Physical security, security integration, video, access control, security market trends
Round table contributions
Delivering on customer expectations is a basic tenet of success in the physical security market. However, meeting expectations may be an elusive goal, whether because customer needs are not communicated effectively or because equipment doesn’t perform as promised. We asked this week’s Expert Panel Roundtable: what if a customer expects more than a security system can deliver?
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilized. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?
Body-worn cameras are becoming more common every day, driven both by needs of the marketplace and technology developments. However, questions remain about the usefulness of the devices, and their future role in promoting safety and security. We asked this week’s Expert Panel Roundtable: What are the challenges of body-worn cameras for the security industry?
The world of politics, like the world of security, is an environment of constant change. But do changes in one have an impact on the other? Governments around the world are involved in buying a wide variety of physical security systems, so how those governments operate certainly affects how they spend money on security. But in a broader sense, governments (and the associated political forces at work) also impact how their citizens and those in the private sector view threats and, as a logical extension, the security systems they need to address those threats. We asked this week’s Expert Panel Roundtable: How does the political climate affect spending on security systems?
A busy trade show abounds with new products and expanded features, colorful signage and blinking video screens, all competing for attention from busy attendees. It’s a microcosm of how the security marketplace – or any market, for that matter – sells its products. But what happens if the reality turns out different to the sales pitch? What happens when product or system performance doesn’t quite live up to the claims? Some would call that hype, and it can lead to disillusioned and frustrated customers. We asked this week’s Expert Panel Roundtable: What is the negative impact of hype in the security marketplace?
Consolidation is a reality in the security and video surveillance market. In the last several years, we have seen a variety of mergers and acquisitions (M&As) involving scores of companies of all sizes. But what is the impact of M&A activity on the companies involved, on their customers, and on the industry as a whole? We posed this question to our Expert Panel Roundtable: Do mergers and acquisitions have a net positive or net negative impact on the security market (and why)?
IP network dependability matters in physical security and safety applications, given that a company’s assets and people are at risk. There have been strides in the areas of network dependability, fault-tolerance, reliability, and survivability. However, networks (or affordable ones, at any rate) still cannot ensure near-100 percent uptime, which is why system designers acknowledge and plan for the possibility of a network outage. We asked this week’s Expert Panel Roundtable: How can/should an IP networked system adapt when network connectivity is lost?
Sometimes customers expect more out of a security system. A brand new security system just doesn’t perform as the customer expected it would. In fact, one might argue that the many variables in today’s complex systems make it more likely than ever that some element of a system might not measure up to a customer’s expectations. What happens then? We asked this week’s Expert Panel Roundtable: What happens if a customer’s expectations of system performance are greater than what a physical security system can deliver?
How mobile telephones have transformed into “smartphones” is one of the great technology stories of our time. What once was a single-function device now can do almost anything – display video, pay for groceries, monitor our health. The smartphones we carry in our pockets today have more computing power than the “super computers” of yesteryear, and that power has found many uses in a seemingly endless array of “apps.” Some of them are directly related to our physical security systems. We asked this week’s Expert Panel Roundtable: What security applications are best suited to smartphone apps?
One of the benefits of newer IP systems is the ability to store video inside the camera or in a nearby digital video recorder (DVR) at the edge of the network. Edge-based storage is unlikely to take the place of centralized storage, but it is complementary and provides some interesting new options related to system design. We asked this week’s Expert Panel Roundtable: What is the value of edge-based storage and in what specific applications?
Healthcare organizations are an important vertical market for many security manufacturers and integrators. Like other vertical markets, healthcare has its own unique set of requirements and challenges for physical security systems. We asked this week’s Expert Panel: What are the distinctive security problems faced by healthcare organizations? What technologies are being embraced to increase security?
Software changes constantly. There’s always a new patch or fix, and our computers persistently remind us that an update is available. As a core component of today’s IP networked video systems, video management software (VMS) is also subject to the need to be constantly updated and refined. We asked our Expert Panel Roundtable to elaborate: Why is it important that networked video customers keep up to date with the latest version of video management software (VMS)?
College campuses often operate like small communities – or even like large communities depending on enrollment. Although each college and university campus is unique, there are commonalities such as a young and vulnerable population of students, many living away from their parents for the first time. Campuses can be urban or rural, geographically dispersed or densely populated, with a variety of demographics and “wild card” elements such as partying, drugs and alcohol. Campus police and security officers face a variety of challenging environments. Is it wise to add firearms to the mix? Is it necessary for campus police to be armed? Specifically, we asked this week’s Expert Panel: In what situations should college or university campus police be armed?
More and more physical security systems are being hosted in the cloud. But are cloud-based security systems “safe?” It’s a question being posed by risk-averse security professionals all over the world, and one for which a clear, concise answer may be difficult to find. We decided to pose it to our Expert Panel.
We asked this week’s Expert Panel: What are the limitations on where video cameras can be placed because of privacy? With hundreds of new cameras installed every day, the likelihood increases exponentially that a camera will be placed in a location where it violates privacy. In fact, threats to privacy are often among the largest objections when video surveillance is proposed, whether in a public area or in the workplace. Allaying fears about undermining privacy is a basic requirement to make such systems acceptable to the public. It’s a touchy subject, but one our Expert Panel is willing to address.
Articles by Larry Anderson
Video is widely embraced as an essential element of physical security systems. However, surveillance footage is often recorded without sound, even though many cameras are capable of capturing audio as well as video. Beyond the capabilities of cameras, there is a range of other audio products on the market that can improve system performance and/or expand capabilities (e.g., gunshot detection.) We asked this week’s Expert Panel Roundtable: How does audio enhance the performance of security and/or video systems?
Even though ISC West 2020 was canceled, many of the product introductions planned for the trade show still happened. For example, physical security and secure identification company Identiv introduced the Hirsch Velocity Cirrus and MobilisID. Hirsch Velocity Cirrus is a cloud-based Access Control as a Service (ACaaS) solution. It is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. Smart mobile physical access control solution Identiv’s MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. We caught up with Jason Spielfogel, Identiv’s Director of Product Management, to discuss the new products and other topics. Q: How is Identiv positioned in the market as a whole? What philosophy drives your product offerings? What vertical markets do you target? Every customer needs every one of these components Spielfogel: Identiv provides a total solution. Our platforms provide access control hardware and software, video surveillance and analytics, door access readers, and ID credentials, both cards and mobile, for a variety of vertical markets: Federal government, state, local and education government agencies (SLED), healthcare, schools, banks/financial services, retail, airports and transportation, and infrastructure. Every customer needs every one of these components in every physical security deployment, and we ensure that all parts are working together at all times, even as technology continues to evolve. With that said, our philosophy is very customer-centric, and we position ourselves as a trusted partner. Our products and technology platform always strive to reflect and anticipate the environment our customers are facing, both in terms of technical requirements and functional capabilities. Q: How does the MobilisID system eliminate "friction?" Spielfogel: Identiv’s MobilisID eliminates the “friction” of access control by forgiving the user from presenting a physical credential to the reader. A simple wave of their hand over the MobilisID reader establishes a connection, and the reader reads their mobile device’s credential from the MobilisID app. No badge or access card to read, and no contact with the reader, makes this a frictionless access control experience. Administrative friction is also eliminated because there is no physical credential to issue or withdraw; it’s all done via the MobilisID Manager. Q: Discuss the advantages of Bluetooth over competing technologies. Bluetooth offers a blend of reliability and specificity Spielfogel: There are two primary competing technologies: WiFi and Near Field Communication (NFC). The problem with WiFi is that it’s not location-specific. In other words, the WiFi router can’t tell which door the user is near. NFC has the opposite problem in that it’s impossible to get credential reads unless the phone is presented within an inch or two of the reader. Bluetooth offers a blend of reliability and specificity to create frictionless access. Q: "Touchless" has always been a big selling point. Doesn't the coronavirus improve the outlook for these systems even more? Spielfogel: The coronavirus certainly highlights the value of frictionless access. But the vast majority of access systems today use proximity which was already touchless. But for systems using touchpads or contact-based credentialing, certainly frictionless is offering some alternatives that would help keep employees and visitors safer in the current climate. Q: How else might the current pandemic change the security market forever (i.e., more teleworking?) Spielfogel: Permanent changes are not likely, but it does force security directors to rethink how their employees interact physically with systems for both physical and logical access. As a result, we might see accelerated adoption of some emerging technologies, such as greater use of mobile logical access solutions, as well as frictionless physical access control. We’ve already seen an uptick in our smart card reader and token line and our Thursby enterprise and personal mobility offering during the coronavirus pandemic. Q: There are a lot of cloud systems in the access control space. How is your Cirrus cloud product different? Velocity already has all those features Spielfogel: Cirrus is different from many others in that it’s built on one of the most mature, feature-rich, secure physical access solutions available today – Hirsch hardware and Velocity Software. While many competitors are scrambling to add features to their relatively new ACaaS platforms, Velocity already has all those features. While they are building up their encryption capabilities and cybersecurity testing, we’ve already been doing that for two decades. We certainly have some more development ahead of us for Cirrus, but most of it is just surfacing features we already have into the Cirrus interface. Q: How do you guide customers as their needs change? Spielfogel: Whether users want solutions that are on-prem, in the cloud, or anything in between, Identiv’s full architecture ensures that customers can adopt and migrate to new solutions as they see fit. No two customers are alike, so providing the flexibility to gradually update or change systems is a real differentiator. Our competitors either want customers to jump all at once to the cloud or push to keep everything on-prem/legacy. CSOs and CISOs live in a different world: They've got it all to deal with. We're there with them across all of it, because that's the true reality.
Motorola Solutions has agreed to acquire IndigoVision, a U.K.-based provider of end-to-end video security solutions. The boards of Motorola Solutions, its holding company and IndigoVision have reached an agreement on the terms of a recommended cash acquisition for approximately $37.2 million, representing a premium of approximately 116 percent based on the average share price over the most recent 12-month period. The acquisition will be funded by existing cash resources of Motorola Solutions and become final in May 2020. Motorola Solutions has a strong presence in the large and expanding area of video security since acquiring Avigilon in March 2018. Their product offerings include high-definition cameras, advanced video analytics, network video management hardware and software and access control solutions. IndigoVision is a developer of complete, end-to-end video security solutions from cameras to video recorders to body worn cameras to security management software. Motorola Solutions says the IndigoVision range of products, global presence and customer base are "highly complementary" to Motorola Solutions' existing presence in video security. Among the benefits is enhanced geographical reach across a wider customer base. "The access we will now have to Motorola Solutions' range of innovative technologies will create new opportunities for IndigoVision and enable us to bring an exciting proposition to the market that allows us to further deliver on our goal of delivering safety, security and business intelligence," says Pedro Vasco Simoes, Chief Executive Officer of IndigoVision. "We share IndigoVision's commitment to providing next-generation, end-to-end video security solutions that enhance safety, security and efficiency," says John Kedzierski, Senior Vice President, Video Security Solutions, Motorola Solutions.
The global pandemic caused by the novel coronavirus is changing work environments to an unprecedented degree. More employees than ever are being asked to work remotely from home. Along with the new work practices comes a variety of security challenges. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Covid-19 concerns Concerns about the coronavirus have increased the business world’s dependence on teleworking. According to Cisco Systems, WebEx meeting traffic connecting Chinese users to global workplaces has increased by a factor of 22 since the outbreak began. Traffic in other countries is up 400% or more, and specialist video conferencing businesses have seen a near doubling in share value (as the rest of the stock market shrinks). Basic email security has remained unchanged for 30 years Email is a core element of business communications, yet basic email security has remained unchanged for 30 years. Many smaller businesses are likely to still be using outdated Simple Mail Transfer Protocol (SMTP) when sending and receiving email. “The default state of all email services is unencrypted, unsecure and open to attack, putting crucial information at risk,” says Paul Holland, CEO of secure email systems provider Beyond Encryption. “With remote working a likely outcome for many of us in the coming weeks, the security and reliability of our electronic communication will be a high priority,” says Holland. The company’s Mailock system allows employees to work from any device at home or in the office without concerns about data compromise or cybersecurity issues. Acting quickly and effectively As the virus spreads, businesses and organizations will need to act quickly to establish relevant communication with their employees, partners and customers surrounding key coronavirus messages, says Heinan Landa, CEO and Founder of IT services firm Optimal Networks. Employers should also enact proper security training to make sure everyone is up to speed with what’s happening and can report any suspicious online activity. Reviewing and updating telework policies to allow people to work from home will also provide flexibility for medical care for employees and their families as needed. Scammers, phishing, and fraud An additional factor in the confusing environment created by the coronavirus is growth in phishing emails and creation of domains for fraud. Phishing is an attempt to fraudulently obtain sensitive information such as passwords or credit card information by disguising oneself as a trusted entity. Landa says homebound workers should understand that phishing can come from a text, a phone call, or an email. “Be wary of any form of communication that requires you to click on a link, download an attachment, or provide any kind of personal information,” says Landa. Homebound workers should understand that phishing can come from a text, a phone call, or an email Email scammers often try to elicit a sense of fear and urgency in their victims – emotions that are more common in the climate of a global pandemic. Attackers may disseminate malicious links and PDFs that claim to contain information on how to protect oneself from the spread of the disease, says Landa. Ron Culler, Senior Director of Technology and Solutions at ADT Cybersecurity, offers some cyber and home security tips for remote workers and their employers: When working from home, workers should treat their home security just as they would if working from the office. This includes arming their home security system and leveraging smart home devices such as outdoor and doorbell cameras and motion detectors. More than 88% of burglaries happen in residential areas. When possible, it’s best to use work laptops instead of personal equipment, which may not have adequate antivirus software and monitoring systems in place. Workers should adhere to corporate-approved protocols, hardware and software, from firewalls to VPNs. Keep data on corporate systems and channels, whether it’s over email or in the cloud. The cyber-protections that employees depended on in the office might not carry over to an at-home work environment. Schedule more video conferences to keep communication flowing in a controlled, private environment. Avoid public WiFi networks, which are not secure and run the risk of remote eavesdropping and hacking by third parties. In addition to work-from-home strategies, companies should consider ways to ensure business cyber-resilience and continuity, says Tim Rawlins, Director and Senior Adviser for risk mitigation firm NCC Group. “Given that cyber-resilience always relies on people, process and technology, you really need to consider these three elements,” he says. “And your plan will need to be adaptable as the situation can change very quickly.” Employees and their employers Self-isolation and enforced quarantine can impact both office staff and business travelers Self-isolation and enforced quarantine can impact both office staff and business travelers, and the situation can change rapidly as the virus spreads, says Rawlins. Employees should be cautious about being overseen or overheard outside of work environments when working on sensitive matters. The physical security of a laptop or other equipment is paramount. “It’s also important to look at how material is going to be backed up if it’s not connected to the office network while working offline,” says Rawlins. It’s also a good time to test the internal contact plan or “call tree” to ensure messages get through to everyone at the right time, he adds.
HID Global is introducing a new “flagship” line of access control readers as successors to the iCLASS line. The new HID Signo readers will support 15 different credentialing formats and communicate using the latest NFC (near field communication), BLE (Bluetooth Low Energy) and OSDP (Open Supervised Device Protocol) standards. HID Global says the new readers will simplify integration to more secure and mobile credentials. HID Global has invested in a “future-proof” approach that both accommodates a variety of current market needs and can adapt to embrace new technologies as they come onto the market. The new line incorporates “all the hardware you need,” combining the capabilities of older generations of readers into a single product. Simplifying the choice of readers The new reader line seeks to simplify the choice of readers in a time when a variety of trends is complicating the access control market, from cloud systems to mobile access to identity management. “We are simplifying the way we bring our products to market, and baking it all into our readers,” says Harm Radstaak, HID Global Vice President and Managing Director. “If an installer takes a reader out of the box and mounts it on the wall, it just works.” We are simplifying the way we bring our products to market" In designing the product, HID sought feedback from channel partners, installers, consultants and end users on how the new readers would function. In addition, the company sought advice from architects on the design of the product. Aesthetics and industrial design elements were a priority because they ideally reflect the quality and “promise” of how the product will perform. Cybersecurity Cybersecurity is another emphasis. The readers store cryptographic keys and process cryptographic operations on certified EAL6+ secure element hardware, and custom authentication keys can be used for organizations who prefer that level of control. EAL6+ certification is a designation of the Evaluation Assurance Level of an IT product or system (the highest score is EAL7). Signo also includes a velocity checking feature designed to mitigate and thwart brute force attacks. “The new Signo line is a continuation of the journey we have been on,” says Radstaak. “It is the natural succession of what we have been doing for years, and it underlines our position in the market.” By natively supporting mobile credentials, the new product line reinforces HID’s commitment to mobile systems, which the company first brought to market in 2014. Signo readers also include Enhanced Contactless polling to support mobile credentials in Apple Wallet. Addressing standards Embracing the OSDP standard, which was created in 2008, also addresses the growing customer need for bi-directional, secure communications. There is built-in support for OSDP Secure Channel as well as legacy Wiegand communication for organizations seeking to transition. Signo incorporates support for most credential technologies globally, including Seos, credentials with HID’s Secure Identity Object, and a variety of 125kHz legacy technologies such as Indala and Prox. The flexibility and openness of Signo is a response to the acceleration of new technologies entering the access control market. “If you look at new technologies in general, our market has been slow in adopting them,” says Radstaak. “However, with new entrants in the market, new technologies, new device manufacturers and artificial intelligence (AI), I believe the market is adopting new technologies much faster than before. Users are much savvier.” The consumer Administrators will be able to remotely configure and diagnose readers Radstaak says he expects market adoption of the new readers will be fast. “Customers have been waiting for this platform,” he says. “This has been a tremendous investment for HID Global, and it underlines our position in the market with its open platform, simplicity and future-proofing. We are prepared for whatever comes next technology-wise.” With Signo readers, administrators will be able to remotely configure and diagnose readers as well as monitor status through a centrally managed and connected reader ecosystem. As a member of the FiRA Consortium, HID Global has advocated bringing new technology to market based on the “fine ranging” capabilities of ultra-wideband (UWB) technology, which has applications in detection of the precise location or presence of a connected device or object. It’s the kind of technology that Signo platform’s “future-proofing” approach is geared to accommodate. “As the capability unfolds, we will be there to adapt,” says Radstaak.
With just days left until the planned industry trade show, Reed Exhibitions has canceled ISC West over concerns about the COVID-19 coronavirus. Here is the statement on the decision: 'We at ISC West want to express our concern for everyone impacted by the COVID-19 coronavirus. Based on our close monitoring of ongoing developments with the virus, recent reports from public health officials and extensive consultation with our partners in the global security community, ISC West, scheduled to be held March 17-20, will now occur in July at the Sands Expo Center in Las Vegas. We take pride in offering vital business opportunities to our customers, including networking, education and access to new products and technologies, and commit ourselves to making July’s ISC West 2020 event live up to high standards. Over the coming weeks, along with ISC West’s Premier Sponsor SIA - we will continue to serve the industry, creating ways to connect, collaborate and keep our world moving during this difficult period.'
When a fire or other emergency occurs in a building or facility, first responders depend on every available resource to ensure a safe and orderly evacuation and response. One element in any response plan is the facility’s physical security systems, including access control, video surveillance and intrusion detection. How can these systems contribute to an orderly response to a chaotic situation? We asked this week’s Expert Panel Roundtable: What is the role of security systems in the event of a fire or other emergency evacuation?
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilizing the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualization and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
We live in an era of Big Data. Surrounded by a flood of information, more companies are looking for ways to analyze that information (data) and systematically extract intelligence that can help them operate more efficiently and profitably. The data obsession has extended to the physical security industry, too, where large amounts of data have historically been a little-used byproduct of our access control and even video systems. But the picture is changing. We asked this week's Expert Panel Roundtable: What impact are data analytics having on the security market?
ISC West is being affected only minimally by the COVID-19 coronavirus, which is having an impact on international business travel, specifically to and from China. One consequence of coronavirus travel restrictions is a decision by Reed Exhibitions International not to proceed with a dedicated pavilion for Chinese companies at ISC West, March 17-20. In the main hall, however, some Chinese companies will remain in the show and staff their exhibit booths with U.S. office personnel and resources. Importantly, the ISC West event is moving forward as planned. Several trade show organizers globally have canceled events because of fears of spreading the disease. For example, the Mobile World Congress in Barcelona was canceled at the end of February. “Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customers relative to personal health and safety, and the very challenging business predicament for these companies,” says Will Wise, Group Vice President, Security & Gaming Portfolio, Reed Exhibitions. Minimal Impact Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customersThe ISC West team and Reed Exhibitions International colleagues in China have been working diligently to assess the status of all ISC West exhibitors from China, given the travel restriction, says Wise. Among show attendees, Chinese travel restrictions will have a negligible impact. In past years, only a tiny fraction of attendees traveled to Las Vegas from China for the show. Immediate action by the U.S. government as soon as the world became aware of the COVID-19 coronavirus has enabled a controlled business and health and safety dynamic that will allow the show to proceed as planned. The U.S. took quick action to put major travel restrictions in place, including no incoming flights/travel from China. “The status is ever-evolving and we’ll be keeping the expo floor plan updated,” says Wise. The China pavilion In previous years, the China pavilion had hosted 50 or more companies as part of what was formerly known as “Global Expo,” located in the Venetian Ballroom adjacent to the Sands Convention Center. In 2019, the slate of companies in the Venetian Ballroom expanded to include some domestic exhibitors as well as the international companies. Importantly, the ISC West event is moving forward as plannedThis year, Venetian Ballroom exhibits will continue without the participation of Chinese companies. There will be international exhibitors from countries outside China as well as some domestic companies, including the Emerging Technology Zone, where new startups will highlight their latest innovations. The Security Industry Association (SIA) New Product Showcase will also be featured in the Venetian Ballroom, as well as a VIP international lounge. Additionally, a new pavilion highlighting Loss Prevention and Supply Chain companies will be featured, and there will be an educational theater offering free sessions on topics such as drones and robotics. Reed Exhibitions strongly urges exhibitors and visitors to refer to the guidelines and protocols as suggested by the World Health Organization and local /national public health authorities to contain and mitigate against any further spread of the virus. Suggested precautions include frequent hand washing (including alcohol-based hand rubs) and maintaining a three-foot distance between oneself and other people, particularly those who are coughing, sneezing and have a fever.
At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan. FPA’s efforts were directed expressly toward the protection of the client, avoiding unnecessary escalation or complications and minimizing physical, visual, and legal exposure. Dedicated to the safety of clients Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation Specializing in protecting celebrities and high-net-worth individuals, Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation, and dedicated to the safety and success of clients. The agency was formed in 2017 by Russell Stuart, a California State Guard officer and security and entertainment industry veteran. The agency is the culmination of 20 years of experience in the fields of security, military, emergency management, logistics and technology, media and entertainment, and celebrity management. We interviewed Russell Stuart, Founder and CEO of Force Protection Agency (FPA), which has been called “the Secret Service of Hollywood,” for his insights into providing security for celebrities. Q: What unique need in the marketplace do you seek to serve, and how are you qualified to serve it? Stuart: The needs of celebrity and high-net-worth clients are complex and constantly changing. When dealing with a high-profile individual, discretion is paramount, extensive communication is required, and adaptation is ongoing. A critical objective is anticipating and planning for all types of potential negative scenarios and preventing them from even starting, all while not disrupting the normal course of operation of the client's day or their business. Force Protection Agency is poised to serve these needs by innovating and intelligently managing the planning, procedures, and personnel used in every facet of protecting the client’s interests and achieving their objectives. Q: What is the typical level of "professionalism" among bodyguards and security professionals that protect celebrities? Why does professionalism matter, and how do you differentiate yourself on this point? Stuart: Professionalism is an overall way of approaching everything to do with the business, from recruiting, to training, to making sure the right agent is with the right client. Nothing matters more; polish and precision are not only critical to mission success, but also support the comprehensive best interest of the client while preventing costly collateral damage and additional negative consequences. True “professional protective services" is intelligent strength and proper execution, not emotional or reactionary violence. Unfortunately, the latter is frequent among many celebrity bodyguards, and often incurs extremely expensive and even dangerous repercussions. Q: Your company has been described as "the Secret Service of Hollywood." How true is that comparison, and how does your work differ from (e.g.) protecting the President? Force Protection Agency prides itself on providing its services with discretion, precision, and poise Stuart: Totally true, and for this reason: the keys to success in protection are prioritization, and planning. Most people fail to even recognize the first, negating any level of effort given to the second. Establishing the true needs and the correct priority of objectives for each individual client and situation, and firmly committing to these without deviation, are what distinguishes both government secret services and Force Protection Agency from the vast majority of general security firms. Also, the term “secret service” implies an inconspicuous yet professional approach, and Force Protection Agency prides itself on providing its services with discretion, precision, and poise. Q: What is the biggest challenge of protecting celebrities? Stuart: The very nature of celebrity is visibility and access, which always increases risk. The challenge of protecting a high-profile individual is facilitating that accessibility in a strategic and controlled manner while mitigating risk factors. A client’s personal desires and preferences can often conflict with a lowest risk scenario, so careful consideration and thorough preparation are essential, along with continual communication. Q: How does the approach to protection change from one celebrity (client) to another? What variables impact how you do your job? Stuart: The approach is largely determined by the client’s specific needs, requests and objectives. The circumstances of a client's activities, location, and other associated entities can vastly disrupt operation activities. A client may prefer a more or less obvious security presence, which can impact the quantity and proximity of personnel. Force Protection Agency coordinates extensively with numerous federal, state, and municipal government agencies, which also have a variety of influence depending on the particular locations involved and the specific client activities being engaged in. Q: Are all your clients celebrities or what other types of "executives" do you protect – and, if so, how are those jobs different? Stuart: Force Protection Agency provides protective services for a wide range of clients, from the world’s most notable superstars to corporate executives and government representatives. We also provide private investigation services for a vast variety of clientele. Force Protection Agency creates customized solutions that surpass each individual client’s needs and circumstances. The differences between protecting a major celebrity or top business executive can be quite different or exactly the same. Although potentially not as well known in popular culture, some top CEOs have a net worth well above many famous celebrities and their security needs must reflect their success. Q: What is the role of technology in protecting famous people (including drones)? Technology is crucial to the success of security operations Stuart: Technology is crucial to the success of security operations and brings a tremendous advantage to those equipped with the best technological resources and the skills required to maximize their capabilities. It affects equipment such as communication and surveillance devices like drones, cameras, radios, detection/tracking devices, GPS, defensive weapons, protective equipment, and more. Technology also brings immense capabilities to strategic planning and logistical operations through the power of data management and is another aspect of Force Protection Agency operation that sets us apart from the competition. Q: What additional technology tools would be helpful in your work (i.e., a “technology wish list”)? Stuart: The rapidly growing and evolving realm of social media is a massive digital battlefield littered with current and potential future threats and adversaries. Most mass shooters as of late have left a trail of disturbing posts and comments across social media platforms and chat rooms that telegraphed their disturbing mindset and future attacks. A tool that could manage an intelligent search for such threats and generate additional intel through a continuous scan of all available relevant data from social media sources would be extremely useful and could potentially save many lives. Q: Anything you wish to add? Stuart: Delivering consistent excellence in protection and security is both a vital need and a tremendous responsibility. Force Protection Agency is proud of their unwavering commitment to “Defend, Enforce, Assist” and stands ready to secure and satisfy each and every client, and to preserve the life and liberty of our nation and the world.
Utilities are an important element of critical infrastructure and, as such, must be protected to ensure that the daily lives of millions of people continue without disruption. Protecting utilities presents a unique range of challenges, whether one considers the electrical grid or telecommunications networks, the local water supply or oil and gas lines. Security technologies contribute to protecting these diverse components, but it’s not an easy job. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting utilities?
The Private Security Industry Act of 2001 gives the Security Industry Authority (SIA) the function of setting standards of conduct in the United Kingdom’s private security industry. Time is winding down to provide input during the SIA’s six-week consultation on a new draft code of conduct for SIA licence holders and applicants for SIA licences. The authority is inviting the industry, licence holders, and anyone with an interest in private security to have their say on the draft code of conduct by taking part in a survey. The consultation will end on 23 February. “The ethos of the code of conduct is that it will improve standards and public safety by setting out the standards of conduct and behavior we expect people to uphold if they are entrusted with protecting the public, premises and property,” says Ian Todd, Chief Executive, Security Industry Authority (SIA). Security's Code of Conduct A code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession In security as in many professions, a code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession. SIA is suggesting Six Commitments of behavior that will apply to all licensed security operatives and to applicants. If the code of conduct is sanctioned by the U.K. Home Office, it would become mandatory and incorporated into SIA’s licensing criteria Get Licensed. A commitment to certain standards of behavior is fundamental to what it means to be fit and proper, and to being part of a profession. The six commitments are: Act with honesty and integrity Be trustworthy Protect the people and property you are entrusted to protect Be professional at work Act with fairness and impartiality at work Be accountable for your decisions and actions “We will review the comments from the consultation once it concludes on 23 February, analyze the results and publish a report on our findings,” says Todd. “The SIA will then use the comments it has received to write a final version of the code of conduct. The introduction of a code of conduct will be subject to final approval by Home Office Ministers.” SIA’s current Standards of Behavior provide guidance on professional behavior but are not mandatory. The draft code of conduct builds on the Standards of Behavior. Upholding SIA's Standards The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act “The majority of licence holders uphold the standards of behavior that the SIA, their employers and the public expect of them,” says Todd. “Their professionalism and dedication keep the public safe and tackle crime. However, there are incidents in which some licence holders do not behave in this way. This minority lower the standard of service the public receives, harm public safety, and bring themselves and the rest of the private security industry into disrepute.” The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act. It is likely that they will be required to enforce the code of conduct should it become mandatory. The draft code of conduct is currently out for consultation and the proposal has been shared widely to licence holders, private security businesses, and enforcement partners encouraging them all to take part. “Once the consultation has concluded, we will analyze the findings from the feedback, produce a report and publish it on our website and share this widely via social media,” says Todd.
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
J.D. Power is a well-known name when it comes to measuring customer satisfaction, and they have been measuring satisfaction in the home security industry since 2016. Changes affecting the marketplace – both in terms of disruptors and technology – make this a unique time. For example, in 2019, J.D. Power expanded the Home Security Satisfaction Study to not only measure the traditional pro-install/pro-monitor companies, but to separately evaluate self-install/pro-monitor brands. “At J.D. Power our rankings are meant to support an industry in two key ways,” says Christina Cooley, J.D. Power's Director, @Home Intelligence. “First, we provide consumers who are shopping for products and services with a ‘report card’ of who provides customers with high levels of customer satisfaction. Second, we provide companies with actionable insights to help them prioritize their initiatives to improve and maintain high levels of customers satisfaction that drive loyalty and growth.” Differentiating between companies The traditional Pro-Install/Pro-Monitor companies are challenged to differentiate from one another In home security, J.D. Power is in a unique position to report on the changes taking place in the evolving industry. The 2019 rankings show that the traditional Pro-Install/Pro-Monitor companies are challenged to differentiate from one another, as each have their individual strengths and opportunities, but overall the score range is relatively tight. On the do-it-yourself (DIY) side, there is more differentiation. A set of brands has been able to challenge the traditional industry by achieving extremely high customer satisfaction levels. Price is always an important factor that impacts customer satisfaction, whether for security or another market J.D. Power serves. The equation is simple, says Cooley: Does the price paid equal the value the customer feels they have received from the product or service? “For Home Security, we didn’t specifically look at price until this year,” says Cooley. “With the changes that have occurred in the market, price can be a differentiator as we’ve seen with the emergence of DIY-installed systems. However, lower pricing does not have a direct relationship to quality of service.” The price factor For example, there are some higher-priced pro-installed brands that perform lower on customer satisfaction than lower-priced competitors. And DIY-installed systems as a whole are less expensive, and price is the customer satisfaction driver in which the DIY segment most outperforms the pro segment. Price is the customer satisfaction driver in which the DIY segment most outperforms the pro segment The equation is: Performance minus Expectations equals Customer Satisfaction. “Obviously, price point will be a factor in the purchase decision and the expectations the customer has about the product and service,” says Cooley. “Any pro or DIY system has the opportunity to differentiate the customer experience regardless of price point.” There are clear differences in the pro vs. DIY experience, which is why J.D. Power evaluates the brands in separate rankings. However, Cooley says the drivers of satisfaction are consistent across both groups. The key to each group goes back to the equation above. Evaluating the purchase process For the both pro and DIY companies, J.D. Power evaluates the purchase process the same. Though the customer may take a different path to purchase based on the offering they seek, the drivers are still the same: Usefulness of information provided Reasonableness of contract terms Professionalism of sales representative Ease of purchasing home security system. For installation, there are clear differences. DIY systems are evaluated based on: Ease of completing installation Quality of installation instructions provided Timeliness of receiving home security system. Pro systems are evaluated based on: Professionalism of technician Timeliness of completing installation Quality of work performed. Interestingly, purchase and installation are the customer satisfaction driver where both pro and DIY providers (as a whole) are most closely aligned on performance. Customer loyalty The price a customer is paying must align with the quality of the system they receive What drives a customer to purchase a home security system initially will often be very different than what will keep them as a loyal customer, Cooley notes. The price a customer is paying must align with the quality of the system they receive, and the service provided through the professional monitoring and customer service. “With the expansion of home security offerings, it’s more important than ever for home security companies to understand the motivations, intentions, and usage patterns across different customer segments to ensure that regardless of the decision to go pro or DIY-install, they are able to meet their customers’ needs and differentiate in the very competitive market. The J.D. Power Home Security Study provides these actionable insights.” The study is focused on the companies/brands that comprise the top two-thirds of market share in each segment, pro and DIY installed. A number of the brands included may work with local dealers or retailers for sales and install, but the customer is essentially evaluating those services as part of the system purchased. It is one and the same from the customer’s perspective, and the sales/install process can either delight or frustrate a customer from the beginning, which can then set the foundation for the entire experience moving forward. Reasons for shopping for a security system tend to differ between pro and DIY shoppers: Both sets are most focused on wanting a newer, more up-to-date system Between the two, pro customers are more often moving into a new home or wanting to take advantage of a discount or bundling opportunity with other products For DIY customers, they are shopping for a system to give them more peace of mind and to protect their property. Reasons for selecting the provider also vary: A pro company is often selected based on brand reputation or a special offer/promo A DIY company is primarily chosen based on price or a positive review. In terms of brand image, we see that customers see both pro and DIY providers similarly in terms of reliability. However, when it comes to being customer-driven, DIY providers receive higher image ratings compared to pro-installed companies.
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
The Security Industry Alarm Coalition (SIAC) has a mission to be the voice of the electronic security industry on issues involving municipal alarm management for the approximately 18,000 public safety agencies in the U.S. and Canada. Specifically, SIAC works to minimize the number of false alarms, which are a costly waste of resources for law enforcement jurisdictions. SIAC works directly with leaders in law enforcement at the national level, such as the International Association of Chiefs of Police (IACP) and the National Sheriffs’ Association (NSA); and at the state and local levels to provide expertise and proven strategies to reduce unnecessary dispatches to alarm sites while maintaining the police response taxpayers endorse and deserve. The primary tools for alarm management are education on causes of false alarms and implementation of the Model Ordinance for Alarm Management and False Alarm Reduction. SIAC's Model Ordinance SIAC works to minimize the number of false alarmsRecently both the International Association of Chiefs of Police and National Sheriffs’ Association passed resolutions supporting SIAC’s Model Ordinance. This has resulted in dispatch reductions between 40-50% in jurisdictions where all of the model’s recommendations have been followed. Adoption of some version of the Model Ordinance grows each year. It has been adopted nationwide by over a thousand large cities and small towns. Fourteen states have adopted SIAC’s suggestion of a statewide alarm management committee through state associations of chiefs of police. “This enables the industry to work with law enforcement leadership on a regular basis and in a formalized structure to discuss and address issues,” says Stan Martin, SIAC Executive Director. Fourteen states have adopted SIAC’s suggestion of a statewide alarm management committee SIAC worked with the industry on new alarm panel standards that made it less likely an end user would trigger a false alarm. The overall dependability and sophistication of alarm systems have also helped make them less vulnerable to outside forces that can trigger the system. Video and audio technology are playing an ever-increasing role with helping monitoring centers evaluate whether a crime is in progress before dispatching the police. Dramatic changes in the industry Kirk MacDowell was recently selected as SIAC’s new Chairman of the Board. He is a dynamic industry leader with more than 39 years of experience in the industry. SIAC’s biggest challenge is maintaining strong financial support for its work during a time of dramatic changes in the structure of the electronic security industry. The Security Industry Alarm Coalition (SIAC) has a mission to be the voice of the electronic security industry SIAC’s biggest challenge is maintaining strong financial support for its work during a time of dramatic changes Some cities require a "verified response" before police officers are dispatched to an alarm. This requirement is problematic for the end-user as it requires a third-party confirmation that a crime is being or has been committed. This creates a significant delay in response to crime victims needing immediate help. Fortunately for citizens, the vast majority of cities have rejected ordinances that require confirmation that a crime has taken place prior to police dispatch – verified response. Over the past 15 years only about 34 of 18,000 public service agencies in the U.S. have adopted some form of verified response and 10 of those cities ended the policy. It is important to note that despite the rejection of verified response in favor of the Model Ordinance, there are still individuals who lobby aggressively to curtail police response without verification. This requires a continued and aggressive education program to get in front of these lobbying efforts which are based on false premises and misleading statistics, says Martin. Despite SIAC’s success, there are a number of important issues that need to be addressed, says Martin. First is the high turnover among law enforcement leaders and elected officials. SIAC has been effective in developing relationships with current leaders in law enforcement as well as the next generation of leaders who are currently rising through the ranks of their departments. SIAC has been effective in developing relationships with current leaders in law enforcement as well as the next generation of leaders Coordinating challenges Another challenge has been the attempt by at least one city (Sandy Springs, Ga.) to fine alarm companies for customer-generated false alarms. SIAC is currently coordinating a challenge of that ordinance in federal court with the state alarm association in Georgia. SIAC is also working on plans for more secure funding and on succession planning so the organization can continue to move forward aggressively in the future. SIAC, Inc. is a 501(c)(6) not-for-profit Delaware corporation. The Board of Directors has two members from each of the major North American trade associations: Canadian Security Association (CANASA), The Monitoring Association (TMA, formerly CSAA), Electronic Security Association (ESA), and the Security Industry Association (SIA), and an elected official. SIAC is funded by donations from individual companies. There are no memberships dues, and the organization sells no products or services.
Facial recognition continues to be a political football and a target of privacy activists in the United States. For example, San Diego has suspended its use of facial recognition scanners by law enforcement after a campaign by civil rights groups. The San Diego Tactical Identification System (TACIDS) program included a database of facial recognition scans shared by 30 local, state and federal agencies. A California law, passed in the fall, puts a three-year moratorium on law enforcement use of face recognition technology. A proposal in Congress would prohibit use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD), thus protecting the more than two million public housing residents nationwide from being “over-surveilled.” The “No Biometric Barriers to Housing Act” is supported by the NAACP, the National Housing Law Project, National Low-Income Housing Coalition, National Action Network, Color of Change, and the Project on Government Oversight. The problems of Facial Recognition "Studies that show that facial recognition systems may misidentify many individuals including women and people of colour" A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing because it “could be used to enable invasive, unnecessary and harmful government surveillance of…residents.” The letter cites studies that show that facial recognition systems may misidentify many individuals including women and people of color, thus “exacerbating vulnerabilities that marginalized groups already face in life.” In June, Somerville, Mass., became the second U.S. city to ban the use of facial recognition technology in public spaces. The first was San Francisco. A coalition of organizations and trade associations has issued a letter to Congress outlining concerns with “blanket prohibitions” or moratoriums on facial recognition technology and listing beneficial uses for public safety, national security and fighting fraud. The Security Industry Association (SIA) is part of the coalition, the Information Technology and Innovation Foundation. A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing Facial recognition technology has benefited Americans in many ways, such as helping to thwart identity thieves" The letter says: “While polls consistently show that Americans trust law enforcement to use facial recognition technology responsibly, some groups have called for lawmakers to enact bans on [the] technology. While we agree that it is important to have effective oversight and accountability of these tools to uphold and protect civil liberties, we disagree that a ban is the best option.” Development and guidance As alternatives to outright bans, the letter proposes expanded testing and performance standards, develop of best practices and guidance for law enforcement, and additional training for different uses of the technology. “Facial recognition technology has benefited Americans in many ways, such as helping to fight human trafficking, thwart identity thieves and improve passenger facilitation at airports and enhance aviation security,” says Don Erickson, CEO of SIA. “SIA believes this advanced technology should be used in a safe, accurate and effective way, and look forward to working with Congress to help the U.S. set the example on how to ethically and responsibly govern this technology.” SIA has produced a document called “Face Facts: Dispelling Common Myths Associated with Facial Recognition Technology.”
Look who’s talking about the top issues in the physical security industry in 2019. Our website’s Expert Panel Roundtable discussions in 2019 reflected some of the most timely and important topics in the industry. The very most-clicked-on Expert Panel Roundtable discussion in 2019 was about the year before – reviewing what caused disruptions in 2018. The second most popular was about 2019, the year ahead. Other hot topics that made the Top-10 list of roundtable discussions included what makes a good security salesperson, the need for greater cybersecurity awareness, and how millennials are changing the industry. Here is a roundup of the Top 10 Expert Panel Roundtable discussions posted in 2019, along with a “sound bite” from each discussion and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2019 (including the quotable panelists named and linked below). 1. What caused the most disruption in 2018 in the physical security space? “The industry is in the midst of a dynamic technology revolution, and we are seeing increased use of security solutions that leverage machine-based learning, artificial intelligence, and robotics. This past year, the market embraced these emerging technologies, with a myriad of solutions now being embedded with these capabilities, including IP cameras, access control systems, security robots, and drones.” – Travis Deyle, Cobalt Robotics 2. What technology trend will have the biggest impact on physical security in 2019? “IoT (Internet of Things) will continue to make us more efficient. We’re already seeing the increased integration of IoT devices into enterprise-level solutions. The rise in city-living is also putting pressure on infrastructure, so it will become increasingly important for the truly smart and safe city to move beyond a vision into reality.” – Jamie Barnfield, IDIS 3. What are the security challenges of hospitals and the healthcare industry? “Preventing security incidents is a priority and a challenge for healthcare directors. Traditionally, the success of a healthcare facility’s safety program has been equated to the number of issues that warranted a response; though, the simple number of emergency responses is not helpful in preventing the same situations from occurring again.” – Julie Brown, Johnson Controls 4. What characteristics do salespeople require in the physical security industry? “To be a good salesperson, you must understand each customer’s needs and help them solve their problems. In physical security, this need is typically some kind of risk mitigation – guarding themselves and their organizations against threats, danger and liability. This makes the conversation more fraught than if you were selling a business product such as lighting, HR software or insurance, since ultimately you are talking about people’s lives and livelihoods.” – Dave Whitis, Boon Edam 5. How does security technology make our schools safer? “IP-based physical security solutions can help deliver safer environments so that students, staff, and faculty can focus on learning. Video surveillance provides a live and recorded visual representation of what’s happening across a school and can readily be called upon to access important information during an investigation. Electronic access control on doors and barriers not only regulates who goes where, but also provides protection for property and assets.” – Terry Schulenberg, Genetec 6. Is greater awareness helping to increase cybersecurity? “On a daily basis, we hear of widely publicized cybersecurity incidents which affect our customer’s businesses, peace of mind, and assets. This new world is one the physical security industry has not been familiar with. What follows these well-publicized events is frustration and confusion, particularly for small and medium-sized businesses. Confusion then leads to application of ineffective security tools or, worse, inaction.” – Drew Alexander, STANLEY Security 7. What security markets are likely to embrace AI? “Transportation seems to be the market that could benefit the most from embracing artificial intelligence. As it relates to people tracking, AI could single out deviating behavior, such as someone walking against the flow of rush-hour traffic, and in turn could initiate a real-time response so authorities can determine whether or not intervening is necessary.” – Per Björkdahl, ONVIF 8. How are Millennials changing the security industry? “Over the last few years, we’ve seen the Millennial generation have a profound impact on the security industry, and this is largely due to the fact that those born in this time period have a very knowledgeable and in-depth experience with technology. Millennials are accustomed to smart devices, automation and at-your-fingertips accessibility, which has created new and unfamiliar demands when it comes to security systems and solutions.” – Ron Virden, ACRE 9. What are the mainstream uses for thermal cameras? “Thermal cameras have been the go-to solution for perimeter protection applications for decades. This year, we’re seeing more integrations of thermal cameras with other solutions like radar to improve redundancy, long-range detection and alarm verification for airports and other large sites. Thanks to new technology partnerships and thermal offerings, customers are seeing the value of thermal beyond traditional use cases.” – Fredrik Wallberg, FLIR Systems 10. How do software improvements drive physical security? “Software improvements ultimately drive greater interoperability among technology partners and system integration in physical security solutions. From a surveillance standpoint, software is also increasingly used to enhance system performance and overall longevity by identifying anomalies. For example, to ensure video data is preserved and not lost, customers are using health monitoring software on surveillance hard drives.” – Jessica Burton, Seagate Technology
“Open systems” has been a security industry buzzword for decades, although reality has sometimes diverged significantly from the ideal. The current state-of-the-art in open systems provides a multitude of benefits to increasingly complex physical security systems. We asked this week’s Expert Panel Roundtable to elaborate: What is the impact of open systems on physical security?
One of the common characteristics of trade shows is booths with walls and walls of new products. Sometimes exhibitors seem intent on displaying everything in their portfolio, even though the displays appear cluttered and may not be welcoming. In an age of system sales, in particular, the emphasis on products can seem off kilter. Discussions with exhibitors at this year’s GSX show reveal a new awareness of the need for less cluttered booths, but the equipment walls persist. Here’s a review of Day 2 from the show floor. Allegion embraces more open booth design At GSX 2019, Allegion is among the exhibitors embracing a new, more open booth design that encourages engagement with customers and puts less emphasis on product displays. Discussions at the Allegion booth have centered around the value proposition and lower complexity of network-connected access control systems. The approach has been gaining a higher profile at Allegion since the company acquired Isonas, whose system configuration involves a reader-controller connected to the network via power-over-Ethernet cable. “Customers are also asking about Bluetooth technology and mobile applications,” said Jonathan Mooney, Allegion sales leader. Allegion is looking to deploy the Isonas software in other products in their portfolio; it will be offered in the range of Schlage wireless locks by the middle of 2020.The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control" “The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control,” said Mooney. Bosch offers complete security solution Bosch is introducing 55 new products at GSX 2019, but when it comes down to it, the company’s overarching message is not about individual products but about how they can be combined into a larger system. “At the end of the day, the message from Bosch is ‘how do I create a complete security solution?’” said Paul Garms, Bosch Director, Regional Marketing Security. “That’s what we are trying to demonstrate: How do all these things integrate?” Most of interest to attendees are actual demonstrations, which are a unique aspect of the trade show experience. “It’s nice at a show where we can really demonstrate what we are talking about when we say ‘integrated solution,’” said Garms. “And people can say, ‘oh yeah, if I trip this video analytic, the speaker will warn me I am approaching a restricted area.’ Or, when the manager signs in on the intrusion panel, now the associate can access a door he wasn’t able to before. It’s that integration and the complete solution that resonates. People are also interested in new products. At a show, they like to see them in operation.” At the Bosch booth, there is a big wall that illustrates some integration possibilities. An array of cameras was among the 55 new products introduced by Bosch, which also emphasized systems. Machine learning and advanced video analytics One implementation featured on the wall is Bosch’s Camera Trainer machine learning system. The system can “train” a camera to recognize a car in a parking lot, for example. Among the new Bosch products is the Autodome 7000i, the next generation of a best-selling camera, now with H.265 encoding and analytics such as line crossing. There is also an outdoor panoramic camera that is adjustable to 180-degree or 360-degree views. The new, less expensive 3000i series cameras provide an affordable option with edge analytics and Bosch’s data security protection included. Integration from Honeywell as well as 'the big picture' At Honeywell Security Group, Senior Product Manager G. Eric Green said the show seems to be much better attended than last year, “and we have had a lot of interest in our products.” Even end-user attendees typical of the GSX show are interested in the details of technology, as well as “the bigger picture,” commented Green. “Some of our booth visitors want to get into the weeds,” he said. “They say they want this piece of hardware. But they also also interested in the big picture. How things are interacting is very important.”Honeywell announced the 30 Series IP cameras, which can be used as part of video systems that comply with National Defense Authorization Act Section 889" “Most customers have installed products from other vendors that they expect us to work with. So integration is always at the top of the list. Can you work with these guys? Do you have an API? Do you support this piece of equipment? We always hear that a lot,” said Green. “There are customers who want best-in-breed products, but they’re not necessarily concerned about that coming from one manufacturer,” he said. “Other customers want ‘one throat to choke.’ When something goes wrong, they don’t want any finger-pointing.” Web-based security console and frictionless access control Honeywell is showing a beta version of its Pro-Watch 5.0 product, which is coming out in Q1 next year. It is an integrated security console that provides a map view of access control, video management, intrusion and other third party systems. The web-based platform offers access to each element, all controlled by permissions. “We are also building in an incident workflow engine that allows an operator to see exactly what steps he should take when something occurs as defined by the supervisor or a security director,” said Green. “It can literally walk you through, and it is completely freeform. Whatever you want it to say, it will say. This works in conjunction with access control, video, and all the things we talk to.” The Honeywell booth was a busy place on day two of GSX 2019 Another new Honeywell product is the OmniAssure Touch reader, a “frictionless” device that can read a credential off a smart phone in a user’s pocket. The user merely touches the reader, and it scans the area for a nearby mobile device that is authorized, and you can walk through the door. Honeywell also announced the 30 Series IP cameras, which are encrypted and can be used as part of video systems that comply with National Defense Authorization Act Section 889. They are made in Taiwan. Arcules' cloud security solution “There are fewer people here at GSX 2019, but we have seen a lot of really big companies looking for a cloud service,” said Andreas Pettersson, CEO of cloud video company Arcules. At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive: They say “we want to move to the cloud.” Pettersson theorized that concerns about a possible weakening economy may prompt some companies to avoid the large capital expenditure of procuring a new on-premise system and instead opt for the minimal investment needed for a cloud system. Monthly operating expenses of a cloud system are also predictable and more easily managed, said Pettersson.At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive Arcules is proactive on the subject of cybersecurity and has a two-page handout that summarizes the cybersecurity advantages of their system. They are eager to talk about cybersecurity as it relates to cloud systems, said Pettersson. He said that, in his experience, on-premise systems tend to have more cybersecurity issues, whether because ports are left open or a firewall is implemented incorrectly. Users may also seek to bypass the firewall — a dangerous practice that is not an option with cloud systems. Security patches may not have been implemented; in a cloud system, such updates are pushed out automatically. The recurring monthly revenue (RMR) aspect of cloud systems are a windfall to integrators who embrace the cloud. “One integrator said he went on vacation for the first time in years because he had the extra money coming in,” said Pettersson. Control room integration from Vistacom "We're still fairly new to GSX, as our first show was 5 years ago, but what we have noticed is that the show continues to attract valuable attendees and drive critical conversations around what companies like ours must bring to the table in order to be successful in this space," said Dan Gundry, Director of Sales and Marketing, Vistacom. "We've had so many chances to learn from and share with potential customers and partners, and as a result, we continue to forge great relationships.” Vistacom is highlighting its control room integration and the value enterprise organizations can gain from implementing one in their facility. The company works alongside end-user customers and security integrators to build a command center space, taking into account video wall display technology, operator consoles and furniture, audio and lighting considerations, as well as temperature and more, in an effort to optimize these centers. Stay tuned for the full GSX 2019 show review.
As editor of SecurityInformed.com, Larry attends industry and corporate events, interviews security leaders and contributes original editorial content to the sites. He also guides the "editorial roadmap" to ensure the site provides the most relevant content for security professionals. From 1996 to 2008, Larry was editor of "Access Control & Security Systems" magazine and its affiliated websites. He earned a Bachelor of Arts from Georgia State University with a minor in marketing. [Pictured: Larry and wife Linda relax with SecurityInformed.com's loyal office dog, Frankie] How did you come to work in the security industry? I started in the newspaper business and then migrated to trade publishing. I realized that every profession has its own journalism microcosm, so I learned a lot about robotics and paint and adhesives before I landed in the security field. That was around 1996, and security has been the center of my professional life, and a subject of continuing fascination ever since. What is the best professional advice you have ever received? I never met the man, but a famous quote from Woody Allen is something like "80 percent of life is showing up." I find that comforting. Showing up is something I can do. And knowing that I am already 80 percent successful at the get-go has provided extra confidence in a lot of situations over the years. Quick Facts Favorite TV show Comedians in Cars Getting Coffee First job McDonald's crew member Tea or coffee Neither: Diet Coke Best gift you received Dance lessons from my wife Last thing you cooked Grilled Cheese What's something few people know about you? Several years ago, after ISC West, I was killing time at the Wynn casino before going to the airport. I had put my last few dollars in a “Red White and Blue” slot machine, and I won the “mini-progressive” – more than $6,000! Having the lady count those $100 bills into my hand is a great memory of ISC West. What's the most rewarding thing about what you do for a living? I get to hear people talk every day about something they are passionate about. I get to learn from really smart people about interesting subjects that actually matter in the world. Jekyll Island on the Georgia coast is Larry Anderson's go-to destination for a relaxing week every summer What are your interests, hobbies and passions outside security? Books, including “literary” fiction, whodunits and lawyer novels. I tend to binge-watch television on demand while on the treadmill at the gym – which takes away the guilt. My wife Linda and I go to the movies a couple of times a month. Where was your last vacation? Jekyll Island on the Georgia coast is our go-to destination for a relaxing week every summer for the last 20 years. They have houses you can rent for the week, beautiful nature walks and bike trails, huge trees draped with Spanish moss, and a smattering of history – it was where millionaires like J.P. Morgan and William Rockefeller retreated to their 25-room “cottages” in the early 1900s. There’s plenty to see and do – or not to do if so inclined!
If you’ve been paying attention over the last twelve months, you will have noticed that deep learning techniques and artificial intelligence (AI) are making waves in the physical security market, with manufacturers eagerly adopting these buzzwords at the industry's biggest trade shows. With all the hype, security professionals are curious to know what these terms really mean, and how these technologies can boost real-world security system performance. The growing number of applications of deep learning technology and AI in physical security is a clear indication that these are more than a passing fad. This review of some of our most comprehensive articles on these topics shows that AI is an all-pervasive trend that the physical security industry will do well to embrace quickly. Here, we examine the opportunities that artificial intelligence presents for smart security applications, and look back at how some of the leading security companies are adapting to respond to rapidly-changing expectations: What Is Deep Learning Technology? Machine Learning involves collecting large amounts of data related to a problem, training a model using this data and employing this model to process new data. Recently, there have been huge advances in a branch of Machine Learning called Deep Learning. This describes a family of algorithms based on neural networks. These algorithms are able to learn efficiently from example, and subsequently apply this learning to new data. Here, Zvika Ashani explains how deep learning technology can boost video surveillance systems. Relationship Between Deep Learning And Artificial Intelligence With deep learning, you can show a computer many different images and it will "learn" to distinguish the differences. This is the "training" phase. After the neural network learns about the data, it can then use "inference" to interpret new data based on what it has learned. For example, if it has seen enough cats before, the system will know when a new image is a cat. In effect, the system “learns” by looking at lots of data to achieve artificial intelligence (AI). Larry Anderson explores how new computer hardware - the Graphic Processing Unit (GPU) – is making artificial intelligence accessible to the security industry. Improving Surveillance Efficiency And Accuracy With AI Larry Anderson explains how the latest technologies from Neurala and Motorola will enable the addition of AI to existing products, changing an existing solution from a passive sensor to a device that is “active in its thinking.” The technology is already being added to existing Motorola body-worn-cameras to enable police officers to more efficiently search for objects or persons of interest. In surveillance applications, AI could eliminate the need for humans to do repetitive or boring work, such as look at hours of video footage. Intelligent Security Systems Overcome Smart City Surveillance Challenges AI technology is expected to answer the pressing industry questions of how to use Big Data effectively and make a return on the investment in expensive storage, while maintaining (or even lowering) human capital costs. However, until recently, these expectations have been limited by factors such as a limited ability to learn, and high ongoing costs. Zvika Ashani examines how these challenges are being met and overcome, making artificial intelligence the standard in Smart City surveillance deployments. Combining AI And Robotics To Enhance Security Operations With the abilities afforded by AI, robots can navigate any designated area autonomously to keep an eye out for suspicious behavior or alert first responders to those who may need aid. This also means that fewer law enforcement and/or security personnel will have be pulled from surrounding areas. While drones still require a human operator to chart their flight paths, the evolution of artificial intelligence (AI) is increasing the capabilities of these machines to work autonomously, says Steve Reinharz. Future Of Artificial Intelligence In The Security Industry Contributors to SourceSecurity.com have been eager to embrace artificial intelligence and its ability to make video analytics more accurate and effective. Manufacturers predicted that deep learning technology could provide unprecedented insight into human behaviour, allowing video systems to more accurately monitor and predict crime. They also noted how cloud-based systems hold an advantage for deep learning video analytics. All in all, manufacturers are hoping that AI will provide scalable solutions across a range of vertical markets.
Our most popular articles in 2017 reflected changing trends in the U.S. security market, from deep learning to protection of mobile workers, from building automation to robotics. Again in 2017, the most read articles tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 most-clicked articles we posted in 2017. They are listed in order here with the author’s name and a brief excerpt. 1. Las Vegas Massacre Demands Reevaluation of Hospitality Sector Security The Oct. 1, 2017, sniper attack from a 32nd-floor room at Mandalay Bay, overlooking 22,000 people attending a country music festival, has been compared to “shooting fish in a barrel.” When the bullets rained down, there was nowhere to hide. The attack came from outside the “perimeter” of the event, so any additional screening of attendees would not have prevented it. There are also implications of the Las Vegas massacre for the hospitality industry. Hotels and resorts such as Mandalay Bay have not generally embraced technologies like the explosives scanners or X-ray machines used at airport terminals, at least not in the United States. 2. Deep Learning Algorithms Broaden the Scope of Video Analytics [Zvika Ashani] Until recently there have been minimal applications of Machine Learning used in video analytics products, largely due to high complexity and high resource usage, which made such products too costly for mainstream deployment. However, the last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning. The recent increased interest in Deep Learning is largely due to the availability of graphical processing units (GPUs). GPUs can efficiently train and run Deep Learning algorithms The last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning 3. Home Security Systems: Why You Need to Upgrade From 3G to 4G Technology [Missy Dalby] The current communication method for most home security systems is via CDMA and 3G (GSM) technologies. With the emergence of faster, better, and stronger 4G LTE technology, carriers are migrating away from old technology standards and methods towards new, more efficient ones. As such, the older technology is going dark, and soon. Manufacturers of cellular modules have stopped making them. At the end of 2018 they will stop letting customers add systems utilizing 3G radios to their channels. 4. Diving into AI and Deep Learning at NVIDIA’s San Jose Conference [Larry Anderson] Video analytics applications fall under NVIDIA's “AI City” initiative, which they describe as a combination of "safe cities" (video surveillance, law enforcement, forensics) and "smart cities" (traffic management, retail analytics, resource optimization). Depending on the application, AI City technology must function in the cloud, on premises and/or at the edge. NVIDIA’s new Metropolis initiative offers AI at every system level, from the Jetson TX2 "embedded supercomputer" available at the edge, to on-premises servers (using NVIDIA’s Tesla and Quadro) to cloud systems (using NVIDIA’s DGX). 5. Physical Security Evolves to Protect Mobile Workers [Annie Asrari] With an increasing number of employees traveling and working remotely, the days of a dedicated worker who commutes to and from a single location every day of the week are just about over. Security professionals must take a second look at their policies and procedures for employee safety. To protect employees in this new mobile world, where people, assets and brand reputation threats may face higher than normal levels of safety and security risks, businesses must focus less on securing physical, four-wall perimeters and instead take a global approach to security that focuses on protecting traveling, remote and lone workers. Businesses must take a global approach to security that focuses on protecting traveling, remote and lone workers 6. New Security Technologies Driving Excitement on Busy ISC West Day One [Larry Anderson] ISC West in Las Vegas kicked off April 5 with an expanding focus on new technologies and new applications, including some that go beyond any narrow definition of security. “Technology is disrupting the market and executives are taking our solutions beyond security,” says Moti Shabtai, CEO and President of Qognify. “They are starting with security and quickly moving to other risk and business continuity issues in the organizations. They want a clear return on investment (ROI), which we can deliver if we move from covering a limited island of ‘security’ issues and give them the value of also managing risk, safety, and operations.” 7. Optimizing Building Automation for Good Return on Investment [Minu Youngkin] Smart buildings are on the rise around the world, not only because a growing number of companies are considering their environmental impact, but also because of the dramatic cost savings that can be realized through integration. In every building that has an integrated security and access control system, an opportunity awaits to also integrate the building’s energy use, water use, ventilation and more. The key is to effectively convey the tremendous potential of this new technology to the end user. 8. ISC West 2017: How Will IT and Consumer Electronics Influence the Secuirty Industry? [Fredrik Nilsson] A good way to predict trends [at the upcoming ISC West show] is to look at what’s happening in some larger, adjacent technology industries, such as IT and consumer electronics. Major trends on these fronts are the most likely to influence what new products will be launched in the electronic security industry. Proof in point is H.264, an advanced compression technology ratified in 2003 and adopted as the new standard by the consumer industry a few years later. By 2009, it became the new compression standard for the video surveillance industry as well. Violence will continue to challenge the healthcare sector in the future 9. The Future of Healthcare Security: Violence Response and Emergency Preparedness [Ben Scaglione and David LaRose] Violence will continue to challenge the healthcare sector in the future. Domestic violence, child abuse, behavioral health, drug and alcohol abuse will all continue to challenge hospital staff in the Emergency Department, Women’s Health, and behavioral health areas. The Hazard Vulnerability Assessments (HVA) along with facility wide risk assessments helps in defining risk severity and identifying historical patterns of violence. 10. Robot Revolution: Uncovering the Real Value of Security Robots [Steve Reinharz] The security coverage that a robot offers in the case of a shopping mall can be easily overshadowed by the fact that the machines seem to serve to entertain the population. Instead, security robots can best be utilized for more high-level roles, such as in critical infrastructure sites, corporate campuses and educational facilities, where wide, expansive spaces require continuous protection. In these locales, security can be difficult to achieve, as cost, location and lack of resources make the logistics of deployment difficult.
SourceSecurity.com’s most trafficked articles in 2017 reflected changing trends in the market, from facial detection to drones, from deep learning to body worn cameras. Again in 2017, the most well-trafficked articles posted at SourceSecurity.com tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles posted at SourceSecurity.com in 2017 that generated the most page views. They are listed in order here with the author’s name and a brief excerpt. MOBOTIX is increasingly positioning itself as a specialist in high-quality IP surveillance software 1. MOBOTIX Aims High with Cybersecurity and Customer-Focused Solutions [Jeannie Corfield] With a new CEO and Konica Minolta on board, MOBOTIX is set for expansion on a global scale. But how much growth can we expect for a company like MOBOTIX in an increasingly commoditised surveillance market, where many of the larger players compete on price as a key differentiator? While MOBOTIX respects those players, the German manufacturer wants to tell a different story. Rather than competing as a camera hardware manufacturer, MOBOTIX is increasingly positioning itself as a specialist in high-quality IP surveillance software – camera units are just one part of an intelligent system. When MOBOTIX succeeds in telling this story, partners understand that it’s not about the price. 2. ‘Anti-Surveillance Clothing’ Creates a New Wrinkle in Facial Detection [Larry Anderson] The latest challenge to facial recognition technology is “anti-surveillance clothing,” aimed at confusing facial recognition algorithms as a way of preserving “privacy.” The clothing, covered with ghostly face-like designs to specifically trigger face-detection algorithms, are a backlash against the looming possibility of facial recognition being used in retail environments and for other commercial purposes. 3. Drone Terror: How to Protect Facilities and People [Logan Harris] Already, rogue groups such as ISIS have used low cost drones to carry explosives in targeted attacks. Using this same method, targeting high profile locations to create terror and panic is very possible. Security professionals and technologists are working furiously to address the gaps in drone defense. Compact Surveillance Radar (CSR) is a security technology addressing the problems with other types of detection. CSR, like traditional radar, has the benefit of being able to detect and track foreign objects in all weather conditions, but at a fraction of the size and cost. The last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning 4. Deep Learning Algorithms Broaden the Scope of Video Analytics [Zvika Anshani] Until recently there have been minimal applications of Machine Learning used in video analytics products, largely due to high complexity and high resource usage, which made such products too costly for mainstream deployment. However, the last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning. The recent increased interest in Deep Learning is largely due to the availability of graphical processing units (GPUs). GPUs can efficiently train and run Deep Learning algorithms 5. Body Worn Cameras: Overcoming the Challenges of Live Video Streaming [Mark Patrick] Most body camera manufacturers, that are trying to stream, attempt to use these consumer technologies; but they don’t work very well in the field, which is not helpful when you need to see what is happening, right now, on the ground. The video must be of usable quality, even though officers wearing the cameras may be moving and experiencing signal fluctuations – most mobile video produces significant delays and signal breakups. Video and audio must always remain in sync so there’s no confusion about who said what. Therefore, special technology is required that copes with poor and varying bandwidths to allow a real-time view of the scene and support immediate decision-making by local and remote team members and support teams moving to the scene. 6. QinetiQ Demonstrates New Privacy-Protecting Body Scanner for Crowded Places [Ron Alalouff] QinetiQ has developed a scanner that can be used in crowded places without having to slow down or stop moving targets. The body scanner, capable of detecting hidden explosives or weapons on a person, has been demonstrated publicly in the United Kingdom for the first time. SPO-NX from QinetiQ – a company spun out of the UK’s Defense Evaluation and Research Agency (DERA) in 2001 – can quickly screen large groups of people for concealed weapons or explosives in a passive, non-intrusive way, without needing people to stop or slow down. 7. ISC West 2017: How Will IT and Consumer Electronics Influence the Security Industry? [Fredrik Nilsson] A good way to predict trends [at the upcoming ISC West show] is to look at what’s happening in some larger, adjacent technology industries, such as IT and consumer electronics. Major trends on these fronts are the most likely to influence what new products will be launched in the electronic security industry. Proof in point is H.264, an advanced compression technology ratified in 2003 and adopted as the new standard by the consumer industry a few years later. By 2009, it became the new compression standard for the video surveillance industry as well. By drawing data from a number of different sources and subsystems, it is possible to move towards a truly smart environment 8. Integrating Security Management into Broader Building Systems [Gert Rohrmann] Security solutions should be about integration not isolation. Many organizations are considering their existing processes and systems and looking at how to leverage further value. Security is part of that focus and is a central component in the move towards a more integrated approach, which results in significant benefits. By drawing data from a number of different sources and subsystems, including building automation, it is possible to move towards a truly smart environment. 9. How to Use Video Analytics and Metadata to Prevent Terrorist Attacks [Yury Akhmetov] How we defend and prevent terrorism must be based on intelligent processing of information, and an early awareness of potential threats – and effective preventive action – may eliminate most attacks. Video analytics, automated surveillance and AI decision-making will change the rules of the struggle between civilians and terrorists by making attempted attacks predictable, senseless and silent. To what extent can technology investigate and prevent terror crimes considering the latest technology innovations? 10. Next Generation Video Analytics: Separating Fact from Fiction [Erez Goldstein] ‘Next generation video analytics’ is a catchy marketing phrase, is how much substance is behind it? Video analytics as a technology has been with us for many years, but there has always been an air of confusion and mystery around it, in large part created by Hollywood movies, where every camera is connected, an operator can search the network and locate the villain in a matter of seconds. I am pleased to say that, in many respects, fact has caught up with fiction, with the newest video analytics solutions that are now on the market focusing on search and specifically real-time search. These solutions have been tried, tested and proven to help reduce search time from hours to minutes and even seconds.
In 2017, SecurityInformed.com covered topics from all corners of the physical security industry - from video surveillance, to access control, to intrusion detection and beyond. But just how much have you been paying attention to the industry this past year? Does your knowledge of the cloud soar high above your colleagues and security friends? Can you recall your facts faster than 60-fps? Are you hooked into the mainframe with your expertise in cybersecurity? Now you can find out. We have launched our SecurityInformed.com Best of the Year Quiz 2017, and this is your opportunity to prove just how much you remembered in this eventful year of security. Compiled by Editor Larry Anderson, our questions span topics as diverse as millennials, body-worn-cameras and security trade shows. So, what are you waiting for? Are you ready to prove your knowledge? Are you the champion of the security trade? Take our SourceSecurity.com Best of the Year Quiz 2017 now, and be the envy of the industry!
SourceSecurity.com’s Expert Panel had a lot to say in 2015 on a variety of topics in our Roundtable discussions. Not surprisingly, the discussion topics that have generated the most interest (in terms of how much visitor traffic they generated) are the same hot topics we hear about every day in the industry. Our very most-clicked-on Roundtable discussion in 2015 was about the impact of video on privacy rights. Other hot topics that made the Top-10 list of Roundtable discussions included the Cloud (twice!), the impact of IT on physical security, and the outlook for 4K cameras. Additional well-read discussions centered on expanding the benefits of security to other departments and how to improve training. Readers also gravitated to Expert Panel Roundtable discussions of more technical topics such as the value of full-frame-rate video and the effectiveness of panoramic view cameras (compared to pan-tilt-zoom functionality). Rounding out the Top 10 is a discussion of the desirability (and legal implications) of using dummy cameras. Here is a listing of the Top 10 Expert Panel Roundtable discussions posted in 2015 at SourceSecurity.com, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2015 (including the quotable panelists named below). 1. What Are The Limitations On Where Video Cameras Can Be Placed Because Of Privacy? "Use of cameras in retail applications can easily be justified in general surveillance of sales floors and shopping aisles, but cameras should only be used in changing areas to address a particularly serious problem that cannot be addressed by less intrusive means.” [Mark Pritchard] 2. Are Cloud-Based Security Systems “Safe?” "If the authentication principles are insufficient and weak passwords are allowed, it doesn’t matter how strong the encryption is. Because cloud-based systems are exposed to the Internet, they demand strong authentication and increased operational procedures." [Per Björkdahl] 3. How Does IT Affect The Physical Security Buying Decision? "Of course, we all want good value, but we must invest as necessary. If you strip everything back, the integrator's job is to deliver data. If IT and security departments can keep this objective in mind, then 'value' redefines itself." [Larry Lummis] 4. Which Non-Security Uses Of Video Are Catching On? "While video can help with quality control across the supply chain, it will be especially useful in ensuring compliance with the international adulteration rule [for food manufacturers], the rule with the last court-ordered deadline on May 31, 2016." [Don Hsieh] 5. What Is The Value Of "Full-Frame-Rate" Video? "I once took a client’s footage of a genuine street fight to check how many images per second were needed to prove who punched who – 25fps was fine but 12fps made the video evidence doubtful. Don’t forget, however many fps you choose, your shutter speed must be fast enough to prevent motion blur spoiling the details." [Simon Lambert] 6. When Is It Desirable To Use 'Dummy' Cameras As A Deterrent? "If cameras are present, there is a reasonable expectation of a secure environment in both public and private areas. If the public sees cameras and assumes they are real, they could argue that they were reliant on the protection provided by the cameras." [Dave Poulin] 7. Are Megapixel Or Panoramic-View Cameras An Effective Substitute For PTZs? "Panoramic cameras are usually static, so zooming into a scene’s details is done in software and limited by pixels in the sensor, lens quality and software such as de-warping, so clarity at the boundaries might disappoint. PTZ cameras zoom optically, magnifying long-range details significantly better." [Simon Lambert] 8. Is HD Still The Standard Of Resolution In The Market? For How Much Longer? "The 720p and 1080p HDTV remains dominant today and is expected to be for the foreseeable future. The next standards-based resolution will be 4K, which represents 8.3 megapixel, but first the industry will need to improve on bandwidth with better compression and better light sensitivity." [Fredrik Nilsson] 9. What Are The Current Limitations Of Cloud-Based Systems? "The only remaining limitations of cloud-based systems are bandwidth and connectivity to the cloud. There is more than enough bandwidth for applications like Access Control and Visitor Management, but it will take a couple more years before all high-resolution video is cloud-based.” [Paul Bodell] 10. How Can Security Training Be Improved Among Integrators And End Users? "Training should be sticky and persistent. Follow-up training such as on-line review and updated course material should be available to keep the knowledge fresh. Technology is constantly changing, as soon as training is complete the knowledge begins to go stale." [Charlie Erickson] See the full coverage of 2015/2016 Review and Forecast articles here
There's nothing like a visit to the China Public Security Expo (CPSE) in Shenzhen to open your eyes to a new world of security market manufacturers and customers in the Asia-Pacific market. The show is huge by Western standards – someone told me it's five times the size of ISC West in Las Vegas. But even more than the size of the show, it was the crowd that made an impression on this first-time visitor. Huge numbers of attendees and exhibitors Think of the mass of humanity you might expect at a rock concert, or at Walmart on Black Friday. There was no space to move as you enter the show; you're swept along as part of a sweaty crowd. Fortunately, it was a little easier to maneuver once I got past the initial rush. There were some familiar Western brands – I saw Tyco and Honeywell among others – but the vast majority of the exhibitors are names unfamiliar in the West. And there are a lot of them, aisles and aisles of large, elaborate exhibits. Not waiting for attendees to approach a booth, there were people in the aisles aggressively urging you to enter a nearby exhibit, or at least to take a piece of literature. The experience was a stark contrast to the slow activity at ASIS, where exhibitors complained about lack of booth traffic. No need here to rationalise about the quality of the leads – here, it was clearly about quantity. Companies operating on a larger scale The massive scale of CPSE confirmed my initial observations from the previous couple of days as I had visited Hangzhou as well as Shenzhen. Everything seems bigger here. Large, high-rise buildings are everywhere you look, many of them recently built, across miles and miles, with more to come. Cranes dot the horizon as even more construction is under way. What these Chinese companies are achieving exceeds our tired perceptions in the West of "commoditised products" or "cheap Chinese" My host for the trip, Hikvision, inhabits two large skyscrapers in Hangzhou, and there's an adjacent third building (much bigger than the others) already under construction. When I visited their factory, I learned that they are also building a brand new (and larger) manufacturing facility that will use more automation and further expand their already huge daily output of video surveillance products. It's growth on a scale far beyond anything we're seeing anywhere else in the security marketplace. I visited some other manufacturers at the show, including Dahua, which is gearing up for a larger presence in the U.S. market; and Uniview, which is changing its global brand to UNV and is on the verge of going public. Eyeing Western markets What these Chinese companies are achieving exceeds our tired perceptions in the West of "commoditised products" or "cheap Chinese". Hikvision alone has a broad and rich range of technologies that includes intelligent systems, analytics and product capabilities that other companies often claim will be their advantage as the market becomes more commoditised. Undermining lingering perceptions of questionable Chinese quality were impressive quality control processes Hikvision displayed on the factory tours. Western markets, especially the United States, loom large in the sights of these big companies. Often the missing piece is a U.S. sales and service infrastructure. Hikvision (and other Chinese players) are growing in the U.S. market. Reflecting Hikvision's growth here is (what else?) a new building planned in California. I learned a lot on my Far East adventure; among other things, that the future of the security marketplace will be more global than ever. (And a new word, a verb: to libate.)
Strategic management of costs is important when considering video storage systems Costs are at issue when considering any component of a video system. Strategic management of costs is especially important when considering video storage systems because storage accounts for such a large cost component of networked systems. Gartner’s Total Cost of Ownership (TCO) As enterprise products begin to dominate the video storage market, more attention needs to be addressed to Gartner’s Total Cost of Ownership (TCO), says Jeff Burgess, president and CEO of BCDVideo. This concept takes it beyond the initial purchase costs, and also factors in management and support, the opportunity cost of downtime, and other productivity losses. “It’s especially true these days as more and more, video data is being analyzed for business purposes,” says Burgess. “After all, they are counting on it to run their project. The video doesn’t get recorded if the recorder is not working or continually freezing up.” ‘Cost Of Power, Pipe, And People’ Burgess urges integrators and end users to ask themselves: What is the video recorder really costing me over the course of the five-year project? It’s likely a racked solution, so in IT terminology that “costs power, pipe, and people.” “Take the people out of the mix,” Burgess says. “You should not need to roll a truck to the site every time there is an issue. Especially after a warranty service call. The system should automatically accept the replacement drive and bring the data over to it within the existing RAID settings, without the integrator’s on-site presence needed. The integrator really needs to look under the hood to see what else the system can provide other than simply being a storage box or a box of parts from multiple brands, not meant to work together.” Finding the right balance of control, performance, scalability and availability to keep up with and effectively exploit the surveillance data deluge allows organizations to avoid painful and costly upgrades Today’s intelligently-built video solutions provide the integrator with an easy-to-track cost savings over the lifespan of the project versus buying boxes on the cheap, says Burgess. “Today’s savvy integrator realises it doesn’t take many truck rolls to lose all those front-end savings, which are now eating away at their profits.” Camera With SD Cards Another cost factor is to focus more on the utilisation of the SD cards in the camera. Utilising cards within the cameras creates a very inexpensive way of adding redundancy to a solution, says Burgess, who notes that most VMS companies can pull the video from the SD cards should there be an interruption in the network or at the head end. Educate Yourself Veracity recommends asking a lot of questions to guide system design and minimize costs. What retention time do you need? What would you wish? Do you want to relay on video motion detection, or would you prefer to find a system that allows you to record low frame rate 24/7 and then increase frame rate on motion? Does your storage choice allow you to use low cost drives? Does it use a huge amount of power? Is it overly complex? “Educate yourself about the choices,” says Scott Sereboff, CEO of Veracity USA. “Look around. Consider the alternatives. You have a choice that does not include a RAID storage system with an $800-plus per terabyte price tag.” "Starting with a solution that takes minimal install and tuning, and is proven to scale well beyond current needs, future proofs the system for the short- and long-term for the customer and the integrator", says Jeff Adams, director of sales, surveillance solutions, DDN Storage solutions Balancing Performance, Capacity And Availability Finding the right balance of control, performance, scalability and availability to keep up with and effectively exploit the surveillance data deluge allows organizations to avoid painful and costly upgrades, says Jeff Adams, director of sales, surveillance solutions, DataDirects Network (DDN) Storage solutions. “Performance needs to scale to allow for increasingly demanding playback and/or analytics features. Capacity needs to scale non-disruptively as cameras are added, while resolutions and retention periods may increase over time. Availability at scale is tricky; something as simple as slow rebuild times becomes critical in larger systems – endangering availability and system data integrity.” In addition to new installations, DDN does a healthy business in replacing underpowered infrastructures that deliver on the initial requirements but fail on scaling, says Adams. The most frequent culprits when a video surveillance site fails and needs a significant replacement/upgrade include: single controller architectures, silent data corruption, data loss from secondary failures during drive rebuilds, performance impact of rebuilds, alternates to RAID6 data protection, and lack of experience scaling into the petabyte or multi-petabyte range. Many mid-range video surveillance storage “solutions” take more than a week to install and tune, and cannot handle significant scale, adds Adams. For end users, this limits the ability to add cameras, capacity and demand (playback, analytics and system consolidation). For integrators, this means a lot of “care and feeding,” and frequent completion delays up front, as well as increased support considerations throughout the life of the project. “Starting with a solution that takes minimal install and tuning, and is proven to scale well beyond current needs, future proofs the system for the short- and long-term for the customer and the integrator,” says Adams. It also keeps costs low.
Physical access control system architecture should be built to use the changing IT infrastructures of today’s organizations to their fullest It’s time to completely rethink physical access control systems with an eye toward the changing world of information technology. Today’s physical access control system architecture only leverages existing network hardware technology – it doesn’t utilize the organization’s full IT infrastructure, which includes systems providing advanced security services and sources of security-related real-time information. A close look at most organization’s IT roadmaps will show that traditional-architecture access control systems are off on a side road. Physical access control system architecture should be built to use the changing IT infrastructures of today’s organizations to their fullest. Such an approach is key to future-proofing and minimizing costs. The architecture needs to be able to keep pace with technological advancements in computing, communications and integration at the system level and the device level, providing strong security capabilities in a cost-efficient manner. Because hardware-centric, distributed intelligence can’t keep up with IT advances, an ever-widening gap exists between the capabilities, effectiveness and ease of management that a physical access control system can provide – and what today’s physical access control products can provide. Unless the concept of “putting intelligence at the door” includes all the intelligence that should be utilised to make an access decision, such an approach actually provides less security than today’s networked technologies are capable of providing. A key issue is a system’s native support for technological advances versus requiring third-party devices and middleware in a piecemeal approach to system design. With traditional hardware-centric physical access control systems, advanced features and real-time authentication and authorization capabilities could only be achieved by implementing costly third-party solutions or custom-designed applications. Cost and reliability factors have kept such capabilities out of reach for most physical access control customers, even though IT security systems have had such features for more than a decade. Until a full transition is made to next-generation architecture, existing physical access control system deployments will continue to fall further and further behind as technology advances, and will continue to have shortcomings and weaknesses At the infrastructure level, next-generation physical access control system architecture must be IT-centric, taking advantage of an organization’s existing IT infrastructure. It must be deployable throughout the enterprise like any other business application that uses networked end-point devices. At the application level, next-generation physical access control system architecture must be IT-aligned in support of the customer’s preferred approaches to identity, credential and access management (ICAM), and must be easily integrated with relevant business systems. These changes create significant opportunities for integrators and end users, offering software- and net-centricity, server-based real-time access decisions, advanced security protection, scalability, IT- and ICAM-friendly deployment, and mobile device- and smart card-friendly deployment. There are two questions to consider about making the transition to next-generation physical access control architecture: First, will your organization’s current system be satisfactory five to 10 years from now given the pace of technological advances? Second, from a cost- and security-effectiveness standpoint, is continued investment in legacy physical access control technology the smartest approach to your organization’s critical asset protection and incident response needs? Until a full transition is made to next-generation architecture, existing physical access control system deployments will continue to fall further and further behind as technology advances, and will continue to have shortcomings and weaknesses – as well as needless costs – that constitute a liability to an organization’s asset protection program. Editor’s Note: This article is based on Mr. Raefield’s answers to several questions about the access control market posed by SourceSecurity.com.
The merger of Vicon and IQinVision has been one of the more interesting business developments in the security and video surveillance markets in 2014. Wondering how the merger is working out, I spoke with Eric Fullerton, CEO, Vicon Industries Inc., at the ASIS 2014 show in Atlanta. Here are some of his comments: SS.com: What drew you to Vicon; what opportunity do you see here? Fullerton: The merger of Vicon and IQinVision was announced at the end of Q1, and I thought: What is that? My first reaction was that it’s a losing proposition - putting a struggling camera company and a struggling solutions company together. Then I started looking at it more closely. I think by putting these two companies together, we will be able to create a very strong video company that can lift video to the next level. I wanted a good challenge, and to be part of the next change in the industry by combining hardware and software and to start innovating at the edge. SS.com: What do you see as the next level of video, once it’s realized? Fullerton: Video will become the most important digital information source to an operation. Video isn’t just your security application, but it’s a digital business application that adds value to the bottom line. That’s where we want to be delivering products and solutions. We are starting to extract metadata from the cameras. You can analyze the content of video, which provides a totally different value to the video. Less than half of one percent of recorded video is actually looked at -- it’s just used to document what happened after the fact. With some of the modern cameras, like some we are already launching, there is metadata storage of each frame, all the vectors and everything that you can know. Without looking at the video you can analyze changes from frame to frame in terms of color and movement. That will add value to the use of the video. You won’t have to sit and watch it to know what it’s capturing, but you will know what’s going on by using analytic algorithms, and combining that with other digital security systems, including access control and video management. With some of the self-learning video analytics, facial recognition and other things, we are starting to analyze video with data algorithms, channelizing it, and using it as valuable input into HR and management solutions, even in manufacturing. You can get more efficiency. Video will become a valuable addition to daily operations and add value to the bottom line. SS.com: What is Vicon’s part of that – an end-to-end solution, or what? Fullerton: That’s the million dollar question. We are going to build cameras under the IQinVision brand, and have a full line of cameras. We will focus on where our core capabilities are – design and functionality. We will be outsourcing all manufacturing to China and other places that give us the right cost basis, and we will be adding our value at the high end of the camera. The camera line will be open and able to interoperate with other video management systems that we know today. "We’ll have a plug-and-playsolution at the bottom todeliver what the peoplewant at the low end – oneto 60 cameras with limitedfunctionality. At the mid-market we will have muchmore robust and functionalNVRs with more storagefor your larger installations.And then at the high end wewill a VMS-type solutionthat is cloud-enabled" On the Vicon side, today we have a proprietary VMS, which is not what the market is asking for. The emergence of Milestone as an open platform company was because end users were looking for freedom of choice and to get out of proprietary jail. We will migrate our video management platform to an open platform. We’ll have a plug-and-play solution at the bottom to deliver what the people want at the low end – one to 60 cameras with limited functionality. At the mid-market we will have much more robust and functional NVRs with more storage for your larger installations. And then at the high end we will a VMS-type solution that is cloud-enabled. We will also have a cloud solution at the low-end, residential, mom-and-pop market, with video only, no integrations. Later we’ll develop a multi-tenant cloud system for video service providers (VSPs). Going to the cloud doesn’t mean you put the video in the cloud. It means you can get the video when you need to, but also get the information you need. There will be a lot of on-camera storage. Because you have the knowledge of what’s happening in the frames (using metadata), you can pull out the data from the cloud and then decide what part of the video you need to look at. SS.com: How fast are you getting out of the analog business? Fullerton: We’re not. The analog business will have a very long tail – the last 10 to 15 years has proven that. Yes, there is some erosion of margin because of commoditization. There are benefits of analog cameras – they’re robust, they work, you can pull the cable longer than an Ethernet cable. Because of the robustness and the pricing, and some of the features, we’ll see a long tail of analog for years to come. SS.com: What impact do you see of these changes on dealer partners? Fullerton: Being successful in the security industry is to understand how business is done and what end users want. One reason IT didn’t take over is that there is much better value than anybody realized in the guidance security dealers provide end users. I strongly believe business in the security industry is done by local people, and we will migrate as a combined company to a full two-tiered distribution model. We go through distribution and security integrators, and they will be the ones doing the business with the end user. SS.com: How do you deal with preconceptions about your history as a company, and how do you re-educate the market about that? Fullerton: In the security industry, if you look at the history of how it was built, and the old boy’s network, the shadow of what you do is very long. The interesting thing is that Vicon has had IP solutions for 14 years. Everybody thinks that Vicon is an analog company. Yes, we still sell analog cameras because there’s a need in the market. Vicon has been a proprietary company. I would say the biggest fault of the company has been to try to be proprietary when the market is going the other way. That’s the big change we will make. We will be announcing that, and driving PR to let everyone know the new Vicon is an open company that gives the end user the freedom of choice and also delivers on higher value. SS.com: What is your message to the market? Fullerton: We have a 4K camera, which has been our message at the ASIS 2014 show. The management team sat down last week and said “how are we going to drive this?” “What are our values going to be?” We looked at our vision and our mission. The vision is that we believe video will become the most important digital [resource] in a company, so it will add to the bottom line, not just surveillance. Our values are built around the acronym CIPIT – Customer orientation, Integrity, Passion, Innovation and Team effort.
Commoditisation is the biggest problem facing today’s security integrators, says Bill Bozeman, president and CEO of PSA Security Network, an electronic security cooperative encompassing some 250 electronic security systems integrators, and aligning them with over 150 vendor partners. Multi-million-dollar manufacturers are taking advantage of economies of scale to drive down pricing of many of the components our industry uses, and lower prices are poised to have a long-term detrimental impact on integrators’ business, Bozeman says. “You have to sell that many more cameras and card readers to create the same amount of revenue,” he says. “There’s a lot of danger there.” To survive the impact of commoditisation, integrators are looking to develop new business models that are not totally dependent on the installation of systems. Possibilities include recurring revenue models and sales of security services, which can provide a predictable cash flow. Recurring revenue for a systems integrator might come from longer-term maintenance contracts, or from monthly fees for alarm monitoring, access to cloud services, etc. Security services, in effect, involve an integrator providing a wider range of services to an end user customer for a monthly fee, basically allowing the end user to “outsource” its complete security operation to an integrator. Commoditisation over time will require that integrators re-think their business models, says Bozeman, but integrators will require a lot of education on how to embrace the needed transition. “Contractors don’t have that model,” he says. “They are embracing it slowly; it’s a slow migration, and we have tried to lead them in that direction. They’re picking up on it, but it’s been a herd of turtles.” On the plus side, Bozeman says proliferation of handheld devices with the ability to receive video and alarm signals is opening up a new wave of customers for integrators. He says the capabilities of hand-held devices drive visibility of the video surveillance world. The growth of lower-tech options, such as ‘baby-cams,’ is also helping “to drive interest toward professionally designed systems,” says Bozeman.
In its role to achieve “plug-and-play” interoperability for security system and device integration, the Physical Security Interoperability Alliance (PSIA) is looking ahead to some new possibilities in its long-term roadmap. David Bunzel, PSIA executive director, shared with me some of the active discussions among alliance members about where the next wave of interoperability initiatives may lead. Integration of wireless locks is at the top of the list, a response to the growing and evolving product category. Looking further into the future, integration of smart elevators, energy management systems and hotel management systems are part of the alliance’s roadmap. There are specific access control and integration issues related to each category. In the case of energy management systems, for example, there is demand for access control systems to be able to adjust a building’s climate system in response to whether anyone has entered the building (for example, on the weekend). Access control can also monitor overall building occupancy and optimize climate settings based on that information (especially valuable as a strategy to save energy costs and promote “green” compliance). The more our lives and technologies are interconnected, the greater the expectations for physical access control to be a part of a larger ecosystem Smart elevators are another opportunity to interface with access control, and increasingly their management is a requirement for enterprise building systems. Even more futuristic is the possibility of having an employee’s computer work station interface with an access control system. In this scenario, an employee’s desktop computer could automatically power up, open appropriate files and applications, and/or access networks to which the employee is authorized – all based on a card or biometric scan when the employee enters the building. With the increase of remote workers and companies needing fewer work stations (and seeking to reduce costs), the “hot desking” concept could continue to gain favor – and provide new benefits of interfacing with physical access control. In this case, rather than a work station assigned to each employee (even those who do not come to the office very often), the concept of a “hot desk” would allow an employer to use a smaller number of generic workstations, each available as needed when a remote worker comes into the office. When an employee comes to work (and scans his access control credential), he or she would be assigned to a specific workstation, and that desktop computer would then automatically configure itself to the employee’s specific needs and access privileges. It’s a new level of physical-logical integration, and an opportunity for the physical access control market, but interoperability challenges have to be addressed. The more our lives and technologies are interconnected, the greater the expectations for physical access control to be a part of a larger ecosystem. It appears PSIA and its members have challenges to keep them busy for years to come.
For the 20,000 or so security professionals who attend each year, ASIS International’s Annual Seminar and Exhibits is all about education. Attendees can polish their skills and update their security know-how in any of more than 200 education sessions during the yearly event. They can also learn all about the latest available security technologies and services at the massive 225,000-square-foot exhibition. Celebrities are on hand too, or at least some well-known and notable dignitaries are keynote speakers, including General Colin Powell, former U.S. Secretary of State; and John Huntsman, former Utah Governor and U.S Presidential candidate. Sharing dramatic stories of heroic rescues from recent geopolitical history, U.S. Navy SEAL Rear Admiral Scott Moore discusses team building in the context of the military’s most elite forces. These are just a few of the attractions when ASIS International presents the 60th Annual Seminar and Exhibits Sept. 29-Oct. 1 in the Georgia World Congress Center in Atlanta, Ga. For the fourth consecutive year, the (ISC)2 Security Congress, which focuses on issues of information and software security, co-locates with the ASIS event, thus combining physical and logical security professionals in one place (and allowing them to attend various facets of both events). ASIS International is the largest organization of security management professionals worldwide, and (ISC)2 is the largest not-for-profit membership body of certified information and software security professionals worldwide. The focus of ASIS for the manufacturer and supplier community is the vast exhibit hall, where more than 700 companies demonstrate cutting-edge technology, products and services to security professionals worldwide The focus of ASIS for the manufacturer and supplier community is the vast exhibit hall, where more than 700 companies demonstrate cutting-edge technology, products and services to security professionals worldwide. The ASIS exhibition is one of two large security trade show events each year in the U.S. market and provides a focus for many product introductions and other commercial announcements among the manufacturing community. Although the attendee focus is on end users, there are also integrators, consultants, distributors and others who flock to the ASIS exhibit hall to see what’s new in the security market for the second half of 2014. Other highlights of the ASIS conference sessions include focus on top security concerns and need-to-know industry trends, including cyber-fraud, drones, security metrics, aviation security and many more. Education sessions reflect a range of topics, including urgent issues on everyone’s minds and in the headlines, such as mass shooting incidents, cyber-fraud, workplace violence, the safety of our food supply, and dealing with legalized marijuana, among many more. On the business side, sessions explore management issues such as internal theft and sabotage, best practices in hiring top security personnel, monitoring Internet communications, and complying with employer mandates of the U.S. Affordable Care Act. One session focuses on a new breed of security integrator emerging to address both small- and large-scale projects. “The Integrator of the Future” session identifies the largest growth markets for tomorrow’s integration professional. SourceSecurity.com Editor Larry Anderson is attending ASIS 2014 to report the latest company and product news from the 60th annual event.
The SourceSecurity.com team attended this year's IFSEC International 2014 with great anticipation to view the new innovations first-hand on show and see how the move to London would impact visitor experience. To capture the show, we have provided a summary of IFSEC in pictures above. Highlights from IFSEC 2014 We saw an overwhelming number of people and products; here is a snapshot of our IFSEC experience for 2014: FLIR SourceSecurity.com attended FLIR’s press briefing which took place on the first day of the show. FLIR emphasized that it was more than just a professional thermal camera company – the company has recently released $499 thermal cameras to the consumer industry. For FLIR, the security market is growing industry. With the acquisition of Lorex in 2012, FLIR will be introducing Lorex products under the FLIR brand (consumer side, not professional) in EMEA. At IFSEC 2014, FLIR also introduced FLIR One- its first consumer camera for the iPhone. HID Global HID Global’s Director of Technical Services, Nick Hislop, talked SourceSecurity.com through its emerging technologies in the form of leveraging Bluetooth LE and NFC. The concept is simple: to make mobile access more convenient. Nick also demonstrated how HID’s products and solutions are relevant for a number of vertical markets including Enterprise, Healthcare, Education and Finance Services. Nedap ID Ido Wentink of Nedap Identification Systems introduced SourceSecurity.com to the Nedap IDS advanced license plate recognition product, ANPR Access HD. The company also introduced uPASS Access, a backward compatibility convertor and UHF ISO Card for improved user experience for uPASS platform. The ANPR Access HD for advanced license plate recognition is a higher resolution lens than its previous release, the ANPR Access camera. Other features of the ANPR Access HD include a more powerful CCV, increased IR illumination and expanded OCR library. SourceSecurity.com’s visit to STI’s booth saw the company emphasize its importance not just within the fire industry, but within the security industry as well Security Technology International (STI) SourceSecurity.com’s visit to STI’s booth saw the company emphasize its importance not just within the fire industry, but within the security industry as well. STI is looking to get the message out there that they’re not just a fire company. Paul Machacek, Sales Team Business Developer, talked SourceSecurity.com through a number of STI’s products including STI’s Polycarbonate Protective Covers, Steel cages, Call Points & Switches and Stand-alone Alarm Systems. Samsung - Changing the face of IP On day two of the show, Samsung hosted a press conference for the global launch of its Open Platform. This new initiative gives users the opportunity to utilize third party APPs with Samsung's WiseNetIII cameras and domes. Tim Biddulph, Product Manager at Samsung, hosted the conference and offered an insight into Samsung's tag line for the show, "Changing the face of IP". Taking a lead in IP technology, Samsung is seeking to give end-users a solution that is effectively future-proof in terms of expandability and its ability to integrate with new technology in the future. Ease of use was also at the top of Samsung's agenda with its "Zero configuration" NVR solution and there was a large focus on the power of integration within different vertical markets. ASSA ABLOY ASSA ABLOY showcased a number of its access security solutions on its impressive stand. SourceSecurity.com met with Thomas Schulz who gave a comprehensive tour of the stand. From ASSA ABLOY Aperio, there was a focus on the benefits of energy saving for its customers with the Aperio range now featuring battery-powered online and offline locks, cylinders, and escutcheons. There was also ABLOY CliQ technology on show which integrates electronics and mechanics, combining mechanical ABLOY PROTEC locking solutions with low-power electronics. A number of access control solution from effeff, Mul-T-Lock, Traka and Yale were also showcased on the stand. VIVOTEK At the VIVOTEK stand, the SourceSecurity.com team were given a tour of the stand which featured their low-light solution and their latest retail solution On day one of the show, VIVOTEK hosted a luncheon in the Crown Plaza hotel, just a stone's throw from the ExCeL center. As well as enjoying a great meal, attendees were privy to the company's main focus for the coming year and its milestones and product roadmap for 2014 and beyond. The warm hosts included: Steve Ma, Executive Vice President at VIVOTEK, Brandy Lin, Team leader at VIVOTEK and Owen Chen, the Chairman of VIVOTEK. During the luncheon, VIVOTEK shared its vision of being seen as more than just a camera manufacturer, rather, as a total solution provider. The message of the importance of integration, an increased awareness of the need for reliability of products and ease of use was key on their agenda. At the VIVOTEK stand, the SourceSecurity.com team were given a tour of the stand wich featured their low-light solution and their latest retail solution, which was made up of a series of mini high definition cameras for discreetness. SALTO Salto showcased its latest wireless access control door solution, the XS4 mini. XS4 Mini includes SALTO Virtual Network SVN and wireless capability with mini installation needs. Embedded in the heart of the product is the latest microprocessor technology, ready for the connected world, open and future-proof for online connection, wireless technology and NFC. Seagate During an editorial briefing with the SourceSecurity.com team, Seagate shared their valuable knowledge of the history of storage manufacturing and stressed the importance of choosing the right storage solution for installations. With the rise of "Big Data" and increased storage needs in the surveillance market this is something which has become much more of a consideration. As one of only three storage manufacturers, Seagate's experience and know-how within the surveillance industry is vast and it hopes to push out its knowledge to the industry to ensure that people know the benefits of choosing a fit-for-purpose storage solution. Western Digital SourceSecurity.com spoke to Martin Jefferson at Western Digital, who gave a very detailed explanation of how the new WD purple surveillance hard drive had been created and why it was fit-for purpose. It was a very insightful presentation of the product and demonstrated the inherent need for the market to understand why choosing the right storage solution is vital to any installation. OptexAt the Optex stand SourceSecurity.com spoke to Aude Desbieres, who gave a breakdown of the latest offering from Optex at the show. Amongst the array of new products on the stand, Optex showcased the new analytics features of its laser Sensor, REDSCAN, and a new people counting solution developed by Giken Trastem. There was also a focus on full integration of its IP sensors with Milestone XProtectand Hawkeye mapping software and new grade 2 and grade 3 detectors. Our very own Larry Anderson also sat down with their MD Mike Shibata to discuss the company's future and development roadmap. During an editorial briefing with the SourceSecurity.com team, Seagate shared their valuable knowledge of the history of storage manufacturing and stressed the importance of choosing the right storage solution for installations Tyco Stephen Carney, Director of Product Management for Video Solutions at Tyco Security Products, set down with SourceSecurity.com to give an insight into their product roadmaps and their main focus for the coming year. He spoke on their concept of Unification which looks at integration at code level rather than simply API level. With the launch of their victor 4.5 Unified Client, they hope to give the end user a solution that is more secure and efficient for businesses and organizations that require an active surveillance environment. He also mentioned Tyco's increased focus on the end user and customer experience being at the heart of how they develop their product offering for the market. Senstar At the Senstar booth, SourceSecurity.com were given an insight by Miriam Rautiainen into Senstar's new FlexZone, a fence-mounted sensor that detects and locates intruders. The FlexZone can also locate multiple intrusions simultaneously and is scalable, thus making it an easy and flexible option no matter how big or small the installation needs to be. With FlexZone, less equipment and infrastructure is required, adding to the flexibility of the product. Furthermore, rejecting false alarms is even easier with FlexZone than with Senstar's previous offerings. Miriam also mentioned the acquisition of Optellios earlier this year, which has allowed Senstar to expand on their fiber technology portfolio. Nedap SourceSecurity.com also attended a seminar at the Nedap stand about their collaboration with EE. EE has selected Nedap's AEOS security management platform as part of their plan to expand their business throughout the UK. Since the AEOS system is completely web-based, EE employees can access it from anywhere. Traka At the Traka stand, Tanveer Choudhry, Global Marketing Manager at Traka, gave us a demonstration of their new Traka 21 - a plug and play key management system designed for small to medium size businesses. The system is very user-friendly and easy to use, as Tanveer showed us. Furthermore, a PC connection isn't necessary as the Traka 21 can operate as a stand-alone. However, the system features a USB port, which allows employees to extract user data. The Traka 21 will be available later this year.
Ever wish your smart phone could see in the dark? Sure you have, and FLIR Systems has just the gadget to make it possible. It’s the FLIR One, the “first personal thermal imaging device for consumers,” introduced earlier this year. Now available for the iPhone, with a version for select Android models coming soon, the product sells for less than $350. It allows its users to “see what the naked eye can’t.” According to the manufacturer, FLIR One “provides a visual image of minute temperature differences, giving users the power to see in the dark, observe invisible heat sources, compare relative temperatures, [and] see through smoke.” FLIR One made a big splash at the Consumer Electronics Show (CES) in January and has been widely featured in the technology media since then. FLIR One is part of the company’s strategy of promoting greater use of thermal imaging in a variety of markets, including security, by increasing overall consumer awareness of the power of the technology. The new camera for the consumer market uses technology that will also be coming soon to a security camera near you, expanding the capabilities of video surveillance and combining the benefits of thermal and visible imaging into a single video stream. FLIR’s Multi-Spectral Dynamic Imaging (MSX) capability – used in the FLIR One and soon to be incorporated into security cameras – involves extracting the details of a visible image and “embossing” them onto a thermal image, says Andy Teich, FLIR CEO. The FLIR One uses both a thermal image sensor and the smart phone’s visible camera; there are two apertures. The compact device combines both of the images using MSX algorithms running in the background to calibrate and perfectly align the two images into one. The smart phone then displays a single video image that is richer in content than either one individually. The resulting thermal image includes some of the visible details – the most important ones at any rate. “[The technology] blends high-fidelity detail from a visible image with thermal for an image this is quite rich in detail,” Teich says. In the security market, for example, the image can combine a thermal image of a car in a parking lot with the ability to read the license plate number, which would be captured by a visible sensor. The “edges” created by color changes in a visible image provide detail that is combined with a thermal image. (FLIR has provided both visible and thermal cameras since its acquisition of Lorex Technology in 2012.) Teich says the MSX technology was developed for the company’s thermography business, which involves the use of hand-held cameras for temperature detection. The FLIR One is the first camera introduced outside the thermography segment. “Ultimately it will find its way into the security business,” says Teich, probably “within the next year.”
Frank De Fina put Samsung on the map related to video surveillance in the United States market. Five years ago, before the longtime Panasonic executive signed on, the Samsung brand had little traction in the U.S. surveillance market, although the Korean giant was already well known in the broader electronics market. Back then Samsung surveillance cameras were thought of as inferior to Panasonic, Sony or the other brands – if they were thought of at all. Five years later, Samsung is climbing up the market share rankings. A lot of the success can be attributed to Samsung’s technological advances and the innovation of new products they are bringing to market. The products have gotten better, true, but De Fina gets the credit for building a solid management infrastructure and expanding the distribution channels over the last five years. Now, those elements will be continuing without him. “I’m leaving the company in better shape than I found it,” said De Fina, Samsung’s executive vice-president, North America. He emphasizes that his parting with Samsung at the end of May is “amicable” and “based on personal reasons,” among them a grueling 106-mile-a-day commute. “I want the industry to know I’m taking a breather,” he said. “I want to adjust my life to better suit some of the issues I have.” “Building the Samsung brand and credibility were the main focus early on,” De Fina said. “You have to have great products, great people and success stories by customers who were willing to take a chance.” His only regret is that it took five years to accomplish the turnaround. “I wish I could have done it in two years instead of five,” he said. “Five years ago, it was literally a shell,” De Fina remembers. “There were no processes and no team. I am pleased to say I organized and built a great team. The credit for building the business goes to that team.” The success has been notable as Samsung has increased its market share in the United States and is on track to increase U.S. video surveillance sales by more than 75 percent this year over last. ”The team at Samsung is great, and I don’t want them to suffer from this (departure) being misunderstood,” said De Fina in a telephone conference call with a dozen or so security industry journalists. In the call, he deferred any mention of his possible successor to “the management at Samsung.” What’s next for Frank De Fina? One possibility is to work as a consultant, he said. “I’d like to be a business professor at Princeton (near my home), but I don’t have a degree in physics, and they would probably check,” he joked.
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload