Physical security, security integration, video, access control, security market trends
Round table contributions
Delivering on customer expectations is a basic tenet of success in the physical security market. However, meeting expectations may be an elusive goal, whether because customer needs are not communicated effectively or because equipment doesn’t perform as promised. We asked this week’s Expert Panel Roundtable: what if a customer expects more than a security system can deliver?
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilized. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?
Body-worn cameras are becoming more common every day, driven both by needs of the marketplace and technology developments. However, questions remain about the usefulness of the devices, and their future role in promoting safety and security. We asked this week’s Expert Panel Roundtable: What are the challenges of body-worn cameras for the security industry?
The world of politics, like the world of security, is an environment of constant change. But do changes in one have an impact on the other? Governments around the world are involved in buying a wide variety of physical security systems, so how those governments operate certainly affects how they spend money on security. But in a broader sense, governments (and the associated political forces at work) also impact how their citizens and those in the private sector view threats and, as a logical extension, the security systems they need to address those threats. We asked this week’s Expert Panel Roundtable: How does the political climate affect spending on security systems?
A busy trade show abounds with new products and expanded features, colorful signage and blinking video screens, all competing for attention from busy attendees. It’s a microcosm of how the security marketplace – or any market, for that matter – sells its products. But what happens if the reality turns out different to the sales pitch? What happens when product or system performance doesn’t quite live up to the claims? Some would call that hype, and it can lead to disillusioned and frustrated customers. We asked this week’s Expert Panel Roundtable: What is the negative impact of hype in the security marketplace?
Consolidation is a reality in the security and video surveillance market. In the last several years, we have seen a variety of mergers and acquisitions (M&As) involving scores of companies of all sizes. But what is the impact of M&A activity on the companies involved, on their customers, and on the industry as a whole? We posed this question to our Expert Panel Roundtable: Do mergers and acquisitions have a net positive or net negative impact on the security market (and why)?
IP network dependability matters in physical security and safety applications, given that a company’s assets and people are at risk. There have been strides in the areas of network dependability, fault-tolerance, reliability, and survivability. However, networks (or affordable ones, at any rate) still cannot ensure near-100 percent uptime, which is why system designers acknowledge and plan for the possibility of a network outage. We asked this week’s Expert Panel Roundtable: How can/should an IP networked system adapt when network connectivity is lost?
Sometimes customers expect more out of a security system. A brand new security system just doesn’t perform as the customer expected it would. In fact, one might argue that the many variables in today’s complex systems make it more likely than ever that some element of a system might not measure up to a customer’s expectations. What happens then? We asked this week’s Expert Panel Roundtable: What happens if a customer’s expectations of system performance are greater than what a physical security system can deliver?
How mobile telephones have transformed into “smartphones” is one of the great technology stories of our time. What once was a single-function device now can do almost anything – display video, pay for groceries, monitor our health. The smartphones we carry in our pockets today have more computing power than the “super computers” of yesteryear, and that power has found many uses in a seemingly endless array of “apps.” Some of them are directly related to our physical security systems. We asked this week’s Expert Panel Roundtable: What security applications are best suited to smartphone apps?
One of the benefits of newer IP systems is the ability to store video inside the camera or in a nearby digital video recorder (DVR) at the edge of the network. Edge-based storage is unlikely to take the place of centralized storage, but it is complementary and provides some interesting new options related to system design. We asked this week’s Expert Panel Roundtable: What is the value of edge-based storage and in what specific applications?
Healthcare organizations are an important vertical market for many security manufacturers and integrators. Like other vertical markets, healthcare has its own unique set of requirements and challenges for physical security systems. We asked this week’s Expert Panel: What are the distinctive security problems faced by healthcare organizations? What technologies are being embraced to increase security?
Software changes constantly. There’s always a new patch or fix, and our computers persistently remind us that an update is available. As a core component of today’s IP networked video systems, video management software (VMS) is also subject to the need to be constantly updated and refined. We asked our Expert Panel Roundtable to elaborate: Why is it important that networked video customers keep up to date with the latest version of video management software (VMS)?
College campuses often operate like small communities – or even like large communities depending on enrollment. Although each college and university campus is unique, there are commonalities such as a young and vulnerable population of students, many living away from their parents for the first time. Campuses can be urban or rural, geographically dispersed or densely populated, with a variety of demographics and “wild card” elements such as partying, drugs and alcohol. Campus police and security officers face a variety of challenging environments. Is it wise to add firearms to the mix? Is it necessary for campus police to be armed? Specifically, we asked this week’s Expert Panel: In what situations should college or university campus police be armed?
More and more physical security systems are being hosted in the cloud. But are cloud-based security systems “safe?” It’s a question being posed by risk-averse security professionals all over the world, and one for which a clear, concise answer may be difficult to find. We decided to pose it to our Expert Panel.
We asked this week’s Expert Panel: What are the limitations on where video cameras can be placed because of privacy? With hundreds of new cameras installed every day, the likelihood increases exponentially that a camera will be placed in a location where it violates privacy. In fact, threats to privacy are often among the largest objections when video surveillance is proposed, whether in a public area or in the workplace. Allaying fears about undermining privacy is a basic requirement to make such systems acceptable to the public. It’s a touchy subject, but one our Expert Panel is willing to address.
Articles by Larry Anderson
Sooner or later (hopefully sooner), the novel coronavirus global pandemic will allow workplaces to reopen. But as we move into this recovery phase, there are many questions surrounding the transition. How can companies ensure facilities are in acceptable working order to reopen? How do they decide who is coming back and when? How will social distancing impact the operation of a company’s physical access control system? How can companies ensure that both visitors and employees are aware of the policy changes and extra controls? For answers to these and other salient questions, we called on Ian Lowe, Product Marketing Director of HID SAFE Identity and Access Management (IAM) solutions. “There’s no doubt about it: the global pandemic will change the way we live, work, and conduct business for some time,” says Lowe. “Over the past several weeks, we have been working with customers to enable a safe return to the workplace. We have observed that the number of challenges in the mid-to-long-term level and the associated complexity vary by location.” Lowe shares some of the proactive measures and best practices that can assist in a safe return to the workplace as we settle into a “new normal”. Challenge 1: Ensuring building readiness After being unoccupied for weeks or months, building readiness must be addressed completely before welcoming anyone inside. Even though employees may be eager to return, the workplace itself may not be ready. Companies may want to consider continuing remote work while facility operations are prepped. Challenge 2: workforce management There’s no doubt about it: the global pandemic will change the way we live, work, and conduct business for some time While it is dependent on location and industry, taking a phased approach is the best course of action when allowing employees, contractors and visitors back into facilities. First, facilities management will want to survey the property for readiness and then provide an estimate as to when employees may begin reporting back into the office. Next, it’s important to consider that office density needs are interrelated to the facility architecture. It is possible to accommodate a higher capacity of workforce in an airy, open office space than in a constrained one. A good rule of thumb is to start by introducing no more than 30% of employees back into the workplace at first. This could be a rolling group model in which the population total remains controlled and constant, but specific individuals vary from day to day. This option is good for a workforce that needs to be together in person but not necessarily all at the same time due to office density concerns. Welcoming visitors or customers into the office should be delayed as long as possible. If that’s not feasible, visitor numbers should be factored into the total density count. A cloud-based visitor management system can help with implementation. Challenge 3: Controlling access The ability to vet staff, employees, contractors and visitors before and during the return will vary greatly depending on the location. Policies should be implemented that require employees to be screened regularly — and for an extended amount of time. Look to answer the following questions: Where have you visited in the days since last entering the workplace? Have you come into contact with anyone else who has recently visited high-risk areas? Have you shown any symptoms of infection in the past xx number of days? Policies should be implemented that require employees to be screened regularly — and for an extended amount of time If there is cause for concern, refuse the visitor and/or supplement the screening process with additional steps. Temperature checking is mandatory in many organizations— often multiple times a day. This applies to interactions at delivery bays, too. A policy-based physical identity and access management solution integrated with existing physical access controls makes it possible to enforce, monitor and report this type of activity. Challenge 4: Social distancing and contact tracing plan Social distancing may continue within the office, which will impact restrictions and guidelines related to access control. The office layout may be reworked for proper distance between cubicles, workplace positions and employees. Specific entrances, exits and pathways may be designated as one-way-only. Assigning Bluetooth LE beacons to employees once they are inside the workplace will allow companies to monitor proximity to others and measure localised density in real-time by using location services, contact tracing, and surge response technologies. Challenge 5: Reduced physical touchpoints Contactless technologies can help enforce social distancing and reduce touchpoints on common surfaces Reducing the number of physical touchpoints is desirable throughout a workplace. Contactless technologies can help enforce social distancing and reduce touchpoints on common surfaces such as faucets, doorknobs, coffee pot handles, etc. While introducing additional security checks and screenings, it’s important to not increase touchpoints and further infection risks. There have been more requests for a contactless experience to secure workplace access, including automatic doors and turnstiles, contactless cards and mobile access. Challenge 6: Communicating for confidence Proactive communication is key to provide reassurance that appropriate safety measures have been taken and that both visitors and employees are aware of the policy changes and extra controls. Equally important is to communicate a policy change – and the reasoning behind it – before it happens. While there may not be an exact expiration date on these new policies, ensuring that impacted individuals will have a safer experience is universally appreciated.
Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. Touchless biometric systems in demand The trend has translated into a sharp decline in purchase of touch modality and a sharp increase in the demand for touchless systems, says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Biometrics solutions are being affected unequally, depending on whether they involve touch sensing, he says. Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads “Users do not want to touch anything anymore,” says Zarrabi. “From our company’s experience, we see it as a huge catalyst for touchless suppliers. We have projects being accelerated for touchless demand and have closed a number of large contracts very fast. I’m sure it’s true for anyone who is supplying touchless solutions.” Biometric systems are also seeing the addition of thermal sensors to measure body temperature in addition to the other sensors driving the system. Fingerscans and hybrid face systems TBS offers 2D and 3D systems, including both fingerscans and hybrid face/iris systems to provide touchless identification at access control points. Contactless and hygienic, the 2D Eye system is a hybrid system that combines the convenience of facial technology with the higher security of iris recognition. The system recognises the face and then detects the iris from the face image and zeros in to scan the iris. The user experiences the system as any other face recognition system. The facial aspect quickens the process, and the iris scan heightens accuracy. TBS also offers the 2D Eye Thermo system that combines face, iris and temperature measurement using a thermal sensor module. TBS's 2D Eye Thermo system combines face, iris and temperature measurement using a thermal sensor module Another TBS system is a 3D Touchless Fingerscan system that provides accuracy and tolerance, anti-spoofing, and is resilient to water, oil, dust and dirt. The 2D+ Multispectral for fingerprints combines 2D sensing with “multispectral” subsurface identification, which is resilient to contaminants and can read fingerprints that are oily, wet, dry or damaged – or even through a latex glove. In addition, the 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue. The system fills the market gap for consent-based true on-the-fly systems, says Zarrabi. The system captures properties of the hand and has applications in the COVID environment, he says. The higher accuracy and security ratings are suitable for critical infrastructure applications, and there is no contact; the system is fully hygienic. Integration with access control systems Integration of TBS biometrics with a variety of third-party access control systems is easy. A “middleware” subsystem is connected to the network. Readers are connected to the subsystem and also to the corporate access control system. An interface with the TBS subsystem coordinates with the access control system. For example, a thermal camera used as part of the biometric reader can override the green light of the access control system if a high temperature (suggesting COVID-19 infection, for example) is detected. The enrollment process is convenient and flexible and can occur at an enrollment station or at an administration desk. Remote enrollment can also be accomplished using images from a CCTV camera. All templates are encrypted. Remotely enrolled employees can have access to any location they need within minutes. The 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue Although there are other touchless technologies available, they cannot effectively replace biometrics, says Zarrabi. For example, a centrally managed system that uses a Bluetooth signal from a smart phone could provide convenience, is “touchless,” and could suffice for some sites. However, the system only confirms the presence and “identity” of a smart phone – not the person who should be carrying it. “There has been a lot of curiosity about touchless, but this change is strong, and there is fear of a possible second wave of COVID-19 or a return in two or three years,” says Zarrabi. “We really are seeing customers seriously shifting to touchless.”
Protecting the oil and gas market is key to a thriving economy. The list of security challenges for oil and gas requires the best technology solutions our industry has to offer, from physical barriers to video systems to cybersecurity. We asked this week’s Expert Panel Roundtable: What are the security challenges of the oil and gas market?
The general public gets much of its understanding of security industry technology from watching movies and TV. However, there is a gap between reality and the fantasy world. Understanding of security technologies may also be shaped by news coverage, including expression of extreme or even exaggerated concerns about privacy. The first step in addressing any challenge is greater awareness, so we asked this week’s Expert Panel Roundtable: Which security industry technology is most misunderstood by the general public and why?
Arteco’s VCA video analytics system is their latest new product, signaling a move from machine vision-based analytics to deep learning video analytics. A server – separate from the Arteco video management system (VMS) – manages the algorithms for the analytics. Arteco has been field-testing the product for a year and a half and had planned to launch it officially at ISC West in March (which was postponed). In lieu of the trade show launch, the company has been presenting the product (along with partners) through a series of webinars. The deep learning video analytics product operates out of the box – “just turn it on,” says Steve Birkmeier, Arteco VP of Sales. Functionality is based on “training” of pre-classified objects, such as differentiating between a person, an animal, a vehicle, or just clutter. The deep learning library focuses on people and vehicles. Detection and identification The new system detects everything in the field of view The new system detects everything in the field of view and only identifies what the operator is looking for, thus reducing false alarms. Any identified object is provided with an accuracy reading (e.g., 92% confident it is a human.) The system can be set up from the graphical user interface (GUI). Arteco VCA (video content analysis) also uses analytics rules, such as “if A+B=C, then do D.” Therefore, an abandoned object may elicit a different response than a violated area. With roots in the industrial automation market of the early-2000s, Arteco offers an event-based video management system (VMS) platform. That is, their emphasis is on identifying and providing video at the moment something happens rather than managing a vast amount of video that shows, in effect, nothing of interest. Arteco’s system, providing functionality expected in a full-featured VMS, is designed around the need to react to exceptions and events. Video verification “We can pull in events from any type of system and provide the related video,” says Steve Birkmeier, Arteco VP of Sales. “It can be access control, fire, intrusion, perimeter security, radar or microwave barriers, vape sensors, license plate recognition, or whatever.” An open connector, xml framework enables Arteco to interface with other systems and provide video verification of events. In addition to a focus on event-based video, Arteco also emphasizes ease of use, building on their 20-year history with video analytics. Another point of differentiation is their open architecture that easily and repeatably enables incorporation of third-party “events.” Finally, Arteco’s systems are competitively priced (less expensive), including flexible pricing and licensing structure to maximize value for a customer. In addition to security, there are multiple operational applications that use video verification In addition to security, there are multiple operational applications that use video verification. For example, integration with warehouse management software using metadata from warehouse surveillance video can provide a searchable database. An operator can enter a purchase order number, for instance, and the system provides video associated with that sale. The role of video in physical security Arteco has traditionally been a strong player in the utilities vertical, where event-based video management is useful to keep watch on high-value assets located in remote areas with little physical security. Another strong vertical is car dealerships in the United States, including security and loss prevention applications as well as integration with fleet management (using RFID and/or license plate reading). Arteco’s heat mapping capabilities can help a car dealer analyze customer activity to guide merchandising decisions, in the same way a retail store might. Big-box stores are another application for Arteco’s combination of marketing analytics, security and loss prevention. Arteco’s strength is also proving useful in the emerging, highly regulated cannabis industry. State regulations require that each marijuana plant be tagged, and systems are required to provide total chain of custody records from “seed to sale.” In the case of Arteco, video associated with a specific plant tag is available at each stage of growth, production and sale. Coronavirus and video management The analytics can detect when people are grouped together closer than 2 meters As an Italian company, Arteco has already applied its deep-learning VCA product at city centers in Italy, which was hard hit by the novel coronavirus. The analytics can detect when people are grouped together closer than 2 meters, for example, and can provide an alarm if social distancing requirements related to the coronavirus are not being observed. The system can also detect and confirm the use of face masks at an entrance. Tracking that number – the percentage of customers who comply – in real time might offer additional peace of mind for high-risk customers entering a store, for example. Birkmeier contends the world has been changed forever by the pandemic, although acceptance over time of new technologies being introduced will vary greatly by geographic location. Already, in the last decade or so, acceptance of video surveillance has been greater, even in the U.S. market, he says. ”More often you hear ‘why don’t you have cameras’ rather than ‘I don’t like these camera here,’” he comments.
Video management systems (VMS) have been around almost since the advent of IP cameras. During those years, VMSs have evolved from software that provides basic functionality to more user-friendly systems offering a growing list of capabilities, many of them related to analyzing data as well as recording and displaying video. But the evolution is far from over. We asked this week’s Expert Panel Roundtable: What’s new with video management systems (VMS), and what are the new opportunities?
The next step in the journey of digital transformation, the fifth generation of wireless communications technologies (5G) will have an enormous impact on mankind, and on every industry including security. In short, 5G will disrupt the way we live and work. To discuss the changes, we presented our questions to Benoît Jouffrey, VP 5G Expertise at Thales, which is at the forefront of the transformation with an emphasis on trust and security. Following are his responses. Q: In layman's terms, what is the difference between 4G and 5G ecosystems as they relate to opportunity, flexibility and choice in networking tools? Jouffrey: Compared with largely one-size-fits-all 4G services, the 5G ecosystem will provide organizations with much greater choice and flexibility in the way they communicate over mobile networks. The network slicing capabilities of 5G means that business can have their own independent networks, with each one customized to their unique requirements and backed up by service-level agreements (SLA). Another aspect of 5G will be the ability to drive latency between UE (User Equipment) and network down to below a few milliseconds, which will massively boost the performance and scalability of enterprise applications. Q: How can these capabilities drive a company's digital operations? 5G will allow enterprises to be connected more efficiently Jouffrey: 5G will allow enterprises to be connected more efficiently: they can rely on a higher density of connected devices exchanging more information in a better timeframe. Due to these slicing capabilities, 5G networks allow for much greater personalization than 4G networks. This means that businesses could benefit from this personalized network, tailored to their portfolio of Internet of Things (IoT) use cases, and not be necessarily expected to rely on a one-size-fits-all network. By combining the unique capabilities of 5G with the insights derived from analytics, machine learning, and artificial intelligence, enterprises will be in much better stead to run their operations efficiently and securely. Q: How might 5G impact the use of cloud systems? Jouffrey: 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have a small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate. Q: How can one provide trustworthy 5G lifecycle management for IoT devices? Jouffrey: Trustworthy IoT lifecycle management is an end-to-end approach from the secure provisioning of keys within the devices, to the proper identification of the users, from the authentication on the network or the network slice, to the secure handling of the data either at stored or in motion. Resources need to be invested long before this to qualify the business model, in prototyping, as well as prototype testing. Most organizations don’t have the resources to counter all the security challenges of their 5G IoT deployments. Businesses will often end up choosing between navigating a risk-laden 5G environment, with inadequate or incomplete trust mechanisms, or outsourcing these requirements. When looking at outsourcing, companies must choose a provider with expertise in digital security, ensuring 5G IoT deployments have data protection and connectivity credentials built in, together with end-to-end data protection solutions such as encryption – protecting data in the device, network, and cloud at rest and in transit. Q: How can wireless modules address new 5G IoT use cases? Wireless modules can be expected to play a bigger role than in previous generations of cellular Jouffrey: As IoT considerations are integrated into the 5G ecosystem, wireless modules can be expected to play a bigger role than in previous generations of cellular. 5G modules support different characteristics to earlier generations – the 5G use cases are much more complex, varied, from high-end use cases requiring high data usage and throughput, such as for industrial routers, to low-throughput, energy consumption optimized devices, as required for some IoT sensors. At the end, compared to the largely one-size-fits-all approach that preceded it, 5G will increase the demand for vertical-tailored wireless modules. Importantly, these wireless modules need to support new data protection and security features that go well beyond conventional compliance to 3rd Generation Partnership Project (3GPP) standards. Due to the extent of personalization within 5G networks, wireless modules must also offer providers and customers greater security as well as agility all along the device lifespan. Q: What are the new data protection challenges posed by 5G, and how can they be addressed? Jouffrey: The 5G era presents exciting opportunities, as well as security challenges. The greatest risks to enterprise data on 5G networks – including eavesdropping, man-in the middle attacks, denial of services, loss or compromisation of data – were already known in 4G. The 5G standards have looked at providing answers to these threats and come with some noticeable improvements, such as the encryption of the international mobile subscriber identity (IMSI), otherwise known as the Subscription Permanent Identifier in 5G. But what’s different with 5G is the threat surface area, due notably to the variety of devices that will be used over these 5G networks and the underlying technologies used for the deployment of the networks, such as cloud native virtualization. On top of this, it’s the first generation of cellular to launch in an era of global cyber-crime, funded by organized crime and states alike. So, whilst enterprises should look to the ecosystem of telecom operators and cloud providers, vendors, and system operators to help understand the opportunities presented by 5G – this same ecosystem needs to guide them in countering any new risks that the 5G architecture may pose. The key to securing 5G enabled devices is to build security into devices from the outset using encryption. The key to securing 5G enabled devices is to build security into devices from the outset Q: What new roles can the 5G embedded universal integrated circuit card (eSIM) endorse in network authentication? Jouffrey: 5G is the first generation of cellular to launch in a buoyant eSIM market. The eSIM will be key in supporting network slicing authentication and security, enabling enterprises to leverage their credentials to pre-select network slices. However, to support secure authentication for mobile networks that may require the usage of different authentication algorithms over time, these 5G eSIMs must support this flexibility of usage of multiple authentication and authorization credentials. With this capability built into these eSIMs from the start, mobile operators can remotely swap the authentication algorithm either for a dedicated primary authentication, or in a definitive way, thanks to key rotation management, thus maintaining a trusted environment.
The COVID-19 global pandemic will have a profound and lasting impact on the physical security industry. It will boost adoption of new technologies to address new types of threats. It will map out a path for new involvement of physical security technologies in areas of public health. It will raise new notions of privacy and turn previous thinking about privacy on its head. And the aftermath of the pandemic will give rise to all these changes in a breathtakingly accelerated timeframe. In the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace. Security and the futureIn the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace These were some of the thoughts I heard recently in a panel discussion titled “Crisis and the Everyday,” which was part of Genetec’s Connect’DX virtual trade show, April 20-21. The virtual conversation – emphasising both in form and content the current topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security. “How do you support the business and, more broadly, societies and communities?” The new normal for security The “new normal” for security will include addressing biological risks alongside our traditional emphasis on physical risk and digital risk. “Some industry sectors are being challenged in a way I have not seen in my lifetime,” said Brekke. “But they are learning fast.” “We should take a look at where we have been and where we are going,” said Brekke, whose firm develops comprehensive strategies to align security organizations with corporate missions. “This is a point in time that has never existed, and a time to take a fresh look at what security is to the corporation and greater community. It’s more a mindset than a specific set of tasks. “We just need to take a fresh look from a mix of perspectives.” “Crisis and the Everyday" was part of Genetec’s Connect’DX virtual trade show Infrared cameras and access control technologies New technologies to address the pandemic are enabling some nations around the world to track how people come and go and who they are exposed to. Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing. But what will such use of these technologies mean in the long term? Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing “We will see whether people will become more comfortable with this technology,” said Ken Lochiatto, President and CEO, Convergint Technologies, a service-based security integration company. “Tools are in hand, and coming soon, that will allow us to be more proactive, to step in and measure the health of colleagues, for example,” said Lochiatto. “There are a lot of questions that will have to be addressed, and a lot of discussion will have to happen. Coronavirus will knock down the barriers (to the use of newer technology) in the short term, but where will it settle two years from now?” Manufacturer philanthropy Security product manufacturers are expanding their scope beyond law enforcement and emergency management and stepping forward to help with the public good. “Technology in the security space is moving faster than the political establishment is thinking about,” adds Lockiatto. “We have to manage it as an industry so the government will not step in. We need to manage the discussion.” An accelerated timeline will raise the stakes even further. “All the questions that would have taken longer to answer will be answered in the next 6-8 months. For the security industry, it will drive even greater need for products,” said Lochiatto. “The biggest question is ‘Where does this all go?’” said Brekke. “What is the new normal? What is the future, and how do we prepare our companies for it? What does technology look like in the future? There isn’t just one particular set of questions, just a constant stream of ‘What’s next?’” Public health versus individual liberty The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection, especially as it pertains to sharing medical information. “There will be a new balance between public health and safety as a whole versus individual liberties,” said Brekke. “Technology providers need to be at the table talking about the solutions. We should all be engaged in government affairs to balance the discussion and add our own perspectives. As a society and country, we have to come to a different perspective on this.” The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection “There are not enough ethics and guard rails,” said Jonathan Ballon, Vice President and General Manager, Intel Corp. “The majority of people are not afraid enough. They should be afraid; we need more regulation. We need to establish an ethical code of conduct for use of technology in these situations. We need to eliminate bias, respect individuals, and ensure people are being treated fairly. “In the next several years, there will be a lot of experimentation in the quest to get to a future state we can see and almost grasp. There will be black eyes and bruises on the path to getting there.” From smart security to more intelligent technology After the pandemic, the innovation climate will befit new technology adoption. “Platforms are only limited by our imaginations, and it creates an extraordinary opportunity and drives a lot of economic value,” said Ballon. “Long-term, the future is extremely bright. Companies should ensure that they are resilient and take advantage of another period of technology adoption, which we see coming out of every economic downturn.” After the pandemic, the innovation climate will befit new technology adoption Another evolution in the market is a transition from “smart” systems to more “intelligent” ones. Intelligence includes the ability to “learn” using tools such as deep learning and artificial intelligence. “Systems are going from smart to intelligent to autonomous, including systems that can operate within the constraints we have established,” said Ballon. Pierre Racz, president and CEO of Genetec, offered some words of caution about the growth of artificial intelligence in his keynote presentation, “AI Hype Self Defense.” Racz sought to provide guidance on the limits of the technology and urged the online audience to be skeptical of technology that “works best when you need it least.” “Science and technology are morally neutral,” he said. “How we use them is not.” Intelligent automation over artificial intelligence Specifically, Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm”. AI systems don’t know anything that isn’t included in their input data – for better and for worse. Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm” “A properly designed system can be useful [only] if you engineer around the false positives, false negatives and the unanticipated training set biases,” said Racz. For example, because AI is based on probabilities, it doesn’t perform as well when identifying improbable things. In lieu of “artificial intelligence,” Racz recommends the term “intelligent automation” (IA), which describes using a machine (computer) for heavy computational lifting and keeping a human in the loop to provide intuition and creativity. “Do not misinterpret crafty guessing for intelligence or thinking,” Racz warns. “AI doesn’t exist, but real stupidity exists. And we must design our systems taking into account the legitimate fears of the public we serve.”
We are all more aware than ever of the need for cybersecurity. The Internet of Things is a scary place when you think about all the potential for various cyber-attacks that can disrupt system operation and negatively impact a customer’s business. Because most physical security systems today are IP-based, the two formerly separate disciplines are more intertwined than ever. We asked this week’s Expert Panel Roundtable: How can cybersecurity challenges impact the physical security of a company (and vice versa)?
Cloud systems are among the fastest-growing segments of the physical security industry. The fortunes of integrators can improve when they embrace a recurring monthly revenue (RMR) model, and cloud systems are expanding the services and features manufacturers can provide, from remote diagnostics to simplified system design. But for all the success of cloud systems, there remains confusion in the market about the exact definition of “cloud.” Or does there? We asked this week’s Expert Panel Roundtable: What is “the cloud?” Is there agreement in the market about what the term means?
The drive for learning doesn’t diminish, even in times of a global pandemic. To accommodate the demands of social distancing, more training today happens online. “We have seen unprecedented international demand for our portfolio of online training courses ranging from small installation companies to the largest organizations, across a wide range of sectors,” says Jerry Alfandari, Group Marketing Manager of Linx International Group, a U.K. training firm. “More than ever, businesses are looking to ensure they have the skills in-house to coordinate their response to the changing situation. Individuals are also taking this time to upskill themselves for when we return to ‘normal’ by bringing something with them they didn’t have before. Perhaps unsurprisingly, people are still seeking to better themselves for what will be, eventually, a competitive market.” Expert security training Topics such as CCTV, Access Control, Intruder and Fire Tavcom Training, part of the Linx International Group, provides technical security training delivered by expert tutors on topics such as CCTV, Access Control, Intruder and Fire and also CCTV Control Room and Security Management. Given the practical nature of the courses, the majority have historically been delivered in a state-of-the-art training centre through interactive workshops. However, in order to best protect their staff and learners, and following government guidelines, Tavcom have closed their training centre for the time being. Learners are still able to book into classroom courses for later in the year with a choice of two learning centres now being offered: Hampshire or the recently established training centre in Shipley. For those who prefer to learn online, Tavcom delivers accredited online security training. “Given the situation we are all in at the moment, our online courses have seen an 86% increase in demand over the last several months,” says Alfandari. All online courses offer the same level of support as the classroom courses, with many accredited to BTEC level 3 and 5, catering to professionals of varying skill levels and experience. Improve your professional development “Our online courses remain as accessible as ever, with huge numbers of security systems engineers and professionals seeking to use this [quarantine] time to improve their professional development,” Alfandari says. “We encourage all people to consider the benefits of eLearning and, if they need any advice, to reach out to the Tavcom training team.” It’s more important now than ever before that learners are able to access Tavcom’s online learning programmes and continue in their professional development, he says. To help facilitate learning, the company has discounted 25% off the portfolio of eLearning courses, many of which are BTEC accredited and come with expert tutor support. We are also introducing new interactive ways of teaching traditionally classroom-based courses" “We are also introducing new interactive ways of teaching traditionally classroom-based courses with the aid of Zoom virtual classroom courses, led by our tutors,” says Alfandari. “From the learner’s own home, they will be able to undertake their chosen training course and return to the training centre later in the year to complete the practical assessment.” Skillsets remain in demand Even the most well-prepared organizations with extensive contingency plans have been stunned by the scale and speed of the current situation. Alfandari says: “We are finding especially our Intruder Alarms courses for repair and maintenance engineers have been exceptionally popular; those skill sets remain as in demand as ever in these troubled times.” A sister company, PerpetuityARC Training, offers Security Management BTEC Level 4 and Risk, Crisis and Disaster Management BTEC Level 4 courses that are purposely designed to help businesses and those responsible for security learn how to identify threats, risks and vulnerabilities, and create a comprehensive plan that will enable practical measures to be applied to mitigate the impact. Both courses run via two media: classroom or online and are tutor-supported so learners have a choice according to what best suits their needs and requirements. An online Essential Security Practices course is comprised of 12 modules designed to introduce the essentials of corporate security. Modules can be bought individually or as a whole course and will establish fundamental knowledge of best security practice. “It’s a great starting place if you’re new to security or want to brush up on your expertise,” says Alfandari. Maintaining a security presence is a challenge during a global pandemic. “With people following guidelines by staying at home, we’ve been working hard to drive the message that learning doesn’t stop just because you can’t go out,” says Alfandari. “People may think that because they can’t get to the training centre then they can’t train, but that’s just not the case.” Learning in these unprecedented times Our training centres may be closed for now, but our courses are still very much running" Between Tavcom Training and PerpetuityARC Training, there are more than 20 distance learning courses including ASIS International and The Security Institute, all of which can be accessed at home, at a learner’s own pace. “It’s important that people understand that we’re still here, still available and that we haven’t ‘gone away’,” says Alfandari. “Our training centres may be closed for now, but our courses are still very much running. “ “These are, without doubt, extremely difficult times,” he adds. “We are here for our learners. Our team are working hard behind the scenes to facilitate the best possible learning experience during this time, and we encourage all potential learners to really use this and make the most of it. Whether you want a refresher in security basics or finally to start on that qualification you’ve been putting off, we are here to help you in your professional development.” Rhiannon Limbert, Marketing Coordinator for Linx International Group, contributed to this content.
There was a time when men dominated the physical security industry. On second thought, that time is today. Even with increasing numbers of women entering our community, it’s an industry that is still mostly populated by men. But change is coming, and the industry as a whole is benefiting greatly from a surge in female voices. We asked this week’s Expert Panel Roundtable: What is the changing role of women in security?
Superior image quality has been the “holy grail” of the video surveillance business for several years. A transition to 4K images and a race to ever-higher pixel counts have dominated product development conversations for a while now. However, it’s now possible that the tide has turned. These days, data is sometimes more important than image quality, and increasing use of smaller-format mobile devices has helped to make image quality variations moot. As the industry changes, we asked this week’s Expert Panel Roundtable: What’s the next big thing in video image quality (beyond 4K and megapixel)?
Axis Communications has introduced a body-worn camera solution, which the company says represents a natural extension of their corporate vision, business strategy and core competence. The new body-worn cameras and other elements of the system will provide Axis new opportunities to grow by tapping into existing and new customers. The fast-growing body-worn camera market is an attractive one, and Axis sees opportunities to extend the use of body-worn cameras beyond the current core market of police and corrections officers. Private security applications for the technology include healthcare, education, banking, public venues, retail, logistics, transportation and places of worship. The new body-worn camera system was designed with Axis partners and ecosystem in mind, says Martin Gren, Founder and Director of New Projects at Axis. “We try to make it fit with existing customers.” Deploying and using the system The new body-worn camera system was designed with Axis partners and ecosystem in mind Gren says the system is easy to deploy and use. The Axis W100 camera provides 1080p images, wide dynamic range (WDR) and has dual microphones, operating 12 hours on a single charge. GPS/GNSS global satellite navigation provides location, and a six-axis gyroscope and accelerometer offer additional data beyond the video image. For example, sensors might be triggered in some situations to initiate recording. One-bay (Axis W700) or eight-bay (Axis W701) docking stations enable high-speed supervised data offloading and battery charging, and a system controller (Axis W800) provides a central point for integration and management. Use of Zipstream compression technology saves on bandwidth and storage. Video cannot be accessed in the field, but only when a camera has been docked. There are many layers of security, and encryption protects all data used in the system from being accessed by outside agents. The USB interface cannot be connected to an ordinary computer but only to the docking station. Open standards Open standards ensure easy integration with video management systems and/or evidence management systems, whether on-premises or in the cloud. At the time of release, the Axis body-worn camera system is already integrated with Milestone XProtect, Genetec Security Center, and Axis Camera Station VMSs. It is also integrated with the Genetec Clearance cloud-based evidence management system. An application programming interface (API) will facilitate additional integrations over time. The body-worn cameras will be sold through the current Axis channels The body-worn cameras will be sold through the current Axis channels of distributors, systems integrators and resellers. The camera is part of the Axis “ecosystem,” which includes the company’s familiar network cameras as well as recent additions such as access control, network audio systems (including loud speakers), intercom door stations, a radar detector and other Internet of Things (IoT) devices. “The more things you integrate, the more value you add to customers,” said Gren. The new body-worn camera systems are core products for Axis; they are not made by another original equipment manufacturer (OEM) and merely sold under the Axis label. “When we decided to do body-worn cameras, OEMing was not an option,” said Gren. “Instead we took some experienced Axis engineers and a bunch of new ones to develop this product line to ensure the same Axis quality and compatibility.” Introducing the new product The body-worn camera system was unveiled remotely in a press conference webinar; the original plan was to introduce the new product at ISC West, which was canceled to minimize spread of the novel coronavirus. In addition to announcing the new product, the Axis executives provided commentary and insight into the ongoing coronavirus crisis. “The security industry is a close-knit community that is connected in more ways than one,” said Fredrik Nilsson, Axis Vice President of the Americas. “We are all in this together. The industry has always exemplified resiliency, ingenuity and vision to address such challenges.” We are all in this together. The industry has always exemplified resiliency, ingenuity and vision" “There is some disruption in the Axis supply chain, but we have a broad partner-based supply chain when it comes to our sub-suppliers, our seven global CLCs (Configuration and Logistics Centers) and the distributors who keep inventory for integrators,” said Nilsson in the March 18th press call. “There is some stress on some components, but things are working relatively well under the circumstances. We are monitoring it on a day-to-day basis, but so far we have been able to hold things up very well.” Gren offered a comment on the possible use of thermal cameras (which Axis makes) to measure body temperature during the COVID-19 crisis: “When we designed our thermal cameras, that was a common question,” he said. “But in general, it is difficult to use a thermal camera to get an accurate reading. We have one model – the Q2901 – that is a temperature-accurate thermal camera, and if you look straight into the camera, it is accurate to around 1° F. However, there are more efficient ways to [measure temperature]. In general, it’s not a business application I would recommend.”
Video is widely embraced as an essential element of physical security systems. However, surveillance footage is often recorded without sound, even though many cameras are capable of capturing audio as well as video. Beyond the capabilities of cameras, there is a range of other audio products on the market that can improve system performance and/or expand capabilities (e.g., gunshot detection.) We asked this week’s Expert Panel Roundtable: How does audio enhance the performance of security and/or video systems?
Even though ISC West 2020 was canceled, many of the product introductions planned for the trade show still happened. For example, physical security and secure identification company Identiv introduced the Hirsch Velocity Cirrus and MobilisID. Hirsch Velocity Cirrus is a cloud-based Access Control as a Service (ACaaS) solution. It is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. Smart mobile physical access control solution Identiv’s MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. We caught up with Jason Spielfogel, Identiv’s Director of Product Management, to discuss the new products and other topics. Q: How is Identiv positioned in the market as a whole? What philosophy drives your product offerings? What vertical markets do you target? Every customer needs every one of these components Spielfogel: Identiv provides a total solution. Our platforms provide access control hardware and software, video surveillance and analytics, door access readers, and ID credentials, both cards and mobile, for a variety of vertical markets: Federal government, state, local and education government agencies (SLED), healthcare, schools, banks/financial services, retail, airports and transportation, and infrastructure. Every customer needs every one of these components in every physical security deployment, and we ensure that all parts are working together at all times, even as technology continues to evolve. With that said, our philosophy is very customer-centric, and we position ourselves as a trusted partner. Our products and technology platform always strive to reflect and anticipate the environment our customers are facing, both in terms of technical requirements and functional capabilities. Q: How does the MobilisID system eliminate "friction?" Spielfogel: Identiv’s MobilisID eliminates the “friction” of access control by forgiving the user from presenting a physical credential to the reader. A simple wave of their hand over the MobilisID reader establishes a connection, and the reader reads their mobile device’s credential from the MobilisID app. No badge or access card to read, and no contact with the reader, makes this a frictionless access control experience. Administrative friction is also eliminated because there is no physical credential to issue or withdraw; it’s all done via the MobilisID Manager. Hirsch Velocity Cirrus is a cloud-based Access Control as a Service (ACaaS) solution Q: Discuss the advantages of Bluetooth over competing technologies. Bluetooth offers a blend of reliability and specificity Spielfogel: There are two primary competing technologies: WiFi and Near Field Communication (NFC). The problem with WiFi is that it’s not location-specific. In other words, the WiFi router can’t tell which door the user is near. NFC has the opposite problem in that it’s impossible to get credential reads unless the phone is presented within an inch or two of the reader. Bluetooth offers a blend of reliability and specificity to create frictionless access. Q: "Touchless" has always been a big selling point. Doesn't the coronavirus improve the outlook for these systems even more? Spielfogel: The coronavirus certainly highlights the value of frictionless access. But the vast majority of access systems today use proximity which was already touchless. But for systems using touchpads or contact-based credentialing, certainly frictionless is offering some alternatives that would help keep employees and visitors safer in the current climate. Q: How else might the current pandemic change the security market forever (i.e., more teleworking?) Spielfogel: Permanent changes are not likely, but it does force security directors to rethink how their employees interact physically with systems for both physical and logical access. As a result, we might see accelerated adoption of some emerging technologies, such as greater use of mobile logical access solutions, as well as frictionless physical access control. We’ve already seen an uptick in our smart card reader and token line and our Thursby enterprise and personal mobility offering during the coronavirus pandemic. Q: There are a lot of cloud systems in the access control space. How is your Cirrus cloud product different? Velocity already has all those features Spielfogel: Cirrus is different from many others in that it’s built on one of the most mature, feature-rich, secure physical access solutions available today – Hirsch hardware and Velocity Software. While many competitors are scrambling to add features to their relatively new ACaaS platforms, Velocity already has all those features. While they are building up their encryption capabilities and cybersecurity testing, we’ve already been doing that for two decades. We certainly have some more development ahead of us for Cirrus, but most of it is just surfacing features we already have into the Cirrus interface. Q: How do you guide customers as their needs change? Spielfogel: Whether users want solutions that are on-prem, in the cloud, or anything in between, Identiv’s full architecture ensures that customers can adopt and migrate to new solutions as they see fit. No two customers are alike, so providing the flexibility to gradually update or change systems is a real differentiator. Our competitors either want customers to jump all at once to the cloud or push to keep everything on-prem/legacy. CSOs and CISOs live in a different world: They've got it all to deal with. We're there with them across all of it, because that's the true reality.
Motorola Solutions has agreed to acquire IndigoVision, a U.K.-based provider of end-to-end video security solutions. The boards of Motorola Solutions, its holding company and IndigoVision have reached an agreement on the terms of a recommended cash acquisition for approximately $37.2 million, representing a premium of approximately 116 percent based on the average share price over the most recent 12-month period. The acquisition will be funded by existing cash resources of Motorola Solutions and become final in May 2020. Motorola Solutions has a strong presence in the large and expanding area of video security since acquiring Avigilon in March 2018. Their product offerings include high-definition cameras, advanced video analytics, network video management hardware and software and access control solutions. IndigoVision is a developer of complete, end-to-end video security solutions from cameras to video recorders to body worn cameras to security management software. Motorola Solutions says the IndigoVision range of products, global presence and customer base are "highly complementary" to Motorola Solutions' existing presence in video security. Among the benefits is enhanced geographical reach across a wider customer base. "The access we will now have to Motorola Solutions' range of innovative technologies will create new opportunities for IndigoVision and enable us to bring an exciting proposition to the market that allows us to further deliver on our goal of delivering safety, security and business intelligence," says Pedro Vasco Simoes, Chief Executive Officer of IndigoVision. "We share IndigoVision's commitment to providing next-generation, end-to-end video security solutions that enhance safety, security and efficiency," says John Kedzierski, Senior Vice President, Video Security Solutions, Motorola Solutions.
The global pandemic caused by the novel coronavirus is changing work environments to an unprecedented degree. More employees than ever are being asked to work remotely from home. Along with the new work practices comes a variety of security challenges. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Covid-19 concerns Concerns about the coronavirus have increased the business world’s dependence on teleworking. According to Cisco Systems, WebEx meeting traffic connecting Chinese users to global workplaces has increased by a factor of 22 since the outbreak began. Traffic in other countries is up 400% or more, and specialist video conferencing businesses have seen a near doubling in share value (as the rest of the stock market shrinks). Basic email security has remained unchanged for 30 years Email is a core element of business communications, yet basic email security has remained unchanged for 30 years. Many smaller businesses are likely to still be using outdated Simple Mail Transfer Protocol (SMTP) when sending and receiving email. “The default state of all email services is unencrypted, unsecure and open to attack, putting crucial information at risk,” says Paul Holland, CEO of secure email systems provider Beyond Encryption. “With remote working a likely outcome for many of us in the coming weeks, the security and reliability of our electronic communication will be a high priority,” says Holland. The company’s Mailock system allows employees to work from any device at home or in the office without concerns about data compromise or cybersecurity issues. Acting quickly and effectively As the virus spreads, businesses and organizations will need to act quickly to establish relevant communication with their employees, partners and customers surrounding key coronavirus messages, says Heinan Landa, CEO and Founder of IT services firm Optimal Networks. Employers should also enact proper security training to make sure everyone is up to speed with what’s happening and can report any suspicious online activity. Reviewing and updating telework policies to allow people to work from home will also provide flexibility for medical care for employees and their families as needed. Scammers, phishing, and fraud An additional factor in the confusing environment created by the coronavirus is growth in phishing emails and creation of domains for fraud. Phishing is an attempt to fraudulently obtain sensitive information such as passwords or credit card information by disguising oneself as a trusted entity. Landa says homebound workers should understand that phishing can come from a text, a phone call, or an email. “Be wary of any form of communication that requires you to click on a link, download an attachment, or provide any kind of personal information,” says Landa. Homebound workers should understand that phishing can come from a text, a phone call, or an email Email scammers often try to elicit a sense of fear and urgency in their victims – emotions that are more common in the climate of a global pandemic. Attackers may disseminate malicious links and PDFs that claim to contain information on how to protect oneself from the spread of the disease, says Landa. Ron Culler, Senior Director of Technology and Solutions at ADT Cybersecurity, offers some cyber and home security tips for remote workers and their employers: When working from home, workers should treat their home security just as they would if working from the office. This includes arming their home security system and leveraging smart home devices such as outdoor and doorbell cameras and motion detectors. More than 88% of burglaries happen in residential areas. When possible, it’s best to use work laptops instead of personal equipment, which may not have adequate antivirus software and monitoring systems in place. Workers should adhere to corporate-approved protocols, hardware and software, from firewalls to VPNs. Keep data on corporate systems and channels, whether it’s over email or in the cloud. The cyber-protections that employees depended on in the office might not carry over to an at-home work environment. Schedule more video conferences to keep communication flowing in a controlled, private environment. Avoid public WiFi networks, which are not secure and run the risk of remote eavesdropping and hacking by third parties. In addition to work-from-home strategies, companies should consider ways to ensure business cyber-resilience and continuity, says Tim Rawlins, Director and Senior Adviser for risk mitigation firm NCC Group. “Given that cyber-resilience always relies on people, process and technology, you really need to consider these three elements,” he says. “And your plan will need to be adaptable as the situation can change very quickly.” Employees and their employers Self-isolation and enforced quarantine can impact both office staff and business travelers Self-isolation and enforced quarantine can impact both office staff and business travelers, and the situation can change rapidly as the virus spreads, says Rawlins. Employees should be cautious about being overseen or overheard outside of work environments when working on sensitive matters. The physical security of a laptop or other equipment is paramount. “It’s also important to look at how material is going to be backed up if it’s not connected to the office network while working offline,” says Rawlins. It’s also a good time to test the internal contact plan or “call tree” to ensure messages get through to everyone at the right time, he adds.
HID Global is introducing a new “flagship” line of access control readers as successors to the iCLASS line. The new HID Signo readers will support 15 different credentialing formats and communicate using the latest NFC (near field communication), BLE (Bluetooth Low Energy) and OSDP (Open Supervised Device Protocol) standards. HID Global says the new readers will simplify integration to more secure and mobile credentials. HID Global has invested in a “future-proof” approach that both accommodates a variety of current market needs and can adapt to embrace new technologies as they come onto the market. The new line incorporates “all the hardware you need,” combining the capabilities of older generations of readers into a single product. Simplifying the choice of readers The new reader line seeks to simplify the choice of readers in a time when a variety of trends is complicating the access control market, from cloud systems to mobile access to identity management. “We are simplifying the way we bring our products to market, and baking it all into our readers,” says Harm Radstaak, HID Global Vice President and Managing Director. “If an installer takes a reader out of the box and mounts it on the wall, it just works.” We are simplifying the way we bring our products to market" In designing the product, HID sought feedback from channel partners, installers, consultants and end users on how the new readers would function. In addition, the company sought advice from architects on the design of the product. Aesthetics and industrial design elements were a priority because they ideally reflect the quality and “promise” of how the product will perform. Cybersecurity Cybersecurity is another emphasis. The readers store cryptographic keys and process cryptographic operations on certified EAL6+ secure element hardware, and custom authentication keys can be used for organizations who prefer that level of control. EAL6+ certification is a designation of the Evaluation Assurance Level of an IT product or system (the highest score is EAL7). Signo also includes a velocity checking feature designed to mitigate and thwart brute force attacks. “The new Signo line is a continuation of the journey we have been on,” says Radstaak. “It is the natural succession of what we have been doing for years, and it underlines our position in the market.” By natively supporting mobile credentials, the new product line reinforces HID’s commitment to mobile systems, which the company first brought to market in 2014. Signo readers also include Enhanced Contactless polling to support mobile credentials in Apple Wallet. Addressing standards Embracing the OSDP standard, which was created in 2008, also addresses the growing customer need for bi-directional, secure communications. There is built-in support for OSDP Secure Channel as well as legacy Wiegand communication for organizations seeking to transition. Signo incorporates support for most credential technologies globally, including Seos, credentials with HID’s Secure Identity Object, and a variety of 125kHz legacy technologies such as Indala and Prox. The flexibility and openness of Signo is a response to the acceleration of new technologies entering the access control market. “If you look at new technologies in general, our market has been slow in adopting them,” says Radstaak. “However, with new entrants in the market, new technologies, new device manufacturers and artificial intelligence (AI), I believe the market is adopting new technologies much faster than before. Users are much savvier.” The consumer Administrators will be able to remotely configure and diagnose readers Radstaak says he expects market adoption of the new readers will be fast. “Customers have been waiting for this platform,” he says. “This has been a tremendous investment for HID Global, and it underlines our position in the market with its open platform, simplicity and future-proofing. We are prepared for whatever comes next technology-wise.” With Signo readers, administrators will be able to remotely configure and diagnose readers as well as monitor status through a centrally managed and connected reader ecosystem. As a member of the FiRA Consortium, HID Global has advocated bringing new technology to market based on the “fine ranging” capabilities of ultra-wideband (UWB) technology, which has applications in detection of the precise location or presence of a connected device or object. It’s the kind of technology that Signo platform’s “future-proofing” approach is geared to accommodate. “As the capability unfolds, we will be there to adapt,” says Radstaak.
With just days left until the planned industry trade show, Reed Exhibitions has canceled ISC West over concerns about the COVID-19 coronavirus. Here is the statement on the decision: 'We at ISC West want to express our concern for everyone impacted by the COVID-19 coronavirus. Based on our close monitoring of ongoing developments with the virus, recent reports from public health officials and extensive consultation with our partners in the global security community, ISC West, scheduled to be held March 17-20, will now occur in July at the Sands Expo Center in Las Vegas. We take pride in offering vital business opportunities to our customers, including networking, education and access to new products and technologies, and commit ourselves to making July’s ISC West 2020 event live up to high standards. Over the coming weeks, along with ISC West’s Premier Sponsor SIA - we will continue to serve the industry, creating ways to connect, collaborate and keep our world moving during this difficult period.'
A standard is a document that establishes uniform engineering or technical criteria, methods, processes, and/or practices. Standards surround every aspect of our business. For example, the physical security marketplace is impacted by industry standards, national and international standards, quality standards, building codes and even environmental standards, to name just a few. We asked this week’s Expert Panel Roundtable: How have standards changed the security market as we know it?
One of the common characteristics of trade shows is booths with walls and walls of new products. Sometimes exhibitors seem intent on displaying everything in their portfolio, even though the displays appear cluttered and may not be welcoming. In an age of system sales, in particular, the emphasis on products can seem off kilter. Discussions with exhibitors at this year’s GSX show reveal a new awareness of the need for less cluttered booths, but the equipment walls persist. Here’s a review of Day 2 from the show floor. Allegion embraces more open booth design At GSX 2019, Allegion is among the exhibitors embracing a new, more open booth design that encourages engagement with customers and puts less emphasis on product displays. Discussions at the Allegion booth have centered around the value proposition and lower complexity of network-connected access control systems. The approach has been gaining a higher profile at Allegion since the company acquired Isonas, whose system configuration involves a reader-controller connected to the network via power-over-Ethernet cable. “Customers are also asking about Bluetooth technology and mobile applications,” said Jonathan Mooney, Allegion sales leader. Allegion is looking to deploy the Isonas software in other products in their portfolio; it will be offered in the range of Schlage wireless locks by the middle of 2020.The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control" “The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control,” said Mooney. Bosch offers complete security solution Bosch is introducing 55 new products at GSX 2019, but when it comes down to it, the company’s overarching message is not about individual products but about how they can be combined into a larger system. “At the end of the day, the message from Bosch is ‘how do I create a complete security solution?’” said Paul Garms, Bosch Director, Regional Marketing Security. “That’s what we are trying to demonstrate: How do all these things integrate?” Most of interest to attendees are actual demonstrations, which are a unique aspect of the trade show experience. “It’s nice at a show where we can really demonstrate what we are talking about when we say ‘integrated solution,’” said Garms. “And people can say, ‘oh yeah, if I trip this video analytic, the speaker will warn me I am approaching a restricted area.’ Or, when the manager signs in on the intrusion panel, now the associate can access a door he wasn’t able to before. It’s that integration and the complete solution that resonates. People are also interested in new products. At a show, they like to see them in operation.” At the Bosch booth, there is a big wall that illustrates some integration possibilities. An array of cameras was among the 55 new products introduced by Bosch, which also emphasized systems. Machine learning and advanced video analytics One implementation featured on the wall is Bosch’s Camera Trainer machine learning system. The system can “train” a camera to recognize a car in a parking lot, for example. Among the new Bosch products is the Autodome 7000i, the next generation of a best-selling camera, now with H.265 encoding and analytics such as line crossing. There is also an outdoor panoramic camera that is adjustable to 180-degree or 360-degree views. The new, less expensive 3000i series cameras provide an affordable option with edge analytics and Bosch’s data security protection included. Integration from Honeywell as well as 'the big picture' At Honeywell Security Group, Senior Product Manager G. Eric Green said the show seems to be much better attended than last year, “and we have had a lot of interest in our products.” Even end-user attendees typical of the GSX show are interested in the details of technology, as well as “the bigger picture,” commented Green. “Some of our booth visitors want to get into the weeds,” he said. “They say they want this piece of hardware. But they also also interested in the big picture. How things are interacting is very important.”Honeywell announced the 30 Series IP cameras, which can be used as part of video systems that comply with National Defense Authorization Act Section 889" “Most customers have installed products from other vendors that they expect us to work with. So integration is always at the top of the list. Can you work with these guys? Do you have an API? Do you support this piece of equipment? We always hear that a lot,” said Green. “There are customers who want best-in-breed products, but they’re not necessarily concerned about that coming from one manufacturer,” he said. “Other customers want ‘one throat to choke.’ When something goes wrong, they don’t want any finger-pointing.” Web-based security console and frictionless access control Honeywell is showing a beta version of its Pro-Watch 5.0 product, which is coming out in Q1 next year. It is an integrated security console that provides a map view of access control, video management, intrusion and other third party systems. The web-based platform offers access to each element, all controlled by permissions. “We are also building in an incident workflow engine that allows an operator to see exactly what steps he should take when something occurs as defined by the supervisor or a security director,” said Green. “It can literally walk you through, and it is completely freeform. Whatever you want it to say, it will say. This works in conjunction with access control, video, and all the things we talk to.” The Honeywell booth was a busy place on day two of GSX 2019 Another new Honeywell product is the OmniAssure Touch reader, a “frictionless” device that can read a credential off a smart phone in a user’s pocket. The user merely touches the reader, and it scans the area for a nearby mobile device that is authorized, and you can walk through the door. Honeywell also announced the 30 Series IP cameras, which are encrypted and can be used as part of video systems that comply with National Defense Authorization Act Section 889. They are made in Taiwan. Arcules' cloud security solution “There are fewer people here at GSX 2019, but we have seen a lot of really big companies looking for a cloud service,” said Andreas Pettersson, CEO of cloud video company Arcules. At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive: They say “we want to move to the cloud.” Pettersson theorized that concerns about a possible weakening economy may prompt some companies to avoid the large capital expenditure of procuring a new on-premise system and instead opt for the minimal investment needed for a cloud system. Monthly operating expenses of a cloud system are also predictable and more easily managed, said Pettersson.At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive Arcules is proactive on the subject of cybersecurity and has a two-page handout that summarizes the cybersecurity advantages of their system. They are eager to talk about cybersecurity as it relates to cloud systems, said Pettersson. He said that, in his experience, on-premise systems tend to have more cybersecurity issues, whether because ports are left open or a firewall is implemented incorrectly. Users may also seek to bypass the firewall — a dangerous practice that is not an option with cloud systems. Security patches may not have been implemented; in a cloud system, such updates are pushed out automatically. The recurring monthly revenue (RMR) aspect of cloud systems are a windfall to integrators who embrace the cloud. “One integrator said he went on vacation for the first time in years because he had the extra money coming in,” said Pettersson. Control room integration from Vistacom "We're still fairly new to GSX, as our first show was 5 years ago, but what we have noticed is that the show continues to attract valuable attendees and drive critical conversations around what companies like ours must bring to the table in order to be successful in this space," said Dan Gundry, Director of Sales and Marketing, Vistacom. "We've had so many chances to learn from and share with potential customers and partners, and as a result, we continue to forge great relationships.” Vistacom is highlighting its control room integration and the value enterprise organizations can gain from implementing one in their facility. The company works alongside end-user customers and security integrators to build a command center space, taking into account video wall display technology, operator consoles and furniture, audio and lighting considerations, as well as temperature and more, in an effort to optimize these centers. Stay tuned for the full GSX 2019 show review.
As editor of SecurityInformed.com, Larry attends industry and corporate events, interviews security leaders and contributes original editorial content to the sites. He also guides the "editorial roadmap" to ensure the site provides the most relevant content for security professionals. From 1996 to 2008, Larry was editor of "Access Control & Security Systems" magazine and its affiliated websites. He earned a Bachelor of Arts from Georgia State University with a minor in marketing. [Pictured: Larry and wife Linda relax with SecurityInformed.com's loyal office dog, Frankie] How did you come to work in the security industry? I started in the newspaper business and then migrated to trade publishing. I realized that every profession has its own journalism microcosm, so I learned a lot about robotics and paint and adhesives before I landed in the security field. That was around 1996, and security has been the center of my professional life, and a subject of continuing fascination ever since. What is the best professional advice you have ever received? I never met the man, but a famous quote from Woody Allen is something like "80 percent of life is showing up." I find that comforting. Showing up is something I can do. And knowing that I am already 80 percent successful at the get-go has provided extra confidence in a lot of situations over the years. Quick Facts Favorite TV show Comedians in Cars Getting Coffee First job McDonald's crew member Tea or coffee Neither: Diet Coke Best gift you received Dance lessons from my wife Last thing you cooked Grilled Cheese What's something few people know about you? Several years ago, after ISC West, I was killing time at the Wynn casino before going to the airport. I had put my last few dollars in a “Red White and Blue” slot machine, and I won the “mini-progressive” – more than $6,000! Having the lady count those $100 bills into my hand is a great memory of ISC West. What's the most rewarding thing about what you do for a living? I get to hear people talk every day about something they are passionate about. I get to learn from really smart people about interesting subjects that actually matter in the world. Jekyll Island on the Georgia coast is Larry Anderson's go-to destination for a relaxing week every summer What are your interests, hobbies and passions outside security? Books, including “literary” fiction, whodunits and lawyer novels. I tend to binge-watch television on demand while on the treadmill at the gym – which takes away the guilt. My wife Linda and I go to the movies a couple of times a month. Where was your last vacation? Jekyll Island on the Georgia coast is our go-to destination for a relaxing week every summer for the last 20 years. They have houses you can rent for the week, beautiful nature walks and bike trails, huge trees draped with Spanish moss, and a smattering of history – it was where millionaires like J.P. Morgan and William Rockefeller retreated to their 25-room “cottages” in the early 1900s. There’s plenty to see and do – or not to do if so inclined!
If you’ve been paying attention over the last twelve months, you will have noticed that deep learning techniques and artificial intelligence (AI) are making waves in the physical security market, with manufacturers eagerly adopting these buzzwords at the industry's biggest trade shows. With all the hype, security professionals are curious to know what these terms really mean, and how these technologies can boost real-world security system performance. The growing number of applications of deep learning technology and AI in physical security is a clear indication that these are more than a passing fad. This review of some of our most comprehensive articles on these topics shows that AI is an all-pervasive trend that the physical security industry will do well to embrace quickly. Here, we examine the opportunities that artificial intelligence presents for smart security applications, and look back at how some of the leading security companies are adapting to respond to rapidly-changing expectations: What Is Deep Learning Technology? Machine Learning involves collecting large amounts of data related to a problem, training a model using this data and employing this model to process new data. Recently, there have been huge advances in a branch of Machine Learning called Deep Learning. This describes a family of algorithms based on neural networks. These algorithms are able to learn efficiently from example, and subsequently apply this learning to new data. Here, Zvika Ashani explains how deep learning technology can boost video surveillance systems. Relationship Between Deep Learning And Artificial Intelligence With deep learning, you can show a computer many different images and it will "learn" to distinguish the differences. This is the "training" phase. After the neural network learns about the data, it can then use "inference" to interpret new data based on what it has learned. For example, if it has seen enough cats before, the system will know when a new image is a cat. In effect, the system “learns” by looking at lots of data to achieve artificial intelligence (AI). Larry Anderson explores how new computer hardware - the Graphic Processing Unit (GPU) – is making artificial intelligence accessible to the security industry. Improving Surveillance Efficiency And Accuracy With AI Larry Anderson explains how the latest technologies from Neurala and Motorola will enable the addition of AI to existing products, changing an existing solution from a passive sensor to a device that is “active in its thinking.” The technology is already being added to existing Motorola body-worn-cameras to enable police officers to more efficiently search for objects or persons of interest. In surveillance applications, AI could eliminate the need for humans to do repetitive or boring work, such as look at hours of video footage. Intelligent Security Systems Overcome Smart City Surveillance Challenges AI technology is expected to answer the pressing industry questions of how to use Big Data effectively and make a return on the investment in expensive storage, while maintaining (or even lowering) human capital costs. However, until recently, these expectations have been limited by factors such as a limited ability to learn, and high ongoing costs. Zvika Ashani examines how these challenges are being met and overcome, making artificial intelligence the standard in Smart City surveillance deployments. Combining AI And Robotics To Enhance Security Operations With the abilities afforded by AI, robots can navigate any designated area autonomously to keep an eye out for suspicious behavior or alert first responders to those who may need aid. This also means that fewer law enforcement and/or security personnel will have be pulled from surrounding areas. While drones still require a human operator to chart their flight paths, the evolution of artificial intelligence (AI) is increasing the capabilities of these machines to work autonomously, says Steve Reinharz. Future Of Artificial Intelligence In The Security Industry Contributors to SourceSecurity.com have been eager to embrace artificial intelligence and its ability to make video analytics more accurate and effective. Manufacturers predicted that deep learning technology could provide unprecedented insight into human behaviour, allowing video systems to more accurately monitor and predict crime. They also noted how cloud-based systems hold an advantage for deep learning video analytics. All in all, manufacturers are hoping that AI will provide scalable solutions across a range of vertical markets.
Our most popular articles in 2017 reflected changing trends in the U.S. security market, from deep learning to protection of mobile workers, from building automation to robotics. Again in 2017, the most read articles tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 most-clicked articles we posted in 2017. They are listed in order here with the author’s name and a brief excerpt. 1. Las Vegas Massacre Demands Reevaluation of Hospitality Sector Security The Oct. 1, 2017, sniper attack from a 32nd-floor room at Mandalay Bay, overlooking 22,000 people attending a country music festival, has been compared to “shooting fish in a barrel.” When the bullets rained down, there was nowhere to hide. The attack came from outside the “perimeter” of the event, so any additional screening of attendees would not have prevented it. There are also implications of the Las Vegas massacre for the hospitality industry. Hotels and resorts such as Mandalay Bay have not generally embraced technologies like the explosives scanners or X-ray machines used at airport terminals, at least not in the United States. 2. Deep Learning Algorithms Broaden the Scope of Video Analytics [Zvika Ashani] Until recently there have been minimal applications of Machine Learning used in video analytics products, largely due to high complexity and high resource usage, which made such products too costly for mainstream deployment. However, the last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning. The recent increased interest in Deep Learning is largely due to the availability of graphical processing units (GPUs). GPUs can efficiently train and run Deep Learning algorithms The last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning 3. Home Security Systems: Why You Need to Upgrade From 3G to 4G Technology [Missy Dalby] The current communication method for most home security systems is via CDMA and 3G (GSM) technologies. With the emergence of faster, better, and stronger 4G LTE technology, carriers are migrating away from old technology standards and methods towards new, more efficient ones. As such, the older technology is going dark, and soon. Manufacturers of cellular modules have stopped making them. At the end of 2018 they will stop letting customers add systems utilizing 3G radios to their channels. 4. Diving into AI and Deep Learning at NVIDIA’s San Jose Conference [Larry Anderson] Video analytics applications fall under NVIDIA's “AI City” initiative, which they describe as a combination of "safe cities" (video surveillance, law enforcement, forensics) and "smart cities" (traffic management, retail analytics, resource optimization). Depending on the application, AI City technology must function in the cloud, on premises and/or at the edge. NVIDIA’s new Metropolis initiative offers AI at every system level, from the Jetson TX2 "embedded supercomputer" available at the edge, to on-premises servers (using NVIDIA’s Tesla and Quadro) to cloud systems (using NVIDIA’s DGX). 5. Physical Security Evolves to Protect Mobile Workers [Annie Asrari] With an increasing number of employees traveling and working remotely, the days of a dedicated worker who commutes to and from a single location every day of the week are just about over. Security professionals must take a second look at their policies and procedures for employee safety. To protect employees in this new mobile world, where people, assets and brand reputation threats may face higher than normal levels of safety and security risks, businesses must focus less on securing physical, four-wall perimeters and instead take a global approach to security that focuses on protecting traveling, remote and lone workers. Businesses must take a global approach to security that focuses on protecting traveling, remote and lone workers 6. New Security Technologies Driving Excitement on Busy ISC West Day One [Larry Anderson] ISC West in Las Vegas kicked off April 5 with an expanding focus on new technologies and new applications, including some that go beyond any narrow definition of security. “Technology is disrupting the market and executives are taking our solutions beyond security,” says Moti Shabtai, CEO and President of Qognify. “They are starting with security and quickly moving to other risk and business continuity issues in the organizations. They want a clear return on investment (ROI), which we can deliver if we move from covering a limited island of ‘security’ issues and give them the value of also managing risk, safety, and operations.” 7. Optimizing Building Automation for Good Return on Investment [Minu Youngkin] Smart buildings are on the rise around the world, not only because a growing number of companies are considering their environmental impact, but also because of the dramatic cost savings that can be realized through integration. In every building that has an integrated security and access control system, an opportunity awaits to also integrate the building’s energy use, water use, ventilation and more. The key is to effectively convey the tremendous potential of this new technology to the end user. 8. ISC West 2017: How Will IT and Consumer Electronics Influence the Secuirty Industry? [Fredrik Nilsson] A good way to predict trends [at the upcoming ISC West show] is to look at what’s happening in some larger, adjacent technology industries, such as IT and consumer electronics. Major trends on these fronts are the most likely to influence what new products will be launched in the electronic security industry. Proof in point is H.264, an advanced compression technology ratified in 2003 and adopted as the new standard by the consumer industry a few years later. By 2009, it became the new compression standard for the video surveillance industry as well. Violence will continue to challenge the healthcare sector in the future 9. The Future of Healthcare Security: Violence Response and Emergency Preparedness [Ben Scaglione and David LaRose] Violence will continue to challenge the healthcare sector in the future. Domestic violence, child abuse, behavioral health, drug and alcohol abuse will all continue to challenge hospital staff in the Emergency Department, Women’s Health, and behavioral health areas. The Hazard Vulnerability Assessments (HVA) along with facility wide risk assessments helps in defining risk severity and identifying historical patterns of violence. 10. Robot Revolution: Uncovering the Real Value of Security Robots [Steve Reinharz] The security coverage that a robot offers in the case of a shopping mall can be easily overshadowed by the fact that the machines seem to serve to entertain the population. Instead, security robots can best be utilized for more high-level roles, such as in critical infrastructure sites, corporate campuses and educational facilities, where wide, expansive spaces require continuous protection. In these locales, security can be difficult to achieve, as cost, location and lack of resources make the logistics of deployment difficult.
SourceSecurity.com’s most trafficked articles in 2017 reflected changing trends in the market, from facial detection to drones, from deep learning to body worn cameras. Again in 2017, the most well-trafficked articles posted at SourceSecurity.com tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles posted at SourceSecurity.com in 2017 that generated the most page views. They are listed in order here with the author’s name and a brief excerpt. MOBOTIX is increasingly positioning itself as a specialist in high-quality IP surveillance software 1. MOBOTIX Aims High with Cybersecurity and Customer-Focused Solutions [Jeannie Corfield] With a new CEO and Konica Minolta on board, MOBOTIX is set for expansion on a global scale. But how much growth can we expect for a company like MOBOTIX in an increasingly commoditised surveillance market, where many of the larger players compete on price as a key differentiator? While MOBOTIX respects those players, the German manufacturer wants to tell a different story. Rather than competing as a camera hardware manufacturer, MOBOTIX is increasingly positioning itself as a specialist in high-quality IP surveillance software – camera units are just one part of an intelligent system. When MOBOTIX succeeds in telling this story, partners understand that it’s not about the price. 2. ‘Anti-Surveillance Clothing’ Creates a New Wrinkle in Facial Detection [Larry Anderson] The latest challenge to facial recognition technology is “anti-surveillance clothing,” aimed at confusing facial recognition algorithms as a way of preserving “privacy.” The clothing, covered with ghostly face-like designs to specifically trigger face-detection algorithms, are a backlash against the looming possibility of facial recognition being used in retail environments and for other commercial purposes. 3. Drone Terror: How to Protect Facilities and People [Logan Harris] Already, rogue groups such as ISIS have used low cost drones to carry explosives in targeted attacks. Using this same method, targeting high profile locations to create terror and panic is very possible. Security professionals and technologists are working furiously to address the gaps in drone defense. Compact Surveillance Radar (CSR) is a security technology addressing the problems with other types of detection. CSR, like traditional radar, has the benefit of being able to detect and track foreign objects in all weather conditions, but at a fraction of the size and cost. The last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning 4. Deep Learning Algorithms Broaden the Scope of Video Analytics [Zvika Anshani] Until recently there have been minimal applications of Machine Learning used in video analytics products, largely due to high complexity and high resource usage, which made such products too costly for mainstream deployment. However, the last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning. The recent increased interest in Deep Learning is largely due to the availability of graphical processing units (GPUs). GPUs can efficiently train and run Deep Learning algorithms 5. Body Worn Cameras: Overcoming the Challenges of Live Video Streaming [Mark Patrick] Most body camera manufacturers, that are trying to stream, attempt to use these consumer technologies; but they don’t work very well in the field, which is not helpful when you need to see what is happening, right now, on the ground. The video must be of usable quality, even though officers wearing the cameras may be moving and experiencing signal fluctuations – most mobile video produces significant delays and signal breakups. Video and audio must always remain in sync so there’s no confusion about who said what. Therefore, special technology is required that copes with poor and varying bandwidths to allow a real-time view of the scene and support immediate decision-making by local and remote team members and support teams moving to the scene. 6. QinetiQ Demonstrates New Privacy-Protecting Body Scanner for Crowded Places [Ron Alalouff] QinetiQ has developed a scanner that can be used in crowded places without having to slow down or stop moving targets. The body scanner, capable of detecting hidden explosives or weapons on a person, has been demonstrated publicly in the United Kingdom for the first time. SPO-NX from QinetiQ – a company spun out of the UK’s Defense Evaluation and Research Agency (DERA) in 2001 – can quickly screen large groups of people for concealed weapons or explosives in a passive, non-intrusive way, without needing people to stop or slow down. 7. ISC West 2017: How Will IT and Consumer Electronics Influence the Security Industry? [Fredrik Nilsson] A good way to predict trends [at the upcoming ISC West show] is to look at what’s happening in some larger, adjacent technology industries, such as IT and consumer electronics. Major trends on these fronts are the most likely to influence what new products will be launched in the electronic security industry. Proof in point is H.264, an advanced compression technology ratified in 2003 and adopted as the new standard by the consumer industry a few years later. By 2009, it became the new compression standard for the video surveillance industry as well. By drawing data from a number of different sources and subsystems, it is possible to move towards a truly smart environment 8. Integrating Security Management into Broader Building Systems [Gert Rohrmann] Security solutions should be about integration not isolation. Many organizations are considering their existing processes and systems and looking at how to leverage further value. Security is part of that focus and is a central component in the move towards a more integrated approach, which results in significant benefits. By drawing data from a number of different sources and subsystems, including building automation, it is possible to move towards a truly smart environment. 9. How to Use Video Analytics and Metadata to Prevent Terrorist Attacks [Yury Akhmetov] How we defend and prevent terrorism must be based on intelligent processing of information, and an early awareness of potential threats – and effective preventive action – may eliminate most attacks. Video analytics, automated surveillance and AI decision-making will change the rules of the struggle between civilians and terrorists by making attempted attacks predictable, senseless and silent. To what extent can technology investigate and prevent terror crimes considering the latest technology innovations? 10. Next Generation Video Analytics: Separating Fact from Fiction [Erez Goldstein] ‘Next generation video analytics’ is a catchy marketing phrase, is how much substance is behind it? Video analytics as a technology has been with us for many years, but there has always been an air of confusion and mystery around it, in large part created by Hollywood movies, where every camera is connected, an operator can search the network and locate the villain in a matter of seconds. I am pleased to say that, in many respects, fact has caught up with fiction, with the newest video analytics solutions that are now on the market focusing on search and specifically real-time search. These solutions have been tried, tested and proven to help reduce search time from hours to minutes and even seconds.
In 2017, SecurityInformed.com covered topics from all corners of the physical security industry - from video surveillance, to access control, to intrusion detection and beyond. But just how much have you been paying attention to the industry this past year? Does your knowledge of the cloud soar high above your colleagues and security friends? Can you recall your facts faster than 60-fps? Are you hooked into the mainframe with your expertise in cybersecurity? Now you can find out. We have launched our SecurityInformed.com Best of the Year Quiz 2017, and this is your opportunity to prove just how much you remembered in this eventful year of security. Compiled by Editor Larry Anderson, our questions span topics as diverse as millennials, body-worn-cameras and security trade shows. So, what are you waiting for? Are you ready to prove your knowledge? Are you the champion of the security trade? Take our SourceSecurity.com Best of the Year Quiz 2017 now, and be the envy of the industry!
SourceSecurity.com’s Expert Panel had a lot to say in 2015 on a variety of topics in our Roundtable discussions. Not surprisingly, the discussion topics that have generated the most interest (in terms of how much visitor traffic they generated) are the same hot topics we hear about every day in the industry. Our very most-clicked-on Roundtable discussion in 2015 was about the impact of video on privacy rights. Other hot topics that made the Top-10 list of Roundtable discussions included the Cloud (twice!), the impact of IT on physical security, and the outlook for 4K cameras. Additional well-read discussions centered on expanding the benefits of security to other departments and how to improve training. Readers also gravitated to Expert Panel Roundtable discussions of more technical topics such as the value of full-frame-rate video and the effectiveness of panoramic view cameras (compared to pan-tilt-zoom functionality). Rounding out the Top 10 is a discussion of the desirability (and legal implications) of using dummy cameras. Here is a listing of the Top 10 Expert Panel Roundtable discussions posted in 2015 at SourceSecurity.com, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2015 (including the quotable panelists named below). 1. What Are The Limitations On Where Video Cameras Can Be Placed Because Of Privacy? "Use of cameras in retail applications can easily be justified in general surveillance of sales floors and shopping aisles, but cameras should only be used in changing areas to address a particularly serious problem that cannot be addressed by less intrusive means.” [Mark Pritchard] 2. Are Cloud-Based Security Systems “Safe?” "If the authentication principles are insufficient and weak passwords are allowed, it doesn’t matter how strong the encryption is. Because cloud-based systems are exposed to the Internet, they demand strong authentication and increased operational procedures." [Per Björkdahl] 3. How Does IT Affect The Physical Security Buying Decision? "Of course, we all want good value, but we must invest as necessary. If you strip everything back, the integrator's job is to deliver data. If IT and security departments can keep this objective in mind, then 'value' redefines itself." [Larry Lummis] 4. Which Non-Security Uses Of Video Are Catching On? "While video can help with quality control across the supply chain, it will be especially useful in ensuring compliance with the international adulteration rule [for food manufacturers], the rule with the last court-ordered deadline on May 31, 2016." [Don Hsieh] 5. What Is The Value Of "Full-Frame-Rate" Video? "I once took a client’s footage of a genuine street fight to check how many images per second were needed to prove who punched who – 25fps was fine but 12fps made the video evidence doubtful. Don’t forget, however many fps you choose, your shutter speed must be fast enough to prevent motion blur spoiling the details." [Simon Lambert] 6. When Is It Desirable To Use 'Dummy' Cameras As A Deterrent? "If cameras are present, there is a reasonable expectation of a secure environment in both public and private areas. If the public sees cameras and assumes they are real, they could argue that they were reliant on the protection provided by the cameras." [Dave Poulin] 7. Are Megapixel Or Panoramic-View Cameras An Effective Substitute For PTZs? "Panoramic cameras are usually static, so zooming into a scene’s details is done in software and limited by pixels in the sensor, lens quality and software such as de-warping, so clarity at the boundaries might disappoint. PTZ cameras zoom optically, magnifying long-range details significantly better." [Simon Lambert] 8. Is HD Still The Standard Of Resolution In The Market? For How Much Longer? "The 720p and 1080p HDTV remains dominant today and is expected to be for the foreseeable future. The next standards-based resolution will be 4K, which represents 8.3 megapixel, but first the industry will need to improve on bandwidth with better compression and better light sensitivity." [Fredrik Nilsson] 9. What Are The Current Limitations Of Cloud-Based Systems? "The only remaining limitations of cloud-based systems are bandwidth and connectivity to the cloud. There is more than enough bandwidth for applications like Access Control and Visitor Management, but it will take a couple more years before all high-resolution video is cloud-based.” [Paul Bodell] 10. How Can Security Training Be Improved Among Integrators And End Users? "Training should be sticky and persistent. Follow-up training such as on-line review and updated course material should be available to keep the knowledge fresh. Technology is constantly changing, as soon as training is complete the knowledge begins to go stale." [Charlie Erickson] See the full coverage of 2015/2016 Review and Forecast articles here
There's nothing like a visit to the China Public Security Expo (CPSE) in Shenzhen to open your eyes to a new world of security market manufacturers and customers in the Asia-Pacific market. The show is huge by Western standards – someone told me it's five times the size of ISC West in Las Vegas. But even more than the size of the show, it was the crowd that made an impression on this first-time visitor. Huge numbers of attendees and exhibitors Think of the mass of humanity you might expect at a rock concert, or at Walmart on Black Friday. There was no space to move as you enter the show; you're swept along as part of a sweaty crowd. Fortunately, it was a little easier to maneuver once I got past the initial rush. There were some familiar Western brands – I saw Tyco and Honeywell among others – but the vast majority of the exhibitors are names unfamiliar in the West. And there are a lot of them, aisles and aisles of large, elaborate exhibits. Not waiting for attendees to approach a booth, there were people in the aisles aggressively urging you to enter a nearby exhibit, or at least to take a piece of literature. The experience was a stark contrast to the slow activity at ASIS, where exhibitors complained about lack of booth traffic. No need here to rationalise about the quality of the leads – here, it was clearly about quantity. Companies operating on a larger scale The massive scale of CPSE confirmed my initial observations from the previous couple of days as I had visited Hangzhou as well as Shenzhen. Everything seems bigger here. Large, high-rise buildings are everywhere you look, many of them recently built, across miles and miles, with more to come. Cranes dot the horizon as even more construction is under way. What these Chinese companies are achieving exceeds our tired perceptions in the West of "commoditised products" or "cheap Chinese" My host for the trip, Hikvision, inhabits two large skyscrapers in Hangzhou, and there's an adjacent third building (much bigger than the others) already under construction. When I visited their factory, I learned that they are also building a brand new (and larger) manufacturing facility that will use more automation and further expand their already huge daily output of video surveillance products. It's growth on a scale far beyond anything we're seeing anywhere else in the security marketplace. I visited some other manufacturers at the show, including Dahua, which is gearing up for a larger presence in the U.S. market; and Uniview, which is changing its global brand to UNV and is on the verge of going public. Eyeing Western markets What these Chinese companies are achieving exceeds our tired perceptions in the West of "commoditised products" or "cheap Chinese". Hikvision alone has a broad and rich range of technologies that includes intelligent systems, analytics and product capabilities that other companies often claim will be their advantage as the market becomes more commoditised. Undermining lingering perceptions of questionable Chinese quality were impressive quality control processes Hikvision displayed on the factory tours. Western markets, especially the United States, loom large in the sights of these big companies. Often the missing piece is a U.S. sales and service infrastructure. Hikvision (and other Chinese players) are growing in the U.S. market. Reflecting Hikvision's growth here is (what else?) a new building planned in California. I learned a lot on my Far East adventure; among other things, that the future of the security marketplace will be more global than ever. (And a new word, a verb: to libate.)
Strategic management of costs is important when considering video storage systems Costs are at issue when considering any component of a video system. Strategic management of costs is especially important when considering video storage systems because storage accounts for such a large cost component of networked systems. Gartner’s Total Cost of Ownership (TCO) As enterprise products begin to dominate the video storage market, more attention needs to be addressed to Gartner’s Total Cost of Ownership (TCO), says Jeff Burgess, president and CEO of BCDVideo. This concept takes it beyond the initial purchase costs, and also factors in management and support, the opportunity cost of downtime, and other productivity losses. “It’s especially true these days as more and more, video data is being analyzed for business purposes,” says Burgess. “After all, they are counting on it to run their project. The video doesn’t get recorded if the recorder is not working or continually freezing up.” ‘Cost Of Power, Pipe, And People’ Burgess urges integrators and end users to ask themselves: What is the video recorder really costing me over the course of the five-year project? It’s likely a racked solution, so in IT terminology that “costs power, pipe, and people.” “Take the people out of the mix,” Burgess says. “You should not need to roll a truck to the site every time there is an issue. Especially after a warranty service call. The system should automatically accept the replacement drive and bring the data over to it within the existing RAID settings, without the integrator’s on-site presence needed. The integrator really needs to look under the hood to see what else the system can provide other than simply being a storage box or a box of parts from multiple brands, not meant to work together.” Finding the right balance of control, performance, scalability and availability to keep up with and effectively exploit the surveillance data deluge allows organizations to avoid painful and costly upgrades Today’s intelligently-built video solutions provide the integrator with an easy-to-track cost savings over the lifespan of the project versus buying boxes on the cheap, says Burgess. “Today’s savvy integrator realises it doesn’t take many truck rolls to lose all those front-end savings, which are now eating away at their profits.” Camera With SD Cards Another cost factor is to focus more on the utilisation of the SD cards in the camera. Utilising cards within the cameras creates a very inexpensive way of adding redundancy to a solution, says Burgess, who notes that most VMS companies can pull the video from the SD cards should there be an interruption in the network or at the head end. Educate Yourself Veracity recommends asking a lot of questions to guide system design and minimize costs. What retention time do you need? What would you wish? Do you want to relay on video motion detection, or would you prefer to find a system that allows you to record low frame rate 24/7 and then increase frame rate on motion? Does your storage choice allow you to use low cost drives? Does it use a huge amount of power? Is it overly complex? “Educate yourself about the choices,” says Scott Sereboff, CEO of Veracity USA. “Look around. Consider the alternatives. You have a choice that does not include a RAID storage system with an $800-plus per terabyte price tag.” "Starting with a solution that takes minimal install and tuning, and is proven to scale well beyond current needs, future proofs the system for the short- and long-term for the customer and the integrator", says Jeff Adams, director of sales, surveillance solutions, DDN Storage solutions Balancing Performance, Capacity And Availability Finding the right balance of control, performance, scalability and availability to keep up with and effectively exploit the surveillance data deluge allows organizations to avoid painful and costly upgrades, says Jeff Adams, director of sales, surveillance solutions, DataDirects Network (DDN) Storage solutions. “Performance needs to scale to allow for increasingly demanding playback and/or analytics features. Capacity needs to scale non-disruptively as cameras are added, while resolutions and retention periods may increase over time. Availability at scale is tricky; something as simple as slow rebuild times becomes critical in larger systems – endangering availability and system data integrity.” In addition to new installations, DDN does a healthy business in replacing underpowered infrastructures that deliver on the initial requirements but fail on scaling, says Adams. The most frequent culprits when a video surveillance site fails and needs a significant replacement/upgrade include: single controller architectures, silent data corruption, data loss from secondary failures during drive rebuilds, performance impact of rebuilds, alternates to RAID6 data protection, and lack of experience scaling into the petabyte or multi-petabyte range. Many mid-range video surveillance storage “solutions” take more than a week to install and tune, and cannot handle significant scale, adds Adams. For end users, this limits the ability to add cameras, capacity and demand (playback, analytics and system consolidation). For integrators, this means a lot of “care and feeding,” and frequent completion delays up front, as well as increased support considerations throughout the life of the project. “Starting with a solution that takes minimal install and tuning, and is proven to scale well beyond current needs, future proofs the system for the short- and long-term for the customer and the integrator,” says Adams. It also keeps costs low.
Physical access control system architecture should be built to use the changing IT infrastructures of today’s organizations to their fullest It’s time to completely rethink physical access control systems with an eye toward the changing world of information technology. Today’s physical access control system architecture only leverages existing network hardware technology – it doesn’t utilize the organization’s full IT infrastructure, which includes systems providing advanced security services and sources of security-related real-time information. A close look at most organization’s IT roadmaps will show that traditional-architecture access control systems are off on a side road. Physical access control system architecture should be built to use the changing IT infrastructures of today’s organizations to their fullest. Such an approach is key to future-proofing and minimizing costs. The architecture needs to be able to keep pace with technological advancements in computing, communications and integration at the system level and the device level, providing strong security capabilities in a cost-efficient manner. Because hardware-centric, distributed intelligence can’t keep up with IT advances, an ever-widening gap exists between the capabilities, effectiveness and ease of management that a physical access control system can provide – and what today’s physical access control products can provide. Unless the concept of “putting intelligence at the door” includes all the intelligence that should be utilised to make an access decision, such an approach actually provides less security than today’s networked technologies are capable of providing. A key issue is a system’s native support for technological advances versus requiring third-party devices and middleware in a piecemeal approach to system design. With traditional hardware-centric physical access control systems, advanced features and real-time authentication and authorization capabilities could only be achieved by implementing costly third-party solutions or custom-designed applications. Cost and reliability factors have kept such capabilities out of reach for most physical access control customers, even though IT security systems have had such features for more than a decade. Until a full transition is made to next-generation architecture, existing physical access control system deployments will continue to fall further and further behind as technology advances, and will continue to have shortcomings and weaknesses At the infrastructure level, next-generation physical access control system architecture must be IT-centric, taking advantage of an organization’s existing IT infrastructure. It must be deployable throughout the enterprise like any other business application that uses networked end-point devices. At the application level, next-generation physical access control system architecture must be IT-aligned in support of the customer’s preferred approaches to identity, credential and access management (ICAM), and must be easily integrated with relevant business systems. These changes create significant opportunities for integrators and end users, offering software- and net-centricity, server-based real-time access decisions, advanced security protection, scalability, IT- and ICAM-friendly deployment, and mobile device- and smart card-friendly deployment. There are two questions to consider about making the transition to next-generation physical access control architecture: First, will your organization’s current system be satisfactory five to 10 years from now given the pace of technological advances? Second, from a cost- and security-effectiveness standpoint, is continued investment in legacy physical access control technology the smartest approach to your organization’s critical asset protection and incident response needs? Until a full transition is made to next-generation architecture, existing physical access control system deployments will continue to fall further and further behind as technology advances, and will continue to have shortcomings and weaknesses – as well as needless costs – that constitute a liability to an organization’s asset protection program. Editor’s Note: This article is based on Mr. Raefield’s answers to several questions about the access control market posed by SourceSecurity.com.
The merger of Vicon and IQinVision has been one of the more interesting business developments in the security and video surveillance markets in 2014. Wondering how the merger is working out, I spoke with Eric Fullerton, CEO, Vicon Industries Inc., at the ASIS 2014 show in Atlanta. Here are some of his comments: SS.com: What drew you to Vicon; what opportunity do you see here? Fullerton: The merger of Vicon and IQinVision was announced at the end of Q1, and I thought: What is that? My first reaction was that it’s a losing proposition - putting a struggling camera company and a struggling solutions company together. Then I started looking at it more closely. I think by putting these two companies together, we will be able to create a very strong video company that can lift video to the next level. I wanted a good challenge, and to be part of the next change in the industry by combining hardware and software and to start innovating at the edge. SS.com: What do you see as the next level of video, once it’s realized? Fullerton: Video will become the most important digital information source to an operation. Video isn’t just your security application, but it’s a digital business application that adds value to the bottom line. That’s where we want to be delivering products and solutions. We are starting to extract metadata from the cameras. You can analyze the content of video, which provides a totally different value to the video. Less than half of one percent of recorded video is actually looked at -- it’s just used to document what happened after the fact. With some of the modern cameras, like some we are already launching, there is metadata storage of each frame, all the vectors and everything that you can know. Without looking at the video you can analyze changes from frame to frame in terms of color and movement. That will add value to the use of the video. You won’t have to sit and watch it to know what it’s capturing, but you will know what’s going on by using analytic algorithms, and combining that with other digital security systems, including access control and video management. With some of the self-learning video analytics, facial recognition and other things, we are starting to analyze video with data algorithms, channelizing it, and using it as valuable input into HR and management solutions, even in manufacturing. You can get more efficiency. Video will become a valuable addition to daily operations and add value to the bottom line. SS.com: What is Vicon’s part of that – an end-to-end solution, or what? Fullerton: That’s the million dollar question. We are going to build cameras under the IQinVision brand, and have a full line of cameras. We will focus on where our core capabilities are – design and functionality. We will be outsourcing all manufacturing to China and other places that give us the right cost basis, and we will be adding our value at the high end of the camera. The camera line will be open and able to interoperate with other video management systems that we know today. "We’ll have a plug-and-playsolution at the bottom todeliver what the peoplewant at the low end – oneto 60 cameras with limitedfunctionality. At the mid-market we will have muchmore robust and functionalNVRs with more storagefor your larger installations.And then at the high end wewill a VMS-type solutionthat is cloud-enabled" On the Vicon side, today we have a proprietary VMS, which is not what the market is asking for. The emergence of Milestone as an open platform company was because end users were looking for freedom of choice and to get out of proprietary jail. We will migrate our video management platform to an open platform. We’ll have a plug-and-play solution at the bottom to deliver what the people want at the low end – one to 60 cameras with limited functionality. At the mid-market we will have much more robust and functional NVRs with more storage for your larger installations. And then at the high end we will a VMS-type solution that is cloud-enabled. We will also have a cloud solution at the low-end, residential, mom-and-pop market, with video only, no integrations. Later we’ll develop a multi-tenant cloud system for video service providers (VSPs). Going to the cloud doesn’t mean you put the video in the cloud. It means you can get the video when you need to, but also get the information you need. There will be a lot of on-camera storage. Because you have the knowledge of what’s happening in the frames (using metadata), you can pull out the data from the cloud and then decide what part of the video you need to look at. SS.com: How fast are you getting out of the analog business? Fullerton: We’re not. The analog business will have a very long tail – the last 10 to 15 years has proven that. Yes, there is some erosion of margin because of commoditization. There are benefits of analog cameras – they’re robust, they work, you can pull the cable longer than an Ethernet cable. Because of the robustness and the pricing, and some of the features, we’ll see a long tail of analog for years to come. SS.com: What impact do you see of these changes on dealer partners? Fullerton: Being successful in the security industry is to understand how business is done and what end users want. One reason IT didn’t take over is that there is much better value than anybody realized in the guidance security dealers provide end users. I strongly believe business in the security industry is done by local people, and we will migrate as a combined company to a full two-tiered distribution model. We go through distribution and security integrators, and they will be the ones doing the business with the end user. SS.com: How do you deal with preconceptions about your history as a company, and how do you re-educate the market about that? Fullerton: In the security industry, if you look at the history of how it was built, and the old boy’s network, the shadow of what you do is very long. The interesting thing is that Vicon has had IP solutions for 14 years. Everybody thinks that Vicon is an analog company. Yes, we still sell analog cameras because there’s a need in the market. Vicon has been a proprietary company. I would say the biggest fault of the company has been to try to be proprietary when the market is going the other way. That’s the big change we will make. We will be announcing that, and driving PR to let everyone know the new Vicon is an open company that gives the end user the freedom of choice and also delivers on higher value. SS.com: What is your message to the market? Fullerton: We have a 4K camera, which has been our message at the ASIS 2014 show. The management team sat down last week and said “how are we going to drive this?” “What are our values going to be?” We looked at our vision and our mission. The vision is that we believe video will become the most important digital [resource] in a company, so it will add to the bottom line, not just surveillance. Our values are built around the acronym CIPIT – Customer orientation, Integrity, Passion, Innovation and Team effort.
Commoditisation is the biggest problem facing today’s security integrators, says Bill Bozeman, president and CEO of PSA Security Network, an electronic security cooperative encompassing some 250 electronic security systems integrators, and aligning them with over 150 vendor partners. Multi-million-dollar manufacturers are taking advantage of economies of scale to drive down pricing of many of the components our industry uses, and lower prices are poised to have a long-term detrimental impact on integrators’ business, Bozeman says. “You have to sell that many more cameras and card readers to create the same amount of revenue,” he says. “There’s a lot of danger there.” To survive the impact of commoditisation, integrators are looking to develop new business models that are not totally dependent on the installation of systems. Possibilities include recurring revenue models and sales of security services, which can provide a predictable cash flow. Recurring revenue for a systems integrator might come from longer-term maintenance contracts, or from monthly fees for alarm monitoring, access to cloud services, etc. Security services, in effect, involve an integrator providing a wider range of services to an end user customer for a monthly fee, basically allowing the end user to “outsource” its complete security operation to an integrator. Commoditisation over time will require that integrators re-think their business models, says Bozeman, but integrators will require a lot of education on how to embrace the needed transition. “Contractors don’t have that model,” he says. “They are embracing it slowly; it’s a slow migration, and we have tried to lead them in that direction. They’re picking up on it, but it’s been a herd of turtles.” On the plus side, Bozeman says proliferation of handheld devices with the ability to receive video and alarm signals is opening up a new wave of customers for integrators. He says the capabilities of hand-held devices drive visibility of the video surveillance world. The growth of lower-tech options, such as ‘baby-cams,’ is also helping “to drive interest toward professionally designed systems,” says Bozeman.
In its role to achieve “plug-and-play” interoperability for security system and device integration, the Physical Security Interoperability Alliance (PSIA) is looking ahead to some new possibilities in its long-term roadmap. David Bunzel, PSIA executive director, shared with me some of the active discussions among alliance members about where the next wave of interoperability initiatives may lead. Integration of wireless locks is at the top of the list, a response to the growing and evolving product category. Looking further into the future, integration of smart elevators, energy management systems and hotel management systems are part of the alliance’s roadmap. There are specific access control and integration issues related to each category. In the case of energy management systems, for example, there is demand for access control systems to be able to adjust a building’s climate system in response to whether anyone has entered the building (for example, on the weekend). Access control can also monitor overall building occupancy and optimize climate settings based on that information (especially valuable as a strategy to save energy costs and promote “green” compliance). The more our lives and technologies are interconnected, the greater the expectations for physical access control to be a part of a larger ecosystem Smart elevators are another opportunity to interface with access control, and increasingly their management is a requirement for enterprise building systems. Even more futuristic is the possibility of having an employee’s computer work station interface with an access control system. In this scenario, an employee’s desktop computer could automatically power up, open appropriate files and applications, and/or access networks to which the employee is authorized – all based on a card or biometric scan when the employee enters the building. With the increase of remote workers and companies needing fewer work stations (and seeking to reduce costs), the “hot desking” concept could continue to gain favor – and provide new benefits of interfacing with physical access control. In this case, rather than a work station assigned to each employee (even those who do not come to the office very often), the concept of a “hot desk” would allow an employer to use a smaller number of generic workstations, each available as needed when a remote worker comes into the office. When an employee comes to work (and scans his access control credential), he or she would be assigned to a specific workstation, and that desktop computer would then automatically configure itself to the employee’s specific needs and access privileges. It’s a new level of physical-logical integration, and an opportunity for the physical access control market, but interoperability challenges have to be addressed. The more our lives and technologies are interconnected, the greater the expectations for physical access control to be a part of a larger ecosystem. It appears PSIA and its members have challenges to keep them busy for years to come.
For the 20,000 or so security professionals who attend each year, ASIS International’s Annual Seminar and Exhibits is all about education. Attendees can polish their skills and update their security know-how in any of more than 200 education sessions during the yearly event. They can also learn all about the latest available security technologies and services at the massive 225,000-square-foot exhibition. Celebrities are on hand too, or at least some well-known and notable dignitaries are keynote speakers, including General Colin Powell, former U.S. Secretary of State; and John Huntsman, former Utah Governor and U.S Presidential candidate. Sharing dramatic stories of heroic rescues from recent geopolitical history, U.S. Navy SEAL Rear Admiral Scott Moore discusses team building in the context of the military’s most elite forces. These are just a few of the attractions when ASIS International presents the 60th Annual Seminar and Exhibits Sept. 29-Oct. 1 in the Georgia World Congress Center in Atlanta, Ga. For the fourth consecutive year, the (ISC)2 Security Congress, which focuses on issues of information and software security, co-locates with the ASIS event, thus combining physical and logical security professionals in one place (and allowing them to attend various facets of both events). ASIS International is the largest organization of security management professionals worldwide, and (ISC)2 is the largest not-for-profit membership body of certified information and software security professionals worldwide. The focus of ASIS for the manufacturer and supplier community is the vast exhibit hall, where more than 700 companies demonstrate cutting-edge technology, products and services to security professionals worldwide The focus of ASIS for the manufacturer and supplier community is the vast exhibit hall, where more than 700 companies demonstrate cutting-edge technology, products and services to security professionals worldwide. The ASIS exhibition is one of two large security trade show events each year in the U.S. market and provides a focus for many product introductions and other commercial announcements among the manufacturing community. Although the attendee focus is on end users, there are also integrators, consultants, distributors and others who flock to the ASIS exhibit hall to see what’s new in the security market for the second half of 2014. Other highlights of the ASIS conference sessions include focus on top security concerns and need-to-know industry trends, including cyber-fraud, drones, security metrics, aviation security and many more. Education sessions reflect a range of topics, including urgent issues on everyone’s minds and in the headlines, such as mass shooting incidents, cyber-fraud, workplace violence, the safety of our food supply, and dealing with legalized marijuana, among many more. On the business side, sessions explore management issues such as internal theft and sabotage, best practices in hiring top security personnel, monitoring Internet communications, and complying with employer mandates of the U.S. Affordable Care Act. One session focuses on a new breed of security integrator emerging to address both small- and large-scale projects. “The Integrator of the Future” session identifies the largest growth markets for tomorrow’s integration professional. SourceSecurity.com Editor Larry Anderson is attending ASIS 2014 to report the latest company and product news from the 60th annual event.
The SourceSecurity.com team attended this year's IFSEC International 2014 with great anticipation to view the new innovations first-hand on show and see how the move to London would impact visitor experience. To capture the show, we have provided a summary of IFSEC in pictures above. Highlights from IFSEC 2014 We saw an overwhelming number of people and products; here is a snapshot of our IFSEC experience for 2014: FLIR SourceSecurity.com attended FLIR’s press briefing which took place on the first day of the show. FLIR emphasized that it was more than just a professional thermal camera company – the company has recently released $499 thermal cameras to the consumer industry. For FLIR, the security market is growing industry. With the acquisition of Lorex in 2012, FLIR will be introducing Lorex products under the FLIR brand (consumer side, not professional) in EMEA. At IFSEC 2014, FLIR also introduced FLIR One- its first consumer camera for the iPhone. HID Global HID Global’s Director of Technical Services, Nick Hislop, talked SourceSecurity.com through its emerging technologies in the form of leveraging Bluetooth LE and NFC. The concept is simple: to make mobile access more convenient. Nick also demonstrated how HID’s products and solutions are relevant for a number of vertical markets including Enterprise, Healthcare, Education and Finance Services. Nedap ID Ido Wentink of Nedap Identification Systems introduced SourceSecurity.com to the Nedap IDS advanced license plate recognition product, ANPR Access HD. The company also introduced uPASS Access, a backward compatibility convertor and UHF ISO Card for improved user experience for uPASS platform. The ANPR Access HD for advanced license plate recognition is a higher resolution lens than its previous release, the ANPR Access camera. Other features of the ANPR Access HD include a more powerful CCV, increased IR illumination and expanded OCR library. SourceSecurity.com’s visit to STI’s booth saw the company emphasize its importance not just within the fire industry, but within the security industry as well Security Technology International (STI) SourceSecurity.com’s visit to STI’s booth saw the company emphasize its importance not just within the fire industry, but within the security industry as well. STI is looking to get the message out there that they’re not just a fire company. Paul Machacek, Sales Team Business Developer, talked SourceSecurity.com through a number of STI’s products including STI’s Polycarbonate Protective Covers, Steel cages, Call Points & Switches and Stand-alone Alarm Systems. Samsung - Changing the face of IP On day two of the show, Samsung hosted a press conference for the global launch of its Open Platform. This new initiative gives users the opportunity to utilize third party APPs with Samsung's WiseNetIII cameras and domes. Tim Biddulph, Product Manager at Samsung, hosted the conference and offered an insight into Samsung's tag line for the show, "Changing the face of IP". Taking a lead in IP technology, Samsung is seeking to give end-users a solution that is effectively future-proof in terms of expandability and its ability to integrate with new technology in the future. Ease of use was also at the top of Samsung's agenda with its "Zero configuration" NVR solution and there was a large focus on the power of integration within different vertical markets. ASSA ABLOY ASSA ABLOY showcased a number of its access security solutions on its impressive stand. SourceSecurity.com met with Thomas Schulz who gave a comprehensive tour of the stand. From ASSA ABLOY Aperio, there was a focus on the benefits of energy saving for its customers with the Aperio range now featuring battery-powered online and offline locks, cylinders, and escutcheons. There was also ABLOY CliQ technology on show which integrates electronics and mechanics, combining mechanical ABLOY PROTEC locking solutions with low-power electronics. A number of access control solution from effeff, Mul-T-Lock, Traka and Yale were also showcased on the stand. VIVOTEK At the VIVOTEK stand, the SourceSecurity.com team were given a tour of the stand which featured their low-light solution and their latest retail solution On day one of the show, VIVOTEK hosted a luncheon in the Crown Plaza hotel, just a stone's throw from the ExCeL center. As well as enjoying a great meal, attendees were privy to the company's main focus for the coming year and its milestones and product roadmap for 2014 and beyond. The warm hosts included: Steve Ma, Executive Vice President at VIVOTEK, Brandy Lin, Team leader at VIVOTEK and Owen Chen, the Chairman of VIVOTEK. During the luncheon, VIVOTEK shared its vision of being seen as more than just a camera manufacturer, rather, as a total solution provider. The message of the importance of integration, an increased awareness of the need for reliability of products and ease of use was key on their agenda. At the VIVOTEK stand, the SourceSecurity.com team were given a tour of the stand wich featured their low-light solution and their latest retail solution, which was made up of a series of mini high definition cameras for discreetness. SALTO Salto showcased its latest wireless access control door solution, the XS4 mini. XS4 Mini includes SALTO Virtual Network SVN and wireless capability with mini installation needs. Embedded in the heart of the product is the latest microprocessor technology, ready for the connected world, open and future-proof for online connection, wireless technology and NFC. Seagate During an editorial briefing with the SourceSecurity.com team, Seagate shared their valuable knowledge of the history of storage manufacturing and stressed the importance of choosing the right storage solution for installations. With the rise of "Big Data" and increased storage needs in the surveillance market this is something which has become much more of a consideration. As one of only three storage manufacturers, Seagate's experience and know-how within the surveillance industry is vast and it hopes to push out its knowledge to the industry to ensure that people know the benefits of choosing a fit-for-purpose storage solution. Western Digital SourceSecurity.com spoke to Martin Jefferson at Western Digital, who gave a very detailed explanation of how the new WD purple surveillance hard drive had been created and why it was fit-for purpose. It was a very insightful presentation of the product and demonstrated the inherent need for the market to understand why choosing the right storage solution is vital to any installation. OptexAt the Optex stand SourceSecurity.com spoke to Aude Desbieres, who gave a breakdown of the latest offering from Optex at the show. Amongst the array of new products on the stand, Optex showcased the new analytics features of its laser Sensor, REDSCAN, and a new people counting solution developed by Giken Trastem. There was also a focus on full integration of its IP sensors with Milestone XProtectand Hawkeye mapping software and new grade 2 and grade 3 detectors. Our very own Larry Anderson also sat down with their MD Mike Shibata to discuss the company's future and development roadmap. During an editorial briefing with the SourceSecurity.com team, Seagate shared their valuable knowledge of the history of storage manufacturing and stressed the importance of choosing the right storage solution for installations Tyco Stephen Carney, Director of Product Management for Video Solutions at Tyco Security Products, set down with SourceSecurity.com to give an insight into their product roadmaps and their main focus for the coming year. He spoke on their concept of Unification which looks at integration at code level rather than simply API level. With the launch of their victor 4.5 Unified Client, they hope to give the end user a solution that is more secure and efficient for businesses and organizations that require an active surveillance environment. He also mentioned Tyco's increased focus on the end user and customer experience being at the heart of how they develop their product offering for the market. Senstar At the Senstar booth, SourceSecurity.com were given an insight by Miriam Rautiainen into Senstar's new FlexZone, a fence-mounted sensor that detects and locates intruders. The FlexZone can also locate multiple intrusions simultaneously and is scalable, thus making it an easy and flexible option no matter how big or small the installation needs to be. With FlexZone, less equipment and infrastructure is required, adding to the flexibility of the product. Furthermore, rejecting false alarms is even easier with FlexZone than with Senstar's previous offerings. Miriam also mentioned the acquisition of Optellios earlier this year, which has allowed Senstar to expand on their fiber technology portfolio. Nedap SourceSecurity.com also attended a seminar at the Nedap stand about their collaboration with EE. EE has selected Nedap's AEOS security management platform as part of their plan to expand their business throughout the UK. Since the AEOS system is completely web-based, EE employees can access it from anywhere. Traka At the Traka stand, Tanveer Choudhry, Global Marketing Manager at Traka, gave us a demonstration of their new Traka 21 - a plug and play key management system designed for small to medium size businesses. The system is very user-friendly and easy to use, as Tanveer showed us. Furthermore, a PC connection isn't necessary as the Traka 21 can operate as a stand-alone. However, the system features a USB port, which allows employees to extract user data. The Traka 21 will be available later this year.
Ever wish your smart phone could see in the dark? Sure you have, and FLIR Systems has just the gadget to make it possible. It’s the FLIR One, the “first personal thermal imaging device for consumers,” introduced earlier this year. Now available for the iPhone, with a version for select Android models coming soon, the product sells for less than $350. It allows its users to “see what the naked eye can’t.” According to the manufacturer, FLIR One “provides a visual image of minute temperature differences, giving users the power to see in the dark, observe invisible heat sources, compare relative temperatures, [and] see through smoke.” FLIR One made a big splash at the Consumer Electronics Show (CES) in January and has been widely featured in the technology media since then. FLIR One is part of the company’s strategy of promoting greater use of thermal imaging in a variety of markets, including security, by increasing overall consumer awareness of the power of the technology. The new camera for the consumer market uses technology that will also be coming soon to a security camera near you, expanding the capabilities of video surveillance and combining the benefits of thermal and visible imaging into a single video stream. FLIR’s Multi-Spectral Dynamic Imaging (MSX) capability – used in the FLIR One and soon to be incorporated into security cameras – involves extracting the details of a visible image and “embossing” them onto a thermal image, says Andy Teich, FLIR CEO. The FLIR One uses both a thermal image sensor and the smart phone’s visible camera; there are two apertures. The compact device combines both of the images using MSX algorithms running in the background to calibrate and perfectly align the two images into one. The smart phone then displays a single video image that is richer in content than either one individually. The resulting thermal image includes some of the visible details – the most important ones at any rate. “[The technology] blends high-fidelity detail from a visible image with thermal for an image this is quite rich in detail,” Teich says. In the security market, for example, the image can combine a thermal image of a car in a parking lot with the ability to read the license plate number, which would be captured by a visible sensor. The “edges” created by color changes in a visible image provide detail that is combined with a thermal image. (FLIR has provided both visible and thermal cameras since its acquisition of Lorex Technology in 2012.) Teich says the MSX technology was developed for the company’s thermography business, which involves the use of hand-held cameras for temperature detection. The FLIR One is the first camera introduced outside the thermography segment. “Ultimately it will find its way into the security business,” says Teich, probably “within the next year.”
Frank De Fina put Samsung on the map related to video surveillance in the United States market. Five years ago, before the longtime Panasonic executive signed on, the Samsung brand had little traction in the U.S. surveillance market, although the Korean giant was already well known in the broader electronics market. Back then Samsung surveillance cameras were thought of as inferior to Panasonic, Sony or the other brands – if they were thought of at all. Five years later, Samsung is climbing up the market share rankings. A lot of the success can be attributed to Samsung’s technological advances and the innovation of new products they are bringing to market. The products have gotten better, true, but De Fina gets the credit for building a solid management infrastructure and expanding the distribution channels over the last five years. Now, those elements will be continuing without him. “I’m leaving the company in better shape than I found it,” said De Fina, Samsung’s executive vice-president, North America. He emphasizes that his parting with Samsung at the end of May is “amicable” and “based on personal reasons,” among them a grueling 106-mile-a-day commute. “I want the industry to know I’m taking a breather,” he said. “I want to adjust my life to better suit some of the issues I have.” “Building the Samsung brand and credibility were the main focus early on,” De Fina said. “You have to have great products, great people and success stories by customers who were willing to take a chance.” His only regret is that it took five years to accomplish the turnaround. “I wish I could have done it in two years instead of five,” he said. “Five years ago, it was literally a shell,” De Fina remembers. “There were no processes and no team. I am pleased to say I organized and built a great team. The credit for building the business goes to that team.” The success has been notable as Samsung has increased its market share in the United States and is on track to increase U.S. video surveillance sales by more than 75 percent this year over last. ”The team at Samsung is great, and I don’t want them to suffer from this (departure) being misunderstood,” said De Fina in a telephone conference call with a dozen or so security industry journalists. In the call, he deferred any mention of his possible successor to “the management at Samsung.” What’s next for Frank De Fina? One possibility is to work as a consultant, he said. “I’d like to be a business professor at Princeton (near my home), but I don’t have a degree in physics, and they would probably check,” he joked.
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload