Physical security, security integration, video, access control, security market trends
Round table contributions
Delivering on customer expectations is a basic tenet of success in the physical security market. However, meeting expectations may be an elusive goal, whether because customer needs are not communicated effectively or because equipment doesn’t perform as promised. We asked this week’s Expert Panel Roundtable: what if a customer expects more than a security system can deliver?
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilized. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?
Body-worn cameras are becoming more common every day, driven both by needs of the marketplace and technology developments. However, questions remain about the usefulness of the devices, and their future role in promoting safety and security. We asked this week’s Expert Panel Roundtable: What are the challenges of body-worn cameras for the security industry?
The world of politics, like the world of security, is an environment of constant change. But do changes in one have an impact on the other? Governments around the world are involved in buying a wide variety of physical security systems, so how those governments operate certainly affects how they spend money on security. But in a broader sense, governments (and the associated political forces at work) also impact how their citizens and those in the private sector view threats and, as a logical extension, the security systems they need to address those threats. We asked this week’s Expert Panel Roundtable: How does the political climate affect spending on security systems?
A busy trade show abounds with new products and expanded features, colorful signage and blinking video screens, all competing for attention from busy attendees. It’s a microcosm of how the security marketplace – or any market, for that matter – sells its products. But what happens if the reality turns out different to the sales pitch? What happens when product or system performance doesn’t quite live up to the claims? Some would call that hype, and it can lead to disillusioned and frustrated customers. We asked this week’s Expert Panel Roundtable: What is the negative impact of hype in the security marketplace?
Consolidation is a reality in the security and video surveillance market. In the last several years, we have seen a variety of mergers and acquisitions (M&As) involving scores of companies of all sizes. But what is the impact of M&A activity on the companies involved, on their customers, and on the industry as a whole? We posed this question to our Expert Panel Roundtable: Do mergers and acquisitions have a net positive or net negative impact on the security market (and why)?
IP network dependability matters in physical security and safety applications, given that a company’s assets and people are at risk. There have been strides in the areas of network dependability, fault-tolerance, reliability, and survivability. However, networks (or affordable ones, at any rate) still cannot ensure near-100 percent uptime, which is why system designers acknowledge and plan for the possibility of a network outage. We asked this week’s Expert Panel Roundtable: How can/should an IP networked system adapt when network connectivity is lost?
Sometimes customers expect more out of a security system. A brand new security system just doesn’t perform as the customer expected it would. In fact, one might argue that the many variables in today’s complex systems make it more likely than ever that some element of a system might not measure up to a customer’s expectations. What happens then? We asked this week’s Expert Panel Roundtable: What happens if a customer’s expectations of system performance are greater than what a physical security system can deliver?
How mobile telephones have transformed into “smartphones” is one of the great technology stories of our time. What once was a single-function device now can do almost anything – display video, pay for groceries, monitor our health. The smartphones we carry in our pockets today have more computing power than the “super computers” of yesteryear, and that power has found many uses in a seemingly endless array of “apps.” Some of them are directly related to our physical security systems. We asked this week’s Expert Panel Roundtable: What security applications are best suited to smartphone apps?
One of the benefits of newer IP systems is the ability to store video inside the camera or in a nearby digital video recorder (DVR) at the edge of the network. Edge-based storage is unlikely to take the place of centralized storage, but it is complementary and provides some interesting new options related to system design. We asked this week’s Expert Panel Roundtable: What is the value of edge-based storage and in what specific applications?
Healthcare organizations are an important vertical market for many security manufacturers and integrators. Like other vertical markets, healthcare has its own unique set of requirements and challenges for physical security systems. We asked this week’s Expert Panel: What are the distinctive security problems faced by healthcare organizations? What technologies are being embraced to increase security?
Software changes constantly. There’s always a new patch or fix, and our computers persistently remind us that an update is available. As a core component of today’s IP networked video systems, video management software (VMS) is also subject to the need to be constantly updated and refined. We asked our Expert Panel Roundtable to elaborate: Why is it important that networked video customers keep up to date with the latest version of video management software (VMS)?
College campuses often operate like small communities – or even like large communities depending on enrollment. Although each college and university campus is unique, there are commonalities such as a young and vulnerable population of students, many living away from their parents for the first time. Campuses can be urban or rural, geographically dispersed or densely populated, with a variety of demographics and “wild card” elements such as partying, drugs and alcohol. Campus police and security officers face a variety of challenging environments. Is it wise to add firearms to the mix? Is it necessary for campus police to be armed? Specifically, we asked this week’s Expert Panel: In what situations should college or university campus police be armed?
More and more physical security systems are being hosted in the cloud. But are cloud-based security systems “safe?” It’s a question being posed by risk-averse security professionals all over the world, and one for which a clear, concise answer may be difficult to find. We decided to pose it to our Expert Panel.
We asked this week’s Expert Panel: What are the limitations on where video cameras can be placed because of privacy? With hundreds of new cameras installed every day, the likelihood increases exponentially that a camera will be placed in a location where it violates privacy. In fact, threats to privacy are often among the largest objections when video surveillance is proposed, whether in a public area or in the workplace. Allaying fears about undermining privacy is a basic requirement to make such systems acceptable to the public. It’s a touchy subject, but one our Expert Panel is willing to address.
Articles by Larry Anderson
As an industry, we often speak in buzzwords. In addition to being catchy and easy to remember, these new and trendy industry terms can also reflect the state of the security market’s technology. In short, the latest buzzwords provide a kind of shorthand description of where the industry is - and where it’s going. We asked this week’s Expert Panel Roundtable: What new buzzword(s) rose to prominence in the security industry in 2020? (And how do they reflect industry trends?)
Thermal cameras can be used for rapid and safe initial temperature screening of staff, visitors and customers. Used the right way, the cameras can help prevent unnecessary spread of viruses like the novel coronavirus. During the global pandemic, use of thermal cameras has increased, but they have not always been used correctly, and therefore, not effectively. Hikvision’s temperature screening thermal products are currently assisting users in initial temperature screening across the global market. During 2020, demand increased in most markets, and the company highly recommends that Hikvision’s thermographic cameras be used in accordance with local laws and regulations. Limitations of the technology include throughput and the impact of ambient conditions. Detect viruses and fever Hikvision releases a video that illustrates how skin temperature measurements are normalized within minutes Thermal cameras cannot detect viruses and fever and should only be used as a first line of screening before using secondary measures to confirm, says Stefan Li, Thermal Product Director at Hikvision. “We also believe it is important for businesses and authorities to use [thermal cameras] alongside a full program of additional health and safety procedures, which includes handwashing, regular disinfection of surfaces, wearing protective clothing such as masks, and social distancing.” Hikvision has released a video that illustrates how skin temperature measurements are normalized within minutes after someone emerges from the cold. Mr. Li says the video demonstrates the accuracy of forehead measurement under difficult circumstances when people come inside from a cold outdoor environment. Temperature screening facilities “There have been some claims that measuring the forehead temperature is not as accurate as measuring the inner canthus, and we believe this video demonstrates the accuracy of forehead measurement very well,” he says. “We also illustrate how the skin temperature will experience a process of recovery (warming up), no matter if it is measured by a thermal camera or a thermometer.” Mr. Li adds that people should wait five minutes in such circumstances before starting a temperature measurement. “We hope that stakeholders who are involved in the design of temperature screening facilities and associated health and safety procedures will recognize how important it is to consider the skin temperature recovery time, and that forehead measurement can provide accurate test results,” says Mr. Li. Thermal imaging manufacturers The algorithm is based on a large number of test results to obtain a value that tends to be dynamically balanced The temperature measurement principle of thermal imaging is to detect the heat radiation emitted by the human body. The detected heat value often does not reflect the true internal body temperature of an individual. Furthermore, the temperature varies among different parts of the human, such as the forehead, ears, underarms, etc. A temperature compensation algorithm can be used to adjust the measured skin temperature to align with the internal body temperature. The algorithm is based on a large number of test results to obtain a value that tends to be dynamically balanced. At present, thermal imaging manufacturers in the market, and even forehead thermometer manufacturers, have developed their own algorithms to map the skin temperature measured by the camera to the internal body temperature, so as to compensate the skin temperature to the internal body temperature. Thermal cameras This is also why Hikvision recommends that the "actual body temperature" should be checked with a secondary device for confirmation. The calibration work for a thermal camera is completed in the production process at the factory, including calibration of reference values and detection point and so on. At the same time, the equipment parameters should be adjusted before on-site use to ensure accurate temperature reads. Hikvision does not deny the accuracy of temperature measurement at the inner canthus but prefers forehead temperature measurement and algorithms based on actual use scenarios, says Mr. Li. A large amount of test data and practical results indicates that the forehead is a correct and easy-to-use temperature measurement area, says the company. There are advantages and disadvantages of choosing different facial areas for temperature measurement. Default compensation temperature Two main approaches direct the measurement area and how compensation algorithms are applied: Forehead area + default forehead compensation algorithm value Upper half face (forehead + canthus) + default inner canthus compensation algorithm value. Both methods deploy compensation algorithms, but the default compensation temperature of the inner canthus will be less than the default compensation temperature of the forehead, generally speaking. The reason is that the temperature of the inner canthus of most people is higher than their forehead, so the temperature compensation is relatively low (i.e., closer to the actual temperature inside the body.) Upper face area Hikvision found that selecting the upper face area plus the default compensation value for the inner canthus resulted in situations when the calculated temperature is lower than the actual temperature. For the Hikvision solution, the forehead is a relatively obvious and easy-to-capture area on an entire face Mr. Li explains: “The reason is that when the camera cannot capture the position of the inner canthus (for example, when a person is walking, or the face is not facing the camera), the camera will automatically capture the temperature of the forehead. Then the result that appears is the sum of the forehead temperature plus the default compensation temperature of the inner canthus, which is lower than the actual temperature of the person being measured. Therefore, errors are prone to occur.” Thermal imaging products But for the Hikvision solution, the forehead is a relatively obvious and easy-to-capture area on an entire face. Also, the default forehead compensation temperature is based on rigorous testing and can also correctly mimic the actual temperature of the person being measured, says Mr. Li. After many test comparisons, considering that the results of forehead temperature measurement are relatively more stable, and in order to avoid the false results from inner canthus temperature measurement, Hikvision chose the forehead temperature measurement approach. “We look forward to bringing thermal imaging products from a niche market where there is a relatively high-end industry application to a mass market and serving more users,” says Mr. Li. Facial recognition terminals Additional application parameters can maximize effectiveness of thermal cameras for measuring body temperature: Positioning and height - All cameras must be mounted appropriately to avoid loss of accuracy and performance. The installation height of each camera must be adjusted according to camera resolution and focal length, and stable installation is needed to avoid errors caused by shaking. Ensuring a ‘one-direction path’ - The detection area must ensure that cameras capture the full faces of all those passing by or stopping, and obstacles should be avoided in the field of view, such as glass doors that block the camera. Adequate start-up and usage - A waiting time of more than 90 minutes is required for preheating, after the initial start-up. Before conducting a thermal scan, people should be given three to five minutes to allow their body temperature to stabilize. When Hikvision MinMoe facial recognition terminals are used, people must stand at a fixed distance, pass one by one, make a short stop, and face the camera directly. Hikvision cameras support efficient group screening, but one-by-one screening is suggested for more accurate results, says Mr. Li. Unstable environmental condition An unstable environmental condition may affect the accuracy of thermal camera systems Environmental factors can impact the accuracy of thermal cameras, and the idea of using a black body is to provide the camera with a reference point that has a stable temperature. The black body is heated to a specific temperature and helps the thermal camera to know how much error is caused by environmental factors in the room, and how the camera should calibrate itself in real time to improve its accuracy. A black body can help increase the temperature measurement accuracy, and the most common improvement is from ±0.5 degrees to ±0.3 degrees. However, it also increases the cost of the installation. In some markets, customers may require black bodies in order to comply with regulatory accuracy requirements. An unstable environmental condition may affect the accuracy of thermal camera systems for measuring temperature. Medical temperature measurement Therefore, Hikvision suggests that the ambient conditions should be met for installation and use. First of all, users should avoid installing devices in hot or changeable environments. All cameras require indoor environments with calm air, consistent temperature and no direct sunlight. Installation should also be avoided in semi-open locations that may be prone to changes in ambient conditions, such as doorways, and there should be enough stable, visible light. All devices should be installed to avoid backlighting, high temperature targets, and reflections in the field of view as far as possible. “We often see the misconception that thermal cameras can replace medical temperature measurement equipment, which is not the case,” says Mr. Li. Rapid preliminary screening “Temperature screening thermographic cameras are designed for the detection of skin-surface temperatures, and the measurement should be conducted to achieve rapid preliminary screening in public areas. It is really important that actual core body temperatures are measured subsequently with clinical measurement devices.”
What a year 2020 was for the security industry! There were vast challenges that could not have been foreseen at the beginning of the year. It is safe to say that the events of 2020 defied all industry prognosticators. However, is that any reason not to hope our expectations looking ahead to 2021 will be much closer to reality? Can we possibly benefit from looking ahead and trying to plan for the challenges of the year ahead? We asked this week’s Expert Panel Roundtable: What will be the security industry’s biggest challenge in 2021?
As a subset of the larger economy, the security industry is bound to feel the effects of an economic downturn. Such was the case in 2020 when the COVID-19 pandemic undermined economic growth and presented a brand new set of challenges to business. The security industry has been able to pivot toward emerging opportunities, but that success has been offset by broader economic challenges. We asked this week’s Expert Panel Roundtable: What impact, positive or negative, has the larger economy had on the security marketplace in 2020?
Artificial intelligence (AI) is more than a buzzword. AI is increasingly becoming part of our everyday lives, and a vital tool in the physical security industry. In 2020, AI received more attention than ever, and expanded the ways it can contribute value to physical security systems. This article will revisit some of those development at year-end, including links back to the originally published content. In the security market today, AI is expanding the use cases, making technologies more powerful and saving money on manpower costs - and today represents just the beginning of what AI can do for the industry. What it will never do, however, is completely take the place of humans in operating security systems. There is a limit to how much we are willing to turn over to machines - even the smartest ones. Beyond video analytics "Apply AI to security and now you have an incredibly powerful tool that allows you to operate proactively rather than reactively," said Jody Ross of AMAG Technology, one of our Expert Roundtable Panelists. AI made its initial splash in the physical security market by transforming the effectiveness of video analytics AI made its initial splash in the physical security market by transforming the effectiveness of video analytics. However, now there are many other applications, too, as addressed by our Expert Panel Roundtable in another article. Artificial intelligence (AI) and machine learning provide useful tools to make sense of massive amounts of Internet of Things (IoT) data. By helping to automate low-level decision-making, the technologies can make security operators more efficient. Biometrics with access control Intelligent capabilities can expand integration options such as increasing the use of biometrics with access control. AI can also help to monitor mechanics and processes. Intelligent systems can help end users understand building occupancy and traffic patterns and even to help enforce physical distancing. These are just a few of the possible uses of the technologies - in the end, the sky is the limit. AI is undoubtedly one of the bigger disrupters in the physical security industry, and adoption is growing at a rapid rate. And it’s not just about video analytics. Rather, it is data AI, which is completely untapped by the security industry. Bottom line: AI can change up your security game by automatically deciphering information to predict the future using a wide range of sources and data that have been collected, whether past, present, and future. That’s right. You can look into the future. Smarter perimeter protection Now, Intrusion Detection (Perimeter Protection) systems with cutting-edge, built-in AI algorithms to recognize a plethora of different object types, can distinguish objects of interest, thus significantly decreasing the false-positive intrusion rate. The more advanced AI-based systems enable the users to draw ROIs based on break-in points, areas of high-valuables, and any other preference to where alerts may be beneficial. AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store Similarly, AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store. The loitering time and region of interest are customizable in particular systems, which allows for a range of detection options. Smart security is advancing rapidly. As AI and 4K rise in adoption on smart video cameras, these higher video resolutions are driving the demand for more data to be stored on-camera. AI and smart video promise to extract greater insights from security video. Meeting urban needs Complex, extensive camera networks will already require a large amount of data storage, particularly if this is 24/7 monitoring from smart video-enabled devices. Newer edge computing will play an important role in capturing, collecting, and analyzing data. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices and sensors. Video data is so rich nowadays, you can analyze it and deduce a lot of valuable information in real-time, instead of post-event. In smart cities applications, the challenge of identifying both physical and invisible threats to meet urban citizens’ needs will demand a security response that is proactive, adaptable and dynamic. Optimize security solutions As we look ahead to the future of public safety, it’s clear that new technologies, driven by artificial intelligence (AI), can dramatically improve the effectiveness of today’s physical security space. For smart cities, the use of innovative AI and machine learning technologies have already started to help optimize security solutions. In sports stadium applications, AI’s role in getting fans and spectators back after the COVID pandemic is huge, through capabilities such as social distance monitoring, crowd scanning/metrics, facial recognition, fever detection, track and trace and providing behavioral analytics. Technologies such as AI-powered collaboration platforms now work alongside National Leagues, Franchises and Governing Bodies to implement AI surveillance software into their CCTV/surveillance cameras. AI surveillance software In many ways, it’s the equivalent of a neighborhood watch program made far more intelligent through the use of AI This is now creating a more collaborative effort from the operations team in stadiums, rather than purely security. AI surveillance software, when implemented into the surveillance cameras can be accessed by designated users on any device and on any browser platform. One of the biggest advantages of using AI technology is that it’s possible to integrate this intelligent software into building smarter, safer communities and cities. Essentially, this means developing a layered system that connects multiple sensors for the detection of visible and invisible threats. Integrated systems mean that threats can be detected and tracked, with onsite and law enforcement notified faster, and possibly before an assault begins to take place. In many ways, it’s the equivalent of a neighborhood watch program made far more intelligent through the use of AI. Fighting illicit trade Using technology in this way means that thousands of people can be screened seamlessly and quickly, without invading their civil liberties or privacy. AI’s ability to detect visible or invisible threats or behavioral anomalies will prove enormously valuable to many sectors across our global economy. Revolutionary AI-driven technologies can help to fight illicit trade across markets. AI technologies in this specific application promise to help build safer and more secure communities in the future. AI can support the ongoing fight against illicit trade on a global scale in a tangible way. For financial transactions at risk of fraud and money laundering, for example, tracking has become an increasing headache if done manually. As a solution to this labor-intensive process, AI technology can be trained to follow all the compliance rules and process a large number of documents - often billions of pages of documents - in a short period of time.
The cloud is here to stay. Its resilience and ability to connect the world during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft, or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realization of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staffThe advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs, and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
An impact of the COVID-19 pandemic has been to accelerate change. In 2020, the security industry was among many others that sought to adapt to shifting norms. In the process, we grabbed onto new opportunities for change and, in many cases, re-evaluated how we have done business for decades. If necessity is the mother of invention, perhaps crisis is the mother of acceleration. This article will reflect on how these themes impacted the physical security industry in 2020, based on content we published throughout the year, and with links back to the original articles. Sensitive data leakage Since the lockdown came into effect, organizations globally have undergone years' worth of transformations in a matter of months. Whether it has been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the ‘next normal’ there remains a great deal of uncertainty around what the next 12 months holds and how organizations can navigate turbulence in the face of a possible recession. One of the most notable and widely reported trends has been the switch to remote methods of work, or home working. With so many employees logging on from residential networks, through personal devices that may be more easily compromised, the overall attack surface has greatly increased, raising the risk of potential corporate and sensitive data leakage in their new home office settings. Security and data protection are larger issues than ever. Good cybersecurity hygiene Criminals will use the crisis to scam people for money, account information and more" With a majority of the world working from home, businesses had to respond to this changing landscape. While it used to be that in-person networking events and sales pitches secured new projects or opportunities, the current landscape pushes businesses to be more creative in how they reach their customers. For example, with ISC West being postponed, many companies have turned to online resources to share new product demonstrations and other company news. Others are hosting webinars as a way to discuss the current climate and what it means for the industry. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Work-Life balance In a typical office with an on-premise data center, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. There are many benefits of working remotely with productivity right up the top of the list There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and traveling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working. Video conferencing platforms Trade shows have always been a basic element of how the security industry does business - until the year 2020, that is. This year has seen the total collapse of the trade show model as a means of bringing buyers and sellers face to face. The COVID-19 pandemic has effectively made the idea of a large trade show out of the question. The good news is that the industry has adapted well without the shows. A series of ‘on-line shows’ has emerged, driven by the business world’s increasing dependence on Zoom and other video conferencing platforms. The fact is, 2020 has provided plenty of opportunities for sellers to connect with buyers. Some of these sessions have been incredibly informative – and conveniently accessible from the comfort of a home office. Online training courses Online training has grown in popularity this year, and the change may become permanent Online training has grown in popularity this year, and the change may become permanent. “We have seen unprecedented international demand for our portfolio of online training courses ranging from small installation companies to the largest organizations, across a wide range of sectors,” says Jerry Alfandari, Group Marketing Manager of Linx International Group, a UK training firm. “More than ever, businesses are looking to ensure they have the skills in-house to coordinate their response to the changing situation. Individuals are also taking this time to upskill themselves for when we return to ‘normal’ by bringing something with them they didn’t have before. Perhaps unsurprisingly, people are still seeking to better themselves for what will be, eventually, a competitive market.” Virtual trade show ‘Crisis and the Everyday’ was part of Genetec’s Connect’DX virtual trade show last spring. The virtual conversation – emphasizing both in form and content the topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. In the middle of this pandemic, there is an opportunity to help security reinvent itself “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security.” Cloud-Based platform As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimize impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilizing webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts.
Consolidation continued in the physical security marketplace in the turbulent year 2020. There were several mega-deals in addition to shuffling among small and medium-sized companies. Here is a sampling of companies that changed hands this year, compiled from our archive of company news. With the changing economic climate, how much more is ahead in 2021? Stay tuned. Wesco merges with Anixter WESCO International, Inc., a provider of business-to-business (B2B) distribution, logistics services and supply chain solutions, announced it completed its merger with Anixter International Inc., creating a premier, global B2B distribution and supply chain solutions company. Anixter becomes a wholly owned subsidiary of WESCO International. ACRE acquires Razberi ACRE acquired Razberi Technologies, Farmers Branch, Texas, and the product line of intelligent video appliances, automated security software and health monitoring software will be added to and sold under the ComNet brand and portfolio of products. ComNet will now be selling Razberi products through its established channels. Motorola acquires IndigoVision Among the benefits is enhanced geographical reach across a wider customer base Motorola Solutions says the IndigoVision range of products, global presence and customer base are ‘highly complementary’ to Motorola Solutions' existing presence in video security. Among the benefits is enhanced geographical reach across a wider customer base. Motorola acquires Pelco “Pelco’s track record of innovation, internationally recognized brand, global channel and customer installed base enable us to further expand our global footprint with enterprise and public safety customers,” said Greg Brown, Motorola Solutions’ Chairman and CEO, about the iconic brand. Johnson Controls swallows Qolsys Qolsys Inc., residential and commercial security and smart-home manufacturer, enhances Johnson Controls global innovation platform, delivering next generation security and smart building solutions. JCI had already owned a majority stake in the company since 2014. ADT and Google Home partnership The partnership will combine Nest’s award-winning hardware and services, powered by Google’s machine learning technology, with ADT’s installation, service and professional monitoring network to create a more helpful smart home and integrated experience for customers across the United States. Upon the closing of Google’s equity investment in ADT, Google will own 6.6% of ADT’s outstanding aggregate common equity. Securitas acquires STANLEY in Five Countries The acquisition is aligned with Securitas’ ambition to double the size of its security solutions Securitas acquired STANLEY Security’s electronic security businesses in Germany, Portugal, Switzerland, Singapore and India. The acquisition is aligned with Securitas’ ambition to double the size of its security solutions and electronic security business and expands Securitas’ electronic security footprint and capabilities. Allied Universal to Buy G4S Ending the year on a high note, the boards of directors managing Allied Universal and G4S reached an agreement on the terms of a recommended cash offer. The deal brings to a close a six-month bidding war for G4S. The combined business is expected to generate approximately $18 billion in annual revenues with a global workforce of more than 750,000 people in 85 countries. Quantum acquires Western Digital business line Quantum Corporation entered into an agreement with Western Digital Technologies, Inc., a subsidiary of Western Digital Corp., to acquire its ActiveScale object storage business. The acquisition demonstrates Quantum’s commitment to innovation and growth, extending the company’s leadership role in storing and managing video and unstructured data using a software-defined approach. AVA/Vaion/Jazz Networks Ava, a unified security company, announced the completion of the merger between Jazz Networks, renowned cyber security insider threat detection and response firm; and Vaion, an end-to-end video security solutions provider. Ava is now positioned to deliver unified cyber and physical security solutions to organizations worldwide.
The coronavirus pandemic had a monumental impact on all aspects of the business world, including the security industry. However, amid the gloom and doom, many security professionals also saw opportunity: New ways the industry’s products could be applied to address the challenges of coping with the virus. This article will review some of those opportunities, based on our reporting throughout the year and including links back to the original articles. During and after the pandemic, security systems are an important asset when it comes to helping to keep occupants and buildings safe as employees return to work. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. Role of thermal cameras These foot-traffic patterns can inform settings for a variety of devices - like ventilation and temperature controls - and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, began being deployed early in the pandemic to quickly scan employees, contractors and visitors as part of a first line of defense to detect COVID-19 symptoms. These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices. Thermal cameras can be a tool for detecting fever, but any use of the technology for this purpose is full of qualifications and caveats. Importantly, how the camera system is configured makes all the difference in whether temperature readings are accurate, and the downside of inaccurate readings is obvious - and potentially deadly. Temperature detection systems FDA guidelines limit how the cameras are used, not to mention guidance from other regulatory/government bodies such as the CDC. One of our Expert Roundtable panelists compares the market to a “wild west scenario,” and almost all the panelists are clear about how customers should approach the market: Buyer beware. There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. Customers need to know what questions to ask to ensure they maximize the accuracy of body temperature detection systems. Rise of contactless Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. "Users do not want to touch anything anymore,” says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Facial recognition system Another contactless system that benefits from concerns about spread of COVID-19 is facial recognition. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition systems, further expanding its use for an increasing number of applications. A low-tech solution - the face mask - became a leading preventative measure during the pandemic. But, a high-tech solution is necessary to ensure that everyone is wearing them. Cameras powered by artificial intelligence can now identify whether or not people entering a facility are wearing facemasks and help enforce adherence to mask mandates. This technology is proving to be a cost-effective solution that reduces risks of confrontations over masks policies and gives managers the data they need to document regulatory compliance and reduce liability. Smart video analytics Other technology approaches, including artificial intelligence (AI), were also brought to bear during the pandemic. The German data analytics powerhouse G2K, for example, has developed a Corona Detection and Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated. A “collaborative security” application includes a synthesis of smart video analytics, facial recognition, object identification/detection, and thermal cameras that can support the reopening of businesses globally when installed within those facilities frequented by customers. Enforcing social distancing Several applications have been successful to date and will increase in usability in the foreseeable future, creating “smart cities” working together towards a safer, more secure world. The site of one pilot program is the 250,000-square-foot HID Global facility in Austin. For the pilot program, 80 HID Location Services readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. COVID-19 White Papers In addition, we published several White Papers in 2020 that addressed various aspects of the coronavirus pandemic. They included: The top five security lessons learned that apply across all industries navigating COVID-19. Using video analytics to keep staff, visitors and customers safe by enforcing social distancing. How antimicrobial treatment on door handles and levers can reduce disease spread. How companies can put in extra precautions that will continue to grow and adapt with their environment over the long-term. Determining the practicalities and capabilities of today's thermal cameras to accurately detect body temperature.
As the new Chief Executive Officer of Milestone Systems, Thomas Jensen pledges to continue the company’s focus on protecting people and assets and to help organizations gain insight and optimize their business processes. Seeking to fulfill Milestone’s mission to ‘Make the World See,’ Jensen will maintain Milestone’s approach of being an open video management system (VMS) platform and having an open company culture. End-User communities “I will also be working to expand Milestone’s VMS into new areas and applications —for example, to monitor beach erosion as the climate continues to warm up around the world,” says Jensen. “I believe the future of VMS is about bridging the gap between security and applications that go beyond security.” Jensen’s previous experience in the IT industry contributes to his understanding of the entire channel Jensen’s previous experience in the IT industry contributes to his understanding of the entire channel. His experience as a generalist – extending beyond IT – enables understanding of the business side of things in addition to the skills, strengths and motivations of the people who work at Milestone, its channel, partner networks and the end-user communities. People-First approach “One crucial thing my career taught me is the importance of your team members,” he says. “A former manager once told me that success is the sum of the success of your team. And, luckily, Milestone already has a strong culture and people-first approach. This is one of the things that attracted me to this job.” The new CEO plans to spend his first 90 days building relationships and getting to know the company and the team members. He will be present in conversations with all Milestone people as well as partners and system integrators. “I want to ensure there is continuity and resilience so that my joining Milestone is a seamless transition,” Jensen says. “Furthermore, my focus will be to further build on the strengths of Milestone to create long-term sustainable growth.” Video-Enabled insights Jensen sees security through two lenses: on one hand, protecting people and property, and on the other, providing video-enabled insights for public and private companies to be able to make better decisions. On the protection side, businesses have room to grow as technologies move to provide more affordable, more powerful, and more interoperable solutions. A transformative element in the future evolution of video management is the cloud Regarding video-enabled insights, there is great potential, and Milestone is forging deeper relationships with partners and system integrators of important verticals such as cities, education, transportation, and retail. A transformative element in the future evolution of video management is the cloud, which will advance the deployment of technologies across the board. Best software integrations “I will be spending time working with our organization and partners to evolve Milestone’s cloud strategy and cloud partnerships to address the opportunities that lie ahead,” says Jensen. “I also think that Milestone’s belief in being open and giving integrators and end-users the freedom to choose the best software integrations available in the market is a philosophy that we've held dear from the very beginning — and this will become critical in the future as VMS solutions continue to evolve.” Safer business environment As the COVID-19 pandemic has raged on, Milestone Systems has continued its operation as usual, deploying safety measurements as needed to protect both employees and the partners they work with. COVID-19 has impacted everyone, every business and every government and organization around the world, says Jensen. We’re working with our partners to design a safer business environment with VMS-enabled solutions" “I think it taught us all a lesson in empathy and how we need to respect differences in behavior, regulations and compliance, customs and even each other,” he says. “At Milestone, we’re working with our partners to design a safer business environment with VMS-enabled solutions for social distancing, queue management, and contact tracing.” Creating security solutions “The past 50 years of digital technology and the past 20 years of IP technology have taught us that technologies eventually converge, and in some cases merge,” says Jensen. “Sometimes functions merge and channels converge, other times it’s the networks that come closer together, but none of this is absolute and universal.” “This is why we need to listen and learn from each other and be respectful of differences in the industry and the channel—particularly cultural and regional differences.” Jensen adds: “The technology company of the future — which I believe Milestone is becoming — will not dictate solutions but will instead partner with IT and security stakeholders to create security solutions that meet each customer’s unique challenge and environment.”
Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion. Safe work environment Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies. Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation. Adherence to safety protocols Operating in haste typically results in forced errors and mistakes within the business" “This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform. In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers. Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers? Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions. In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic. Q: What are the elements of safety and compliance involved in onboarding new drivers? Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organizations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity. Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organization, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company. Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference? Employers should also consider State Business Records for potential red flags Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organization’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats. Logically, businesses should consider reviewing Department of Transportation Records, which allow organizations to check whether drivers are licensed and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organization is delinquent or no longer functioning in a given state. Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organization. This includes fraud, bankruptcy, poor business practises, and more. Q: What should be the standard methodology to investigate and collect data on new driver programs? Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first. Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records. You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licensing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process. Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)? Businesses must conduct their operations in a fair, lawful, and transparent manner Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA). When utilizing software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall. Q: How is addressing these issues different in the case of a contracted service versus a company employee? Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation. In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions. Q: What is at risk if companies fail to address these issues? Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise. Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint. When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs. Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements? Enhanced vetting today often includes looking into a contractor’s background or its company Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers. Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more. These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.
Internet-based training has long provided a less-expensive alternative to in-person classroom time. There are even universities that provide most or all of their instruction online. However, the COVID-19 pandemic has expanded acceptance even more and increased usage of internet-based meeting and learning tools. We asked this week’s Expert Panel Roundtable: How can remote or Internet-based training benefit the physical security market?
Zigbee is a familiar name in the smart home arena, and the Zigbee Alliance is expanding its technology approach to address the challenges of the Internet of Things. As the Internet of Things (IoT) has evolved, the need has become obvious for stronger unity among brands and ecosystems to enable products within smart environments to work together more easily. Working to serve that need is the Zigbee Alliance, which seeks to promote collaboration in the Internet of Things by creating, evolving, and promoting universal open standards that enable all objects to connect and interact. Shifting the Smart home market Their IoT effort took off when Amazon, Apple, Google and the Zigbee Alliance announced an industry working group in December 2019 to take the ‘best of market’ technologies from smart home standards, portfolios and ecosystems and to develop a ‘super spec’ that will be open, inclusive and a significant industry shift in the smart home market. Zigbee Alliance has been for a while now working on openness and interoperability" “Zigbee Alliance has been for a while now working on openness and interoperability, which has led us to the Project Connected Home over IP (CHIP), which is looking to unify the environment, under one technology, one certification program and one logo,” says Chris LaPré, Zigbee Alliance’s IoT Solutions Architect. “It really does fuel IoT possibilities, whether in security or any other sectors.” Project CHIP is a royalty-free connectivity standard that unifies brands and ecosystems into a single smart home automation system that operates any other technology based on Internet Protocol (IP). Simplifying product development The intent is to simplify product development for device manufacturers, broaden consumer choice, and to ensure easy discoverability, deployment and engagement to fuel connected living. “We have noticed that, as the IoT has evolved, there is a stronger need for unity, which is why we are developing Project Connected Home over IP,” says Jon Harros, Zigbee Alliance’s Director of Certification and Testing Programs. “It fits with the Zigbee Alliance’s goal to unify systems, and to focus on everyone using the same application at the top. It unifies that environment, whether you are integrating your system with Amazon Echo devices or connecting to Google Home.” Participating in development of Project CHIP are 125 companies of various types from around the world working together with more than 1,100 of their experts serving across sub-committees to formulate specifications and fine-tune the project. Home system technologies The original Zigbee protocol is used for many applications around the world, including smart homes Although the technology is being developed for the home market, the specifications have been formulated with an eye toward expanding into the commercial market in the future. Development of open, interoperable systems provides greater freedom for consumers to choose among the many technology choices on the market, without being tied to a single brand or ecosystem. Zigbee Alliance certifications and memberships span the globe, with roughly a third in Europe, a third in North America and a third in Asia. Involvement in Europe is slightly higher than the other regions. Alliance members represent manufacturing sites all over the world. Project CHIP is a newer initiative of the Zigbee Alliance, which previously developed Zigbee Pro to enable home system technologies to operate using IEEE 802.15.4 wireless signals on the 2.4GHz radio band over a self-healing true mesh network. The original Zigbee protocol is used for many applications around the world, including smart homes. Certification transfer program Among the strengths of the Zigbee Alliance are years of experience certifying products, which includes testing them and confirming that they comply with the promoted specifications and functionality. The specifications are open standards that are developed in cooperation with all the companies that are Zigbee Alliance members. Another route is the certification transfer program, in which a company chooses a certified white-label product, becomes a member of the Alliance, and then rebrands the product while retaining the certification. “It helps them get products on the market quickly while they build their own knowledge base,” says Harros. “All our work is focused on standardizing the behavior and functionality of products and making sure everyone is following the same standard to get interoperability,” says Harros. “Members all contribute to the standards.”
Close collaboration with customers has been a hallmark of the physical security industry for decades. And yet, less ability to collaborate face-to-face to discuss customer needs has been a consequence of the COVID-19 pandemic. “True innovation, which comes from close collaboration with customers, is more difficult to achieve remotely,” said Howard Johnson, President and COO, AMAG Technology, adding “Not being able to visit in person has not been helpful. Kurt John, Chief Cyber Security Officer at Siemens USA, adds “We need to plan intentionally with a strategic approach for collaboration and innovation.” Securing New Ground virtual conference Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry at a ‘View from the Top’ session, during the Securing New Ground virtual conference, sponsored by the Security Industry Association. Their comments covered business practices during the pandemic and the outlook for technology innovation in response. “We had to pivot quickly on business models and create a cross-portfolio team task force to discuss how we can leverage technologies to help customers [during the pandemic],” said John, adding “We are having outcome-based conversations with customers about their businesses and operations, and how we can combine short-term benefits with long-term growth and flexibility.” But some of those conversations are happening from a distance. Results-oriented approach in remote work environment After the pandemic took hold, Siemens shifted rapidly to remote work and embraced other infrastructure changes. “We had to refocus and lead with empathy, flexibility and trust,” said John, adding “We gave our staff flexibility to set their hours and used a results-oriented approach.” There is also a social element missing in the work-from-home model. “Virtual coffee machines do not replace being there in person,” said Pierre Racz, President and CEO, Genetec, adding “Small talk about the weather is important psychological elements.” Positives in using multi-factor identity management He predicts that, in the future, office hours may be reduced, but not floor space, with space needed for in-person collaboration and long-term social distancing. Employees will come to the office to do collaborative work, but can work from home to accomplish individual tasks that may be ‘deferred’ to after-hours, when the kids have been fed. When the pandemic hit, Genetec had resumed 95% of their operations within 36 hours, thanks to their use of multi-factor identity management. They did not suffer from malware and phishing issues. “Multi-factor is really important so that well-engineered phishing campaigns are not successful,” said Pierre Racz. Shift to ‘Zero Trust’ model All three panelists noted a coming skills gap relating both cyber security and systems integration Remote working technologies are shifting to a ‘zero trust’ model, in which access to systems is granted adaptively based on contextual awareness of authorized user patterns based on identity, time, and device posture. For example, an office computer might have more leeway than a home computer and a computer at Starbucks would be even less trusted. The approach increases logical access security while providing users their choice of devices and apps. Skills gap in cyber security and systems integration A growing skills gap has continued throughout the pandemic. “Where we have vacancies, we have struggled to find candidates,” said Howard Johnson. All three panelists noted a coming skills gap relating both cyber security and systems integration. New technologies will clearly require new skills that may currently be rare in the workforce. Cyber security will become even more important with growth in new technologies such as AI, machine learning, 5G and edge computing. A workforce development plan is needed to address the technologies and to enable companies to pivot to new business needs, said John. Adoption of temperature sensing solutions From a technology viewpoint, Johnson has seen attention shift to the reception area and portal, away from touch technologies and embracing temperature sensing as a new element. There have also been new requests for video and audio at the portal point, to create methods of access and egress that do not require security personnel to be present. “Some customers are early adopters, and others are waiting for the market to mature before investing,” Howard Johnson said. “Security companies have been faced with the need to respond rapidly to their customers’ needs during the pandemic, but without seeming like ‘ambulance chasers’,” said Pierre Racz. In the case of Genetec, the company offered new system capabilities, such as a 'contamination report', to existing customers for free. Move to a hybrid and flexible work environment In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach" An immediate impact of the pandemic has been a reduction in required office space, as more employees have worked from home, raising questions about future demand for office space. “The pendulum tends to swing to the extremes,” said Kurt John, adding “In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach.” “Users will be much more careful about letting people into their space, which requires more policies and procedures,” said Lorna Chandler, CEO, Security by Design, who participated in a panel at Securing New Ground about how the pandemic is changing commercial architecture and access control. “Users should also be careful in the rush to secure premises from COVID-19 that they don’t violate HIPAA laws or create other potential liabilities,” adds Chandler. Continuum of mechanical and electromechanical devices Mark Duato, Executive Vice President, Aftermarket, ASSA ABLOY Opening Solutions, said a “Continuum of mechanical and electromechanical devices is needed to protect premises and ensure convenient operation of an access control operation.” “First and foremost, the immediate reaction to the impact of COVID-19 is to rush to educate and invest in technologies to increase the ability to analyze people,” said Duato, who also participated in the access control panel. Shift to touchless, frictionless access control “The move to touchless, frictionless access control “is really a collaboration of people, process and technology,” said Valerie Currin, President and Managing Director, Boon Edam Inc., adding “And all three elements need to come together. Touchless and frictionless have been in our market for decades, and they’re only going to become heightened and grow. We’re seeing our business pivot to serve markets we have not served in the past." More and more data is a feature of new systems, but is only helpful when it is analyzed. “We all live in a world of data, or IoT and sensor technology,” said ASSA ABLOY’s Mark Duato, adding “But we don’t want to be crushed by data. Data is only helpful when you can reduce it to functional benefits that will help us innovate. We have to take the time to squeeze the value out of data.”
Artificial intelligence is more than just the latest buzzword in the security marketplace. In some cases, smarter computer technologies like AI and machine learning (ML) are helping to transform how security operates. AI is also expanding the industry’s use cases, sometimes even beyond the historic province of the security realm. It turns out that AI is also a timely tool in the middle of a global pandemic. We asked this week’s Expert Panel Roundtable: How is artificial intelligence (AI) changing the security market?
The COVID-19 pandemic has provided a double challenge to physical security systems integrators. For one thing, they have had to adapt their own businesses to survive and thrive during the pandemic. On the other hand, they have also been faced with new challenges to serve their customer’s changing needs. Global pandemic effects One integrator company, North American Video (NAV) took the now-familiar steps most companies confronted to adapt their business model to operations in a global pandemic – they suspended all non-essential travel and face-to-face meetings. At one point, NAV had a single employee in the New Jersey headquarters and another one in the Las Vegas office. The rest worked from home, with other offices opening as needed over the following weeks. Another integrator, Convergint Technologies, was able to adapt its approach to the pandemic, location by location, across the United States. The integrator benefitted from its leadership structure, with local managers in various regions who are autonomous and could react to what was happening in each region. Virtual workforce “We saw a dip in April and May, but since then, we have seen business pick back up,” said Mike Mathes, Executive Vice President, Convergint Technologies. The Business of Integration virtual conference sponsored by the Security Industry Association (SIA) “We already had tools and infrastructure deployed to support a virtual workforce. We had the software and the right equipment, and that has allowed us some flexibility to approach the repopulation of our offices in a gradual way.” The impact of COVID-19 on integrators and their customers was the main topic of discussion at a session on The Business of Integration at the Securing New Ground virtual conference sponsored by the Security Industry Association (SIA). Remote monitoring North American Video also benefitted from having technical personnel spread across the United States. By assigning work duties on the basis of geography, they could travel by car with less risk than air travel. They also increased their use of remote monitoring and support to avoid extra visits to customer sites. With 80% of the business in the gaming industry, North American Video saw a profound impact on their customers with the almost complete shutdown of casinos during the early days of the pandemic. Even though gaming was impacted particularly badly by the virus, NAV stayed engaged working on four or five large casino construction projects that continued throughout the shutdown. Revenue shortfalls State legislatures will approve more casinos to help plug the holes in their budgets Other casinos took advantage of empty facilities to make needed upgrades without worrying about disrupting casino operations. “A lot of our strong, long-term clients have sought to perform upgrades during the downtime, including needed service and maintenance,” said Jason Oakley, President and CEO, North American Video (NAV). “When gaming was closed, you were allowed in the facilities to work.” Oakley also sees long-term optimism for the casino business, which will offer a means for state and local governments to make up revenue shortfalls. “State legislatures will approve more casinos to help plug the holes in their budgets,” Oakley predicted. Demands for technology Oakley and NAV have seen an evolution in customer demands for technology in light of the pandemic. The trick is to differentiate between demand that is an immediate reaction versus technology trends that have more staying power. Although customers were keen on purchasing thermal cameras, for example, NAV did the research and recommended against the use of the technology to some of their customers. Artificial Intelligence for social distancing The use of artificial intelligence (AI) for a variety of applications seems to have more staying power. “One area of interest at a high level is modification and repurposing of AI for face mask detection, social distancing and people tracing, including integration into existing cameras,” said Oakley. “If the hospitality industry comes to terms with the new normal with smaller restaurant capacities, there may be an opportunity to use AI for social distancing.” Contact tracing and visitor management technology Mathes of Convergint sees a massive change as customers move toward managed services, accelerating the change with new use cases. We have an entire group that focuses on new solutions and what customers are looking for" As offices seek to repopulate when the pandemic subsides, customers are looking for new uses of existing technologies, added Mathes. “We have an entire group that focuses on new solutions and what customers are looking for,” he said. “They need to understand who is in the building and where they go in the building. If we know someone was only in the cafeteria from 10 to 11 a.m., we can know who was in the cafeteria at that time.” Opportunity for vertical markets to move forward He predicts technologies for contact tracing and visitor management tracking who’s in the building and where will be around for a long time to come. "Various customers and vertical markets are looking at the slowdown differently," said Mathes. "For example, while airlines have slowed down, the view from the airport market is more long-term." “They have 15-year plans, and [the slowdown] is an opportunity to move forward. In the technology space, data centers are expanding. “We try to focus our resources on areas where the money is being spent,” said Mathes. “Our K-12 group has seen an 80% growth over 2019. The money is tied to bonds, so there hasn’t been a slowdown relative to revenue.” He said Convergint is cautiously optimist about 2021.”
Combining artificial intelligence (AI) with cloud video creates systems that are smarter, safer and more cost-effective. Furthermore, adding AI capabilities can widen the advantage gap of cloud video systems compared to on-premise systems, especially for cost-conscious end users. “We strongly believe the total cost of ownership (TCO) for cloud systems is more affordable,” says Ken Francis, President of cloud video surveillance company Eagle Eye Networks. “And introducing really powerful AI will expand the cost differences.” Combining AI and cloud video To finance realization of their vision to combine AI and cloud video, Eagle Eye Networks has raised $40 million of Series E funding from venture capital firm Accel. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end users,” says Francis. In effect, end users have maximum flexibility to manage and analyze their video data however they wish The system sends captured video to the cloud, where a variety of AI or video analytics systems can extract valuable data from the captured video. Eagle Eye offers an application programing interface (API) to enable integration of best-in-breed third-party AI and analytics systems to leverage the video. In effect, end users have maximum flexibility to manage and analyze their video data however they wish. Delivering lower costs In addition to offering integration with third-party systems, Eagle Eye is investing in its own AI development, and hiring additional development and customer service personnel. As new technologies become part of the Eagle Eye platform, customers benefit from lower costs because of economies of scale. Keeping the emphasis on development of cloud systems, Eagle Eye also offers customers maximum flexibility in choosing their cameras. Eagle Eye’s on-premise cyber-hardened “bridge” can connect to almost any camera from thousands of manufacturers, including those connecting with HD-over-coax. The COVID-19 pandemic has expanded the need for end users to view their premises remotely, and in the process has highlighted shortcomings of their existing video systems. As a result, video manufacturers - including Eagle Eye Networks - are seeing a surge in end users updating their systems. Cloud video surveillance Given the costs of installing and maintaining hard drives for local storage (and additional challenges during a pandemic lockdown), more end users are opting to use cloud systems. In effect, the COVID-19 pandemic is accelerating installation of cloud video surveillance. “Our industry is the most resilient in the world,” says Francis. Eagle Eye Networks was on track to double their growth in the first quarter, and then COVID slowed everything down As a whole, 2020 has been a successful year for the cloud system provider. Eagle Eye Networks was on track to double their growth in the first quarter, and then the COVID lockdown slowed everything down. During the second quarter, their revenue from setup fees and appliances fell by 35% or so, but subscriptions increased slightly including customers looking to keep watch over their shuttered businesses. Temperature alerting solutions The third quarter saw another big uptick in business; August and September were booming, and not just from projects that were delayed from Q2. There has also been a spike in customers looking to apply temperature alerting solutions, says Francis. In uncertain economic times, cloud systems require around 40% less up-front costs, and provide flexibility to eliminate the system (and the expense) at any time without losing a large financial investment. Cloud video has reached a tipping point in the United States, Mexico, and the United Kingdom, among other locales, but the technology lags in some other geographic areas such as France. Driving adoption is availability and cost of sufficient upload speed and bandwidth. In addition to Eagle Eye’s branded growth, the company also provides the OEM engine behind a half dozen or so cloud systems offered by other manufacturers. Backing multi-site enteprises About eight years old, Eagle Eye Networks has focused squarely on the small- and middle-sized business (SMB) market, especially multi-site businesses such as retail, banking and healthcare. They also work with local governments and K-12 schools. Moving forward, the company will seek to expand more into multi-site enterprise customers, some of which have 1,000 locations around the world and need to store their video locally to meet regulatory requirements. Multi-site businesses, benefit from the cloud by eliminating the need for local IT equipment and expensive staff Multi-site businesses, especially, benefit from the cloud by eliminating the need for local IT equipment and expensive staff. As Internet connectivity becomes less expensive than installing new cable infrastructure, cloud systems will become more attractive to large campus environments such as colleges and airports, says Francis. The advent of 5G connectivity will also be a plus. All Eagle Eye products are NDAA compliant. Premium support services Further expanding its services, Eagle Eye Networks is poised to launch “Premium Support Services,” in which the cloud provider’s employees will proactively monitor and service customer sites for a minimum additional monthly fee. The cloud structure enables most problems to be addressed and solved remotely without needing to send personnel to a site. The new investment from Accel, a funding partner of top-tier tech companies such as Facebook, Dropbox and Spotify, is Accel's first investment in the security industry. In addition to investing in AI, Eagle Eye also plans to leverage the funding to expand into new regional markets with new data centers and additional staff in business development, sales and support roles.
Video storage has been a challenge since the days of VCRs and videotape. Storing images is a central need for any video systems, especially one that is focused on the forensic and investigative aspects of video. Today, digital video is stored on hard drives and even in the cloud. Increasingly, video is considered “data” that drives a variety of video analytics and even artificial intelligence (AI) applications. We asked this week’s Expert Panel Roundtable: What are the new trends and opportunities in video storage?
Facial recognition is the latest technology to be targeted because of concerns about privacy. If such concerns cloud the public perception, they can be harmful to technology markets. Whether the concerns are genuine or based on misinformation is often beside the point; the practical damage has already been done. But beyond market demand, what is the impact of privacy concerns on technology innovation? We asked this week’s Expert Panel Roundtable: Are privacy concerns stifling innovation in security and related markets?
Historically, concerns about inclusion and diversity have not been widely discussed in the security market. In the last couple of years, however, the Security Industry Association (SIA) and other groups have worked to raise awareness around issues of diversity and inclusion. Specifically, SIA’s Women in Security Forum has focused on the growing role of women in all aspects of security, and SIA’s RISE community has focused on “rising stars” in an industry previously dominated by Baby Boomers. The next generation of security leaders There is a business case to be made for diversity and inclusion, says a report by McKinsey & Company. According to the management consulting company, gender-diverse companies are 24% more likely to outperform less diverse companies, and ethnically diverse companies are 33% more likely to outperform their less diverse counterparts. Furthermore, the “next generation of security leaders” – employees under 30 – are particularly focused on diversity and inclusion. Diversity refers to the traits and characteristics that make people unique A panel discussion at ISC West’s Virtual Event highlighted aspects of inclusion and diversity, starting with a definition of each. Diversity refers to the traits and characteristics that make people unique. On the other hand, inclusion refers to the behavior and social norms that ensure people feel welcome. “We are all on a journey, and our journey takes different paths,” said Willem Ryan of AlertEnterprise, one of the SIA panelists. “There are opportunities to improve over time. We can all change and increase our ability to have a positive impact.” Industry responsibility The industry has a responsibility to the next generation of industry leaders to address issues of inclusion and diversity. Forbes magazine says that millennials are more engaged at work when they believe their company fosters an inclusive culture. So the question becomes: How do we unify and create opportunities to work with and champion tomorrow’s leaders? SIA is driving change in our industry to achieve that goal. More women are active in SIA than ever before. The SIA Women in Security Forum now has 520 members, said Maureen Carlo of BCD International, the SIA Women in Security Forum Chair and another panelist. Also, more women than ever are chairing SIA committees and serving on the SIA Board of Directors. More women than ever are chairing SIA committees Overcoming unconscious bias Former SIA Chairman Scott Shafer of SMS Advisors, another of the panelists, noted that SIA awarded the Chairman’s Award to the Women in Security Forum in 2019, and to the RISE community steering committee in 2020. “There are lots of ways we are seeing the elevation of women and ethnic groups in the security industry,” said Shafer. One topic of interest is the problem of “unconscious bias,” which can be overcome by looking at something through some else’s lens. Ryan suggested use of the acronym SELF – Slow Down, Empathize, Learn, and Find commonalities. Ryan recalled the value of being mentored and having someone shepherd him around the industry. “Now I want to give back,” he said. “We need to look at the things we can change in ourselves, in our company, in our communities, and in our industry. Change comes from the bottom and the top.” Increasing representation “It takes all of us to increase representation everywhere,” said Kasia Hanson of Intel Corp., another panelist. “We have in common that we are all human beings. Let’s make sure the next generation all have opportunities.” Diverse companies can attract better talent Moving forward, the panelists urged the industry to get involved and create opportunities because inclusion drives diversity. Diverse companies can attract better talent and attain a competitive advantage. Awareness of unconscious bias, and working to eliminate it, is an important element of change. Despite the progress the security industry is making, change continues to be incremental. As Ruth Bader Ginsburg has said, “Real change, enduring change, happens one step at a time.”
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials are increasingly enabling smart cities to improve the experience and safety of the people who reside there. Rising scope of 5G, AI, IoT and the Cloud The main foundations that underpin smart cities are 5G, Artificial Intelligence (AI), and the Internet of Things (IoT) and the Cloud. Each is equally important, and together, these technologies enable city officials to gather and analyze more detailed insights than ever before. For public safety in particular, having IoT and cloud systems in place will be one of the biggest factors to improving the quality of life for citizens. Smart cities have come a long way in the last few decades, but to truly make a smart city safe, real-time situational awareness and cross-agency collaboration are key areas which must be developed as a priority. Innovative surveillance cameras with integrated IoT Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns Public places need to be safe, whether that is an open park, shopping center, or the main roads through towns. From dangerous drivers to terrorist attacks, petty crime on the streets to high profile bank robberies, innovative surveillance cameras with integrated IoT and cloud technologies can go some way to helping respond quickly to, and in some cases even prevent, the most serious incidents. Many existing safety systems in cities rely on aging and in some places legacy technology, such as video surveillance cameras. Many of these also use on-premises systems rather than utilising the benefits of the cloud. Smart programming to deliver greater insights These issues, though not creating a major problem today, do make it more challenging for governments and councils to update their security. Changing every camera in a city is a huge undertaking, but in turn, doing so would enable all cameras to be connected to the cloud, and provide more detailed information which can be analyzed by smart programming to deliver greater insights. The physical technologies that are currently present in most urban areas lack the intelligent connectivity, interoperability and integration interfaces that smart cities need. Adopting digital technologies isn’t a luxury, but a necessity. Smart surveillance systems It enables teams to gather data from multiple sources throughout the city in real-time, and be alerted to incidents as soon as they occur. Increased connectivity and collaboration ensures that all teams that need to be aware of a situation are informed instantly. For example, a smart surveillance system can identify when a road accident has occurred. It can not only alert the nearest ambulance to attend the scene, but also the local police force to dispatch officers. An advanced system that can implement road diversions could also close roads around the incident immediately and divert traffic to other routes, keeping everyone moving and avoiding a build-up of vehicles. This is just one example: without digital systems, analyzing patterns of vehicle movements to address congestion issues could be compromised, as would the ability to build real-time crime maps and deploy data analytics which make predictive policing and more effective crowd management possible. Cloud-based technologies Cloud-based technologies provide the interoperability, scalability and automation Cloud-based technologies provide the interoperability, scalability and automation that is needed to overcome the limitations of traditional security systems. Using these, smart cities can develop a fully open systems architecture that delivers interoperation with both local and other remote open systems. The intelligence of cloud systems can not only continue to allow for greater insights as technology develops over time, but it can do so with minimal additional infrastructure investment. Smart surveillance in the real world Mexico City has a population of almost 9 million people, but if you include the whole metropolitan area, this number rises sharply to over 21 million in total, making it one of the largest cities on the planet. Seven years ago, the city first introduced its Safe City initiative, and ever since has been developing newer and smarter ways to keep its citizens safe. In particular, its cloud-based security initiative is making a huge impact. Over the past three years, Mexico City has installed 58,000 new video surveillance cameras throughout the city, in public spaces and on transport, all of which are connected to the City’s C5 (Command, Control, Computers, Communications and Citizen Contact) facility. Smart Cities operations The solution enables officers as well as the general public to upload videos via a mobile app to share information quickly, fixed, body-worn and vehicle cameras can also be integrated to provide exceptional insight into the city’s operations. The cloud-based platform can easily be upgraded to include the latest technology innovations such as license plate reading, behavioral analysis software, video analytics and facial recognition software, which will all continue to bring down crime rates and boost response times to incidents. The right cloud approach Making the shift to cloud-based systems enables smart cities to eliminate dependence on fiber-optic connectivity and take advantage of a variety of Internet and wireless connectivity options that can significantly reduce application and communication infrastructure costs. Smart cities need to be effective in years to come, not just in the present day, or else officials have missed one of the key aspects of a truly smart city. System designers must build technology foundations now that can be easily adapted in the future to support new infrastructure as it becomes available. Open system architecture An open system architecture will also be vital for smart cities to enhance their operations For example, this could include opting for a true cloud application that can support cloud-managed local devices and automate their management. An open system architecture will also be vital for smart cities to enhance their operations and deliver additional value-add services to citizens as greater capabilities become possible in the years to come. The advances today in cloud and IoT technologies are rapid, and city officials and authorities have more options now to develop their smart cities than ever before and crucially, to use these innovations to improve public safety. New safety features Though implementing these cloud-based systems now requires investment, as new safety features are designed, there will be lower costs and challenges associated with introducing these because the basic infrastructure will already exist. Whether that’s gunshot detection or enabling the sharing of video infrastructure and data across multiple agencies in real time, smart video surveillance on cloud-based systems can bring a wealth of the new opportunities.
A standard is a document that establishes uniform engineering or technical criteria, methods, processes, and/or practices. Standards surround every aspect of our business. For example, the physical security marketplace is impacted by industry standards, national and international standards, quality standards, building codes and even environmental standards, to name just a few. We asked this week’s Expert Panel Roundtable: How have standards changed the security market as we know it?
One of the common characteristics of trade shows is booths with walls and walls of new products. Sometimes exhibitors seem intent on displaying everything in their portfolio, even though the displays appear cluttered and may not be welcoming. In an age of system sales, in particular, the emphasis on products can seem off kilter. Discussions with exhibitors at this year’s GSX show reveal a new awareness of the need for less cluttered booths, but the equipment walls persist. Here’s a review of Day 2 from the show floor. Allegion embraces more open booth design At GSX 2019, Allegion is among the exhibitors embracing a new, more open booth design that encourages engagement with customers and puts less emphasis on product displays. Discussions at the Allegion booth have centered around the value proposition and lower complexity of network-connected access control systems. The approach has been gaining a higher profile at Allegion since the company acquired Isonas, whose system configuration involves a reader-controller connected to the network via power-over-Ethernet cable. “Customers are also asking about Bluetooth technology and mobile applications,” said Jonathan Mooney, Allegion sales leader. Allegion is looking to deploy the Isonas software in other products in their portfolio; it will be offered in the range of Schlage wireless locks by the middle of 2020.The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control" “The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control,” said Mooney. Bosch offers complete security solution Bosch is introducing 55 new products at GSX 2019, but when it comes down to it, the company’s overarching message is not about individual products but about how they can be combined into a larger system. “At the end of the day, the message from Bosch is ‘how do I create a complete security solution?’” said Paul Garms, Bosch Director, Regional Marketing Security. “That’s what we are trying to demonstrate: How do all these things integrate?” Most of interest to attendees are actual demonstrations, which are a unique aspect of the trade show experience. “It’s nice at a show where we can really demonstrate what we are talking about when we say ‘integrated solution,’” said Garms. “And people can say, ‘oh yeah, if I trip this video analytic, the speaker will warn me I am approaching a restricted area.’ Or, when the manager signs in on the intrusion panel, now the associate can access a door he wasn’t able to before. It’s that integration and the complete solution that resonates. People are also interested in new products. At a show, they like to see them in operation.” At the Bosch booth, there is a big wall that illustrates some integration possibilities. An array of cameras was among the 55 new products introduced by Bosch, which also emphasized systems. Machine learning and advanced video analytics One implementation featured on the wall is Bosch’s Camera Trainer machine learning system. The system can “train” a camera to recognize a car in a parking lot, for example. Among the new Bosch products is the Autodome 7000i, the next generation of a best-selling camera, now with H.265 encoding and analytics such as line crossing. There is also an outdoor panoramic camera that is adjustable to 180-degree or 360-degree views. The new, less expensive 3000i series cameras provide an affordable option with edge analytics and Bosch’s data security protection included. Integration from Honeywell as well as 'the big picture' At Honeywell Security Group, Senior Product Manager G. Eric Green said the show seems to be much better attended than last year, “and we have had a lot of interest in our products.” Even end-user attendees typical of the GSX show are interested in the details of technology, as well as “the bigger picture,” commented Green. “Some of our booth visitors want to get into the weeds,” he said. “They say they want this piece of hardware. But they also also interested in the big picture. How things are interacting is very important.”Honeywell announced the 30 Series IP cameras, which can be used as part of video systems that comply with National Defense Authorization Act Section 889" “Most customers have installed products from other vendors that they expect us to work with. So integration is always at the top of the list. Can you work with these guys? Do you have an API? Do you support this piece of equipment? We always hear that a lot,” said Green. “There are customers who want best-in-breed products, but they’re not necessarily concerned about that coming from one manufacturer,” he said. “Other customers want ‘one throat to choke.’ When something goes wrong, they don’t want any finger-pointing.” Web-based security console and frictionless access control Honeywell is showing a beta version of its Pro-Watch 5.0 product, which is coming out in Q1 next year. It is an integrated security console that provides a map view of access control, video management, intrusion and other third party systems. The web-based platform offers access to each element, all controlled by permissions. “We are also building in an incident workflow engine that allows an operator to see exactly what steps he should take when something occurs as defined by the supervisor or a security director,” said Green. “It can literally walk you through, and it is completely freeform. Whatever you want it to say, it will say. This works in conjunction with access control, video, and all the things we talk to.” The Honeywell booth was a busy place on day two of GSX 2019 Another new Honeywell product is the OmniAssure Touch reader, a “frictionless” device that can read a credential off a smart phone in a user’s pocket. The user merely touches the reader, and it scans the area for a nearby mobile device that is authorized, and you can walk through the door. Honeywell also announced the 30 Series IP cameras, which are encrypted and can be used as part of video systems that comply with National Defense Authorization Act Section 889. They are made in Taiwan. Arcules' cloud security solution “There are fewer people here at GSX 2019, but we have seen a lot of really big companies looking for a cloud service,” said Andreas Pettersson, CEO of cloud video company Arcules. At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive: They say “we want to move to the cloud.” Pettersson theorized that concerns about a possible weakening economy may prompt some companies to avoid the large capital expenditure of procuring a new on-premise system and instead opt for the minimal investment needed for a cloud system. Monthly operating expenses of a cloud system are also predictable and more easily managed, said Pettersson.At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive Arcules is proactive on the subject of cybersecurity and has a two-page handout that summarizes the cybersecurity advantages of their system. They are eager to talk about cybersecurity as it relates to cloud systems, said Pettersson. He said that, in his experience, on-premise systems tend to have more cybersecurity issues, whether because ports are left open or a firewall is implemented incorrectly. Users may also seek to bypass the firewall — a dangerous practice that is not an option with cloud systems. Security patches may not have been implemented; in a cloud system, such updates are pushed out automatically. The recurring monthly revenue (RMR) aspect of cloud systems are a windfall to integrators who embrace the cloud. “One integrator said he went on vacation for the first time in years because he had the extra money coming in,” said Pettersson. Control room integration from Vistacom "We're still fairly new to GSX, as our first show was 5 years ago, but what we have noticed is that the show continues to attract valuable attendees and drive critical conversations around what companies like ours must bring to the table in order to be successful in this space," said Dan Gundry, Director of Sales and Marketing, Vistacom. "We've had so many chances to learn from and share with potential customers and partners, and as a result, we continue to forge great relationships.” Vistacom is highlighting its control room integration and the value enterprise organizations can gain from implementing one in their facility. The company works alongside end-user customers and security integrators to build a command center space, taking into account video wall display technology, operator consoles and furniture, audio and lighting considerations, as well as temperature and more, in an effort to optimize these centers. Stay tuned for the full GSX 2019 show review.
As editor of SecurityInformed.com, Larry attends industry and corporate events, interviews security leaders and contributes original editorial content to the sites. He also guides the "editorial roadmap" to ensure the site provides the most relevant content for security professionals. From 1996 to 2008, Larry was editor of "Access Control & Security Systems" magazine and its affiliated websites. He earned a Bachelor of Arts from Georgia State University with a minor in marketing. [Pictured: Larry and wife Linda relax with SecurityInformed.com's loyal office dog, Frankie] How did you come to work in the security industry? I started in the newspaper business and then migrated to trade publishing. I realized that every profession has its own journalism microcosm, so I learned a lot about robotics and paint and adhesives before I landed in the security field. That was around 1996, and security has been the center of my professional life, and a subject of continuing fascination ever since. What is the best professional advice you have ever received? I never met the man, but a famous quote from Woody Allen is something like "80 percent of life is showing up." I find that comforting. Showing up is something I can do. And knowing that I am already 80 percent successful at the get-go has provided extra confidence in a lot of situations over the years. Quick Facts Favorite TV show Comedians in Cars Getting Coffee First job McDonald's crew member Tea or coffee Neither: Diet Coke Best gift you received Dance lessons from my wife Last thing you cooked Grilled Cheese What's something few people know about you? Several years ago, after ISC West, I was killing time at the Wynn casino before going to the airport. I had put my last few dollars in a “Red White and Blue” slot machine, and I won the “mini-progressive” – more than $6,000! Having the lady count those $100 bills into my hand is a great memory of ISC West. What's the most rewarding thing about what you do for a living? I get to hear people talk every day about something they are passionate about. I get to learn from really smart people about interesting subjects that actually matter in the world. Jekyll Island on the Georgia coast is Larry Anderson's go-to destination for a relaxing week every summer What are your interests, hobbies and passions outside security? Books, including “literary” fiction, whodunits and lawyer novels. I tend to binge-watch television on demand while on the treadmill at the gym – which takes away the guilt. My wife Linda and I go to the movies a couple of times a month. Where was your last vacation? Jekyll Island on the Georgia coast is our go-to destination for a relaxing week every summer for the last 20 years. They have houses you can rent for the week, beautiful nature walks and bike trails, huge trees draped with Spanish moss, and a smattering of history – it was where millionaires like J.P. Morgan and William Rockefeller retreated to their 25-room “cottages” in the early 1900s. There’s plenty to see and do – or not to do if so inclined!
If you’ve been paying attention over the last twelve months, you will have noticed that deep learning techniques and artificial intelligence (AI) are making waves in the physical security market, with manufacturers eagerly adopting these buzzwords at the industry's biggest trade shows. With all the hype, security professionals are curious to know what these terms really mean, and how these technologies can boost real-world security system performance. The growing number of applications of deep learning technology and AI in physical security is a clear indication that these are more than a passing fad. This review of some of our most comprehensive articles on these topics shows that AI is an all-pervasive trend that the physical security industry will do well to embrace quickly. Here, we examine the opportunities that artificial intelligence presents for smart security applications, and look back at how some of the leading security companies are adapting to respond to rapidly-changing expectations: What Is Deep Learning Technology? Machine Learning involves collecting large amounts of data related to a problem, training a model using this data and employing this model to process new data. Recently, there have been huge advances in a branch of Machine Learning called Deep Learning. This describes a family of algorithms based on neural networks. These algorithms are able to learn efficiently from example, and subsequently apply this learning to new data. Here, Zvika Ashani explains how deep learning technology can boost video surveillance systems. Relationship Between Deep Learning And Artificial Intelligence With deep learning, you can show a computer many different images and it will "learn" to distinguish the differences. This is the "training" phase. After the neural network learns about the data, it can then use "inference" to interpret new data based on what it has learned. For example, if it has seen enough cats before, the system will know when a new image is a cat. In effect, the system “learns” by looking at lots of data to achieve artificial intelligence (AI). Larry Anderson explores how new computer hardware - the Graphic Processing Unit (GPU) – is making artificial intelligence accessible to the security industry. Improving Surveillance Efficiency And Accuracy With AI Larry Anderson explains how the latest technologies from Neurala and Motorola will enable the addition of AI to existing products, changing an existing solution from a passive sensor to a device that is “active in its thinking.” The technology is already being added to existing Motorola body-worn-cameras to enable police officers to more efficiently search for objects or persons of interest. In surveillance applications, AI could eliminate the need for humans to do repetitive or boring work, such as look at hours of video footage. Intelligent Security Systems Overcome Smart City Surveillance Challenges AI technology is expected to answer the pressing industry questions of how to use Big Data effectively and make a return on the investment in expensive storage, while maintaining (or even lowering) human capital costs. However, until recently, these expectations have been limited by factors such as a limited ability to learn, and high ongoing costs. Zvika Ashani examines how these challenges are being met and overcome, making artificial intelligence the standard in Smart City surveillance deployments. Combining AI And Robotics To Enhance Security Operations With the abilities afforded by AI, robots can navigate any designated area autonomously to keep an eye out for suspicious behavior or alert first responders to those who may need aid. This also means that fewer law enforcement and/or security personnel will have be pulled from surrounding areas. While drones still require a human operator to chart their flight paths, the evolution of artificial intelligence (AI) is increasing the capabilities of these machines to work autonomously, says Steve Reinharz. Future Of Artificial Intelligence In The Security Industry Contributors to SourceSecurity.com have been eager to embrace artificial intelligence and its ability to make video analytics more accurate and effective. Manufacturers predicted that deep learning technology could provide unprecedented insight into human behaviour, allowing video systems to more accurately monitor and predict crime. They also noted how cloud-based systems hold an advantage for deep learning video analytics. All in all, manufacturers are hoping that AI will provide scalable solutions across a range of vertical markets.
Our most popular articles in 2017 reflected changing trends in the U.S. security market, from deep learning to protection of mobile workers, from building automation to robotics. Again in 2017, the most read articles tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 most-clicked articles we posted in 2017. They are listed in order here with the author’s name and a brief excerpt. 1. Las Vegas Massacre Demands Reevaluation of Hospitality Sector Security The Oct. 1, 2017, sniper attack from a 32nd-floor room at Mandalay Bay, overlooking 22,000 people attending a country music festival, has been compared to “shooting fish in a barrel.” When the bullets rained down, there was nowhere to hide. The attack came from outside the “perimeter” of the event, so any additional screening of attendees would not have prevented it. There are also implications of the Las Vegas massacre for the hospitality industry. Hotels and resorts such as Mandalay Bay have not generally embraced technologies like the explosives scanners or X-ray machines used at airport terminals, at least not in the United States. 2. Deep Learning Algorithms Broaden the Scope of Video Analytics [Zvika Ashani] Until recently there have been minimal applications of Machine Learning used in video analytics products, largely due to high complexity and high resource usage, which made such products too costly for mainstream deployment. However, the last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning. The recent increased interest in Deep Learning is largely due to the availability of graphical processing units (GPUs). GPUs can efficiently train and run Deep Learning algorithms The last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning 3. Home Security Systems: Why You Need to Upgrade From 3G to 4G Technology [Missy Dalby] The current communication method for most home security systems is via CDMA and 3G (GSM) technologies. With the emergence of faster, better, and stronger 4G LTE technology, carriers are migrating away from old technology standards and methods towards new, more efficient ones. As such, the older technology is going dark, and soon. Manufacturers of cellular modules have stopped making them. At the end of 2018 they will stop letting customers add systems utilizing 3G radios to their channels. 4. Diving into AI and Deep Learning at NVIDIA’s San Jose Conference [Larry Anderson] Video analytics applications fall under NVIDIA's “AI City” initiative, which they describe as a combination of "safe cities" (video surveillance, law enforcement, forensics) and "smart cities" (traffic management, retail analytics, resource optimization). Depending on the application, AI City technology must function in the cloud, on premises and/or at the edge. NVIDIA’s new Metropolis initiative offers AI at every system level, from the Jetson TX2 "embedded supercomputer" available at the edge, to on-premises servers (using NVIDIA’s Tesla and Quadro) to cloud systems (using NVIDIA’s DGX). 5. Physical Security Evolves to Protect Mobile Workers [Annie Asrari] With an increasing number of employees traveling and working remotely, the days of a dedicated worker who commutes to and from a single location every day of the week are just about over. Security professionals must take a second look at their policies and procedures for employee safety. To protect employees in this new mobile world, where people, assets and brand reputation threats may face higher than normal levels of safety and security risks, businesses must focus less on securing physical, four-wall perimeters and instead take a global approach to security that focuses on protecting traveling, remote and lone workers. Businesses must take a global approach to security that focuses on protecting traveling, remote and lone workers 6. New Security Technologies Driving Excitement on Busy ISC West Day One [Larry Anderson] ISC West in Las Vegas kicked off April 5 with an expanding focus on new technologies and new applications, including some that go beyond any narrow definition of security. “Technology is disrupting the market and executives are taking our solutions beyond security,” says Moti Shabtai, CEO and President of Qognify. “They are starting with security and quickly moving to other risk and business continuity issues in the organizations. They want a clear return on investment (ROI), which we can deliver if we move from covering a limited island of ‘security’ issues and give them the value of also managing risk, safety, and operations.” 7. Optimizing Building Automation for Good Return on Investment [Minu Youngkin] Smart buildings are on the rise around the world, not only because a growing number of companies are considering their environmental impact, but also because of the dramatic cost savings that can be realized through integration. In every building that has an integrated security and access control system, an opportunity awaits to also integrate the building’s energy use, water use, ventilation and more. The key is to effectively convey the tremendous potential of this new technology to the end user. 8. ISC West 2017: How Will IT and Consumer Electronics Influence the Secuirty Industry? [Fredrik Nilsson] A good way to predict trends [at the upcoming ISC West show] is to look at what’s happening in some larger, adjacent technology industries, such as IT and consumer electronics. Major trends on these fronts are the most likely to influence what new products will be launched in the electronic security industry. Proof in point is H.264, an advanced compression technology ratified in 2003 and adopted as the new standard by the consumer industry a few years later. By 2009, it became the new compression standard for the video surveillance industry as well. Violence will continue to challenge the healthcare sector in the future 9. The Future of Healthcare Security: Violence Response and Emergency Preparedness [Ben Scaglione and David LaRose] Violence will continue to challenge the healthcare sector in the future. Domestic violence, child abuse, behavioral health, drug and alcohol abuse will all continue to challenge hospital staff in the Emergency Department, Women’s Health, and behavioral health areas. The Hazard Vulnerability Assessments (HVA) along with facility wide risk assessments helps in defining risk severity and identifying historical patterns of violence. 10. Robot Revolution: Uncovering the Real Value of Security Robots [Steve Reinharz] The security coverage that a robot offers in the case of a shopping mall can be easily overshadowed by the fact that the machines seem to serve to entertain the population. Instead, security robots can best be utilized for more high-level roles, such as in critical infrastructure sites, corporate campuses and educational facilities, where wide, expansive spaces require continuous protection. In these locales, security can be difficult to achieve, as cost, location and lack of resources make the logistics of deployment difficult.
SourceSecurity.com’s most trafficked articles in 2017 reflected changing trends in the market, from facial detection to drones, from deep learning to body worn cameras. Again in 2017, the most well-trafficked articles posted at SourceSecurity.com tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles posted at SourceSecurity.com in 2017 that generated the most page views. They are listed in order here with the author’s name and a brief excerpt. MOBOTIX is increasingly positioning itself as a specialist in high-quality IP surveillance software 1. MOBOTIX Aims High with Cybersecurity and Customer-Focused Solutions [Jeannie Corfield] With a new CEO and Konica Minolta on board, MOBOTIX is set for expansion on a global scale. But how much growth can we expect for a company like MOBOTIX in an increasingly commoditised surveillance market, where many of the larger players compete on price as a key differentiator? While MOBOTIX respects those players, the German manufacturer wants to tell a different story. Rather than competing as a camera hardware manufacturer, MOBOTIX is increasingly positioning itself as a specialist in high-quality IP surveillance software – camera units are just one part of an intelligent system. When MOBOTIX succeeds in telling this story, partners understand that it’s not about the price. 2. ‘Anti-Surveillance Clothing’ Creates a New Wrinkle in Facial Detection [Larry Anderson] The latest challenge to facial recognition technology is “anti-surveillance clothing,” aimed at confusing facial recognition algorithms as a way of preserving “privacy.” The clothing, covered with ghostly face-like designs to specifically trigger face-detection algorithms, are a backlash against the looming possibility of facial recognition being used in retail environments and for other commercial purposes. 3. Drone Terror: How to Protect Facilities and People [Logan Harris] Already, rogue groups such as ISIS have used low cost drones to carry explosives in targeted attacks. Using this same method, targeting high profile locations to create terror and panic is very possible. Security professionals and technologists are working furiously to address the gaps in drone defense. Compact Surveillance Radar (CSR) is a security technology addressing the problems with other types of detection. CSR, like traditional radar, has the benefit of being able to detect and track foreign objects in all weather conditions, but at a fraction of the size and cost. The last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning 4. Deep Learning Algorithms Broaden the Scope of Video Analytics [Zvika Anshani] Until recently there have been minimal applications of Machine Learning used in video analytics products, largely due to high complexity and high resource usage, which made such products too costly for mainstream deployment. However, the last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning. The recent increased interest in Deep Learning is largely due to the availability of graphical processing units (GPUs). GPUs can efficiently train and run Deep Learning algorithms 5. Body Worn Cameras: Overcoming the Challenges of Live Video Streaming [Mark Patrick] Most body camera manufacturers, that are trying to stream, attempt to use these consumer technologies; but they don’t work very well in the field, which is not helpful when you need to see what is happening, right now, on the ground. The video must be of usable quality, even though officers wearing the cameras may be moving and experiencing signal fluctuations – most mobile video produces significant delays and signal breakups. Video and audio must always remain in sync so there’s no confusion about who said what. Therefore, special technology is required that copes with poor and varying bandwidths to allow a real-time view of the scene and support immediate decision-making by local and remote team members and support teams moving to the scene. 6. QinetiQ Demonstrates New Privacy-Protecting Body Scanner for Crowded Places [Ron Alalouff] QinetiQ has developed a scanner that can be used in crowded places without having to slow down or stop moving targets. The body scanner, capable of detecting hidden explosives or weapons on a person, has been demonstrated publicly in the United Kingdom for the first time. SPO-NX from QinetiQ – a company spun out of the UK’s Defense Evaluation and Research Agency (DERA) in 2001 – can quickly screen large groups of people for concealed weapons or explosives in a passive, non-intrusive way, without needing people to stop or slow down. 7. ISC West 2017: How Will IT and Consumer Electronics Influence the Security Industry? [Fredrik Nilsson] A good way to predict trends [at the upcoming ISC West show] is to look at what’s happening in some larger, adjacent technology industries, such as IT and consumer electronics. Major trends on these fronts are the most likely to influence what new products will be launched in the electronic security industry. Proof in point is H.264, an advanced compression technology ratified in 2003 and adopted as the new standard by the consumer industry a few years later. By 2009, it became the new compression standard for the video surveillance industry as well. By drawing data from a number of different sources and subsystems, it is possible to move towards a truly smart environment 8. Integrating Security Management into Broader Building Systems [Gert Rohrmann] Security solutions should be about integration not isolation. Many organizations are considering their existing processes and systems and looking at how to leverage further value. Security is part of that focus and is a central component in the move towards a more integrated approach, which results in significant benefits. By drawing data from a number of different sources and subsystems, including building automation, it is possible to move towards a truly smart environment. 9. How to Use Video Analytics and Metadata to Prevent Terrorist Attacks [Yury Akhmetov] How we defend and prevent terrorism must be based on intelligent processing of information, and an early awareness of potential threats – and effective preventive action – may eliminate most attacks. Video analytics, automated surveillance and AI decision-making will change the rules of the struggle between civilians and terrorists by making attempted attacks predictable, senseless and silent. To what extent can technology investigate and prevent terror crimes considering the latest technology innovations? 10. Next Generation Video Analytics: Separating Fact from Fiction [Erez Goldstein] ‘Next generation video analytics’ is a catchy marketing phrase, is how much substance is behind it? Video analytics as a technology has been with us for many years, but there has always been an air of confusion and mystery around it, in large part created by Hollywood movies, where every camera is connected, an operator can search the network and locate the villain in a matter of seconds. I am pleased to say that, in many respects, fact has caught up with fiction, with the newest video analytics solutions that are now on the market focusing on search and specifically real-time search. These solutions have been tried, tested and proven to help reduce search time from hours to minutes and even seconds.
In 2017, SecurityInformed.com covered topics from all corners of the physical security industry - from video surveillance, to access control, to intrusion detection and beyond. But just how much have you been paying attention to the industry this past year? Does your knowledge of the cloud soar high above your colleagues and security friends? Can you recall your facts faster than 60-fps? Are you hooked into the mainframe with your expertise in cybersecurity? Now you can find out. We have launched our SecurityInformed.com Best of the Year Quiz 2017, and this is your opportunity to prove just how much you remembered in this eventful year of security. Compiled by Editor Larry Anderson, our questions span topics as diverse as millennials, body-worn-cameras and security trade shows. So, what are you waiting for? Are you ready to prove your knowledge? Are you the champion of the security trade? Take our SourceSecurity.com Best of the Year Quiz 2017 now, and be the envy of the industry!
SourceSecurity.com’s Expert Panel had a lot to say in 2015 on a variety of topics in our Roundtable discussions. Not surprisingly, the discussion topics that have generated the most interest (in terms of how much visitor traffic they generated) are the same hot topics we hear about every day in the industry. Our very most-clicked-on Roundtable discussion in 2015 was about the impact of video on privacy rights. Other hot topics that made the Top-10 list of Roundtable discussions included the Cloud (twice!), the impact of IT on physical security, and the outlook for 4K cameras. Additional well-read discussions centered on expanding the benefits of security to other departments and how to improve training. Readers also gravitated to Expert Panel Roundtable discussions of more technical topics such as the value of full-frame-rate video and the effectiveness of panoramic view cameras (compared to pan-tilt-zoom functionality). Rounding out the Top 10 is a discussion of the desirability (and legal implications) of using dummy cameras. Here is a listing of the Top 10 Expert Panel Roundtable discussions posted in 2015 at SourceSecurity.com, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2015 (including the quotable panelists named below). 1. What Are The Limitations On Where Video Cameras Can Be Placed Because Of Privacy? "Use of cameras in retail applications can easily be justified in general surveillance of sales floors and shopping aisles, but cameras should only be used in changing areas to address a particularly serious problem that cannot be addressed by less intrusive means.” [Mark Pritchard] 2. Are Cloud-Based Security Systems “Safe?” "If the authentication principles are insufficient and weak passwords are allowed, it doesn’t matter how strong the encryption is. Because cloud-based systems are exposed to the Internet, they demand strong authentication and increased operational procedures." [Per Björkdahl] 3. How Does IT Affect The Physical Security Buying Decision? "Of course, we all want good value, but we must invest as necessary. If you strip everything back, the integrator's job is to deliver data. If IT and security departments can keep this objective in mind, then 'value' redefines itself." [Larry Lummis] 4. Which Non-Security Uses Of Video Are Catching On? "While video can help with quality control across the supply chain, it will be especially useful in ensuring compliance with the international adulteration rule [for food manufacturers], the rule with the last court-ordered deadline on May 31, 2016." [Don Hsieh] 5. What Is The Value Of "Full-Frame-Rate" Video? "I once took a client’s footage of a genuine street fight to check how many images per second were needed to prove who punched who – 25fps was fine but 12fps made the video evidence doubtful. Don’t forget, however many fps you choose, your shutter speed must be fast enough to prevent motion blur spoiling the details." [Simon Lambert] 6. When Is It Desirable To Use 'Dummy' Cameras As A Deterrent? "If cameras are present, there is a reasonable expectation of a secure environment in both public and private areas. If the public sees cameras and assumes they are real, they could argue that they were reliant on the protection provided by the cameras." [Dave Poulin] 7. Are Megapixel Or Panoramic-View Cameras An Effective Substitute For PTZs? "Panoramic cameras are usually static, so zooming into a scene’s details is done in software and limited by pixels in the sensor, lens quality and software such as de-warping, so clarity at the boundaries might disappoint. PTZ cameras zoom optically, magnifying long-range details significantly better." [Simon Lambert] 8. Is HD Still The Standard Of Resolution In The Market? For How Much Longer? "The 720p and 1080p HDTV remains dominant today and is expected to be for the foreseeable future. The next standards-based resolution will be 4K, which represents 8.3 megapixel, but first the industry will need to improve on bandwidth with better compression and better light sensitivity." [Fredrik Nilsson] 9. What Are The Current Limitations Of Cloud-Based Systems? "The only remaining limitations of cloud-based systems are bandwidth and connectivity to the cloud. There is more than enough bandwidth for applications like Access Control and Visitor Management, but it will take a couple more years before all high-resolution video is cloud-based.” [Paul Bodell] 10. How Can Security Training Be Improved Among Integrators And End Users? "Training should be sticky and persistent. Follow-up training such as on-line review and updated course material should be available to keep the knowledge fresh. Technology is constantly changing, as soon as training is complete the knowledge begins to go stale." [Charlie Erickson] See the full coverage of 2015/2016 Review and Forecast articles here
There's nothing like a visit to the China Public Security Expo (CPSE) in Shenzhen to open your eyes to a new world of security market manufacturers and customers in the Asia-Pacific market. The show is huge by Western standards – someone told me it's five times the size of ISC West in Las Vegas. But even more than the size of the show, it was the crowd that made an impression on this first-time visitor. Huge numbers of attendees and exhibitors Think of the mass of humanity you might expect at a rock concert, or at Walmart on Black Friday. There was no space to move as you enter the show; you're swept along as part of a sweaty crowd. Fortunately, it was a little easier to maneuver once I got past the initial rush. There were some familiar Western brands – I saw Tyco and Honeywell among others – but the vast majority of the exhibitors are names unfamiliar in the West. And there are a lot of them, aisles and aisles of large, elaborate exhibits. Not waiting for attendees to approach a booth, there were people in the aisles aggressively urging you to enter a nearby exhibit, or at least to take a piece of literature. The experience was a stark contrast to the slow activity at ASIS, where exhibitors complained about lack of booth traffic. No need here to rationalise about the quality of the leads – here, it was clearly about quantity. Companies operating on a larger scale The massive scale of CPSE confirmed my initial observations from the previous couple of days as I had visited Hangzhou as well as Shenzhen. Everything seems bigger here. Large, high-rise buildings are everywhere you look, many of them recently built, across miles and miles, with more to come. Cranes dot the horizon as even more construction is under way. What these Chinese companies are achieving exceeds our tired perceptions in the West of "commoditised products" or "cheap Chinese" My host for the trip, Hikvision, inhabits two large skyscrapers in Hangzhou, and there's an adjacent third building (much bigger than the others) already under construction. When I visited their factory, I learned that they are also building a brand new (and larger) manufacturing facility that will use more automation and further expand their already huge daily output of video surveillance products. It's growth on a scale far beyond anything we're seeing anywhere else in the security marketplace. I visited some other manufacturers at the show, including Dahua, which is gearing up for a larger presence in the U.S. market; and Uniview, which is changing its global brand to UNV and is on the verge of going public. Eyeing Western markets What these Chinese companies are achieving exceeds our tired perceptions in the West of "commoditised products" or "cheap Chinese". Hikvision alone has a broad and rich range of technologies that includes intelligent systems, analytics and product capabilities that other companies often claim will be their advantage as the market becomes more commoditised. Undermining lingering perceptions of questionable Chinese quality were impressive quality control processes Hikvision displayed on the factory tours. Western markets, especially the United States, loom large in the sights of these big companies. Often the missing piece is a U.S. sales and service infrastructure. Hikvision (and other Chinese players) are growing in the U.S. market. Reflecting Hikvision's growth here is (what else?) a new building planned in California. I learned a lot on my Far East adventure; among other things, that the future of the security marketplace will be more global than ever. (And a new word, a verb: to libate.)
Strategic management of costs is important when considering video storage systems Costs are at issue when considering any component of a video system. Strategic management of costs is especially important when considering video storage systems because storage accounts for such a large cost component of networked systems. Gartner’s Total Cost of Ownership (TCO) As enterprise products begin to dominate the video storage market, more attention needs to be addressed to Gartner’s Total Cost of Ownership (TCO), says Jeff Burgess, president and CEO of BCDVideo. This concept takes it beyond the initial purchase costs, and also factors in management and support, the opportunity cost of downtime, and other productivity losses. “It’s especially true these days as more and more, video data is being analyzed for business purposes,” says Burgess. “After all, they are counting on it to run their project. The video doesn’t get recorded if the recorder is not working or continually freezing up.” ‘Cost Of Power, Pipe, And People’ Burgess urges integrators and end users to ask themselves: What is the video recorder really costing me over the course of the five-year project? It’s likely a racked solution, so in IT terminology that “costs power, pipe, and people.” “Take the people out of the mix,” Burgess says. “You should not need to roll a truck to the site every time there is an issue. Especially after a warranty service call. The system should automatically accept the replacement drive and bring the data over to it within the existing RAID settings, without the integrator’s on-site presence needed. The integrator really needs to look under the hood to see what else the system can provide other than simply being a storage box or a box of parts from multiple brands, not meant to work together.” Finding the right balance of control, performance, scalability and availability to keep up with and effectively exploit the surveillance data deluge allows organizations to avoid painful and costly upgrades Today’s intelligently-built video solutions provide the integrator with an easy-to-track cost savings over the lifespan of the project versus buying boxes on the cheap, says Burgess. “Today’s savvy integrator realises it doesn’t take many truck rolls to lose all those front-end savings, which are now eating away at their profits.” Camera With SD Cards Another cost factor is to focus more on the utilisation of the SD cards in the camera. Utilising cards within the cameras creates a very inexpensive way of adding redundancy to a solution, says Burgess, who notes that most VMS companies can pull the video from the SD cards should there be an interruption in the network or at the head end. Educate Yourself Veracity recommends asking a lot of questions to guide system design and minimize costs. What retention time do you need? What would you wish? Do you want to relay on video motion detection, or would you prefer to find a system that allows you to record low frame rate 24/7 and then increase frame rate on motion? Does your storage choice allow you to use low cost drives? Does it use a huge amount of power? Is it overly complex? “Educate yourself about the choices,” says Scott Sereboff, CEO of Veracity USA. “Look around. Consider the alternatives. You have a choice that does not include a RAID storage system with an $800-plus per terabyte price tag.” "Starting with a solution that takes minimal install and tuning, and is proven to scale well beyond current needs, future proofs the system for the short- and long-term for the customer and the integrator", says Jeff Adams, director of sales, surveillance solutions, DDN Storage solutions Balancing Performance, Capacity And Availability Finding the right balance of control, performance, scalability and availability to keep up with and effectively exploit the surveillance data deluge allows organizations to avoid painful and costly upgrades, says Jeff Adams, director of sales, surveillance solutions, DataDirects Network (DDN) Storage solutions. “Performance needs to scale to allow for increasingly demanding playback and/or analytics features. Capacity needs to scale non-disruptively as cameras are added, while resolutions and retention periods may increase over time. Availability at scale is tricky; something as simple as slow rebuild times becomes critical in larger systems – endangering availability and system data integrity.” In addition to new installations, DDN does a healthy business in replacing underpowered infrastructures that deliver on the initial requirements but fail on scaling, says Adams. The most frequent culprits when a video surveillance site fails and needs a significant replacement/upgrade include: single controller architectures, silent data corruption, data loss from secondary failures during drive rebuilds, performance impact of rebuilds, alternates to RAID6 data protection, and lack of experience scaling into the petabyte or multi-petabyte range. Many mid-range video surveillance storage “solutions” take more than a week to install and tune, and cannot handle significant scale, adds Adams. For end users, this limits the ability to add cameras, capacity and demand (playback, analytics and system consolidation). For integrators, this means a lot of “care and feeding,” and frequent completion delays up front, as well as increased support considerations throughout the life of the project. “Starting with a solution that takes minimal install and tuning, and is proven to scale well beyond current needs, future proofs the system for the short- and long-term for the customer and the integrator,” says Adams. It also keeps costs low.
Physical access control system architecture should be built to use the changing IT infrastructures of today’s organizations to their fullest It’s time to completely rethink physical access control systems with an eye toward the changing world of information technology. Today’s physical access control system architecture only leverages existing network hardware technology – it doesn’t utilize the organization’s full IT infrastructure, which includes systems providing advanced security services and sources of security-related real-time information. A close look at most organization’s IT roadmaps will show that traditional-architecture access control systems are off on a side road. Physical access control system architecture should be built to use the changing IT infrastructures of today’s organizations to their fullest. Such an approach is key to future-proofing and minimizing costs. The architecture needs to be able to keep pace with technological advancements in computing, communications and integration at the system level and the device level, providing strong security capabilities in a cost-efficient manner. Because hardware-centric, distributed intelligence can’t keep up with IT advances, an ever-widening gap exists between the capabilities, effectiveness and ease of management that a physical access control system can provide – and what today’s physical access control products can provide. Unless the concept of “putting intelligence at the door” includes all the intelligence that should be utilised to make an access decision, such an approach actually provides less security than today’s networked technologies are capable of providing. A key issue is a system’s native support for technological advances versus requiring third-party devices and middleware in a piecemeal approach to system design. With traditional hardware-centric physical access control systems, advanced features and real-time authentication and authorization capabilities could only be achieved by implementing costly third-party solutions or custom-designed applications. Cost and reliability factors have kept such capabilities out of reach for most physical access control customers, even though IT security systems have had such features for more than a decade. Until a full transition is made to next-generation architecture, existing physical access control system deployments will continue to fall further and further behind as technology advances, and will continue to have shortcomings and weaknesses At the infrastructure level, next-generation physical access control system architecture must be IT-centric, taking advantage of an organization’s existing IT infrastructure. It must be deployable throughout the enterprise like any other business application that uses networked end-point devices. At the application level, next-generation physical access control system architecture must be IT-aligned in support of the customer’s preferred approaches to identity, credential and access management (ICAM), and must be easily integrated with relevant business systems. These changes create significant opportunities for integrators and end users, offering software- and net-centricity, server-based real-time access decisions, advanced security protection, scalability, IT- and ICAM-friendly deployment, and mobile device- and smart card-friendly deployment. There are two questions to consider about making the transition to next-generation physical access control architecture: First, will your organization’s current system be satisfactory five to 10 years from now given the pace of technological advances? Second, from a cost- and security-effectiveness standpoint, is continued investment in legacy physical access control technology the smartest approach to your organization’s critical asset protection and incident response needs? Until a full transition is made to next-generation architecture, existing physical access control system deployments will continue to fall further and further behind as technology advances, and will continue to have shortcomings and weaknesses – as well as needless costs – that constitute a liability to an organization’s asset protection program. Editor’s Note: This article is based on Mr. Raefield’s answers to several questions about the access control market posed by SourceSecurity.com.
The merger of Vicon and IQinVision has been one of the more interesting business developments in the security and video surveillance markets in 2014. Wondering how the merger is working out, I spoke with Eric Fullerton, CEO, Vicon Industries Inc., at the ASIS 2014 show in Atlanta. Here are some of his comments: SS.com: What drew you to Vicon; what opportunity do you see here? Fullerton: The merger of Vicon and IQinVision was announced at the end of Q1, and I thought: What is that? My first reaction was that it’s a losing proposition - putting a struggling camera company and a struggling solutions company together. Then I started looking at it more closely. I think by putting these two companies together, we will be able to create a very strong video company that can lift video to the next level. I wanted a good challenge, and to be part of the next change in the industry by combining hardware and software and to start innovating at the edge. SS.com: What do you see as the next level of video, once it’s realized? Fullerton: Video will become the most important digital information source to an operation. Video isn’t just your security application, but it’s a digital business application that adds value to the bottom line. That’s where we want to be delivering products and solutions. We are starting to extract metadata from the cameras. You can analyze the content of video, which provides a totally different value to the video. Less than half of one percent of recorded video is actually looked at -- it’s just used to document what happened after the fact. With some of the modern cameras, like some we are already launching, there is metadata storage of each frame, all the vectors and everything that you can know. Without looking at the video you can analyze changes from frame to frame in terms of color and movement. That will add value to the use of the video. You won’t have to sit and watch it to know what it’s capturing, but you will know what’s going on by using analytic algorithms, and combining that with other digital security systems, including access control and video management. With some of the self-learning video analytics, facial recognition and other things, we are starting to analyze video with data algorithms, channelizing it, and using it as valuable input into HR and management solutions, even in manufacturing. You can get more efficiency. Video will become a valuable addition to daily operations and add value to the bottom line. SS.com: What is Vicon’s part of that – an end-to-end solution, or what? Fullerton: That’s the million dollar question. We are going to build cameras under the IQinVision brand, and have a full line of cameras. We will focus on where our core capabilities are – design and functionality. We will be outsourcing all manufacturing to China and other places that give us the right cost basis, and we will be adding our value at the high end of the camera. The camera line will be open and able to interoperate with other video management systems that we know today. "We’ll have a plug-and-playsolution at the bottom todeliver what the peoplewant at the low end – oneto 60 cameras with limitedfunctionality. At the mid-market we will have muchmore robust and functionalNVRs with more storagefor your larger installations.And then at the high end wewill a VMS-type solutionthat is cloud-enabled" On the Vicon side, today we have a proprietary VMS, which is not what the market is asking for. The emergence of Milestone as an open platform company was because end users were looking for freedom of choice and to get out of proprietary jail. We will migrate our video management platform to an open platform. We’ll have a plug-and-play solution at the bottom to deliver what the people want at the low end – one to 60 cameras with limited functionality. At the mid-market we will have much more robust and functional NVRs with more storage for your larger installations. And then at the high end we will a VMS-type solution that is cloud-enabled. We will also have a cloud solution at the low-end, residential, mom-and-pop market, with video only, no integrations. Later we’ll develop a multi-tenant cloud system for video service providers (VSPs). Going to the cloud doesn’t mean you put the video in the cloud. It means you can get the video when you need to, but also get the information you need. There will be a lot of on-camera storage. Because you have the knowledge of what’s happening in the frames (using metadata), you can pull out the data from the cloud and then decide what part of the video you need to look at. SS.com: How fast are you getting out of the analog business? Fullerton: We’re not. The analog business will have a very long tail – the last 10 to 15 years has proven that. Yes, there is some erosion of margin because of commoditization. There are benefits of analog cameras – they’re robust, they work, you can pull the cable longer than an Ethernet cable. Because of the robustness and the pricing, and some of the features, we’ll see a long tail of analog for years to come. SS.com: What impact do you see of these changes on dealer partners? Fullerton: Being successful in the security industry is to understand how business is done and what end users want. One reason IT didn’t take over is that there is much better value than anybody realized in the guidance security dealers provide end users. I strongly believe business in the security industry is done by local people, and we will migrate as a combined company to a full two-tiered distribution model. We go through distribution and security integrators, and they will be the ones doing the business with the end user. SS.com: How do you deal with preconceptions about your history as a company, and how do you re-educate the market about that? Fullerton: In the security industry, if you look at the history of how it was built, and the old boy’s network, the shadow of what you do is very long. The interesting thing is that Vicon has had IP solutions for 14 years. Everybody thinks that Vicon is an analog company. Yes, we still sell analog cameras because there’s a need in the market. Vicon has been a proprietary company. I would say the biggest fault of the company has been to try to be proprietary when the market is going the other way. That’s the big change we will make. We will be announcing that, and driving PR to let everyone know the new Vicon is an open company that gives the end user the freedom of choice and also delivers on higher value. SS.com: What is your message to the market? Fullerton: We have a 4K camera, which has been our message at the ASIS 2014 show. The management team sat down last week and said “how are we going to drive this?” “What are our values going to be?” We looked at our vision and our mission. The vision is that we believe video will become the most important digital [resource] in a company, so it will add to the bottom line, not just surveillance. Our values are built around the acronym CIPIT – Customer orientation, Integrity, Passion, Innovation and Team effort.
Commoditisation is the biggest problem facing today’s security integrators, says Bill Bozeman, president and CEO of PSA Security Network, an electronic security cooperative encompassing some 250 electronic security systems integrators, and aligning them with over 150 vendor partners. Multi-million-dollar manufacturers are taking advantage of economies of scale to drive down pricing of many of the components our industry uses, and lower prices are poised to have a long-term detrimental impact on integrators’ business, Bozeman says. “You have to sell that many more cameras and card readers to create the same amount of revenue,” he says. “There’s a lot of danger there.” To survive the impact of commoditisation, integrators are looking to develop new business models that are not totally dependent on the installation of systems. Possibilities include recurring revenue models and sales of security services, which can provide a predictable cash flow. Recurring revenue for a systems integrator might come from longer-term maintenance contracts, or from monthly fees for alarm monitoring, access to cloud services, etc. Security services, in effect, involve an integrator providing a wider range of services to an end user customer for a monthly fee, basically allowing the end user to “outsource” its complete security operation to an integrator. Commoditisation over time will require that integrators re-think their business models, says Bozeman, but integrators will require a lot of education on how to embrace the needed transition. “Contractors don’t have that model,” he says. “They are embracing it slowly; it’s a slow migration, and we have tried to lead them in that direction. They’re picking up on it, but it’s been a herd of turtles.” On the plus side, Bozeman says proliferation of handheld devices with the ability to receive video and alarm signals is opening up a new wave of customers for integrators. He says the capabilities of hand-held devices drive visibility of the video surveillance world. The growth of lower-tech options, such as ‘baby-cams,’ is also helping “to drive interest toward professionally designed systems,” says Bozeman.
In its role to achieve “plug-and-play” interoperability for security system and device integration, the Physical Security Interoperability Alliance (PSIA) is looking ahead to some new possibilities in its long-term roadmap. David Bunzel, PSIA executive director, shared with me some of the active discussions among alliance members about where the next wave of interoperability initiatives may lead. Integration of wireless locks is at the top of the list, a response to the growing and evolving product category. Looking further into the future, integration of smart elevators, energy management systems and hotel management systems are part of the alliance’s roadmap. There are specific access control and integration issues related to each category. In the case of energy management systems, for example, there is demand for access control systems to be able to adjust a building’s climate system in response to whether anyone has entered the building (for example, on the weekend). Access control can also monitor overall building occupancy and optimize climate settings based on that information (especially valuable as a strategy to save energy costs and promote “green” compliance). The more our lives and technologies are interconnected, the greater the expectations for physical access control to be a part of a larger ecosystem Smart elevators are another opportunity to interface with access control, and increasingly their management is a requirement for enterprise building systems. Even more futuristic is the possibility of having an employee’s computer work station interface with an access control system. In this scenario, an employee’s desktop computer could automatically power up, open appropriate files and applications, and/or access networks to which the employee is authorized – all based on a card or biometric scan when the employee enters the building. With the increase of remote workers and companies needing fewer work stations (and seeking to reduce costs), the “hot desking” concept could continue to gain favor – and provide new benefits of interfacing with physical access control. In this case, rather than a work station assigned to each employee (even those who do not come to the office very often), the concept of a “hot desk” would allow an employer to use a smaller number of generic workstations, each available as needed when a remote worker comes into the office. When an employee comes to work (and scans his access control credential), he or she would be assigned to a specific workstation, and that desktop computer would then automatically configure itself to the employee’s specific needs and access privileges. It’s a new level of physical-logical integration, and an opportunity for the physical access control market, but interoperability challenges have to be addressed. The more our lives and technologies are interconnected, the greater the expectations for physical access control to be a part of a larger ecosystem. It appears PSIA and its members have challenges to keep them busy for years to come.
For the 20,000 or so security professionals who attend each year, ASIS International’s Annual Seminar and Exhibits is all about education. Attendees can polish their skills and update their security know-how in any of more than 200 education sessions during the yearly event. They can also learn all about the latest available security technologies and services at the massive 225,000-square-foot exhibition. Celebrities are on hand too, or at least some well-known and notable dignitaries are keynote speakers, including General Colin Powell, former U.S. Secretary of State; and John Huntsman, former Utah Governor and U.S Presidential candidate. Sharing dramatic stories of heroic rescues from recent geopolitical history, U.S. Navy SEAL Rear Admiral Scott Moore discusses team building in the context of the military’s most elite forces. These are just a few of the attractions when ASIS International presents the 60th Annual Seminar and Exhibits Sept. 29-Oct. 1 in the Georgia World Congress Center in Atlanta, Ga. For the fourth consecutive year, the (ISC)2 Security Congress, which focuses on issues of information and software security, co-locates with the ASIS event, thus combining physical and logical security professionals in one place (and allowing them to attend various facets of both events). ASIS International is the largest organization of security management professionals worldwide, and (ISC)2 is the largest not-for-profit membership body of certified information and software security professionals worldwide. The focus of ASIS for the manufacturer and supplier community is the vast exhibit hall, where more than 700 companies demonstrate cutting-edge technology, products and services to security professionals worldwide The focus of ASIS for the manufacturer and supplier community is the vast exhibit hall, where more than 700 companies demonstrate cutting-edge technology, products and services to security professionals worldwide. The ASIS exhibition is one of two large security trade show events each year in the U.S. market and provides a focus for many product introductions and other commercial announcements among the manufacturing community. Although the attendee focus is on end users, there are also integrators, consultants, distributors and others who flock to the ASIS exhibit hall to see what’s new in the security market for the second half of 2014. Other highlights of the ASIS conference sessions include focus on top security concerns and need-to-know industry trends, including cyber-fraud, drones, security metrics, aviation security and many more. Education sessions reflect a range of topics, including urgent issues on everyone’s minds and in the headlines, such as mass shooting incidents, cyber-fraud, workplace violence, the safety of our food supply, and dealing with legalized marijuana, among many more. On the business side, sessions explore management issues such as internal theft and sabotage, best practices in hiring top security personnel, monitoring Internet communications, and complying with employer mandates of the U.S. Affordable Care Act. One session focuses on a new breed of security integrator emerging to address both small- and large-scale projects. “The Integrator of the Future” session identifies the largest growth markets for tomorrow’s integration professional. SourceSecurity.com Editor Larry Anderson is attending ASIS 2014 to report the latest company and product news from the 60th annual event.
The SourceSecurity.com team attended this year's IFSEC International 2014 with great anticipation to view the new innovations first-hand on show and see how the move to London would impact visitor experience. To capture the show, we have provided a summary of IFSEC in pictures above. Highlights from IFSEC 2014 We saw an overwhelming number of people and products; here is a snapshot of our IFSEC experience for 2014: FLIR SourceSecurity.com attended FLIR’s press briefing which took place on the first day of the show. FLIR emphasized that it was more than just a professional thermal camera company – the company has recently released $499 thermal cameras to the consumer industry. For FLIR, the security market is growing industry. With the acquisition of Lorex in 2012, FLIR will be introducing Lorex products under the FLIR brand (consumer side, not professional) in EMEA. At IFSEC 2014, FLIR also introduced FLIR One- its first consumer camera for the iPhone. HID Global HID Global’s Director of Technical Services, Nick Hislop, talked SourceSecurity.com through its emerging technologies in the form of leveraging Bluetooth LE and NFC. The concept is simple: to make mobile access more convenient. Nick also demonstrated how HID’s products and solutions are relevant for a number of vertical markets including Enterprise, Healthcare, Education and Finance Services. Nedap ID Ido Wentink of Nedap Identification Systems introduced SourceSecurity.com to the Nedap IDS advanced license plate recognition product, ANPR Access HD. The company also introduced uPASS Access, a backward compatibility convertor and UHF ISO Card for improved user experience for uPASS platform. The ANPR Access HD for advanced license plate recognition is a higher resolution lens than its previous release, the ANPR Access camera. Other features of the ANPR Access HD include a more powerful CCV, increased IR illumination and expanded OCR library. SourceSecurity.com’s visit to STI’s booth saw the company emphasize its importance not just within the fire industry, but within the security industry as well Security Technology International (STI) SourceSecurity.com’s visit to STI’s booth saw the company emphasize its importance not just within the fire industry, but within the security industry as well. STI is looking to get the message out there that they’re not just a fire company. Paul Machacek, Sales Team Business Developer, talked SourceSecurity.com through a number of STI’s products including STI’s Polycarbonate Protective Covers, Steel cages, Call Points & Switches and Stand-alone Alarm Systems. Samsung - Changing the face of IP On day two of the show, Samsung hosted a press conference for the global launch of its Open Platform. This new initiative gives users the opportunity to utilize third party APPs with Samsung's WiseNetIII cameras and domes. Tim Biddulph, Product Manager at Samsung, hosted the conference and offered an insight into Samsung's tag line for the show, "Changing the face of IP". Taking a lead in IP technology, Samsung is seeking to give end-users a solution that is effectively future-proof in terms of expandability and its ability to integrate with new technology in the future. Ease of use was also at the top of Samsung's agenda with its "Zero configuration" NVR solution and there was a large focus on the power of integration within different vertical markets. ASSA ABLOY ASSA ABLOY showcased a number of its access security solutions on its impressive stand. SourceSecurity.com met with Thomas Schulz who gave a comprehensive tour of the stand. From ASSA ABLOY Aperio, there was a focus on the benefits of energy saving for its customers with the Aperio range now featuring battery-powered online and offline locks, cylinders, and escutcheons. There was also ABLOY CliQ technology on show which integrates electronics and mechanics, combining mechanical ABLOY PROTEC locking solutions with low-power electronics. A number of access control solution from effeff, Mul-T-Lock, Traka and Yale were also showcased on the stand. VIVOTEK At the VIVOTEK stand, the SourceSecurity.com team were given a tour of the stand which featured their low-light solution and their latest retail solution On day one of the show, VIVOTEK hosted a luncheon in the Crown Plaza hotel, just a stone's throw from the ExCeL center. As well as enjoying a great meal, attendees were privy to the company's main focus for the coming year and its milestones and product roadmap for 2014 and beyond. The warm hosts included: Steve Ma, Executive Vice President at VIVOTEK, Brandy Lin, Team leader at VIVOTEK and Owen Chen, the Chairman of VIVOTEK. During the luncheon, VIVOTEK shared its vision of being seen as more than just a camera manufacturer, rather, as a total solution provider. The message of the importance of integration, an increased awareness of the need for reliability of products and ease of use was key on their agenda. At the VIVOTEK stand, the SourceSecurity.com team were given a tour of the stand wich featured their low-light solution and their latest retail solution, which was made up of a series of mini high definition cameras for discreetness. SALTO Salto showcased its latest wireless access control door solution, the XS4 mini. XS4 Mini includes SALTO Virtual Network SVN and wireless capability with mini installation needs. Embedded in the heart of the product is the latest microprocessor technology, ready for the connected world, open and future-proof for online connection, wireless technology and NFC. Seagate During an editorial briefing with the SourceSecurity.com team, Seagate shared their valuable knowledge of the history of storage manufacturing and stressed the importance of choosing the right storage solution for installations. With the rise of "Big Data" and increased storage needs in the surveillance market this is something which has become much more of a consideration. As one of only three storage manufacturers, Seagate's experience and know-how within the surveillance industry is vast and it hopes to push out its knowledge to the industry to ensure that people know the benefits of choosing a fit-for-purpose storage solution. Western Digital SourceSecurity.com spoke to Martin Jefferson at Western Digital, who gave a very detailed explanation of how the new WD purple surveillance hard drive had been created and why it was fit-for purpose. It was a very insightful presentation of the product and demonstrated the inherent need for the market to understand why choosing the right storage solution is vital to any installation. OptexAt the Optex stand SourceSecurity.com spoke to Aude Desbieres, who gave a breakdown of the latest offering from Optex at the show. Amongst the array of new products on the stand, Optex showcased the new analytics features of its laser Sensor, REDSCAN, and a new people counting solution developed by Giken Trastem. There was also a focus on full integration of its IP sensors with Milestone XProtectand Hawkeye mapping software and new grade 2 and grade 3 detectors. Our very own Larry Anderson also sat down with their MD Mike Shibata to discuss the company's future and development roadmap. During an editorial briefing with the SourceSecurity.com team, Seagate shared their valuable knowledge of the history of storage manufacturing and stressed the importance of choosing the right storage solution for installations Tyco Stephen Carney, Director of Product Management for Video Solutions at Tyco Security Products, set down with SourceSecurity.com to give an insight into their product roadmaps and their main focus for the coming year. He spoke on their concept of Unification which looks at integration at code level rather than simply API level. With the launch of their victor 4.5 Unified Client, they hope to give the end user a solution that is more secure and efficient for businesses and organizations that require an active surveillance environment. He also mentioned Tyco's increased focus on the end user and customer experience being at the heart of how they develop their product offering for the market. Senstar At the Senstar booth, SourceSecurity.com were given an insight by Miriam Rautiainen into Senstar's new FlexZone, a fence-mounted sensor that detects and locates intruders. The FlexZone can also locate multiple intrusions simultaneously and is scalable, thus making it an easy and flexible option no matter how big or small the installation needs to be. With FlexZone, less equipment and infrastructure is required, adding to the flexibility of the product. Furthermore, rejecting false alarms is even easier with FlexZone than with Senstar's previous offerings. Miriam also mentioned the acquisition of Optellios earlier this year, which has allowed Senstar to expand on their fiber technology portfolio. Nedap SourceSecurity.com also attended a seminar at the Nedap stand about their collaboration with EE. EE has selected Nedap's AEOS security management platform as part of their plan to expand their business throughout the UK. Since the AEOS system is completely web-based, EE employees can access it from anywhere. Traka At the Traka stand, Tanveer Choudhry, Global Marketing Manager at Traka, gave us a demonstration of their new Traka 21 - a plug and play key management system designed for small to medium size businesses. The system is very user-friendly and easy to use, as Tanveer showed us. Furthermore, a PC connection isn't necessary as the Traka 21 can operate as a stand-alone. However, the system features a USB port, which allows employees to extract user data. The Traka 21 will be available later this year.
Ever wish your smart phone could see in the dark? Sure you have, and FLIR Systems has just the gadget to make it possible. It’s the FLIR One, the “first personal thermal imaging device for consumers,” introduced earlier this year. Now available for the iPhone, with a version for select Android models coming soon, the product sells for less than $350. It allows its users to “see what the naked eye can’t.” According to the manufacturer, FLIR One “provides a visual image of minute temperature differences, giving users the power to see in the dark, observe invisible heat sources, compare relative temperatures, [and] see through smoke.” FLIR One made a big splash at the Consumer Electronics Show (CES) in January and has been widely featured in the technology media since then. FLIR One is part of the company’s strategy of promoting greater use of thermal imaging in a variety of markets, including security, by increasing overall consumer awareness of the power of the technology. The new camera for the consumer market uses technology that will also be coming soon to a security camera near you, expanding the capabilities of video surveillance and combining the benefits of thermal and visible imaging into a single video stream. FLIR’s Multi-Spectral Dynamic Imaging (MSX) capability – used in the FLIR One and soon to be incorporated into security cameras – involves extracting the details of a visible image and “embossing” them onto a thermal image, says Andy Teich, FLIR CEO. The FLIR One uses both a thermal image sensor and the smart phone’s visible camera; there are two apertures. The compact device combines both of the images using MSX algorithms running in the background to calibrate and perfectly align the two images into one. The smart phone then displays a single video image that is richer in content than either one individually. The resulting thermal image includes some of the visible details – the most important ones at any rate. “[The technology] blends high-fidelity detail from a visible image with thermal for an image this is quite rich in detail,” Teich says. In the security market, for example, the image can combine a thermal image of a car in a parking lot with the ability to read the license plate number, which would be captured by a visible sensor. The “edges” created by color changes in a visible image provide detail that is combined with a thermal image. (FLIR has provided both visible and thermal cameras since its acquisition of Lorex Technology in 2012.) Teich says the MSX technology was developed for the company’s thermography business, which involves the use of hand-held cameras for temperature detection. The FLIR One is the first camera introduced outside the thermography segment. “Ultimately it will find its way into the security business,” says Teich, probably “within the next year.”
Frank De Fina put Samsung on the map related to video surveillance in the United States market. Five years ago, before the longtime Panasonic executive signed on, the Samsung brand had little traction in the U.S. surveillance market, although the Korean giant was already well known in the broader electronics market. Back then Samsung surveillance cameras were thought of as inferior to Panasonic, Sony or the other brands – if they were thought of at all. Five years later, Samsung is climbing up the market share rankings. A lot of the success can be attributed to Samsung’s technological advances and the innovation of new products they are bringing to market. The products have gotten better, true, but De Fina gets the credit for building a solid management infrastructure and expanding the distribution channels over the last five years. Now, those elements will be continuing without him. “I’m leaving the company in better shape than I found it,” said De Fina, Samsung’s executive vice-president, North America. He emphasizes that his parting with Samsung at the end of May is “amicable” and “based on personal reasons,” among them a grueling 106-mile-a-day commute. “I want the industry to know I’m taking a breather,” he said. “I want to adjust my life to better suit some of the issues I have.” “Building the Samsung brand and credibility were the main focus early on,” De Fina said. “You have to have great products, great people and success stories by customers who were willing to take a chance.” His only regret is that it took five years to accomplish the turnaround. “I wish I could have done it in two years instead of five,” he said. “Five years ago, it was literally a shell,” De Fina remembers. “There were no processes and no team. I am pleased to say I organized and built a great team. The credit for building the business goes to that team.” The success has been notable as Samsung has increased its market share in the United States and is on track to increase U.S. video surveillance sales by more than 75 percent this year over last. ”The team at Samsung is great, and I don’t want them to suffer from this (departure) being misunderstood,” said De Fina in a telephone conference call with a dozen or so security industry journalists. In the call, he deferred any mention of his possible successor to “the management at Samsung.” What’s next for Frank De Fina? One possibility is to work as a consultant, he said. “I’d like to be a business professor at Princeton (near my home), but I don’t have a degree in physics, and they would probably check,” he joked.