John L. Moss
LenelS2 announces major enhancements to VRx, a next-generation video management platform that features advanced analytics based on deep learning technology. VRx provides a unified access control and video surveillance experience when used in conjunction with LenelS2’s NetBox access control system, Magic Monitor® unified client and Cumulus cloud-based service. LenelS2, a provider of advanced security systems and services, is a part of Carrier, a provider of innovative heating, ventilating and air conditioning (HVAC), refrigeration, fire, security and building automation technologies. Advanced object detection VRx leverages deep learning for advanced object detection, providing users with enhanced situational awareness. The deep learning built into VRx takes in new video as data and uses the information to improve identification and classification algorithms over time. VRx provides the ability to detect a wide variety of objects such as backpacks, cars, trucks, people and animals, empowering users to quickly spot potential risks and respond accordingly. Forensic searches based on object detection make it possible to rapidly locate recorded video of interest and analyze events. “We call VRx a next-generation VMS because it goes beyond capturing and storing video to digitally analyzing it and enriching the data stream,” said John L. Moss, chief product officer, LenelS2. “Working with video as data is the defining characteristic of VRx.” Uploading crowdsourced video content VRx also enables users to upload crowdsourced video content from their smart devices to a VRx server, creating a more robust database for forensic investigations. The video can be viewed alongside recorded video from security cameras, providing security teams with additional information about a specific event. VRx seamlessly fits into the NetBox ecosystem, allowing the entire solution to easily scale with organizational growth. The Linux-based VRx appliance is plug-and-play and operates similarly to other NetBox ecosystem products, making it easy to set up, configure and maintain. A virtual machine option is also available.
S2 Security, the developer of complete enterprise security solutions, announces S2 Magic Monitor Version 6.1. With a range of media options that now includes Internet-streamed TV as well as enhancements to Magic Monitor Forensics, S2 Magic Monitor Version 6.1 is the most flexible, versatile solution for security operations and enterprise-wide communication. “Broadcast television plays a critical role in situational awareness as well as entertainment,” said John L. Moss, CEO, S2 Security. “Whether you’re seeing an important world event unfold or watching the ball game in the cafeteria, Magic Monitor does it.” Provides Numerous Enhancements Version 6.1 introduces Internet-streamed TV, enabling users with a YouTube TV account to display a wide variety of content in S2 Magic Monitor. Users can push TV streams to an external Magic Monitor, further expanding digital signage capabilities throughout the enterprise. In addition, Version 6.1 provides numerous enhancements to Magic Monitor Forensics that make locating and sharing information about recorded video easier than ever. The Forensics timeline now visually differentiates types of recorded content. Users can add visual bookmarks as well as descriptive text to bookmarks. This feature can be utilised to make notes, create reminders or relay information to another team member reviewing the footage. Users can also aggregate, search for and edit bookmarks, which simplifies navigation back to the video once it has been located.
S2 Security, a developer of complete enterprise security solutions, has announced the availability of S2 Magic Monitor Version 6. S2 Magic Monitor unifies access control, video surveillance, forensics, digital signage and live internet feeds in a single user interface. Version 6 introduces enhanced access control functionality and a new web widget, further unifying the security management experience. “Version 6 delivers on Magic Monitor’s promise to unify all of the user’s security needs within a single, intuitive interface,” said John L. Moss, CEO, S2 Security. “Security professionals will benefit from greater situational awareness and operational efficiency as Magic Monitor helps streamline their workflows.” The new web widget allows users to display any website page within an S2 Magic Monitor cell Managing Multiple Servers In Version 6, comprehensive people management enables users to add, search for and manage person records directly from S2 Magic Monitor. The people search tool provides instant results, making it easy to find any records, which display information including credentials, access levels and recent activity. Simultaneously, S2 NetBox access control system connections are supported, allowing users to manage multiple S2 NetBox servers at the same time. Users can also now view, prioritize and acknowledge S2 NetBox events directly from S2 Magic Monitor. In addition, the new web widget allows users to display any website page within an S2 Magic Monitor cell. This further expands the possibilities for content that can be shown across an enterprise, from news sources to the S2 NetBox web interface and other critical web-based systems.
S2 Security, a provider of IP-based access control, video management and mobile security management systems, introduced S2 Magic Monitor Version 5. S2 Magic Monitor unifies access control, video surveillance and forensics, digital signage and live Internet sourced real-time data and information feeds in a single user interface. Enhanced S2 NetBox Access Control Version 5 introduces Dynamic Cells, which allow users to program any Magic Monitor with interactive content. This version also includes enhanced S2 NetBox access control and event monitoring system integration and additional third-party video management system support. “Version 5 brings more advances than ever, allowing users to create maps, floor plans and command panels with amazing ease,” said John L. Moss, CEO, S2 Security. “New support for Avigilon and Milestone 2017 video servers makes Magic Monitor a truly universal user interface for video surveillance applications.” With Dynamic Cells, Magic Monitors can be customized to meet unique operational requirements, enabling staff to work more productively and enhance safety and security. By programming any Magic Monitor with dynamic content, users can create interactive floor plans as well as follow events on screen by navigating through one camera feed to the next. In addition, Dynamic Cells support touch screen-capable, responsive digital signage for general use throughout the enterprise in public areas such as lobbies and cafeterias. Support For Avigilon And Milestone Systems Also in Version 5, enhanced S2 NetBox integration allows users to view S2 NetBox systems and portals in S2 Magic Monitor, drag and drop portals into Magic Monitor cells to view access history with photo identification and perform momentary unlock directly from the portal cell. In addition, Version 5 provides users with the ability to view cameras from more video management systems with support of Avigilon Control Center 5 and 6 and Milestone 2017. Milestone 2014 and 2016 as well as exacqVision video management systems are already supported. Version 5 is now available for S2 Security Certified Integrators to download on S2 Support Central. For more information on S2 products, visit www.s2sys.com.
S2 Security Monitor Version 4 includes audio support for cameras, video clips and online digital content S2 Security, a provider of IP-based access control, video management, and mobile security management systems, introduced S2 Magic Monitor Version 4. S2 Magic Monitor provides a unified security management user experience for access control, video surveillance, forensics, digital signage, and live Internet feeds. Version 4 introduces new features that benefit security operations as well as employees and visitors, including third-party video management system support, audio support, and advanced Internet widgets. S2 Magic Monitor Version 4 Video management system support is now available for Milestone and exacqVision in addition to S2 NetVR Series products. Version 4 also includes audio support for cameras, video clips and online digital content. Real-time media from Twitter and Everbridge and enhanced weather radar maps bring tailored situational awareness into a variety of environments, from security operations centres to public areas. Upon registration of the product, Version 4 enables integrators to monitor system health and control licensing and software updates online. “Version 4 delivers a truly unified security management and situational awareness user experience,” said John L. Moss, CEO, S2 Security. “We also now make it possible to perform updates remotely, which provides a cost advantage for integrators and a service advantage for end users.” Advanced Weather And Traffic Widgets Support Version 4 also introduces a Professional license option. S2 Magic Monitor Professional supports an unlimited number of S2 NetVR cameras as well as advanced weather and traffic widgets. All S2 Magic Monitor appliances now include Professional licenses. The Standard license is software only, supports up to 128 cameras and is available at no charge. Standard licenses can be easily upgraded at any time. S2 Magic Monitor Version 4 is now generally available for S2 Security Certified Integrators to download on S2 Support Central.
Latest version of access control and event monitoring software also introduces S2 NetBox Virtual Machine and S2 NetBox Offsite Recovery S2 Security, the leader in IP-based access control, video management and mobile security management systems, released NetBox software Version 4.9. With a new Photo ID Badging System, Version 4.9 makes badge management easier than ever by enhancing the user experience and expanding the ability to collaborate across multiple locations. Additional offerings including S2 NetBox Virtual Machine and S2 NetBox Offsite Recovery provide enterprise users with more system configuration options and security. System Design Options “Version 4.9 demonstrates our continued commitment to providing integrators and end users with software updates that make their jobs easier,” said John L. Moss, CEO, S2 Security. “In addition, with S2 NetBox Virtual Machine, we’re giving them more system design options.” The Photo ID Badging System is accessible from any location via the web-based S2 NetBox user interface. Within the new, flexible badge workflow, users can easily collaborate across multiple locations to complete badge production. Users can create custom photo ID layouts, adjust person records, capture photos, add photo IDs and print badges. Photo IDs can be captured locally and printed offsite from any networked printer. S2 Mobile Security Officer 2.0 users can capture photo IDs and review photo requests from iPhone or iPad. Safeguarding System Operation Also in Version 4.9, S2 NetBox Virtual Machine enables users to create a custom S2 NetBox system supporting up to 7,168 portals on their preferred hardware platform. The S2 NetBox Offsite Recovery feature safeguards system operation by immediately directing S2 Nodes to a secondary S2 NetBox controller in the event of a physical disaster. Version 4.9 is now generally available for S2 Security Certified Integrators to download on S2 Support Central.
S2 Security, the leader in IP-based access control, video management and mobile security management systems, recently released NetBox software Version 4.8. With new integrations and many enhancements to the user experience, Version 4.8 access control and event monitoring software makes the S2 system more powerful and easier than ever to use. Integration With S2 Magic Monitor “Version 4.8 introduces an amazing new capability in integrated video display,” said John L. Moss, CEO, S2 Security. “Blending S2 NetBox with S2 Magic Monitor opens the opportunity for many unique applications.” Version 4.8 highlights include integration with S2 Magic Monitor, enabling S2 NetBox events to trigger video, digital signage and other media to be displayed on Magic Monitors throughout the enterprise. Users can also now schedule unlocks for portal groups, arming for input groups, activation for output groups, and access to elevator floor groups with a new resource view and graphical calendar. The latest S2 Nodes have enhanced, built-in diagnostic tools and the ability to support up to 150,000 credentials. In addition, Version 4.8 expands third party integrations. DMP intrusion panel monitoring is simplified with feature and user interface updates, and ASSA ABLOY locksets now automatically sync with the S2 NetBox controller. With over 20 releases since 2004, web-based NetBox access control and event monitoring software leads the security industry in functionality, integrations, and ease of use. Version 4.8 is now generally available for S2 Security Certified Integrators to download on S2 Support Central.
S2 Security, the leader in IP-based access control, video management and mobile security management systems, recently released Version 2 of S2 Magic Monitor, an award-winning dynamic digital canvas that displays video, text, signage and media -- anywhere across the enterprise. S2 Magic Monitor Version 2 refines the user experience with major new features and an easy-to-use interface. "With its range of applications, beautiful visual interface, and ability to react to events and user commands, Magic Monitor is redefining video display," said John L. Moss, CEO, S2 Security. "In any application where you use a video monitor, Magic Monitor will do the job better." S2 Magic Monitor Version 2 New Features Include: Instant Replay: Play back video directly from a live video stream Live Snapshot: Take a picture snapshot directly from a live video stream Multi-Screen Management: Open a Magic Monitor digital canvas on multiple monitors connected to the same computer Digital Zoom: Zoom in for the details on a live or recorded video stream Versatile and responsive, S2 Magic Monitor solves a wide range of security and operational problems. Whether in an operations center, in public areas, at the front desk, or in the field, S2 Magic Monitor delivers the visual information needed for virtually any situation.
S2 Security, the leader in IP-based access control, video management and mobile security management systems, recently introduced S2 MicroNode Plus, the company’s latest two-reader panel for S2 NetBox series web-based access control and event monitoring systems. New product features include a Power over Ethernet Plus (PoE+) power option, storage for up to 150,000 cardholder credentials, and faster processing. “S2 Security routinely updates its hardware products to reflect compelling new technology,” said John L. Moss, CEO, S2 Security. “S2 MicroNode Plus, with its more powerful processor, expanded credential memory, and increased PoE capacity is an excellent example of this.” Upgrade Legacy Access Control Readers S2 MicroNode Plus supports up to two portals, four relay outputs with wet/dry selection, four inputs with programmable levels of supervision, and one temperature input. In addition, the appliance includes a 12VDC auxiliary output for powering devices such as a PIR Request to Exit input or an alarm sounder. Access control and events from connected devices are aggregated to the S2 NetBox web interface for centralized system management. S2 MicroNode Plus is also an ideal retrofit solution. The seamless upgrade from legacy two reader panels can be made without replacing readers, inputs or lock outputs.
Customer support, application engineering and training will be integrated and reinforced under new executive leadership S2 Security, the leader in IP-based access control, video management and mobile security management systems, recently announced expansion plans for its pre-sale and post-sale product support. Technical support functions including customer support, application engineering, and training will be integrated and reinforced under new executive leadership to ensure customers are consistently able to access the appropriate resources they need to design, install and use S2 Security systems. The product support team reports to John Culross, S2 Security’s newly appointed Senior Director of Technical Services. With over 10 years of experience as a customer support manager, Mr. Culross is recognized for building high-performance teams, establishing processes and increasing operational efficiencies. Most recently Director of Customer Support with ProcessUnity, he served in the United States Marine Corps for 14 years. “From our founding, customer support has been a core value,” said John L. Moss, CEO, S2 Security. “Our goal is to provide the best integrator and end user ownership experience in the industry. Growth in our customer base drives this expansion.” The appointment of Mr. Culross is the second in a series of recent senior level hires that support the growth of S2 Security. S2 Security certified integrators have installed over 20,000 systems in more than 70 countries.
S2 Security, the leader in IP-based access control, video management and mobile security management systems, recently announced Version 4.7 NetBox software featuring a new, icon-based user interface and other enhancements. Version 4.7 simplifies the NetBox user experience with streamlined workflows and one-click access to key system functionality, making event and alarm monitoring, video surveillance, system management and setup activities faster and easier to navigate. “Version 4.7 updates and refines the entire NetBox user experience for end users and integrators,” said John L. Moss, CEO, S2 Security. “The clean, highly graphical design combined with the breadth and depth of functionality we’re known for provides an unprecedented user experience.” Icon-based User Interface & Enhancements The new user interface includes control-driven navigation with top-level and command controls that streamline workflows. Key system functionality such as Alarm Status and recently viewed pages is accessible with one click, enhancing productivity and response time. Custom menus are now available for quick access to frequently used controls on a user-by-user basis. Other Version 4.7 enhancements include an alarm resolution report that tracks how long it takes operators to respond to alarms; a new system health monitoring feature that generates an event when an S2 Network Node has low backup battery capacity or low voltage; and expanded integration with Allegion Schlage AD-400 locksets. With over 20 releases since 2004, NetBox access control and event monitoring software leads the industry in functionality, third party integrations, and ease of use. Version 4.7 is now generally available for S2 Security Certified Integrators to download on S2 Support Central.
S2 Security, the leader in IP-based access control, video management and mobile security management systems, today introduced S2 NetVR® 600 video management system, the newest addition to S2 Security’s product ecosystem. Ideal for mid-sized businesses and distributed enterprises with RAID storage requirements, S2 NetVR 600 makes real-time video monitoring and recorded video playback accessible from a client, web browser or mobile app. “S2 NetVR 600 brings stand-alone and integrated systems users more options when RAID storage is required,” said John L. Moss, CEO, S2 Security. “As a member of the S2 ecosystem, S2 NetVR 600 seamlessly interoperates with our video, access control and mobile products.” Features S2 NetVR 600 supports up to 32 IP cameras and up to 32TB internal video storage, available in RAID 5 storage configurations for enhanced reliability and performance. Live and recorded video from S2 NetVR 600 cameras can be viewed from anywhere using the S2 Mobile Security Officer® tablet app. S2 NetVR 600 can also tightly integrate with S2 access control systems. Real-time video surveillance and recorded video are unified in the web-based user interface of the connected S2 NetBox® or S2 Enterprise® controller. Additional features include on-screen PTZ controls and integration of live video views into floor plan graphics. By clicking on an icon in the activity log, users can instantly play back video associated with an event. S2 Security offers a broad range of video products, including S2 NetVR Series video management systems for deployments ranging from small offices to large, distributed global enterprises; S2 NetBox VR converged video management and access control systems; and S2 Network Node VR, an intelligent field panel that brings access control and video management to the network edge. For more information on S2 products.
S2 Security, the leader in IP-based, integrated access control, video management and mobile security management systems, recently announced the introduction of S2 Network Node VR, an intelligent field panel that brings access control and video management to the network edge in a single, compact appliance. S2 Network Node VR provides an easy, cost-effective way for users of S2 access control systems with smaller, distributed locations to connect IP cameras, card readers and other physical security and monitoring devices to a centrally managed S2 system. “S2 Network Node VR is a unique addition to our rich video products line,” said John L. Moss, CEO, S2 Security. “Our large enterprise customers have been asking for an innovative way to bring video, access control, and monitoring to their smaller sites, and this product does exactly that. There’s nothing else like it in our industry.” S2 Network Node VR System Capabilities With support for up to eight IP cameras and up to eight access control portals, S2 Network Node VR system capabilities can be expanded and customized with up to four modular blades for access control, alarm inputs, relay outputs and temperature probes. The fanless product design includes an option for solid-state storage, providing extended product longevity. This keeps servicing costs low and delivers an ideal solution for remote locations. S2 Security has a broad range of video products, including S2 NetBox® VR Quatro, which offers capabilities comparable to S2 Network Node VR with the addition of embedded security management software for stand-alone applications.
More attention needs to be placed on the development of readers that can accommodate Wireless and Wi-Fi technology Many of the changes in the access control market are happening at the “edge” – at the reader level. Access control advances that continue to become more widespread include wireless and PoE-enabled access control hardware such as wireless locks and PoE door controllers, which both reduce installation costs. Other trends are related to mobility; one is the increased use of smart phones and tablets for day-to-day access control operations. Another is the increased adoption of mobile credentials – leveraging near field communications (NFC) or Bluetooth Low Energy (LE)-enabled technologies that allow smart phones to be used as access control credentials to enter a building instead of traditional credentials such as cards. Emerging technology platforms can fragment and hinder the market, among both integrators and end users. Do we install and use Bluetooth, NFC or the latest in biometrics? Are they safe, proven, and are there standards? “Only time will prove which technologies are better,” says Greg Hetrick, PCSC’s director of marketing. “Until then, it’s anyone’s guess, often at the expense of real-world scenarios. By the time it’s proven, new technologies become available. The cycle is always turning.” The best approach is to find the right balance between today’s and tomorrow’s technologies, he adds. Wireless and Wi-Fi technology is inching into the access control space, and because of this, more attention needs to be placed on the development of readers that can accommodate this technology. Accompanying issues include the level of integration with traditional physical access control systems and safety concerns when recommending and deploying these devices, says Robert Laughlin, president of Galaxy Control Systems. John L. Moss, CEO of S2 Security, sees access control evolving in the next five years in relation to “bring your own device (BYOD),” global distributed systems in the cloud, and inexpensive wireless locksets. “With the ubiquity of smart phones and BYOD, people will use mobile devices as personal credentials, either with Bluetooth LE or by using an app built into the device,” he says. “New business models will evolve around these new technologies that will benefit end users through reduced total cost of ownership and integrators through a shorter replacement cycle, which is typically long in access control,” Moss comments. Hetrick believes that in the near future, smart phones or wearables will become the primary source for card access, door entry, system access, payments, health information and identification In the near future, access credentials will become more mobile and more portable, whether physical or cloud-based. “Your smart phone or wearable (smart watch) will become your primary source for card access, for door entry, system access, payments, health information and identification,” Hetrick says. Virtual credentials may live in the cloud versus on a device. If someone switches to a new employer, for example, no new credentials will be assigned. Rather, they are simply authorized and activated by the new employer and deactivated by the previous one. When it’s time to upgrade a device, the credentials are available via the cloud to the new device, Hetrick says. “Device security will improve via biometrics (fingerprint, i.e., Touch ID; and perhaps facial recognition using a device’s camera) with multiple forms of authentication and rolling encryption,” Hetrick says. “As a manufacturer, we hear about biometrics, NFC, these are all things we see, but it’s hard to integrate them into our platform,” says John Smith, senior channel marketing manager, Honeywell Security. “There are 100 different biometrics, not operating to a standard. Most of our systems can work with these things, most have a Wiegand or standard output, but the enrollment piece might be a problem and require a separate application. We as a manufacturer are watching it closely, but we haven’t seen it as a big draw.” For example, a predominant leader hasn’t emerged relative to NFC. Also, biometric readers are three to 10 times more expensive than a card reader, so cost justification has to come down, he adds. Jason Ouellette, product line director, access control, Tyco Security, suggests the future of access control will be a matter of “back to the future.” He expects more access control systems will be based on a cloud environment, reminiscent of the days of mainframe computers. The edge devices that provide the monitoring, reporting and day-to-day management of access control will be comparable to yesterday’s “dumb” terminals. “Additionally, we will see a shift from the traditional plastic cards and fobs to electronic credentials managed through smart devices like mobile phones and tablets,” he adds. “One more shift will be the use of biometrics, such as facial recognition, for access control, which will create a ‘frictionless’ mode of access control as the technology improves,” Ouellette says. “While the technology of cloud-based servers over mainframes and tablets or mobile phones provides far greater capabilities, it will also drastically change the way access control is installed, managed and encountered by end users over the next five years.” More access control systems will be based on a cloud environment, reminiscent of the days of mainframe computers. The edge devices that provide the monitoring, reporting and day-to-day management of access control will be comparable to yesterday’s “dumb” terminals Richard Goldsobel, vice president, Continental Access, sees some movement to more secure (than Wiegand) RS-485 readers. However, he says the the hype for access control right now revolves around moving the access credential to smart phones, using either NFC or Bluetooth LE technology to communicate with the reader. Problem is, the technologies are battling, and both have their pros and cons, but the functionality will be similar. The convenience of the credential on the phone, of course, is the major driving factor, but the functionality also raises some new security concerns. Security may dictate that additional functions be running on the smart phone app, such as biometrics or PIN processing. However, a need for additional actions to be performed on the phone will reduce convenience, says Goldsobel. “Your smart device will continue to play a larger role in the systems,” agrees Greg Love, vice president of sales, AMAG. “You can manage the system and get into the area, all with the same device.” He also sees additional options ahead for hosted, Web or embedded solutions – all from one manufacturer. “The customer can make the choice of how they would like to manage their security,” he says. New solutions will extend above and beyond access control and video management – including risk management, emergency preparedness and enhanced reporting outside of security responsibility. “It’s more of a total facility management system that takes advantage of the network in its entirety,” says Love. New technologies also bring new risks. Hetrick says the market should consider carefully issues related to credential and identity security, whether lost, stolen, duplicated or authenticated. “Can an access point identify that the access device authenticates the actual physical identify of the user?” he asks. “Is a lost card or hacked and stolen mobile device with NFC access able to open a secure door? Or is the access point also smart, i.e., able to use facial recognition to confirm that the card or device and the user are indeed one and the same, and therefore authorized? Or is this just a duplicate access device or card being used by a criminal? Can a duress situation be discreetly announced and identified, perhaps granting access while simultaneously notifying authorities? Will virtual and cloud-based credentials be at risk for attack, theft or duplication? Technology opens new layers of security risks. Are these risks masked, unforeseen? What preventions can be enabled?” Smith of Honeywell says the traditionally slow-moving access control market is being forced to embrace new and changing technologies, and many dealers are not comfortable with the situation. It takes a lot for a dealer to change its products or business model. Some are resistant to change, and others have a hard time finding qualified talent to deal with new technologies. “We are lagging behind technology as a whole,” says Smith. “A lot of dealers we have are resistant, it doesn’t fit their current business model, and they will have to change.”
Access control can sometimes get overshadowed by video surveillance Technology is shifting rapidly in the access control market, but another obstacle is the need to communicate the value of the technology to users. Specifically, access control can sometimes get overshadowed by video surveillance as it competes for a share of the customer’s security dollars. From a pure security standpoint, electronic access control is better suited than video surveillance to keeping people and locations safe, either by deterring, presenting or immediately reporting an incident, contends Richard Goldsobel, vice president, Continental Access. “The value of video to provide information and diagnosis is undeniable,” Goldsobel acknowledges. “However, video is often most valuable after an incident has occurred rather than as a proactive agent. Given the choice, the vast majority of end users choose video over access control. There needs to be a better understanding of the proper balance between the systems. It is an industry education and marketing challenge.” Another challenge for access control is to embrace and leverage new mobile devices and other consumer-driven trends. “We will see a strong push from the quick acceleration of technologies in the consumer space,” says Jeremy Krinitt, general manager of Frontier Security. Mobile devices will continue to impact how security solutions are used and managed, he adds. In many cases currently, mobile systems have a limited feature set. “The key to the accessibility and seamless operability that end users want is for manufacturers to make the same features available in the mobile version of the product that are available in the fixed version,” says John L. Moss, CEO of S2 Security. “We’ll also see a strong push to make information [provided by access control systems] more relevant to users of a solution,” says Krinitt. It is critical that each solution help to focus the user on items that require immediate attention. Krinitt compares the challenge to a similar trend in the video market. “Use of banks of video monitors showing views from multiple cameras is largely being scrapped in favour of a single monitor that brings up video when it warrants the operator’s attention,” he says. The same approach should be applied to access control and other areas of monitoring and response as well. “The elements in the management of an alarm can be assisted by technology to provide a more prompt and effective response,” says Krinitt. The more doors that are access-controlled, the better Costs are another challenge for access control. “End users can’t afford everything they would like to have,” says Greg Love, vice president of sales, AMAG. “The market needs to meet that challenge by offering products that can grow with the customer, letting them start small and then build on the system.” “The market also needs to work on ways to lower the cost-per-door of access control installations,” says John Smith, senior channel marketing manager, Honeywell Security. Edge-based devices and use of power over Ethernet (PoE) are ways to do it. One PoE cable to each door reduces labor and material costs inherent in multiple wire runs. Wireless formats also lower installation costs. “Now we drop the price of the door, lower the installation costs, lower the amount of wire,” he says. Here are some other challenges for the access control market, as mentioned by suppliers: Technology support at the reader Technology shifts at the reader level can be a difficult pain point that requires visiting each reader to update firmware and can prove costly to the customer, says Jason Ouellette, product line director, access control, for Tyco Security. Moving forward, technology and standards such as the open security device protocol (OSDP) for readers will support the distribution of firmware updates for physical access control systems so that these updates can be controlled from the server, thus reducing cost, installation time and speeding up delivery of enhanced solutions to the customer. (Another supplier, AMAG, uses a 20 milliamp MultiNode Current Loop Protocol [MCLP] to provide bi-directional communication at greater distances and send a data stream to the reader.) Incorporating new features When adding new capabilities to a platform as complex as an access control solution, how that capability is implemented is as critical as the capability itself, says Krinitt. When presented with a new feature, customers might find that it does not meet their specific needs or is a significant challenge to use in day-to-day operations. When a feature is added to a solution, it makes a great addition to the checklist. However, there is also a need to understand the user and how they use the solution, Krinitt notes. Ease of use by “casual” users The need for security is increasing globally, yet customers are more cost-conscious than ever when it comes to their security system and their business as a whole. In many cases, the security system administrator also has many other tasks to perform in addition to security, says Ouellette of Tyco Security. The combination of these everyday realities creates a need for simple, quick-to-install and intuitive solutions that do not require a lot of training or support and can be used by an administrator who perhaps does not use the system on a daily basis, he says. Adding more doors From a dealer’s perspective, the more doors that are access-controlled, the better. “But how do we get more wallet share at a customer’s site?” asks Smith of Honeywell. Currently, maybe a front and back door or maybe a few office or server room doors are controlled, but little else. Many important doors, whether storage rooms, R&D labs, conference rooms, the president’s office, etc., are not being controlled (except by mechanical locks). Historically, it has been difficult to cost-justify additional doors, but new wireless electronic locksthat can communicate with an access control system are providing new opportunities. How do organizations prevent the compromise of electronic access control systems and related devices from hackers? Need for tighter integration with video End users want to use integrated video as metadata for personal identification. Tight integration of access control and video enables security to easily identify a person when access is granted or denied without going to a separate user interface, says Moss of S2 Security. Threats from cyber-terrorism The convergence of physical and logical security makes cyber-terrorism a growing concern, says Moss. “How do organizations prevent the compromise of electronic access control systems and related devices from hackers?” he wonders. Moss says all organizations should assess risks and develop a security policy. At a basic level, emphasis should be on preventative measures such as backing up data, securing the network with passwords and firewalls, and using up-to-date antivirus software to regularly check and eliminate problems. Organizations should also educate their employees about threats such as phishing and other cyber-attacks. Limiting users and logins to critical systems, as well as connecting virtual networks to physical systems, can reduce vulnerabilities, says Moss. Larger organizations have the resources to proactively monitor their vulnerabilities and current and emerging technologies to address new concerns. Problems should be reported immediately. At a broader level, cooperation among national security, law enforcement and even hackers can help identify issues. Implementation and management Solutions should be designed to take the guesswork out of implementation by integrators, says Krinitt. Integrators are often dealing with a wide variety of technologies and may be concurrently supporting multiple access control platforms, as well as other hardware and software solutions. Simplified installation may not receive much attention in the industry, but it does have a significant impact on end users. “If you have ever had an integrator show up to implement a solution and be unable to do so on the first visit, then you’ve experienced the impact of this challenge,” he says. Beyond not meeting the expectations of the end user, the problem also undermines the integrator’s goals to provide effective service to customers.
S2 Mobile Security Officer is designed for speed of information sharing, and real time response to situations in the field S2 Security, the leader in IP-based integrated physical security systems, recently announced the introduction of S2 Mobile Security Officer™, a revolutionary tablet app that makes security departments more effective. With S2 Mobile Security Officer, security management and staff can now operate their S2 access control and video management systems from anywhere, dramatically improving productivity, decision making and response time. Modeled after the “battlefield awareness” concept developed by military operations, S2 Mobile Security Officer is designed for ease of use, speed of information sharing, and real time response to situations in the field, while leveraging the advanced technology built in to every S2 system. S2 Mobile Security Officer is administered from a central location, and all actions taken by field security officers are instantly sent back to the command center. “Our vision is for users to be able to interact with their S2 system wherever, whenever and however they want,” said John L. Moss, CEO, S2 Security. “S2 Mobile Security Officer is an industry first that makes this a reality, with more exciting product developments to come.” S2 Mobile Security Officer allows mobile users to remotely open or lock doors; monitor activity and alarms; and muster for evacuations, coordinating multiple mustering points right on the tablet screen. Acting as a photo ID capture camera, S2 Mobile Security Officer lets users take photos and add them immediately to their centrally managed S2 system from the field. Users can also access and control surveillance cameras on demand, displaying high-quality, high frame rate video that can be shared as needed, where needed. Winner of the Security Products Magazine 2014 New Product of the Year Award in the Mobile Security Apps category, S2 Mobile Security Officer was live on display at ASIS 2014 in Booth 3837.
In support of its channel partner programs, S2 Security has appointed Sarah as Senior Director of Marketing S2 Security, the leader in IP-based integrated physical security systems, recently announced the expansion of its channel partner programs. These programs will drive growth and profitability for S2 integrators. They will also enable integrators to simplify the sales process, deliver more value to their customers and differentiate their service offerings. In support of the S2 Channel Partner Program, S2 Security has appointed Sarah Semerjian to the position of Senior Director of Marketing. Ms. Semerjian will oversee all aspects of marketing for the company including channel programs. With over 15 years of marketing, partnership and account management experience, she has an extensive understanding of the security industry and integrator business models. Previously she served as Director of Marketing at CheckVideo, LLC. “Our channel partner program must continue to attract, retain and reward the best partners in the industry,” said John L. Moss, CEO, S2 Security. “I’ve asked Sarah Semerjian to make the program a top priority.” “We want our partners to be as enthusiastic about our company and solutions as we are,” said Sarah Semerjian, Senior Director of Marketing, S2 Security. “We’re designing our channel partner program so that our partners can grow as fast as we do.” The expanded S2 Channel Partner Program will help integrators accelerate their business growth through a variety of elements including focused sales tools and marketing; lead generation; enhanced program communication; incentives and promotions; and training and education.