDSi commented, “We are proud and very excited to be appearing at Security Essen 2018, where we will be formally introducing our GARDiS software to the European market. While we usually visit the bi-annual show, this the first time we have had a formal presence at the event for a few years and we are very much looking to engage with our existing and new partners and resellers across Europe and beyond.” Quality Integration Systems Mica added, “When we visited the last Security Essen in 2016 we were very impressed by the breadth of visitors from across the EU, Middle East, Eastern Europe and beyond. There are big opportunities for the security sector across these regions and TDSi’s portfolio of high quality and high integration systems are perfect for these markets.” Mica and TDSi’s Managing Director John Davies will be available to discuss specific security requirements and projects, as well as the considerable advantages of being a TDSi Channel or Distribution Partner. Potential Gowth Opportunity Mica, who heads up TDSi’s French office at Noisy-le-Grand near Paris, which is central to the company’s appearance at Security Essen 2018, concluded, “This is a particularly exciting time to be working with TDSi – we have impressive growth targets across Europe and this event is the perfect opportunity to meet with us and discuss the potential to grow our business together. If you are attending Security Essen, make sure you visit the TDSi stand to learn more.”
Integrated security manufacturer TDSi is proud to announce its French office is celebrating its 20th Anniversary on 1st September 2018. Originally established as a branch of the UK-based company to service French customers, the office in Noisy-le-Grand, Paris now oversees sales and technical support operations across Europe and North Africa. TDSi’s Managing Director, John Davies commented, “TDSi has a long and distinguished presence in France with an excellent network of partners and loyal customers, but TDSi France has grown well beyond its initial scope to become a vital part of our overall business. In 20 years, the Paris office has grown to generate 25% p.a. of TDSi’s entire income and we are extremely proud of the team.” Extending TDSi’s Global Reach Originally established in 1998 in conjunction with Elkron (now part of ADI Global) as a distribution hub for TDSi products, the French office rapidly evolved into a far more elaborate center for everything TDSi. Following steady sales growth, a strategic decision was made around 10 years ago to take advantage of its Francophile links to further extend TDSi’s reach into North Africa – with an even more concerted push five years later. Even if there are disruptions in trade between the UK and mainland Europe, TDSi France will be on hand to ensure reliable service for all our EU customers" The Paris-based operations continue to be a vital part of TDSi as John Davies continued, “With Brexit looming and the current level of uncertainty over what this will entail, it is very reassuring for TDSi to have a powerful and dynamic presence in the heart of the EU. Even if there are disruptions in trade between the UK and mainland Europe, TDSi France will be on hand to ensure reliable and continued service for all our EU customers, free of any potential issues.” Exhibition At Security Essen TDSi France is also a key component in the manufacturer’s continued growth within the EU and beyond, as Mica Negrilic, International Business Development Manager at TDSi and head of the Paris office added, “TDSi will be exhibiting at Security Essen in September and the French team is at the heart of preparation for our stand and presentations. As a business, we want to establish a wider footprint in Germany and Eastern Europe, which has huge potential for further growth and is already showing a keen interest in our products and services.” Mica concluded, “While we proudly celebrate 20 years of success, TDSi France is very much focused on the future and the huge opportunities we have in the wider European market and beyond. These are exciting times and we look forward to the continued growth of our partnerships, customer base and business as a whole.”
Integrated security manufacturer TDSi is proud to announce its partnership with Panasonic Siew Sales (Thailand) Co.Ltd, which offers a complete integrated security package that includes Panasonic’s Video Insight Platform and TDSi’s EXgarde security management software. Offer Complete Security Solution TDSi’s Managing Director, John Davies commented, “We are delighted to announce this partnership, which is in response to Panasonic Siew Sales (Thailand) Co.Ltd’s ambitious growth plans in the security sector over the next three years. Combining Optex perimeter protection systems and Command Fusion’s automation and control software and hardware, along with our access control solution and Panasonic’s Video Insight VMS Platform, provides an unbeatable fully integrated security solution for our customers in Thailand and beyond.” Ranee Sitthikaew, Senior Department Manager at Panasonic Siew Sales (Thailand) Co.Ltd also commented, “Our approach is to offer a complete security solution rather than just selling products in isolation. We have teamed up with TDSi and other partners to offer all the components required for a fully operational, professionally integrated security system, all from a single source and with full in-country technical assistance and support.” Security Integration Day The announcement follows a recent ‘Security Integration Day’ launch event held in Thailand, which brought together all the partners, featured a number of activities and celebrated the partnership network instigated by Panasonic Siew Sales (Thailand) Co.Ltd. John Davies added, “As well as our close-working partnership on the integrated security solutions offering, Panasonic Siew Sales (Thailand) Co.Ltd will also be a key distributor of TDSi’s products in the Thai market. We are very excited to be working with local experts in Thailand, which is a key market in Southeast Asia for TDSi. We firmly believe this is a key milestone in our continued success in the country and the region.”
Integrated security manufacturer TDSi is pleased to announce the appointment of its new Customer Care Advisor, Abbey Trudgett. Abbey’s role is to support TDSi’s customers with purchasing products, managing returns and supporting them throughout the ordering and delivery process. TDSi’s Managing Director, John Davies commented, “Customer Care is a vital part of our business, so we take pride in providing an excellent level of service. With a wealth of customer-focused and sales experience, I am delighted to welcome Abbey to the TDSi team.” Abbey joins TDSi from a sales and retail background, where she honed her customer care skills. Abbey commented, “I very much enjoy the hustle and bustle of interacting with and helping customers, so my new role at TDSi is a perfect fit! It is very rewarding to see TDSi’s solutions in use worldwide and I am looking forward to helping our customers make the most of our products and services.” We play a crucial role in ensuring orders are processed quickly, accurately and efficiently, so customers get what they need, when they need it" Ensuring Accurate Processing Her new role offers fresh and varied challenges, as Abbey added, “TDSi offers exciting technology in a highly dynamic industry. With a lot of different project needs in various vertical sectors, it’s always exciting to see what new customer requirements we can help with each day.” Abbey concluded, “With orders coming in rapidly via the phone, email or online, we play a crucial role in ensuring these are processed quickly, accurately and efficiently, to ensure customers get what they need, when they need it. There is a great satisfaction in providing the best customer service and I look forward to further developing our relationships with our customers.”
Integration Solution Provider Vastiq Solutions has announced it has been recognized with a Best Project Achievement Award from Panasonic Malaysia, for its design work with security manufacturer TDSi on an integrated security project for Telekom Brunei’s (TelBru) mobile network. The project saw Panasonic’s I-Pro Series CCTV IP cameras integrated with TDSi’s access control systems, VUgarde video management software and Texecom intruder alarms. The project ensures the safety and security of TelBru’s network of mobile telecoms masts and installations. Jayendan Jothi Kandan, Director at Vastiq Solutions commented, “We are delighted to have been recognized by Panasonic Malaysia. Two phases have been completed for TelBru, which now protect 54 sites across the country." "Using Panasonic’s powerful cameras and TDSi’s fully integrated systems, we have supplied a security solution that is robust and dependable, yet flexible and simple to evolve in the future.” TelBru has full peace of mind that its systems and customer service commitments are fully protected" Protecting Commitments Reflecting upon the award, Seelan Kandasamy, General Manager at Panasonic Malaysia Sdn. Bhd commented, “This was a complex project which features many remote, rural and potentially vulnerable locations for a vital telecoms network.” Seelan continued, “As our consulting partner, Vastiq Solutions worked closely with TDSi and ourselves to design an effective solution that encompasses Panasonic’s cameras with these closely aligned integrated security systems. TelBru now has full peace of mind that its systems and customer service commitments are fully protected.” EXgarde Security Management Software IP CCTV cameras monitor each site and integrated access control ensures only authorized individuals or teams can enter. The security team monitors/controls everything via a secure online portal using TDSi’s powerful EXgarde security management software. This reduces the need for human security teams to continually visit each remote site, yet gives instant alerts of any suspicious activity, providing both live and historical data for compliance and security reviews. John Davies, Managing Director of TDSi commented, “The TelBru project is the perfect example of how well-integrated security and surveillance systems can protect vital installations, while offering greater flexibility and support to human security teams. We are proud to have partnered with Vastiq Solutions and Panasonic Malaysia on this exciting project.”
Integrated security manufacturer TDSi is proud to announce its team and products will be featuring with ASSA ABLOY (Stand F320), Milestone Systems (Stand C340) and Anixter (Stand E400) at IFSEC 2018. The event takes place at ExCel London from 19th-21st June 2018. TDSi’s Managing Director, John Davies commented “This year TDSi will be working closely with our partners ASSA ABLOY, Milestone Systems and Anixter to showcase the latest in integrated security systems on each of their stands at IFSEC 2018. We are very excited to be meeting visitors with each of our partners to show how we work together and in turn, the benefit these partnerships provide to the end user.” TDSi and ASSA ABLOY will be demonstrating the integration of the Aperio wireless door locking systems with TDSi’s EXgarde security management software Integrating Aperio System With EXgarde Software TDSi and ASSA ABLOY will be demonstrating the integration of the Aperio wireless door locking systems with TDSi’s EXgarde security management software. This offers a direct, secure connection between these systems and CCTV, intruder alarms, Microsoft Active Directory and other integrated systems. TDSi’s and ASSA ABLOY’s teams will be on the stand to illustrate the considerable benefits and how the combined solutions offer greater peace of mind. Integrated Access Control Via Xprotect VMS TDSi will also be appearing on the Milestone stand, demonstrating the partnership which delivers integrated access control through the Milestone Xprotect VMS engine and the benefits that it provides to end users. Ahead of IFSEC, TDSi and Milestone will also be presenting a Webinar on their joint integration which takes place on Tuesday 29th May (9am-10am). Anixter is a major distributor of TDSi’s products throughout the UK, Europe, Africa and the Middle East GARDiS Software Platform The TDSi team and its products will additionally be featured on the Anixster’s stand. Anixter is a major distributor of TDSi’s products throughout the UK, Europe, Africa and the Middle East. TDSi and Anixter will be focussing on the new GARDiS software platform range. As well as appearing with their partners, TDSi will also be hosting the Harmony Alliance dinner and presenting its annual partner awards. John Davies concluded, “There is something for everyone at IFSEC 2018. If you’re visiting with an interest in wireless access control systems come and see us on the ASSA Abloy stand. If you’re interested in VMS come and visit TDSi on the Milestone stand, and if you are interested in web-based software and access control systems, visit us on the Anixter stand. We look forward to seeing you there!”
Integrated security manufacturer TDSi has announced that Internal Account Manager, Daniel Clark has graduated the Dale Carnegie Sales Training course and was awarded star performer. TDSi’s Managing Director, John Davies commented, “We are proud of Daniel’s achievement, which is a credit to him and his hard work. As a business, we encourage and support our staff in professional and personal development to ensure we offer the very best service and expertise.” Reflecting upon his graduation, Daniel commented, “The Dale Carnegie course offers expert development and coaching in all aspects of professional sales skills. This includes learning how to win, maintain and build customer relationships. This training will help me further identify the needs and support requirements of TDSi customers, then in turn help guide them to the most suitable solutions.”TDSi runs an extensive Partner Training program in two locations in the UK and overseas Developing Symbiotic Relationships The course focuses on building a strong customer rapport and allows the sales organization to build trust, offer insights, and then help the customer meet their business objectives. It also helps sales teams to maintain trust and foster loyalty with their customers, developing a mutually beneficial relationship. Daniel added, “On a personal note I’m delighted to have been given the opportunity to attend this course. It gives me a clear, well thought out structure to work with going forward, which will be of great benefit to myself, TDSi and our business relationships.” TDSi is not only heavily focused on training its own team, but also its partners and customers as well. The company runs an extensive Partner Training program in two locations in the UK and overseas.
TDSi launches its eagerly anticipated GARDiS software solution at Intersec 2018, held in Dubai from 21st to 23rd January 2018. The company will also be showcasing its broad range of integration capabilities with other security systems. Business-Specific Access Control Security John Davies, Managing Director of TDSi commented, “We are very excited to be formally unveiling our new GARDiS software solution in Dubai. GARDiS is a web-based application that offers even greater flexibility and suitability to modern applications. One software installation is all that is required to provide complete access control security for all a business’ needs.” Intersec 2018 is the perfect way to start the security calendar for the new year, as John elaborated, “The Middle East is a key export market for TDSi, so we are looking forward to taking part in Intersec 2018. The event draws exhibitors and visitors from across a wide area and offers our customers and partners the chance to see first-hand, the latest products and services on offer.” Intersec 2018 is the perfect way to start the security calendar for the new year ONVIF-Compliant Application TDSi’s stand at the event will center around GARDiS, which offers all the benefits of a highly secure web-based application. It is easily adaptable for an increased workload, provides easier maintenance and installation, is more secure and is accessible from anywhere on any device. GARDiS also features a simple-to-use and intuitive interface that is designed and built directly around the needs of users and operators. GARDiS has been designed to meet and anticipate important international security standards. The IEC (International Electrotechnical Commission) has adopted ONVIF Profile A and C as the de-facto new international standard for access control. This ushers in the era of open platforms for access control, and accordingly GARDiS has been designed as an ONVIF Profile A and C compliant platform. John concluded, “Intersec is also a great opportunity for the TDSi team to talk directly to the people who buy and sell our products across the Middle East and beyond. This gives us a greater understanding of the needs and demands from this very important security market. If you are attending the event, we would be delighted to give you a demonstration of our powerful and highly flexible product range.”
Integrated security manufacturer TDSi, is pleased to announce that its software analyst and developer Ian Hoare has graduated with a Master’s Degree in Cyber Security and Human Factors from Bournemouth University. Ian’s qualification demonstrates the company’s continued commitment to research, education and training. TDSi’s Managing Director, John Davies commented, “We are very proud that Ian has earned his Master’s Degree, having worked extremely hard to study alongside his role at TDSi. As a company we champion education and training as it benefits not only the person and the business, but also the security industry as a whole.” Cloud Computing And Online Security Ian elaborated on the significance of his new degree for his role at TDSi, “This new qualification demonstrates that I am up to date with the very latest advances in cloud computing and online security. The TDSi team is always at the forefront of secure software for the modern world, but we are keen to illustrate this with continued professional development, giving additional confidence to our customers that all has been done to secure their data.” As part of his graduation process, Ian produced a dissertation that examines the secure development life cycle and how it can fit into the agile development process. He commented, “The Agile development process does not allow for any security processes and there is an argument that it should not, as it is an overhead of the initial development.” Vulnerabilities Can Increase The Financial Cost Ian continued, “However, it is important to identify and mitigate against vulnerabilities within the system, as the financial costs are far greater if vulnerabilities are found after the product is released. This is even more important with the looming GDPR legislation, which comes into force in May next year.” Ian’s Master’s in Cyber Security and Human Factors is just part of an ongoing process of training and research, as he concluded, “The cloud environment is continuously changing with new threats. It is vital to use this knowledge now and to continuously keep this learning and information updated - both for TDSi and its customers, as technology and security needs evolve.”
SourceSecurity.com’s Expert Panel covered a lot of ground in 2017 about a variety of topics resonating in the security market. The most-read Roundtable discussion in 2017 was about a familiar and ongoing debate: What is an open system? Other hot topics that made the Top-10 list of Roundtable discussions included smartphones, buzzwords, standards and product life cycles. Here is a listing of our Top 10 Expert Panel Roundtable discussions posted in 2017, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2017 (including the quotable panelists named below). 1. What is an open system? Is there a consensus in the marketplace on the definition of “open?” "Being truly ‘open’ means going above and beyond when designing your product line, keeping in mind the ability for end-users to easily interface your product with other open-platform solutions. That's why offering an open-platform design must be coupled with the ability to provide exceptional support through training, follow-up and innovation as they are brought to market.” [Mitchell Kane] 2. How are smartphones impacting the physical security market? "The security protocols on phones (such as fingerprint readers and encryption) have become some of the strongest available to consumers and are regularly used to access essential services such as banking. With this level of trust and user convenience from mobile device security, it makes sense to produce physical security systems that also take advantage of it." [John Davies] TDSi's John Davies says it makes sense to produce physical security systems that take advantage of trust and user convenience on mobile devices 3. What is the biggest missed opportunity of security systems integration? "Integrators need to be more savvy on how they can meet their customers’ IT and surveillance goals, from both a technology and services perspective. Being knowledgeable about new innovations can help integrators sell infrastructure, keeping that piece of business rather than losing server sales to a customer’s internal IT department. Integrators are tasked with ensuring surveillance customers can benefit from best practices, and solutions proven in the world of IT offer significant benefit." [Brandon Reich] 4. What are the security industry’s newest buzzwords? "End-to-End Security is a buzzword reflecting how cyber threats are increasing and the importance of ‘the security of security systems,’ especially for companies operating in the critical national infrastructure. Convergence has been a ‘hot topic’ for years, but has it really happened? In order to create true end-to-end security solutions, IT and physical security best practices need to be combined." [Arjan Bouter] End-to-End Security is a buzzword reflecting how cyber threats are increasing, says Arjan Bouter 5. What technology will have the greatest impact in the second half of 2017? "Cloud-hosted access control is poised to have the biggest impact in the second half of 2017. Organisations are looking to decentralise IT management and eliminate the need for overhead costs in hardware infrastructure and ongoing maintenance costs. This decentralisation is driving them to migrate their day-to-day systems to the cloud, and access control is no exception." [Melissa Stenger] 6. Are mergers and acquisitions good or bad for the security industry? “On the ‘pro’ side, consolidation is good for pulling together a fractured market, as vendors try to gain market share by acquiring solutions they may not otherwise have in their portfolio. On the ‘con’ side, however, consolidation restricts or limits innovation as the merged vendors strive to develop end-to-end solutions that reduce customer choices" [Reinier Tuinzing] 7. What new standards are needed in the security marketplace? "Do we need that many new standards, or do we need the industry to embrace the standards that are already in place? I believe that current standards like ONVIF and OSDP are sufficient in what they offer the industry. Members of the security industry just need to start thinking outside the box and realise that it is with standards in place that real industry growth can occur." [Per Björkdahl] 8. What will be the big news at ISC West 2017? "Security solutions that capture greater data and utilise analytics to transform the data into useful information, or business intelligence, will be the talk of the industry at ISC West this year. It’s not just about surveillance or access control anymore, but about who can best assess the end user’s interests and deliver an end-to-end solution that provides a value beyond the technology and a service beyond security.” [Richard Brent] When buying cameras, customers are often lured by lower upfront costs, but may end up paying more in the medium- to long-term because of lower quality, says Oncam's Jumbi Edulbehram 9. Why should a customer continue to buy “premium” surveillance cameras? "When buying cameras, customers are often lured by lower upfront costs, but may end up paying more in the medium- to long-term because of lower quality (requiring costly site visits and replacements), susceptibility to cyber-attacks, or lower quality of integrations with video management systems. Customers should certainly be prudent buyers and make sure that they’re paying for actual reliability/features/functionality rather than simply paying a premium for a brand-name product. When functionality and reliability are important, it always makes sense to ‘buy nice, not twice.’ [Jumbi Edulbehram] 10. What is an acceptable life cycle for a physical security system? "The answer to this question clearly depends on the seat you sit in. Manufacturers, integrators, distributors, consultants and engineers all have extremely different perspectives on this question. As a manufacturer, we design systems to have a lifecycle between 5 and 7 years." [Robert Lydic]
TDSi, a UK manufacturer of integrated access control systems, offering an extensive range of readers, controllers and software systems, integrates with GEMOS, a physical security information (PSIM) platform from ela-soft. The integration allows access control events to be viewed alongside other security applications on one comprehensive user interface. Comprehensive User Interface Combining more than 750 existing applications, GEMOS adv. PSIM layers the physical position of each alert and all system devices onto a site plan. It is able to receive alerts from more than 500,000 data points in one installation, and can identify the exact location of each alarm. The integration with TDS1 will simplify the security management of a site, providing an audit trail of access control events within the PSIM. TDSi provides access control systems which meet the challenges and trends of the security market. With over 35 years’ experience, the company offers engineering excellence, across a comprehensive product range that encompasses Access Control Systems, Biometric Readers, Security Management software, IP CCTV Video Management Software. The portfolio can be easily integrated into other security and BMS applications and can be deployed at businesses and organizations of all sizes and types. Security Critical Environments Since 1990, ela-soft has been developing manufacturer-neutral management systems for security, building and communication technology. GEMOS is one the leading security information management system on market with over 750 different proprietary interfaces and over 1.000 installations. Fedja Vehabovic, Strategic Alliance Manager of ela-soft says: “It was a natural progression for us to integrate TDSi access control software into our GEMOS PSIM platform. We both operate in security critical environments where the protection of people and assets is vital. Access control events with TDSi can now be easily viewed via the GEMOS platform, helping us to offer an even better solution to our customers”. John Davies, TDSi’s Managing Director, said: “We are delighted to be working with ela-soft to offer customers even greater choice by integrating these powerful systems. This approach means that security operators can design and implement the best combinations of components to suit their requirements and budget. TDSi’s broad and flexible portfolio of systems offers the perfect selection to complement GEMOS and strengthen any security network.”
Integrated security manufacturer TDSi is pleased to announce it has appointed new Technical Author Rob Twine. Rob joins the team to help create new technical documents and literature, as well as ensuring existing documentation meets the needs of customers and partners. Expert Documentation TDSi’s Managing Director, John Davies commented, “We are delighted to welcome Rob to the ever-expanding TDSi team. Expert documentation is a key part of our product offering and a vital support for the installers and customers that buy from us, so Rob has a crucial role to play. With a proven track record in technical writing, he has the skills and knowledge to ensure we continue to offer the written support that is needed.” Rob is also excited to be taking on his new role at TDSi, “I am looking forward gaining fresh knowledge from the expert development team. This is my first role in the security industry, but it is a vibrant sector with much to offer and I feel TDSi is a perfect place for me to further hone my skills.” Rob continued, “TDSi has an impressive track record in innovation and market-leading technology, so I feel this is the ideal opportunity for me. I have many ideas that I’m excited to bring to the table, to help TDSi continue to grow and expand moving forward.” Ongoing Success For TDSi Bournemouth born and bred, 25-year-old Rob worked in the Mobile Technology and Computer Learning industry as a Technical Knowledge Author in Poole before joining TDSi. With a keen interest in project management, he also gained a PRINCE2 Foundation (PRojects IN Controlled Environments) qualification earlier this year. Rob concluded, “As a bit of gaming nerd, I’m interested in anything digital or technical and passionate about being creative. My new role at TDSi gives me the scope to bring these skills to bear and to work with a friendly and driven team, to offer the best service to our customers. I am looking forward to playing my part and supporting the company’s ongoing success.”