Physical security, security integration, video, access control, security market trends
Round table contributions
Delivering on customer expectations is a basic tenet of success in the physical security market. However, meeting expectations may be an elusive goal, whether because customer needs are not communicated effectively or because equipment doesn’t perform as promised. We asked this week’s Expert Panel Roundtable: what if a customer expects more than a security system can deliver?
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilized. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?
Body-worn cameras are becoming more common every day, driven both by needs of the marketplace and technology developments. However, questions remain about the usefulness of the devices, and their future role in promoting safety and security. We asked this week’s Expert Panel Roundtable: What are the challenges of body-worn cameras for the security industry?
The world of politics, like the world of security, is an environment of constant change. But do changes in one have an impact on the other? Governments around the world are involved in buying a wide variety of physical security systems, so how those governments operate certainly affects how they spend money on security. But in a broader sense, governments (and the associated political forces at work) also impact how their citizens and those in the private sector view threats and, as a logical extension, the security systems they need to address those threats. We asked this week’s Expert Panel Roundtable: How does the political climate affect spending on security systems?
A busy trade show abounds with new products and expanded features, colorful signage and blinking video screens, all competing for attention from busy attendees. It’s a microcosm of how the security marketplace – or any market, for that matter – sells its products. But what happens if the reality turns out different to the sales pitch? What happens when product or system performance doesn’t quite live up to the claims? Some would call that hype, and it can lead to disillusioned and frustrated customers. We asked this week’s Expert Panel Roundtable: What is the negative impact of hype in the security marketplace?
Consolidation is a reality in the security and video surveillance market. In the last several years, we have seen a variety of mergers and acquisitions (M&As) involving scores of companies of all sizes. But what is the impact of M&A activity on the companies involved, on their customers, and on the industry as a whole? We posed this question to our Expert Panel Roundtable: Do mergers and acquisitions have a net positive or net negative impact on the security market (and why)?
IP network dependability matters in physical security and safety applications, given that a company’s assets and people are at risk. There have been strides in the areas of network dependability, fault-tolerance, reliability, and survivability. However, networks (or affordable ones, at any rate) still cannot ensure near-100 percent uptime, which is why system designers acknowledge and plan for the possibility of a network outage. We asked this week’s Expert Panel Roundtable: How can/should an IP networked system adapt when network connectivity is lost?
Sometimes customers expect more out of a security system. A brand new security system just doesn’t perform as the customer expected it would. In fact, one might argue that the many variables in today’s complex systems make it more likely than ever that some element of a system might not measure up to a customer’s expectations. What happens then? We asked this week’s Expert Panel Roundtable: What happens if a customer’s expectations of system performance are greater than what a physical security system can deliver?
How mobile telephones have transformed into “smartphones” is one of the great technology stories of our time. What once was a single-function device now can do almost anything – display video, pay for groceries, monitor our health. The smartphones we carry in our pockets today have more computing power than the “super computers” of yesteryear, and that power has found many uses in a seemingly endless array of “apps.” Some of them are directly related to our physical security systems. We asked this week’s Expert Panel Roundtable: What security applications are best suited to smartphone apps?
One of the benefits of newer IP systems is the ability to store video inside the camera or in a nearby digital video recorder (DVR) at the edge of the network. Edge-based storage is unlikely to take the place of centralized storage, but it is complementary and provides some interesting new options related to system design. We asked this week’s Expert Panel Roundtable: What is the value of edge-based storage and in what specific applications?
Healthcare organizations are an important vertical market for many security manufacturers and integrators. Like other vertical markets, healthcare has its own unique set of requirements and challenges for physical security systems. We asked this week’s Expert Panel: What are the distinctive security problems faced by healthcare organizations? What technologies are being embraced to increase security?
Software changes constantly. There’s always a new patch or fix, and our computers persistently remind us that an update is available. As a core component of today’s IP networked video systems, video management software (VMS) is also subject to the need to be constantly updated and refined. We asked our Expert Panel Roundtable to elaborate: Why is it important that networked video customers keep up to date with the latest version of video management software (VMS)?
College campuses often operate like small communities – or even like large communities depending on enrollment. Although each college and university campus is unique, there are commonalities such as a young and vulnerable population of students, many living away from their parents for the first time. Campuses can be urban or rural, geographically dispersed or densely populated, with a variety of demographics and “wild card” elements such as partying, drugs and alcohol. Campus police and security officers face a variety of challenging environments. Is it wise to add firearms to the mix? Is it necessary for campus police to be armed? Specifically, we asked this week’s Expert Panel: In what situations should college or university campus police be armed?
More and more physical security systems are being hosted in the cloud. But are cloud-based security systems “safe?” It’s a question being posed by risk-averse security professionals all over the world, and one for which a clear, concise answer may be difficult to find. We decided to pose it to our Expert Panel.
We asked this week’s Expert Panel: What are the limitations on where video cameras can be placed because of privacy? With hundreds of new cameras installed every day, the likelihood increases exponentially that a camera will be placed in a location where it violates privacy. In fact, threats to privacy are often among the largest objections when video surveillance is proposed, whether in a public area or in the workplace. Allaying fears about undermining privacy is a basic requirement to make such systems acceptable to the public. It’s a touchy subject, but one our Expert Panel is willing to address.
Articles by Larry Anderson
Video storage has been a challenge since the days of VCRs and videotape. Storing images is a central need for any video systems, especially one that is focused on the forensic and investigative aspects of video. Today, digital video is stored on hard drives and even in the cloud. Increasingly, video is considered “data” that drives a variety of video analytics and even artificial intelligence (AI) applications. We asked this week’s Expert Panel Roundtable: What are the new trends and opportunities in video storage?
Facial recognition is the latest technology to be targeted because of concerns about privacy. If such concerns cloud the public perception, they can be harmful to technology markets. Whether the concerns are genuine or based on misinformation is often beside the point; the practical damage has already been done. But beyond market demand, what is the impact of privacy concerns on technology innovation? We asked this week’s Expert Panel Roundtable: Are privacy concerns stifling innovation in security and related markets?
Historically, concerns about inclusion and diversity have not been widely discussed in the security market. In the last couple of years, however, the Security Industry Association (SIA) and other groups have worked to raise awareness around issues of diversity and inclusion. Specifically, SIA’s Women in Security Forum has focused on the growing role of women in all aspects of security, and SIA’s RISE community has focused on “rising stars” in an industry previously dominated by Baby Boomers. The next generation of security leaders There is a business case to be made for diversity and inclusion, says a report by McKinsey & Company. According to the management consulting company, gender-diverse companies are 24% more likely to outperform less diverse companies, and ethnically diverse companies are 33% more likely to outperform their less diverse counterparts. Furthermore, the “next generation of security leaders” – employees under 30 – are particularly focused on diversity and inclusion. Diversity refers to the traits and characteristics that make people unique A panel discussion at ISC West’s Virtual Event highlighted aspects of inclusion and diversity, starting with a definition of each. Diversity refers to the traits and characteristics that make people unique. On the other hand, inclusion refers to the behavior and social norms that ensure people feel welcome. “We are all on a journey, and our journey takes different paths,” said Willem Ryan of AlertEnterprise, one of the SIA panelists. “There are opportunities to improve over time. We can all change and increase our ability to have a positive impact.” Industry responsibility The industry has a responsibility to the next generation of industry leaders to address issues of inclusion and diversity. Forbes magazine says that millennials are more engaged at work when they believe their company fosters an inclusive culture. So the question becomes: How do we unify and create opportunities to work with and champion tomorrow’s leaders? SIA is driving change in our industry to achieve that goal. More women are active in SIA than ever before. The SIA Women in Security Forum now has 520 members, said Maureen Carlo of BCD International, the SIA Women in Security Forum Chair and another panelist. Also, more women than ever are chairing SIA committees and serving on the SIA Board of Directors. More women than ever are chairing SIA committees Overcoming unconscious bias Former SIA Chairman Scott Shafer of SMS Advisors, another of the panelists, noted that SIA awarded the Chairman’s Award to the Women in Security Forum in 2019, and to the RISE community steering committee in 2020. “There are lots of ways we are seeing the elevation of women and ethnic groups in the security industry,” said Shafer. One topic of interest is the problem of “unconscious bias,” which can be overcome by looking at something through some else’s lens. Ryan suggested use of the acronym SELF – Slow Down, Empathize, Learn, and Find commonalities. Ryan recalled the value of being mentored and having someone shepherd him around the industry. “Now I want to give back,” he said. “We need to look at the things we can change in ourselves, in our company, in our communities, and in our industry. Change comes from the bottom and the top.” Increasing representation “It takes all of us to increase representation everywhere,” said Kasia Hanson of Intel Corp., another panelist. “We have in common that we are all human beings. Let’s make sure the next generation all have opportunities.” Diverse companies can attract better talent Moving forward, the panelists urged the industry to get involved and create opportunities because inclusion drives diversity. Diverse companies can attract better talent and attain a competitive advantage. Awareness of unconscious bias, and working to eliminate it, is an important element of change. Despite the progress the security industry is making, change continues to be incremental. As Ruth Bader Ginsburg has said, “Real change, enduring change, happens one step at a time.”
John Wiegand died in 1986, but the communications protocol that bears his name is still alive and well, connecting access control readers to controllers using two wires – one to transmit “zeros” and the other to transmit “ones.” The Wiegand protocol persists despite its limitations, including one-way communication, lack of encryption, and inability to manage the readers in a system centrally. In a Wiegand system, a controller provides no acknowledgement that data has been received. Systems that still use the Wiegand protocol are performing below accepted industry standards and are vulnerable to over-the-counter exploits. A session at ISC West’s Virtual Event highlighted a replacement technology that solves those problems and expands the security, flexibility and functionality of systems. The technology is called OSDP (Open Supervised Device Protocol), which is now a standard managed by the Security Industry Association (SIA) and designated as an international standard by the International Electrotechnical Commission (IEC 60839-11-5). Aligning three components OSDP requires alignment of three critical components – the access control system, readers and controllers. The access control system, readers and controllers OSDP is an RS-485 protocol used to pass card format data from the reader to the controller. Like the Wiegand protocol, it uses two wires, but in this case one wire transmits data and the other receives data. Installation is simplified because no system needs more than four wires – two for OSDP communication and two more for power. In contrast, using Wiegand, additional wires are needed to add other capabilities – up to 8 or more wires in all. OSDP cable runs can extend up to 4,000 ft (compared to 500 feet for Wiegand). Resolving problems Therefore, unlike Wiegand, OSDP sends information in both directions and provides “supervision” of the readers. If there is a problem with a reader, such as a reader communication error or disconnect, that notification is sent back to the access control management system. OSDP also supports encryption for greater security, in effect enabling end-to-end encryption for a host system, controller, I/O modules, readers and credentials. That notification is sent back to the access control management system OSDP also provides additional capabilities, such as control of a reader’s LED and buzzer as well as sending text notifications and messages to compatible displays. Integrators and/or end users can also push configuration and firmware updates to readers all at once. Because OSDP is “open,” there are more third-party integrations and standardizations. OSDP is particularly valuable for U.S. government applications because it meets federal access control requirements such as PKI for FICAM. Wiring requirements Best practice dictates rewiring a project using RS-485 cabling. Specific wiring requirements are needed for OSDP, including 24 gauge (AWG) stranded cables that are a shielded twisted pair with 120 Ohm impedance and overall lower capacitance. However, especially for shorter cable runs, existing wire from Wiegand installations can sometimes suffice, say if it is a cable run of less than 100 ft. Installers should prove their competency before being deployed to an outside installation “Installation of OSDP is not hard, just different than field technicians are used to deploying,” said Tony Diodato of Cypress Integration Solutions, one of the ISC West presenters. Therefore, training of technicians is paramount, and installers should prove their competency before being deployed to an outside installation in order to avoid problems. Integrators or installing teams should have a “lab” setup to thoroughly familiarise themselves with installation to ensure successful deployments. Various in-line devices are available to help transition existing Wiegand applications to OSDP, even if one component or other does not support OSDP. For example, data converters enable installation of an OSDP reader with a legacy Wiegand control panel. Replacing existing devices in legacy Wiegand systems with OSDP devices and using data converters can provide some benefits of OSDP without requiring a full “rip-and-replace” installation.
Can a smart card be used securely for multiple applications (and among multiple companies)? End users are demanding such interoperability, and they also want openness to switch out their access control systems in the future without being “locked in” to one vendor. Those are the goals of the LEAF Identity consortium, a collection of companies that can share encrypted access codes for numerous applications to enable MIFARE DESFire EV2 chip cards to be used across multiple vendors. Smart card systems - more secure Almost everyone in the industry now knows that low-frequency (125 kHz) “prox” cards are not secure; in fact, low-cost cloning equipment is readily and inexpensively available. As the industry transitions to encrypted cards, challenges of interoperability persist. Keeping smart card systems more secure are encrypted “keys” – strings of 32 alphanumeric characters encoded onto the card chips. Information is exchanged via radio frequency (RF) in a challenge-response interaction when a card is presented to a reader. The most recent EV2 card enables one encrypted key to be used for up to 16 devices (and among a variety of manufacturers). LEAF consortium enables encryption sharing using protocols that ensure each manufacturer’s systems can interface with a card chip in the same way. Specifically, each card has a “shared data structure,” which means that the location of information is arranged on a card chip in a predictable and consistent manner. Member companies adhere to that structure in order to be interoperable using a single credential. There are no license fees or intellectual property rights involved. Secret key The approach involves a LEAF Custom Cryptographic (Cc), a “secret” key owned by the end user but managed by a third party. “When we present these concepts to integrators, they realize that, first, they need to get their clients to pay attention to the risks around proximity cards and to migrate to encrypted card technology,” says Laurie Aaron, Executive Vice President, WaveLynx Technologies Corp. “Then we explain the benefits of custom-owned keys and of the LEAF data structure. Then integrators can differentiate themselves by selling the value of the end user staying in control and having unlimited interoperability.” Access control manufacturer WaveLynx is implementing the LEAF concept, which is the brainchild of CEO Hugo Wendling, who saw the advantages of leveraging the ability of an EV2 chip card to authenticate access to multiple applications. Key management service WaveLynx set up the specification, maintains the website, and is involved when a manufacturer wants to become LEAF-enabled. They provide a key management service (for life) to end users based on LEAF capabilities. End users “own” the keys and can ask to share them with any other manufacturer. Sharing a key involves two key custodians (engineers), each of whom only has access to half of the encrypted key in order to keep it secure. Combining capabilities The LEAF consortium provides a way for smaller manufacturers to work together to increase their market share without putting anyone’s intellectual property at risk. Working together, smaller manufacturers can assemble systems to compete more effectively with larger manufacturers. In effect, they combine their capabilities rather than compete. LEAF Consortium partners include Allegion, ASSA ABLOY, Brivo, Eline by DIRAK, Linxens, RFIDeas, and Telaeris. Biometric partners include Idemia and IrisID. Biometric devices may either store their biometric on the card or on a central database and access it through the badge number. The LEAF standard continues to evolve in terms of where a biometric template is stored on the chip. Although the standard does not currently offer mobile credentials, mobile functionality will be available by the second quarter of 2021 (or sooner).
Should security spending be a one-time capital expense or as an ongoing operating expense? At first glance, the question appears to be an accounting issue with little impact on the actual equipment or systems involved. However, as security professionals seek to cost-justify new systems, the question may be central to providing the “best security for the money” and a system that fits the company’s continuing needs. We asked this week’s Expert Panel Roundtable: Should security be a capital expense (CAPEX) or an operating expense (OPEX)? Is the trend shifting and what is the impact?
Facial recognition is becoming more popular in newer systems for access control — a shift that began before the pandemic and has intensified with a market shift toward “touchless” systems. A new facial recognition platform is emerging that responds to the access control industry’s increased interest in facial recognition by expanding the concept with a new higher level of technology. At the core of the new system is high-performance, true-3D sensing with facial depth map processing at low power consumption, which enriches the capabilities of small-footprint access control devices. New proficiencies include anti-spoofing (preventing the use of a 2D photo of an authorized user to gain entry) and anti-tailgating (preventing an unauthorized person from gaining entry by following an authorized user) in real time and in challenging lighting conditions. The system uses “true 3D sensing,” which incorporates single-camera structured-light 3D sensing—as opposed to dual-camera depth sensing or IR video imaging-based approaches. AI vision processing and 3D sensing technologies The new “Janus reference design” incorporates AI vision processing, 3D sensing technologies, and RGB-IR CMOS image sensor technologies from Ambarella, Lumentum and ON Semiconductor. Specifically, Lumentum’s high-reliability, high-density VCSEL projector for 3D sensing combines with ON Semiconductor’s RGB-IR CMOS image sensor and Ambarella’s powerful AI vision system on chip (SoC). The Ambarella, Lumentum, and ON Semiconductor engineering teams worked together to incorporate their complementary technologies into the reference design. A reference design offers OEM product and engineering teams a fully functional engineering reference implementation that they can use as the basis for their own product. Teams will often customize a reference design with their choice of various third-party hardware components to fit their product specifications and positioning. They might also integrate their own software, algorithms, and back-end system integrations. The advantage to this approach is that the manufacturer can get to market quickly with a next-generation product that emphasises their core strengths. 3D depth information for facial recognition Generally, it takes between nine months and a year for a manufacturer to get to market using a fully functional reference design, such as the one developed jointly by Ambarella, Lumentum and ON Semiconductor. The Janus platform leverages 3D depth information generated via structured light for facial recognition with a >99% recognition accuracy rate. Traditional 2D-based solutions are prone to false acceptance and presentation attacks, whereas 3D sensing delivers advanced security—just as mobile phones use true-depth cameras for facial recognition. 3D facial recognition also significantly reduces the gender and ethnic biases demonstrated by some 2D facial recognition solutions. The Janus reference design is also aimed at future smart locks for enterprise and residential use: its unique single-camera 3D sensing solution will help OEMs overcome cost and manufacturability barriers, while the ultra-low power edge AI capability can effectively extend the battery life, which in turn reduces maintenance cost. Video security and access control Ambarella sees touchless access control, as well as the convergence of video security and access control, as the mega-trends driving industry innovation and growth—using video, computer vision, and 3D sensing to not only address safety and security, but also to improve the user experience and public health, says William Xu, director of marketing for Ambarella. The convergence of video security cameras and access control readers has been widely discussed by leading access control OEMs. In many cases, they already integrate video security cameras, readers, door controllers, cloud-access, and the like. In most enterprise installations, one would typically find security cameras installed where there are access control readers. Combining the two devices significantly reduces the maintenance cost and system complexity. “In comparison to fingerprint or other contact-based approaches, Janus-based access control is touchless—requiring no physical contact with authentication hardware such as fingerprint sensors or keypads—reducing infection risk while enabling a seamless experience,” says Mr. Xu. “The Janus platform provides true 3D depth information to prevent unauthorized individuals from mimicking legitimate users, and the advanced embedded AI processor enables tracking and anti-tailgating algorithms. Janus-based devices perform well in challenging lighting conditions and they are capable of authenticating multiple users simultaneously, with imperceptible latency.” Access Control and public health What was once purely a security challenge—namely, how to prevent unauthorized entry into a restricted area—has evolved into a public health challenge as well. Many traditional access control methods, from number pads to fingerprint readers, require touch in order to function, and if the current global pandemic has made one thing evident, it’s that minimizing physical contact between users and surfaces is vital to community well-being. Janus was originally designed to facilitate the next generation of facial-recognition-based access control readers—enabling 3D sensing and high recognition speed for seamless authentication. COVID-19 has accelerated industry-wide research, development, and timelines for Janus-based solutions, says Mr. Xu. Deep learning and artificial intelligence drive all the new capabilities offered in Janus—capabilities that are only possible due to the platform’s high computational horsepower. The core deep learning and AI capabilities of Janus enable a wide range of advanced features only possible with an embedded vision SoC, says Mr. Xu. All are performed in real time, even when multiple users are being processed simultaneously. These include the extraction and comparison of facial depth maps with those registered in the system; 3D liveness detection, ensuring that the system can distinguish between real users and photo or video playback attacks; anti-tailgating, which relies on computer vision algorithms to detect and track when an unauthorized person follows a legitimate user inside; face mask detection; and people counting. VCSEL technology According to Ken Huang, Director of Product Line Management, 3D Sensing, Lumentum: “Lumentum’s VCSEL technology is one of the Janus design’s core strengths and differentiators. The process begins when Lumentum’s high-resolution dot projector projects thousands of dots onto the scene to create a unique 3D depth pattern of a user’s face. Most traditional biometric facial security systems rely on 2D images of users—simple photographs—which reduces authentication accuracy. In contrast, the 3D depth map generated by Lumentum’s technology provides the foundation of a more accurate, more secure, and more intelligent system overall. In addition, Lumentum’s VCSEL solutions incorporate a Class 1, eye-safe laser with zero field failures to date.” Adds Paige Peng, Product Marketing Manager, Commercial Sensing Division, ON Semiconductor: “If we think of Ambarella’s CV25 as the brain of the Janus design, the AR0237IR from ON Semiconductor is the eye. The AR0237IR image sensor captures the information, and the CV25 processes it. Other face recognition systems use two “eyes” – one to recognize RGB patterns to generate the viewing image stream, and another IR module to detect liveliness in motion. The Janus solution leverages a single “eye”—the AR0237IR—to obtain both visible and infrared images for depth sensing and advanced algorithms such as anti-spoofing and 3D recognition. AR0237IR also provides good sensitivity in various lighting conditions and supports high-dynamic-range (HDR) functions.” The single-camera 3D sensing solution for access control operates in three seamless steps: Step 1: Lumentum’s high-resolution dot projector creates a unique 3D depth map of a user’s face; Step 2: ON Semiconductor’s RGB-IR image sensor captures the high-resolution images from Step 1, even in low-light or high dynamic range conditions; Step 3: Ambarella’s advanced vision SoC takes the high-resolution images captured in Step 2 and uses deep neural networks (DNNs) for depth processing, facial recognition, anti-tailgating, and anti-spoofing while video encoding and network software run simultaneously.
Traditionally, security industry professionals have often come from backgrounds in law enforcement or the military. However, the industry is changing, and today’s security professionals can benefit from a variety of backgrounds and educational disciplines. The industry’s emphasis on technology solutions suggests a need for more students of computer science, engineering and other technology fields. The closer integration of security with related disciplines within the enterprise suggests a need to prepare through a broad array of educational pursuits. We asked this week’s Expert Panel Roundtable: What is the role of higher education to create the next generation of physical security leaders?
For most security end users, keeping all their data on the premises “feels” more secure. But in the age of Internet connectivity, that feeling of safety is mostly an illusion. In any case, increasingly, video and other security systems are migrating to the cloud. So are most other business IT systems for that matter. However, when “security” is in your job title, it becomes that much more important to ensure that data is reliably protected. We asked this week’s Expert Panel Roundtable: Are cloud-based security systems more or less secure than on-premise systems? How and why?
For several decades, Baby Boomers represented the largest sector of employees in the physical security market. However, these security professionals born between 1946 and 1964 are now nearing retirement – or have already retired. How will the security market change as the next generations step up to make their contributions? We asked this week’s Expert Panel Roundtable: As Baby Boomers approach retirement age, what are the positives and negatives in the physical security market?
Trade shows have always been a basic element of how the security industry does business - until the year 2020, that is. This year has seen the total collapse of the trade show model as a means of bringing buyers and sellers face to face. The COVID-19 pandemic has effectively made the idea of a large trade show out of the question. Today, even air travel seems incredibly risky, or at minimum a huge hassle. The good news is that the industry has adapted well without the shows. A series of “on-line shows” has emerged, driven by the business world’s increasing dependence on Zoom and other video conferencing platforms. The fact is, 2020 has provided plenty of opportunities for sellers to connect with buyers. It’s easy to dismiss these sessions as “Death by PowerPoint,” but some of them are incredibly informative. And conveniently accessible from the comfort of a home office. Internet transforming businesses We have already seen how the online world makes it easier than ever to connect with customers. In the consumer space, businesses like Uber, Shopify and Airbnb have proven that the Internet can transform how business is done. But in the security industry, we hear: “You can’t replace the value of meeting face to face.” That’s definitely true to some degree. A lesson of 2020 is the need to take a hard look at the economic model of trade shows However, the reality of 2020 suggests that there are alternatives that are almost - emphasis on almost - as good. And that don’t cost as much. And that don’t take away as much time from the office. And that don’t involve the effort of schlepping luggage through an airport yet again to a hotel in a beautiful city you will never see where you will spend three days in a big exhibit hall eating overpriced hot dogs and regretting your choice of footwear. Economic model of trade shows Sure, you’ll meet up with old pals, and get some value out of the experience. But how much value versus the cost? A lesson of 2020 is the need to take a hard look at the economic model of trade shows - how much they cost versus the value they provide. Considering how well we have gotten along without them, one wonders how and why trade shows have become such an integral part of our industry, and of hundreds of other industries, for that matter. I have had many conversations with exhibitors at trade shows in the last several decades. I have heard probably thousands of complaints about the slowness of the foot traffic, the high costs of exhibiting, the price and hassles of travel. The question I have often wondered (and asked): Is it worth it? Defray the costs Usually, the complaining exhibitor will reluctantly admit that it is, and/or provide some other justification, such as one of the following: All my competitors are here. If I don’t exhibit, it sends the wrong message to the market. That’s why I need to have the largest booth near the front of the show, too, because it’s all about perception and positioning ourselves in the market. We need the show for the sales leads, which drive our sales for the next six months. If I meet one large end user who turns into a big sale, the extra revenue pays for it all and makes everything worthwhile. This is the only time I get to see my sales staff or other coworkers from around the country. We have a sales meeting this week, too, so it helps to defray the costs. Success of alternatives The realities of 2020, and the challenges to the business world, will impact the nature of commerce for years to come Given the experience of the year 2020 without any trade shows, might some of these justifications melt away? At a minimum, companies will be taking a hard look next year to evaluate what they missed about the trade show experience, and more importantly, what the impact was on their business (if any). What is the future of trade shows? After the 2020 hiatus, exhibitors and attendees alike will be starting with a clean slate, taking a fresh look, reexamining the value proposition with new eyes, braced by the successes (while acknowledging the failures) of alternatives that emerged as necessities during a global pandemic. Ensuring safety and security The realities of 2020, and the challenges to the business world, will impact the nature of commerce for years to come - including trade shows. During the pandemic, we have all had to reinvent ourselves, deploy new strategies, work around new challenges, and in the end, hopefully, emerge better for it. There’s no reason trade shows shouldn’t undergo the same transformation. And it’s likely the “new normal” could look very different. The security market has found new opportunities during the pandemic, including new applications for existing technology and a renewed emphasis on the importance of ensuring safety and security. That positivity will hopefully carry our industry triumphantly into the new decade, and trade shows will adapt to find their place in the newly revitalized industry. As it should be.
School shootings are a high-profile reminder of the need for the highest levels of security at our schools and education facilities. Increasingly, a remedy to boost the security at schools is to use more technology. However, no technology is a panacea, and ongoing violence and other threats at our schools suggest some level of failure. We asked this week’s Expert Panel Roundtable: How have security solutions failed our schools and what is the solution?
The COVID-19 global pandemic continues, and more and more companies are looking for ways to continue (or resume) operations while minimizing the coronavirus’s negative impact on their workforce, or potentially contributing to disease spread among the wider population. Thermal cameras have been proposed as a solution to screen individuals for elevated body temperature since the beginning of the pandemic. However, the technology has its detractors, and there are regulatory questions. We asked this week’s Expert Panel Roundtable: How can thermal cameras be used effectively for fever detection to screen for infectious diseases?
Ethics are an important – but some might argue, undervalued – aspect of the security marketplace. To kindle the industry’s interest in ethics, the Security Industry Association (SIA) in early 2019 created a working group on Ethics in Security Technology. The working group developed a list of ethical principles, which were approved by the organization’s Executive Committee and Board of Directors and became the SIA Membership Code of Ethics. SIA member companies must adhere to the Code of Ethics, and there are consequences of noncompliance, up to and including possible expulsion from the organization. In addition to adopting the Code of Ethics, the Board of Directors have revised the organization’s bylaws to require that members read, understand and adhere to the Code of Ethics as a condition of SIA membership. Navigating issues “SIA wanted to be proactive on this and give members resources to navigate day-to-day issues,” said Ron Hawkins, SIA Director of Industry Relations. He notes that the Code is intentionally written broadly to be applied to a range in cases, and to provide SIA leaders with latitude making decisions. Current members will be required to adhere to the code when they renew their membership Current members will be required to adhere to the code when they renew their membership, which will be sometime during 2020 or in the first half of 2021, depending on when a member joined (for a one-year term). If there is an ethics-related complaint or an issue with a member company, the matter is considered by SIA leadership, which will review the concerns and ask the member company to respond. The resulting judgment might be a written notice/warning, a suspension of membership or expulsion. Enforcement of the Code of Ethics might be triggered by media coverage, government announcements, or written complaints submitted to the SIA Executive Committee. Handling complaints Hawkins emphasises that each complaint will be handled by the Executive Committee and full Board of Directors on a case-by-case basis to address anything not specified in the principles, which focus on requirements rather than consequences. Hawkins says it would be unlikely that any public announcement would be made about enforcement of the Code unless or until a member company were expelled. Since the Code of Ethics took effect on July 1, 2020, SIA has not taken any action on any member company. Any issue with any current member would be addressed on their membership renewal date, Hawkins said. The code applies to all SIA member companies, both manufacturer companies (which make up more than half of the membership) as well as to integrators, service providers, distributors and other member companies. Act with honesty, integrity and transparency Among the principles in the Code of Ethics are requirements to act with honesty, integrity and transparency, and to avoid fraudulent or misleading business practices. Marketing materials must be accurate. Sustainability and environmental impacts of products and services must be considered. The Code also opposes prejudice, harassment and abuse in the workplace The Code also opposes prejudice, harassment and abuse in the workplace. SIA companies should work with law enforcement to enhance public safety while respecting expectations of privacy. Cybersecurity risks should be monitored and mitigated “as much as reasonably possible, according to industry best practices.” Products, services and solutions should not be designed or manufactured in a manner as to “surreptitiously transmit information to third parties.” Finally, the principles require SIA member companies not to “knowingly” design, manufacture, sell or deploy products that have been deemed by any government authority or self-regulatory entity to “support the infliction of human rights abuses, the restrictions of civil liberties, and/or the implementation of other oppressive measures.” Hawkins says that the interpretation of “knowingly” would be made by SIA leaders. Why does the industry need The Code of Ethics? He would not comment on whether the Code of Ethics applies to activities by global companies that do not involve that company’s U.S. subsidiary (which is a SIA member). Such details would be decided on a case-by-case basis by the SIA Board of Directors, he said. The Code of Ethics is needed in part because the security industry impacts important issues for society at large, from privacy to civil liberties to national security. The Code of Ethics is needed in part because the security industry impacts important issues for society “Everywhere you go, you encounter security technologies, such as video cameras in public places,” says Hawkins. “Even if someone is not a purchaser or user of security technology, they will encounter it every day. So security is in a unique position because of its reach beyond the people who buy and use it, and it requires consideration of issues such as civil liberties and privacy.” Hawkins notes that the SIA Board of Directors already has its own “Code of Ethics” which directs how board members perform their duties, such as abstaining from a decision that might involve a competitor.
Serving customer needs is the goal of most commerce in the physical security market. Understanding those needs requires communication and nuance, and there are sometimes surprises along the way. But in every surprising revelation – and in every customer interaction – there is opportunity to learn something valuable that can help to serve the next customer’s needs more effectively. We asked this week’s Expert Panel Roundtable: What was the best lesson you ever learned from a security end user customer?
New software developments have dominated technology innovation in the physical security industry for years, making more things possible to the benefit of integrators and end users. However, hardware is another important piece of the puzzle. No matter how great your software, the system doesn’t perform unless the hardware works too. In our enthusiasm over software developments, let’s not overlook the latest in the hardware world. We asked this week’s Expert Panel Roundtable: How do hardware improvements drive better physical security?
If one employee stands less than six feet away from another employee, a fob attached to a lanyard around his or her neck emits an auditory beep – an immediate reminder to observe social distancing. If an employee were to be diagnosed with COVID-19, a cloud-based database provides a record of who at the company the sick employee had contact with. These capabilities of HID Location Services ensure social distancing and provide contact tracing to enable companies to return to work safely. They have been deployed in a pilot program at HID Global’s Corporate Headquarters in Austin, Texas. Social distancing using a BLE beacon To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. The building area covered by each reader constitutes a “zone,” and the system records when two beacons are signaling from the same zone, which indicates contact between employees. In effect, the system records – historically and forensically – who was near whom (and for how long) using the zone-based approach. “In the workplace, we provide organizations with visibility into the location of their workforce,” says Mark Robinton, Vice President, IoT Services Business Unit at HID Global. Pilot program spans variety of environments By documenting where a sick individual moved in the building, the system also can guide any need to close off a certain area for deep cleaning. Instead of quarantining a whole building, a company could quarantine a small subset of employees who were likely exposed. Importantly, the system only reports data, while management makes the actual decisions about how to respond. The site of the pilot program is the 250,000-square-foot HID Global facility in Austin, which includes a variety of environments, including manufacturing areas, an executive suite, cubicles, a training area, a cafeteria, and lobbies. This spectrum of use cases enables the pilot program to evaluate how the system works in various scenarios. The building in Austin has two floors, plenty of natural lighting and emphasises sustainability in its design. HID Location Services ensure social distancing and provide contact tracing Pilot starts small and expands For the pilot program, 80 readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. The fobs emit an audible beep, which employees have overwhelmingly said they prefer. Observers overseeing the pilot program have documented employee reaction and comments. It emits a blinking LED light, which can be seen by the offending co-worker There were challenges in setting up the pilot program remotely to ensure fewer employees were on site during the pandemic. The equipment was provisioned in Florida and then shipped to the Austin location. Fine-tuning was required to adjust the signal strength of the BLE beacons. The badges were initially more powerful, but the strength was dialed back to be comparable to the fobs and within the six-foot social distancing range. Signal strength is also a variable in diverse environments – the 2.4 Ghz signal tends to reflect easily off metal, so adjustments in signal strength are needed in a factory setting, for example, versus a collection of cubicles. “This facility is large enough and diverse enough that it provides great test results and quality data to analyze,” says Dean Young, Physical Security Manager at HID Global. “Our employees are eager to be part of the pilot to demonstrate that we use the technologies we provide to our customers, and they want to help us stay in compliance with social distancing and contact tracing.” Ensuring privacy while protecting employees HID Global’s headquarters had approximately 425 employees before the coronavirus pandemic lowered the number drastically to include only essential workers. As more people return to work, additional fobs and badges are being issued to expand the scope of the pilot program. The program is also incorporating contact tracing of suppliers and others who visit the facility. Except when triggered by contact among employees, locations are not recorded. Each employee’s location is always available in real-time (e.g. in case of an emergency), but they are not “tracked.” Through BluFi placement and geofence capabilities, the system closes off private areas where location should not be monitored, such as a rest room. Geofencing also identifies when employees enter and/or exit the area covered by the pilot program. Although each beacon is associated with an employee, the employee’s identity is not part of the data stored in the cloud, so there are no privacy concerns. Data is completely anonymized, and no personally identifiable information (PII) is stored in Bluzone. Other computer systems in a company, such as a human resources (HR) program, can privately and securely store the identities associated with each beacon. Other applications for HID location services In addition to social distancing and contact tracing applications, HID Location Services offer other use cases ranging from asset tracking and employee safety/security to location analytics. For example, the system can analyze room usage for better building management and operational efficiency. It can also quickly find people in emergency situations. These use cases ensure continued value for a system even after concerns about social distancing and contact tracing have faded. The system can analyze room usage for better building management and operational efficiency Another big selling point is the ability of a company to be better prepared in case of a future pandemic, or a second wave of this one, says Robinton. The HID Location Services social distancing and contact tracing applications will be available at the end of Q3 and will be rolled out through HID Global’s existing integrator channel. Vertical markets likely to embrace the technology include healthcare, where hospitals need to track patients as they come in and to know which other patients or staff they may have been exposed to. The financial sector is another likely market, as is manufacturing, which is looking to avoid the prospect of shutting down an entire plant. It’s better to address the three or four people who were near a sick employee than to shut down the plant. In the hospitality industry, fobs can be used to signal duress by the housekeeping staff.
Dark video images contain little or no information about the subject being surveilled. Absence of light can make it difficult to see a face, or to distinguish the color of clothing or of an automobile. Adding light to a scene is one solution, but there are also new technologies that empower modern video cameras to see better in any light. We asked this week’s Expert Panel Roundtable: What impact does lighting have on the performance of video systems?
Artificial intelligence (AI) and machine learning have made a big splash in the physical security market, transforming video analytics to a new level of accuracy. In fact, the terms have become common buzzwords throughout the industry. However, the potential for AI and machine learning to impact the physical security industry goes far beyond their ability to improve video analytics. We asked this week’s Expert Panel Roundtable: Beyond better video analytics, how can artificial intelligence (AI) and/or machine learning benefit the physical security market?
The advent of a truly new market for the physical security industry is a rare occurrence. Particularly rare is a new market that is both fast-growing and provides an environment that is not just conducive to application of physical security technologies but that actually demands it. Such is the case with the market for legalized marijuana. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting the cannabis industry?
A standard is a document that establishes uniform engineering or technical criteria, methods, processes, and/or practices. Standards surround every aspect of our business. For example, the physical security marketplace is impacted by industry standards, national and international standards, quality standards, building codes and even environmental standards, to name just a few. We asked this week’s Expert Panel Roundtable: How have standards changed the security market as we know it?
One of the common characteristics of trade shows is booths with walls and walls of new products. Sometimes exhibitors seem intent on displaying everything in their portfolio, even though the displays appear cluttered and may not be welcoming. In an age of system sales, in particular, the emphasis on products can seem off kilter. Discussions with exhibitors at this year’s GSX show reveal a new awareness of the need for less cluttered booths, but the equipment walls persist. Here’s a review of Day 2 from the show floor. Allegion embraces more open booth design At GSX 2019, Allegion is among the exhibitors embracing a new, more open booth design that encourages engagement with customers and puts less emphasis on product displays. Discussions at the Allegion booth have centered around the value proposition and lower complexity of network-connected access control systems. The approach has been gaining a higher profile at Allegion since the company acquired Isonas, whose system configuration involves a reader-controller connected to the network via power-over-Ethernet cable. “Customers are also asking about Bluetooth technology and mobile applications,” said Jonathan Mooney, Allegion sales leader. Allegion is looking to deploy the Isonas software in other products in their portfolio; it will be offered in the range of Schlage wireless locks by the middle of 2020.The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control" “The benefit of the cloud and network is to remove a lot of complexity and unnecessary costs for access control,” said Mooney. Bosch offers complete security solution Bosch is introducing 55 new products at GSX 2019, but when it comes down to it, the company’s overarching message is not about individual products but about how they can be combined into a larger system. “At the end of the day, the message from Bosch is ‘how do I create a complete security solution?’” said Paul Garms, Bosch Director, Regional Marketing Security. “That’s what we are trying to demonstrate: How do all these things integrate?” Most of interest to attendees are actual demonstrations, which are a unique aspect of the trade show experience. “It’s nice at a show where we can really demonstrate what we are talking about when we say ‘integrated solution,’” said Garms. “And people can say, ‘oh yeah, if I trip this video analytic, the speaker will warn me I am approaching a restricted area.’ Or, when the manager signs in on the intrusion panel, now the associate can access a door he wasn’t able to before. It’s that integration and the complete solution that resonates. People are also interested in new products. At a show, they like to see them in operation.” At the Bosch booth, there is a big wall that illustrates some integration possibilities. An array of cameras was among the 55 new products introduced by Bosch, which also emphasized systems. Machine learning and advanced video analytics One implementation featured on the wall is Bosch’s Camera Trainer machine learning system. The system can “train” a camera to recognize a car in a parking lot, for example. Among the new Bosch products is the Autodome 7000i, the next generation of a best-selling camera, now with H.265 encoding and analytics such as line crossing. There is also an outdoor panoramic camera that is adjustable to 180-degree or 360-degree views. The new, less expensive 3000i series cameras provide an affordable option with edge analytics and Bosch’s data security protection included. Integration from Honeywell as well as 'the big picture' At Honeywell Security Group, Senior Product Manager G. Eric Green said the show seems to be much better attended than last year, “and we have had a lot of interest in our products.” Even end-user attendees typical of the GSX show are interested in the details of technology, as well as “the bigger picture,” commented Green. “Some of our booth visitors want to get into the weeds,” he said. “They say they want this piece of hardware. But they also also interested in the big picture. How things are interacting is very important.”Honeywell announced the 30 Series IP cameras, which can be used as part of video systems that comply with National Defense Authorization Act Section 889" “Most customers have installed products from other vendors that they expect us to work with. So integration is always at the top of the list. Can you work with these guys? Do you have an API? Do you support this piece of equipment? We always hear that a lot,” said Green. “There are customers who want best-in-breed products, but they’re not necessarily concerned about that coming from one manufacturer,” he said. “Other customers want ‘one throat to choke.’ When something goes wrong, they don’t want any finger-pointing.” Web-based security console and frictionless access control Honeywell is showing a beta version of its Pro-Watch 5.0 product, which is coming out in Q1 next year. It is an integrated security console that provides a map view of access control, video management, intrusion and other third party systems. The web-based platform offers access to each element, all controlled by permissions. “We are also building in an incident workflow engine that allows an operator to see exactly what steps he should take when something occurs as defined by the supervisor or a security director,” said Green. “It can literally walk you through, and it is completely freeform. Whatever you want it to say, it will say. This works in conjunction with access control, video, and all the things we talk to.” The Honeywell booth was a busy place on day two of GSX 2019 Another new Honeywell product is the OmniAssure Touch reader, a “frictionless” device that can read a credential off a smart phone in a user’s pocket. The user merely touches the reader, and it scans the area for a nearby mobile device that is authorized, and you can walk through the door. Honeywell also announced the 30 Series IP cameras, which are encrypted and can be used as part of video systems that comply with National Defense Authorization Act Section 889. They are made in Taiwan. Arcules' cloud security solution “There are fewer people here at GSX 2019, but we have seen a lot of really big companies looking for a cloud service,” said Andreas Pettersson, CEO of cloud video company Arcules. At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive: They say “we want to move to the cloud.” Pettersson theorized that concerns about a possible weakening economy may prompt some companies to avoid the large capital expenditure of procuring a new on-premise system and instead opt for the minimal investment needed for a cloud system. Monthly operating expenses of a cloud system are also predictable and more easily managed, said Pettersson.At previous shows, questions about the cloud often seemed out of curiosity. Now, potential customers are more decisive Arcules is proactive on the subject of cybersecurity and has a two-page handout that summarizes the cybersecurity advantages of their system. They are eager to talk about cybersecurity as it relates to cloud systems, said Pettersson. He said that, in his experience, on-premise systems tend to have more cybersecurity issues, whether because ports are left open or a firewall is implemented incorrectly. Users may also seek to bypass the firewall — a dangerous practice that is not an option with cloud systems. Security patches may not have been implemented; in a cloud system, such updates are pushed out automatically. The recurring monthly revenue (RMR) aspect of cloud systems are a windfall to integrators who embrace the cloud. “One integrator said he went on vacation for the first time in years because he had the extra money coming in,” said Pettersson. Control room integration from Vistacom "We're still fairly new to GSX, as our first show was 5 years ago, but what we have noticed is that the show continues to attract valuable attendees and drive critical conversations around what companies like ours must bring to the table in order to be successful in this space," said Dan Gundry, Director of Sales and Marketing, Vistacom. "We've had so many chances to learn from and share with potential customers and partners, and as a result, we continue to forge great relationships.” Vistacom is highlighting its control room integration and the value enterprise organizations can gain from implementing one in their facility. The company works alongside end-user customers and security integrators to build a command center space, taking into account video wall display technology, operator consoles and furniture, audio and lighting considerations, as well as temperature and more, in an effort to optimize these centers. Stay tuned for the full GSX 2019 show review.
As editor of SecurityInformed.com, Larry attends industry and corporate events, interviews security leaders and contributes original editorial content to the sites. He also guides the "editorial roadmap" to ensure the site provides the most relevant content for security professionals. From 1996 to 2008, Larry was editor of "Access Control & Security Systems" magazine and its affiliated websites. He earned a Bachelor of Arts from Georgia State University with a minor in marketing. [Pictured: Larry and wife Linda relax with SecurityInformed.com's loyal office dog, Frankie] How did you come to work in the security industry? I started in the newspaper business and then migrated to trade publishing. I realized that every profession has its own journalism microcosm, so I learned a lot about robotics and paint and adhesives before I landed in the security field. That was around 1996, and security has been the center of my professional life, and a subject of continuing fascination ever since. What is the best professional advice you have ever received? I never met the man, but a famous quote from Woody Allen is something like "80 percent of life is showing up." I find that comforting. Showing up is something I can do. And knowing that I am already 80 percent successful at the get-go has provided extra confidence in a lot of situations over the years. Quick Facts Favorite TV show Comedians in Cars Getting Coffee First job McDonald's crew member Tea or coffee Neither: Diet Coke Best gift you received Dance lessons from my wife Last thing you cooked Grilled Cheese What's something few people know about you? Several years ago, after ISC West, I was killing time at the Wynn casino before going to the airport. I had put my last few dollars in a “Red White and Blue” slot machine, and I won the “mini-progressive” – more than $6,000! Having the lady count those $100 bills into my hand is a great memory of ISC West. What's the most rewarding thing about what you do for a living? I get to hear people talk every day about something they are passionate about. I get to learn from really smart people about interesting subjects that actually matter in the world. Jekyll Island on the Georgia coast is Larry Anderson's go-to destination for a relaxing week every summer What are your interests, hobbies and passions outside security? Books, including “literary” fiction, whodunits and lawyer novels. I tend to binge-watch television on demand while on the treadmill at the gym – which takes away the guilt. My wife Linda and I go to the movies a couple of times a month. Where was your last vacation? Jekyll Island on the Georgia coast is our go-to destination for a relaxing week every summer for the last 20 years. They have houses you can rent for the week, beautiful nature walks and bike trails, huge trees draped with Spanish moss, and a smattering of history – it was where millionaires like J.P. Morgan and William Rockefeller retreated to their 25-room “cottages” in the early 1900s. There’s plenty to see and do – or not to do if so inclined!
If you’ve been paying attention over the last twelve months, you will have noticed that deep learning techniques and artificial intelligence (AI) are making waves in the physical security market, with manufacturers eagerly adopting these buzzwords at the industry's biggest trade shows. With all the hype, security professionals are curious to know what these terms really mean, and how these technologies can boost real-world security system performance. The growing number of applications of deep learning technology and AI in physical security is a clear indication that these are more than a passing fad. This review of some of our most comprehensive articles on these topics shows that AI is an all-pervasive trend that the physical security industry will do well to embrace quickly. Here, we examine the opportunities that artificial intelligence presents for smart security applications, and look back at how some of the leading security companies are adapting to respond to rapidly-changing expectations: What Is Deep Learning Technology? Machine Learning involves collecting large amounts of data related to a problem, training a model using this data and employing this model to process new data. Recently, there have been huge advances in a branch of Machine Learning called Deep Learning. This describes a family of algorithms based on neural networks. These algorithms are able to learn efficiently from example, and subsequently apply this learning to new data. Here, Zvika Ashani explains how deep learning technology can boost video surveillance systems. Relationship Between Deep Learning And Artificial Intelligence With deep learning, you can show a computer many different images and it will "learn" to distinguish the differences. This is the "training" phase. After the neural network learns about the data, it can then use "inference" to interpret new data based on what it has learned. For example, if it has seen enough cats before, the system will know when a new image is a cat. In effect, the system “learns” by looking at lots of data to achieve artificial intelligence (AI). Larry Anderson explores how new computer hardware - the Graphic Processing Unit (GPU) – is making artificial intelligence accessible to the security industry. Improving Surveillance Efficiency And Accuracy With AI Larry Anderson explains how the latest technologies from Neurala and Motorola will enable the addition of AI to existing products, changing an existing solution from a passive sensor to a device that is “active in its thinking.” The technology is already being added to existing Motorola body-worn-cameras to enable police officers to more efficiently search for objects or persons of interest. In surveillance applications, AI could eliminate the need for humans to do repetitive or boring work, such as look at hours of video footage. Intelligent Security Systems Overcome Smart City Surveillance Challenges AI technology is expected to answer the pressing industry questions of how to use Big Data effectively and make a return on the investment in expensive storage, while maintaining (or even lowering) human capital costs. However, until recently, these expectations have been limited by factors such as a limited ability to learn, and high ongoing costs. Zvika Ashani examines how these challenges are being met and overcome, making artificial intelligence the standard in Smart City surveillance deployments. Combining AI And Robotics To Enhance Security Operations With the abilities afforded by AI, robots can navigate any designated area autonomously to keep an eye out for suspicious behavior or alert first responders to those who may need aid. This also means that fewer law enforcement and/or security personnel will have be pulled from surrounding areas. While drones still require a human operator to chart their flight paths, the evolution of artificial intelligence (AI) is increasing the capabilities of these machines to work autonomously, says Steve Reinharz. Future Of Artificial Intelligence In The Security Industry Contributors to SourceSecurity.com have been eager to embrace artificial intelligence and its ability to make video analytics more accurate and effective. Manufacturers predicted that deep learning technology could provide unprecedented insight into human behaviour, allowing video systems to more accurately monitor and predict crime. They also noted how cloud-based systems hold an advantage for deep learning video analytics. All in all, manufacturers are hoping that AI will provide scalable solutions across a range of vertical markets.
Our most popular articles in 2017 reflected changing trends in the U.S. security market, from deep learning to protection of mobile workers, from building automation to robotics. Again in 2017, the most read articles tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 most-clicked articles we posted in 2017. They are listed in order here with the author’s name and a brief excerpt. 1. Las Vegas Massacre Demands Reevaluation of Hospitality Sector Security The Oct. 1, 2017, sniper attack from a 32nd-floor room at Mandalay Bay, overlooking 22,000 people attending a country music festival, has been compared to “shooting fish in a barrel.” When the bullets rained down, there was nowhere to hide. The attack came from outside the “perimeter” of the event, so any additional screening of attendees would not have prevented it. There are also implications of the Las Vegas massacre for the hospitality industry. Hotels and resorts such as Mandalay Bay have not generally embraced technologies like the explosives scanners or X-ray machines used at airport terminals, at least not in the United States. 2. Deep Learning Algorithms Broaden the Scope of Video Analytics [Zvika Ashani] Until recently there have been minimal applications of Machine Learning used in video analytics products, largely due to high complexity and high resource usage, which made such products too costly for mainstream deployment. However, the last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning. The recent increased interest in Deep Learning is largely due to the availability of graphical processing units (GPUs). GPUs can efficiently train and run Deep Learning algorithms The last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning 3. Home Security Systems: Why You Need to Upgrade From 3G to 4G Technology [Missy Dalby] The current communication method for most home security systems is via CDMA and 3G (GSM) technologies. With the emergence of faster, better, and stronger 4G LTE technology, carriers are migrating away from old technology standards and methods towards new, more efficient ones. As such, the older technology is going dark, and soon. Manufacturers of cellular modules have stopped making them. At the end of 2018 they will stop letting customers add systems utilizing 3G radios to their channels. 4. Diving into AI and Deep Learning at NVIDIA’s San Jose Conference [Larry Anderson] Video analytics applications fall under NVIDIA's “AI City” initiative, which they describe as a combination of "safe cities" (video surveillance, law enforcement, forensics) and "smart cities" (traffic management, retail analytics, resource optimization). Depending on the application, AI City technology must function in the cloud, on premises and/or at the edge. NVIDIA’s new Metropolis initiative offers AI at every system level, from the Jetson TX2 "embedded supercomputer" available at the edge, to on-premises servers (using NVIDIA’s Tesla and Quadro) to cloud systems (using NVIDIA’s DGX). 5. Physical Security Evolves to Protect Mobile Workers [Annie Asrari] With an increasing number of employees traveling and working remotely, the days of a dedicated worker who commutes to and from a single location every day of the week are just about over. Security professionals must take a second look at their policies and procedures for employee safety. To protect employees in this new mobile world, where people, assets and brand reputation threats may face higher than normal levels of safety and security risks, businesses must focus less on securing physical, four-wall perimeters and instead take a global approach to security that focuses on protecting traveling, remote and lone workers. Businesses must take a global approach to security that focuses on protecting traveling, remote and lone workers 6. New Security Technologies Driving Excitement on Busy ISC West Day One [Larry Anderson] ISC West in Las Vegas kicked off April 5 with an expanding focus on new technologies and new applications, including some that go beyond any narrow definition of security. “Technology is disrupting the market and executives are taking our solutions beyond security,” says Moti Shabtai, CEO and President of Qognify. “They are starting with security and quickly moving to other risk and business continuity issues in the organizations. They want a clear return on investment (ROI), which we can deliver if we move from covering a limited island of ‘security’ issues and give them the value of also managing risk, safety, and operations.” 7. Optimizing Building Automation for Good Return on Investment [Minu Youngkin] Smart buildings are on the rise around the world, not only because a growing number of companies are considering their environmental impact, but also because of the dramatic cost savings that can be realized through integration. In every building that has an integrated security and access control system, an opportunity awaits to also integrate the building’s energy use, water use, ventilation and more. The key is to effectively convey the tremendous potential of this new technology to the end user. 8. ISC West 2017: How Will IT and Consumer Electronics Influence the Secuirty Industry? [Fredrik Nilsson] A good way to predict trends [at the upcoming ISC West show] is to look at what’s happening in some larger, adjacent technology industries, such as IT and consumer electronics. Major trends on these fronts are the most likely to influence what new products will be launched in the electronic security industry. Proof in point is H.264, an advanced compression technology ratified in 2003 and adopted as the new standard by the consumer industry a few years later. By 2009, it became the new compression standard for the video surveillance industry as well. Violence will continue to challenge the healthcare sector in the future 9. The Future of Healthcare Security: Violence Response and Emergency Preparedness [Ben Scaglione and David LaRose] Violence will continue to challenge the healthcare sector in the future. Domestic violence, child abuse, behavioral health, drug and alcohol abuse will all continue to challenge hospital staff in the Emergency Department, Women’s Health, and behavioral health areas. The Hazard Vulnerability Assessments (HVA) along with facility wide risk assessments helps in defining risk severity and identifying historical patterns of violence. 10. Robot Revolution: Uncovering the Real Value of Security Robots [Steve Reinharz] The security coverage that a robot offers in the case of a shopping mall can be easily overshadowed by the fact that the machines seem to serve to entertain the population. Instead, security robots can best be utilized for more high-level roles, such as in critical infrastructure sites, corporate campuses and educational facilities, where wide, expansive spaces require continuous protection. In these locales, security can be difficult to achieve, as cost, location and lack of resources make the logistics of deployment difficult.
SourceSecurity.com’s most trafficked articles in 2017 reflected changing trends in the market, from facial detection to drones, from deep learning to body worn cameras. Again in 2017, the most well-trafficked articles posted at SourceSecurity.com tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles posted at SourceSecurity.com in 2017 that generated the most page views. They are listed in order here with the author’s name and a brief excerpt. MOBOTIX is increasingly positioning itself as a specialist in high-quality IP surveillance software 1. MOBOTIX Aims High with Cybersecurity and Customer-Focused Solutions [Jeannie Corfield] With a new CEO and Konica Minolta on board, MOBOTIX is set for expansion on a global scale. But how much growth can we expect for a company like MOBOTIX in an increasingly commoditised surveillance market, where many of the larger players compete on price as a key differentiator? While MOBOTIX respects those players, the German manufacturer wants to tell a different story. Rather than competing as a camera hardware manufacturer, MOBOTIX is increasingly positioning itself as a specialist in high-quality IP surveillance software – camera units are just one part of an intelligent system. When MOBOTIX succeeds in telling this story, partners understand that it’s not about the price. 2. ‘Anti-Surveillance Clothing’ Creates a New Wrinkle in Facial Detection [Larry Anderson] The latest challenge to facial recognition technology is “anti-surveillance clothing,” aimed at confusing facial recognition algorithms as a way of preserving “privacy.” The clothing, covered with ghostly face-like designs to specifically trigger face-detection algorithms, are a backlash against the looming possibility of facial recognition being used in retail environments and for other commercial purposes. 3. Drone Terror: How to Protect Facilities and People [Logan Harris] Already, rogue groups such as ISIS have used low cost drones to carry explosives in targeted attacks. Using this same method, targeting high profile locations to create terror and panic is very possible. Security professionals and technologists are working furiously to address the gaps in drone defense. Compact Surveillance Radar (CSR) is a security technology addressing the problems with other types of detection. CSR, like traditional radar, has the benefit of being able to detect and track foreign objects in all weather conditions, but at a fraction of the size and cost. The last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning 4. Deep Learning Algorithms Broaden the Scope of Video Analytics [Zvika Anshani] Until recently there have been minimal applications of Machine Learning used in video analytics products, largely due to high complexity and high resource usage, which made such products too costly for mainstream deployment. However, the last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning. The recent increased interest in Deep Learning is largely due to the availability of graphical processing units (GPUs). GPUs can efficiently train and run Deep Learning algorithms 5. Body Worn Cameras: Overcoming the Challenges of Live Video Streaming [Mark Patrick] Most body camera manufacturers, that are trying to stream, attempt to use these consumer technologies; but they don’t work very well in the field, which is not helpful when you need to see what is happening, right now, on the ground. The video must be of usable quality, even though officers wearing the cameras may be moving and experiencing signal fluctuations – most mobile video produces significant delays and signal breakups. Video and audio must always remain in sync so there’s no confusion about who said what. Therefore, special technology is required that copes with poor and varying bandwidths to allow a real-time view of the scene and support immediate decision-making by local and remote team members and support teams moving to the scene. 6. QinetiQ Demonstrates New Privacy-Protecting Body Scanner for Crowded Places [Ron Alalouff] QinetiQ has developed a scanner that can be used in crowded places without having to slow down or stop moving targets. The body scanner, capable of detecting hidden explosives or weapons on a person, has been demonstrated publicly in the United Kingdom for the first time. SPO-NX from QinetiQ – a company spun out of the UK’s Defense Evaluation and Research Agency (DERA) in 2001 – can quickly screen large groups of people for concealed weapons or explosives in a passive, non-intrusive way, without needing people to stop or slow down. 7. ISC West 2017: How Will IT and Consumer Electronics Influence the Security Industry? [Fredrik Nilsson] A good way to predict trends [at the upcoming ISC West show] is to look at what’s happening in some larger, adjacent technology industries, such as IT and consumer electronics. Major trends on these fronts are the most likely to influence what new products will be launched in the electronic security industry. Proof in point is H.264, an advanced compression technology ratified in 2003 and adopted as the new standard by the consumer industry a few years later. By 2009, it became the new compression standard for the video surveillance industry as well. By drawing data from a number of different sources and subsystems, it is possible to move towards a truly smart environment 8. Integrating Security Management into Broader Building Systems [Gert Rohrmann] Security solutions should be about integration not isolation. Many organizations are considering their existing processes and systems and looking at how to leverage further value. Security is part of that focus and is a central component in the move towards a more integrated approach, which results in significant benefits. By drawing data from a number of different sources and subsystems, including building automation, it is possible to move towards a truly smart environment. 9. How to Use Video Analytics and Metadata to Prevent Terrorist Attacks [Yury Akhmetov] How we defend and prevent terrorism must be based on intelligent processing of information, and an early awareness of potential threats – and effective preventive action – may eliminate most attacks. Video analytics, automated surveillance and AI decision-making will change the rules of the struggle between civilians and terrorists by making attempted attacks predictable, senseless and silent. To what extent can technology investigate and prevent terror crimes considering the latest technology innovations? 10. Next Generation Video Analytics: Separating Fact from Fiction [Erez Goldstein] ‘Next generation video analytics’ is a catchy marketing phrase, is how much substance is behind it? Video analytics as a technology has been with us for many years, but there has always been an air of confusion and mystery around it, in large part created by Hollywood movies, where every camera is connected, an operator can search the network and locate the villain in a matter of seconds. I am pleased to say that, in many respects, fact has caught up with fiction, with the newest video analytics solutions that are now on the market focusing on search and specifically real-time search. These solutions have been tried, tested and proven to help reduce search time from hours to minutes and even seconds.
In 2017, SecurityInformed.com covered topics from all corners of the physical security industry - from video surveillance, to access control, to intrusion detection and beyond. But just how much have you been paying attention to the industry this past year? Does your knowledge of the cloud soar high above your colleagues and security friends? Can you recall your facts faster than 60-fps? Are you hooked into the mainframe with your expertise in cybersecurity? Now you can find out. We have launched our SecurityInformed.com Best of the Year Quiz 2017, and this is your opportunity to prove just how much you remembered in this eventful year of security. Compiled by Editor Larry Anderson, our questions span topics as diverse as millennials, body-worn-cameras and security trade shows. So, what are you waiting for? Are you ready to prove your knowledge? Are you the champion of the security trade? Take our SourceSecurity.com Best of the Year Quiz 2017 now, and be the envy of the industry!
SourceSecurity.com’s Expert Panel had a lot to say in 2015 on a variety of topics in our Roundtable discussions. Not surprisingly, the discussion topics that have generated the most interest (in terms of how much visitor traffic they generated) are the same hot topics we hear about every day in the industry. Our very most-clicked-on Roundtable discussion in 2015 was about the impact of video on privacy rights. Other hot topics that made the Top-10 list of Roundtable discussions included the Cloud (twice!), the impact of IT on physical security, and the outlook for 4K cameras. Additional well-read discussions centered on expanding the benefits of security to other departments and how to improve training. Readers also gravitated to Expert Panel Roundtable discussions of more technical topics such as the value of full-frame-rate video and the effectiveness of panoramic view cameras (compared to pan-tilt-zoom functionality). Rounding out the Top 10 is a discussion of the desirability (and legal implications) of using dummy cameras. Here is a listing of the Top 10 Expert Panel Roundtable discussions posted in 2015 at SourceSecurity.com, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2015 (including the quotable panelists named below). 1. What Are The Limitations On Where Video Cameras Can Be Placed Because Of Privacy? "Use of cameras in retail applications can easily be justified in general surveillance of sales floors and shopping aisles, but cameras should only be used in changing areas to address a particularly serious problem that cannot be addressed by less intrusive means.” [Mark Pritchard] 2. Are Cloud-Based Security Systems “Safe?” "If the authentication principles are insufficient and weak passwords are allowed, it doesn’t matter how strong the encryption is. Because cloud-based systems are exposed to the Internet, they demand strong authentication and increased operational procedures." [Per Björkdahl] 3. How Does IT Affect The Physical Security Buying Decision? "Of course, we all want good value, but we must invest as necessary. If you strip everything back, the integrator's job is to deliver data. If IT and security departments can keep this objective in mind, then 'value' redefines itself." [Larry Lummis] 4. Which Non-Security Uses Of Video Are Catching On? "While video can help with quality control across the supply chain, it will be especially useful in ensuring compliance with the international adulteration rule [for food manufacturers], the rule with the last court-ordered deadline on May 31, 2016." [Don Hsieh] 5. What Is The Value Of "Full-Frame-Rate" Video? "I once took a client’s footage of a genuine street fight to check how many images per second were needed to prove who punched who – 25fps was fine but 12fps made the video evidence doubtful. Don’t forget, however many fps you choose, your shutter speed must be fast enough to prevent motion blur spoiling the details." [Simon Lambert] 6. When Is It Desirable To Use 'Dummy' Cameras As A Deterrent? "If cameras are present, there is a reasonable expectation of a secure environment in both public and private areas. If the public sees cameras and assumes they are real, they could argue that they were reliant on the protection provided by the cameras." [Dave Poulin] 7. Are Megapixel Or Panoramic-View Cameras An Effective Substitute For PTZs? "Panoramic cameras are usually static, so zooming into a scene’s details is done in software and limited by pixels in the sensor, lens quality and software such as de-warping, so clarity at the boundaries might disappoint. PTZ cameras zoom optically, magnifying long-range details significantly better." [Simon Lambert] 8. Is HD Still The Standard Of Resolution In The Market? For How Much Longer? "The 720p and 1080p HDTV remains dominant today and is expected to be for the foreseeable future. The next standards-based resolution will be 4K, which represents 8.3 megapixel, but first the industry will need to improve on bandwidth with better compression and better light sensitivity." [Fredrik Nilsson] 9. What Are The Current Limitations Of Cloud-Based Systems? "The only remaining limitations of cloud-based systems are bandwidth and connectivity to the cloud. There is more than enough bandwidth for applications like Access Control and Visitor Management, but it will take a couple more years before all high-resolution video is cloud-based.” [Paul Bodell] 10. How Can Security Training Be Improved Among Integrators And End Users? "Training should be sticky and persistent. Follow-up training such as on-line review and updated course material should be available to keep the knowledge fresh. Technology is constantly changing, as soon as training is complete the knowledge begins to go stale." [Charlie Erickson] See the full coverage of 2015/2016 Review and Forecast articles here
There's nothing like a visit to the China Public Security Expo (CPSE) in Shenzhen to open your eyes to a new world of security market manufacturers and customers in the Asia-Pacific market. The show is huge by Western standards – someone told me it's five times the size of ISC West in Las Vegas. But even more than the size of the show, it was the crowd that made an impression on this first-time visitor. Huge numbers of attendees and exhibitors Think of the mass of humanity you might expect at a rock concert, or at Walmart on Black Friday. There was no space to move as you enter the show; you're swept along as part of a sweaty crowd. Fortunately, it was a little easier to maneuver once I got past the initial rush. There were some familiar Western brands – I saw Tyco and Honeywell among others – but the vast majority of the exhibitors are names unfamiliar in the West. And there are a lot of them, aisles and aisles of large, elaborate exhibits. Not waiting for attendees to approach a booth, there were people in the aisles aggressively urging you to enter a nearby exhibit, or at least to take a piece of literature. The experience was a stark contrast to the slow activity at ASIS, where exhibitors complained about lack of booth traffic. No need here to rationalise about the quality of the leads – here, it was clearly about quantity. Companies operating on a larger scale The massive scale of CPSE confirmed my initial observations from the previous couple of days as I had visited Hangzhou as well as Shenzhen. Everything seems bigger here. Large, high-rise buildings are everywhere you look, many of them recently built, across miles and miles, with more to come. Cranes dot the horizon as even more construction is under way. What these Chinese companies are achieving exceeds our tired perceptions in the West of "commoditised products" or "cheap Chinese" My host for the trip, Hikvision, inhabits two large skyscrapers in Hangzhou, and there's an adjacent third building (much bigger than the others) already under construction. When I visited their factory, I learned that they are also building a brand new (and larger) manufacturing facility that will use more automation and further expand their already huge daily output of video surveillance products. It's growth on a scale far beyond anything we're seeing anywhere else in the security marketplace. I visited some other manufacturers at the show, including Dahua, which is gearing up for a larger presence in the U.S. market; and Uniview, which is changing its global brand to UNV and is on the verge of going public. Eyeing Western markets What these Chinese companies are achieving exceeds our tired perceptions in the West of "commoditised products" or "cheap Chinese". Hikvision alone has a broad and rich range of technologies that includes intelligent systems, analytics and product capabilities that other companies often claim will be their advantage as the market becomes more commoditised. Undermining lingering perceptions of questionable Chinese quality were impressive quality control processes Hikvision displayed on the factory tours. Western markets, especially the United States, loom large in the sights of these big companies. Often the missing piece is a U.S. sales and service infrastructure. Hikvision (and other Chinese players) are growing in the U.S. market. Reflecting Hikvision's growth here is (what else?) a new building planned in California. I learned a lot on my Far East adventure; among other things, that the future of the security marketplace will be more global than ever. (And a new word, a verb: to libate.)
Strategic management of costs is important when considering video storage systems Costs are at issue when considering any component of a video system. Strategic management of costs is especially important when considering video storage systems because storage accounts for such a large cost component of networked systems. Gartner’s Total Cost of Ownership (TCO) As enterprise products begin to dominate the video storage market, more attention needs to be addressed to Gartner’s Total Cost of Ownership (TCO), says Jeff Burgess, president and CEO of BCDVideo. This concept takes it beyond the initial purchase costs, and also factors in management and support, the opportunity cost of downtime, and other productivity losses. “It’s especially true these days as more and more, video data is being analyzed for business purposes,” says Burgess. “After all, they are counting on it to run their project. The video doesn’t get recorded if the recorder is not working or continually freezing up.” ‘Cost Of Power, Pipe, And People’ Burgess urges integrators and end users to ask themselves: What is the video recorder really costing me over the course of the five-year project? It’s likely a racked solution, so in IT terminology that “costs power, pipe, and people.” “Take the people out of the mix,” Burgess says. “You should not need to roll a truck to the site every time there is an issue. Especially after a warranty service call. The system should automatically accept the replacement drive and bring the data over to it within the existing RAID settings, without the integrator’s on-site presence needed. The integrator really needs to look under the hood to see what else the system can provide other than simply being a storage box or a box of parts from multiple brands, not meant to work together.” Finding the right balance of control, performance, scalability and availability to keep up with and effectively exploit the surveillance data deluge allows organizations to avoid painful and costly upgrades Today’s intelligently-built video solutions provide the integrator with an easy-to-track cost savings over the lifespan of the project versus buying boxes on the cheap, says Burgess. “Today’s savvy integrator realises it doesn’t take many truck rolls to lose all those front-end savings, which are now eating away at their profits.” Camera With SD Cards Another cost factor is to focus more on the utilisation of the SD cards in the camera. Utilising cards within the cameras creates a very inexpensive way of adding redundancy to a solution, says Burgess, who notes that most VMS companies can pull the video from the SD cards should there be an interruption in the network or at the head end. Educate Yourself Veracity recommends asking a lot of questions to guide system design and minimize costs. What retention time do you need? What would you wish? Do you want to relay on video motion detection, or would you prefer to find a system that allows you to record low frame rate 24/7 and then increase frame rate on motion? Does your storage choice allow you to use low cost drives? Does it use a huge amount of power? Is it overly complex? “Educate yourself about the choices,” says Scott Sereboff, CEO of Veracity USA. “Look around. Consider the alternatives. You have a choice that does not include a RAID storage system with an $800-plus per terabyte price tag.” "Starting with a solution that takes minimal install and tuning, and is proven to scale well beyond current needs, future proofs the system for the short- and long-term for the customer and the integrator", says Jeff Adams, director of sales, surveillance solutions, DDN Storage solutions Balancing Performance, Capacity And Availability Finding the right balance of control, performance, scalability and availability to keep up with and effectively exploit the surveillance data deluge allows organizations to avoid painful and costly upgrades, says Jeff Adams, director of sales, surveillance solutions, DataDirects Network (DDN) Storage solutions. “Performance needs to scale to allow for increasingly demanding playback and/or analytics features. Capacity needs to scale non-disruptively as cameras are added, while resolutions and retention periods may increase over time. Availability at scale is tricky; something as simple as slow rebuild times becomes critical in larger systems – endangering availability and system data integrity.” In addition to new installations, DDN does a healthy business in replacing underpowered infrastructures that deliver on the initial requirements but fail on scaling, says Adams. The most frequent culprits when a video surveillance site fails and needs a significant replacement/upgrade include: single controller architectures, silent data corruption, data loss from secondary failures during drive rebuilds, performance impact of rebuilds, alternates to RAID6 data protection, and lack of experience scaling into the petabyte or multi-petabyte range. Many mid-range video surveillance storage “solutions” take more than a week to install and tune, and cannot handle significant scale, adds Adams. For end users, this limits the ability to add cameras, capacity and demand (playback, analytics and system consolidation). For integrators, this means a lot of “care and feeding,” and frequent completion delays up front, as well as increased support considerations throughout the life of the project. “Starting with a solution that takes minimal install and tuning, and is proven to scale well beyond current needs, future proofs the system for the short- and long-term for the customer and the integrator,” says Adams. It also keeps costs low.
Physical access control system architecture should be built to use the changing IT infrastructures of today’s organizations to their fullest It’s time to completely rethink physical access control systems with an eye toward the changing world of information technology. Today’s physical access control system architecture only leverages existing network hardware technology – it doesn’t utilize the organization’s full IT infrastructure, which includes systems providing advanced security services and sources of security-related real-time information. A close look at most organization’s IT roadmaps will show that traditional-architecture access control systems are off on a side road. Physical access control system architecture should be built to use the changing IT infrastructures of today’s organizations to their fullest. Such an approach is key to future-proofing and minimizing costs. The architecture needs to be able to keep pace with technological advancements in computing, communications and integration at the system level and the device level, providing strong security capabilities in a cost-efficient manner. Because hardware-centric, distributed intelligence can’t keep up with IT advances, an ever-widening gap exists between the capabilities, effectiveness and ease of management that a physical access control system can provide – and what today’s physical access control products can provide. Unless the concept of “putting intelligence at the door” includes all the intelligence that should be utilised to make an access decision, such an approach actually provides less security than today’s networked technologies are capable of providing. A key issue is a system’s native support for technological advances versus requiring third-party devices and middleware in a piecemeal approach to system design. With traditional hardware-centric physical access control systems, advanced features and real-time authentication and authorization capabilities could only be achieved by implementing costly third-party solutions or custom-designed applications. Cost and reliability factors have kept such capabilities out of reach for most physical access control customers, even though IT security systems have had such features for more than a decade. Until a full transition is made to next-generation architecture, existing physical access control system deployments will continue to fall further and further behind as technology advances, and will continue to have shortcomings and weaknesses At the infrastructure level, next-generation physical access control system architecture must be IT-centric, taking advantage of an organization’s existing IT infrastructure. It must be deployable throughout the enterprise like any other business application that uses networked end-point devices. At the application level, next-generation physical access control system architecture must be IT-aligned in support of the customer’s preferred approaches to identity, credential and access management (ICAM), and must be easily integrated with relevant business systems. These changes create significant opportunities for integrators and end users, offering software- and net-centricity, server-based real-time access decisions, advanced security protection, scalability, IT- and ICAM-friendly deployment, and mobile device- and smart card-friendly deployment. There are two questions to consider about making the transition to next-generation physical access control architecture: First, will your organization’s current system be satisfactory five to 10 years from now given the pace of technological advances? Second, from a cost- and security-effectiveness standpoint, is continued investment in legacy physical access control technology the smartest approach to your organization’s critical asset protection and incident response needs? Until a full transition is made to next-generation architecture, existing physical access control system deployments will continue to fall further and further behind as technology advances, and will continue to have shortcomings and weaknesses – as well as needless costs – that constitute a liability to an organization’s asset protection program. Editor’s Note: This article is based on Mr. Raefield’s answers to several questions about the access control market posed by SourceSecurity.com.
The merger of Vicon and IQinVision has been one of the more interesting business developments in the security and video surveillance markets in 2014. Wondering how the merger is working out, I spoke with Eric Fullerton, CEO, Vicon Industries Inc., at the ASIS 2014 show in Atlanta. Here are some of his comments: SS.com: What drew you to Vicon; what opportunity do you see here? Fullerton: The merger of Vicon and IQinVision was announced at the end of Q1, and I thought: What is that? My first reaction was that it’s a losing proposition - putting a struggling camera company and a struggling solutions company together. Then I started looking at it more closely. I think by putting these two companies together, we will be able to create a very strong video company that can lift video to the next level. I wanted a good challenge, and to be part of the next change in the industry by combining hardware and software and to start innovating at the edge. SS.com: What do you see as the next level of video, once it’s realized? Fullerton: Video will become the most important digital information source to an operation. Video isn’t just your security application, but it’s a digital business application that adds value to the bottom line. That’s where we want to be delivering products and solutions. We are starting to extract metadata from the cameras. You can analyze the content of video, which provides a totally different value to the video. Less than half of one percent of recorded video is actually looked at -- it’s just used to document what happened after the fact. With some of the modern cameras, like some we are already launching, there is metadata storage of each frame, all the vectors and everything that you can know. Without looking at the video you can analyze changes from frame to frame in terms of color and movement. That will add value to the use of the video. You won’t have to sit and watch it to know what it’s capturing, but you will know what’s going on by using analytic algorithms, and combining that with other digital security systems, including access control and video management. With some of the self-learning video analytics, facial recognition and other things, we are starting to analyze video with data algorithms, channelizing it, and using it as valuable input into HR and management solutions, even in manufacturing. You can get more efficiency. Video will become a valuable addition to daily operations and add value to the bottom line. SS.com: What is Vicon’s part of that – an end-to-end solution, or what? Fullerton: That’s the million dollar question. We are going to build cameras under the IQinVision brand, and have a full line of cameras. We will focus on where our core capabilities are – design and functionality. We will be outsourcing all manufacturing to China and other places that give us the right cost basis, and we will be adding our value at the high end of the camera. The camera line will be open and able to interoperate with other video management systems that we know today. "We’ll have a plug-and-playsolution at the bottom todeliver what the peoplewant at the low end – oneto 60 cameras with limitedfunctionality. At the mid-market we will have muchmore robust and functionalNVRs with more storagefor your larger installations.And then at the high end wewill a VMS-type solutionthat is cloud-enabled" On the Vicon side, today we have a proprietary VMS, which is not what the market is asking for. The emergence of Milestone as an open platform company was because end users were looking for freedom of choice and to get out of proprietary jail. We will migrate our video management platform to an open platform. We’ll have a plug-and-play solution at the bottom to deliver what the people want at the low end – one to 60 cameras with limited functionality. At the mid-market we will have much more robust and functional NVRs with more storage for your larger installations. And then at the high end we will a VMS-type solution that is cloud-enabled. We will also have a cloud solution at the low-end, residential, mom-and-pop market, with video only, no integrations. Later we’ll develop a multi-tenant cloud system for video service providers (VSPs). Going to the cloud doesn’t mean you put the video in the cloud. It means you can get the video when you need to, but also get the information you need. There will be a lot of on-camera storage. Because you have the knowledge of what’s happening in the frames (using metadata), you can pull out the data from the cloud and then decide what part of the video you need to look at. SS.com: How fast are you getting out of the analog business? Fullerton: We’re not. The analog business will have a very long tail – the last 10 to 15 years has proven that. Yes, there is some erosion of margin because of commoditization. There are benefits of analog cameras – they’re robust, they work, you can pull the cable longer than an Ethernet cable. Because of the robustness and the pricing, and some of the features, we’ll see a long tail of analog for years to come. SS.com: What impact do you see of these changes on dealer partners? Fullerton: Being successful in the security industry is to understand how business is done and what end users want. One reason IT didn’t take over is that there is much better value than anybody realized in the guidance security dealers provide end users. I strongly believe business in the security industry is done by local people, and we will migrate as a combined company to a full two-tiered distribution model. We go through distribution and security integrators, and they will be the ones doing the business with the end user. SS.com: How do you deal with preconceptions about your history as a company, and how do you re-educate the market about that? Fullerton: In the security industry, if you look at the history of how it was built, and the old boy’s network, the shadow of what you do is very long. The interesting thing is that Vicon has had IP solutions for 14 years. Everybody thinks that Vicon is an analog company. Yes, we still sell analog cameras because there’s a need in the market. Vicon has been a proprietary company. I would say the biggest fault of the company has been to try to be proprietary when the market is going the other way. That’s the big change we will make. We will be announcing that, and driving PR to let everyone know the new Vicon is an open company that gives the end user the freedom of choice and also delivers on higher value. SS.com: What is your message to the market? Fullerton: We have a 4K camera, which has been our message at the ASIS 2014 show. The management team sat down last week and said “how are we going to drive this?” “What are our values going to be?” We looked at our vision and our mission. The vision is that we believe video will become the most important digital [resource] in a company, so it will add to the bottom line, not just surveillance. Our values are built around the acronym CIPIT – Customer orientation, Integrity, Passion, Innovation and Team effort.
Commoditisation is the biggest problem facing today’s security integrators, says Bill Bozeman, president and CEO of PSA Security Network, an electronic security cooperative encompassing some 250 electronic security systems integrators, and aligning them with over 150 vendor partners. Multi-million-dollar manufacturers are taking advantage of economies of scale to drive down pricing of many of the components our industry uses, and lower prices are poised to have a long-term detrimental impact on integrators’ business, Bozeman says. “You have to sell that many more cameras and card readers to create the same amount of revenue,” he says. “There’s a lot of danger there.” To survive the impact of commoditisation, integrators are looking to develop new business models that are not totally dependent on the installation of systems. Possibilities include recurring revenue models and sales of security services, which can provide a predictable cash flow. Recurring revenue for a systems integrator might come from longer-term maintenance contracts, or from monthly fees for alarm monitoring, access to cloud services, etc. Security services, in effect, involve an integrator providing a wider range of services to an end user customer for a monthly fee, basically allowing the end user to “outsource” its complete security operation to an integrator. Commoditisation over time will require that integrators re-think their business models, says Bozeman, but integrators will require a lot of education on how to embrace the needed transition. “Contractors don’t have that model,” he says. “They are embracing it slowly; it’s a slow migration, and we have tried to lead them in that direction. They’re picking up on it, but it’s been a herd of turtles.” On the plus side, Bozeman says proliferation of handheld devices with the ability to receive video and alarm signals is opening up a new wave of customers for integrators. He says the capabilities of hand-held devices drive visibility of the video surveillance world. The growth of lower-tech options, such as ‘baby-cams,’ is also helping “to drive interest toward professionally designed systems,” says Bozeman.
In its role to achieve “plug-and-play” interoperability for security system and device integration, the Physical Security Interoperability Alliance (PSIA) is looking ahead to some new possibilities in its long-term roadmap. David Bunzel, PSIA executive director, shared with me some of the active discussions among alliance members about where the next wave of interoperability initiatives may lead. Integration of wireless locks is at the top of the list, a response to the growing and evolving product category. Looking further into the future, integration of smart elevators, energy management systems and hotel management systems are part of the alliance’s roadmap. There are specific access control and integration issues related to each category. In the case of energy management systems, for example, there is demand for access control systems to be able to adjust a building’s climate system in response to whether anyone has entered the building (for example, on the weekend). Access control can also monitor overall building occupancy and optimize climate settings based on that information (especially valuable as a strategy to save energy costs and promote “green” compliance). The more our lives and technologies are interconnected, the greater the expectations for physical access control to be a part of a larger ecosystem Smart elevators are another opportunity to interface with access control, and increasingly their management is a requirement for enterprise building systems. Even more futuristic is the possibility of having an employee’s computer work station interface with an access control system. In this scenario, an employee’s desktop computer could automatically power up, open appropriate files and applications, and/or access networks to which the employee is authorized – all based on a card or biometric scan when the employee enters the building. With the increase of remote workers and companies needing fewer work stations (and seeking to reduce costs), the “hot desking” concept could continue to gain favor – and provide new benefits of interfacing with physical access control. In this case, rather than a work station assigned to each employee (even those who do not come to the office very often), the concept of a “hot desk” would allow an employer to use a smaller number of generic workstations, each available as needed when a remote worker comes into the office. When an employee comes to work (and scans his access control credential), he or she would be assigned to a specific workstation, and that desktop computer would then automatically configure itself to the employee’s specific needs and access privileges. It’s a new level of physical-logical integration, and an opportunity for the physical access control market, but interoperability challenges have to be addressed. The more our lives and technologies are interconnected, the greater the expectations for physical access control to be a part of a larger ecosystem. It appears PSIA and its members have challenges to keep them busy for years to come.
For the 20,000 or so security professionals who attend each year, ASIS International’s Annual Seminar and Exhibits is all about education. Attendees can polish their skills and update their security know-how in any of more than 200 education sessions during the yearly event. They can also learn all about the latest available security technologies and services at the massive 225,000-square-foot exhibition. Celebrities are on hand too, or at least some well-known and notable dignitaries are keynote speakers, including General Colin Powell, former U.S. Secretary of State; and John Huntsman, former Utah Governor and U.S Presidential candidate. Sharing dramatic stories of heroic rescues from recent geopolitical history, U.S. Navy SEAL Rear Admiral Scott Moore discusses team building in the context of the military’s most elite forces. These are just a few of the attractions when ASIS International presents the 60th Annual Seminar and Exhibits Sept. 29-Oct. 1 in the Georgia World Congress Center in Atlanta, Ga. For the fourth consecutive year, the (ISC)2 Security Congress, which focuses on issues of information and software security, co-locates with the ASIS event, thus combining physical and logical security professionals in one place (and allowing them to attend various facets of both events). ASIS International is the largest organization of security management professionals worldwide, and (ISC)2 is the largest not-for-profit membership body of certified information and software security professionals worldwide. The focus of ASIS for the manufacturer and supplier community is the vast exhibit hall, where more than 700 companies demonstrate cutting-edge technology, products and services to security professionals worldwide The focus of ASIS for the manufacturer and supplier community is the vast exhibit hall, where more than 700 companies demonstrate cutting-edge technology, products and services to security professionals worldwide. The ASIS exhibition is one of two large security trade show events each year in the U.S. market and provides a focus for many product introductions and other commercial announcements among the manufacturing community. Although the attendee focus is on end users, there are also integrators, consultants, distributors and others who flock to the ASIS exhibit hall to see what’s new in the security market for the second half of 2014. Other highlights of the ASIS conference sessions include focus on top security concerns and need-to-know industry trends, including cyber-fraud, drones, security metrics, aviation security and many more. Education sessions reflect a range of topics, including urgent issues on everyone’s minds and in the headlines, such as mass shooting incidents, cyber-fraud, workplace violence, the safety of our food supply, and dealing with legalized marijuana, among many more. On the business side, sessions explore management issues such as internal theft and sabotage, best practices in hiring top security personnel, monitoring Internet communications, and complying with employer mandates of the U.S. Affordable Care Act. One session focuses on a new breed of security integrator emerging to address both small- and large-scale projects. “The Integrator of the Future” session identifies the largest growth markets for tomorrow’s integration professional. SourceSecurity.com Editor Larry Anderson is attending ASIS 2014 to report the latest company and product news from the 60th annual event.
The SourceSecurity.com team attended this year's IFSEC International 2014 with great anticipation to view the new innovations first-hand on show and see how the move to London would impact visitor experience. To capture the show, we have provided a summary of IFSEC in pictures above. Highlights from IFSEC 2014 We saw an overwhelming number of people and products; here is a snapshot of our IFSEC experience for 2014: FLIR SourceSecurity.com attended FLIR’s press briefing which took place on the first day of the show. FLIR emphasized that it was more than just a professional thermal camera company – the company has recently released $499 thermal cameras to the consumer industry. For FLIR, the security market is growing industry. With the acquisition of Lorex in 2012, FLIR will be introducing Lorex products under the FLIR brand (consumer side, not professional) in EMEA. At IFSEC 2014, FLIR also introduced FLIR One- its first consumer camera for the iPhone. HID Global HID Global’s Director of Technical Services, Nick Hislop, talked SourceSecurity.com through its emerging technologies in the form of leveraging Bluetooth LE and NFC. The concept is simple: to make mobile access more convenient. Nick also demonstrated how HID’s products and solutions are relevant for a number of vertical markets including Enterprise, Healthcare, Education and Finance Services. Nedap ID Ido Wentink of Nedap Identification Systems introduced SourceSecurity.com to the Nedap IDS advanced license plate recognition product, ANPR Access HD. The company also introduced uPASS Access, a backward compatibility convertor and UHF ISO Card for improved user experience for uPASS platform. The ANPR Access HD for advanced license plate recognition is a higher resolution lens than its previous release, the ANPR Access camera. Other features of the ANPR Access HD include a more powerful CCV, increased IR illumination and expanded OCR library. SourceSecurity.com’s visit to STI’s booth saw the company emphasize its importance not just within the fire industry, but within the security industry as well Security Technology International (STI) SourceSecurity.com’s visit to STI’s booth saw the company emphasize its importance not just within the fire industry, but within the security industry as well. STI is looking to get the message out there that they’re not just a fire company. Paul Machacek, Sales Team Business Developer, talked SourceSecurity.com through a number of STI’s products including STI’s Polycarbonate Protective Covers, Steel cages, Call Points & Switches and Stand-alone Alarm Systems. Samsung - Changing the face of IP On day two of the show, Samsung hosted a press conference for the global launch of its Open Platform. This new initiative gives users the opportunity to utilize third party APPs with Samsung's WiseNetIII cameras and domes. Tim Biddulph, Product Manager at Samsung, hosted the conference and offered an insight into Samsung's tag line for the show, "Changing the face of IP". Taking a lead in IP technology, Samsung is seeking to give end-users a solution that is effectively future-proof in terms of expandability and its ability to integrate with new technology in the future. Ease of use was also at the top of Samsung's agenda with its "Zero configuration" NVR solution and there was a large focus on the power of integration within different vertical markets. ASSA ABLOY ASSA ABLOY showcased a number of its access security solutions on its impressive stand. SourceSecurity.com met with Thomas Schulz who gave a comprehensive tour of the stand. From ASSA ABLOY Aperio, there was a focus on the benefits of energy saving for its customers with the Aperio range now featuring battery-powered online and offline locks, cylinders, and escutcheons. There was also ABLOY CliQ technology on show which integrates electronics and mechanics, combining mechanical ABLOY PROTEC locking solutions with low-power electronics. A number of access control solution from effeff, Mul-T-Lock, Traka and Yale were also showcased on the stand. VIVOTEK At the VIVOTEK stand, the SourceSecurity.com team were given a tour of the stand which featured their low-light solution and their latest retail solution On day one of the show, VIVOTEK hosted a luncheon in the Crown Plaza hotel, just a stone's throw from the ExCeL center. As well as enjoying a great meal, attendees were privy to the company's main focus for the coming year and its milestones and product roadmap for 2014 and beyond. The warm hosts included: Steve Ma, Executive Vice President at VIVOTEK, Brandy Lin, Team leader at VIVOTEK and Owen Chen, the Chairman of VIVOTEK. During the luncheon, VIVOTEK shared its vision of being seen as more than just a camera manufacturer, rather, as a total solution provider. The message of the importance of integration, an increased awareness of the need for reliability of products and ease of use was key on their agenda. At the VIVOTEK stand, the SourceSecurity.com team were given a tour of the stand wich featured their low-light solution and their latest retail solution, which was made up of a series of mini high definition cameras for discreetness. SALTO Salto showcased its latest wireless access control door solution, the XS4 mini. XS4 Mini includes SALTO Virtual Network SVN and wireless capability with mini installation needs. Embedded in the heart of the product is the latest microprocessor technology, ready for the connected world, open and future-proof for online connection, wireless technology and NFC. Seagate During an editorial briefing with the SourceSecurity.com team, Seagate shared their valuable knowledge of the history of storage manufacturing and stressed the importance of choosing the right storage solution for installations. With the rise of "Big Data" and increased storage needs in the surveillance market this is something which has become much more of a consideration. As one of only three storage manufacturers, Seagate's experience and know-how within the surveillance industry is vast and it hopes to push out its knowledge to the industry to ensure that people know the benefits of choosing a fit-for-purpose storage solution. Western Digital SourceSecurity.com spoke to Martin Jefferson at Western Digital, who gave a very detailed explanation of how the new WD purple surveillance hard drive had been created and why it was fit-for purpose. It was a very insightful presentation of the product and demonstrated the inherent need for the market to understand why choosing the right storage solution is vital to any installation. OptexAt the Optex stand SourceSecurity.com spoke to Aude Desbieres, who gave a breakdown of the latest offering from Optex at the show. Amongst the array of new products on the stand, Optex showcased the new analytics features of its laser Sensor, REDSCAN, and a new people counting solution developed by Giken Trastem. There was also a focus on full integration of its IP sensors with Milestone XProtectand Hawkeye mapping software and new grade 2 and grade 3 detectors. Our very own Larry Anderson also sat down with their MD Mike Shibata to discuss the company's future and development roadmap. During an editorial briefing with the SourceSecurity.com team, Seagate shared their valuable knowledge of the history of storage manufacturing and stressed the importance of choosing the right storage solution for installations Tyco Stephen Carney, Director of Product Management for Video Solutions at Tyco Security Products, set down with SourceSecurity.com to give an insight into their product roadmaps and their main focus for the coming year. He spoke on their concept of Unification which looks at integration at code level rather than simply API level. With the launch of their victor 4.5 Unified Client, they hope to give the end user a solution that is more secure and efficient for businesses and organizations that require an active surveillance environment. He also mentioned Tyco's increased focus on the end user and customer experience being at the heart of how they develop their product offering for the market. Senstar At the Senstar booth, SourceSecurity.com were given an insight by Miriam Rautiainen into Senstar's new FlexZone, a fence-mounted sensor that detects and locates intruders. The FlexZone can also locate multiple intrusions simultaneously and is scalable, thus making it an easy and flexible option no matter how big or small the installation needs to be. With FlexZone, less equipment and infrastructure is required, adding to the flexibility of the product. Furthermore, rejecting false alarms is even easier with FlexZone than with Senstar's previous offerings. Miriam also mentioned the acquisition of Optellios earlier this year, which has allowed Senstar to expand on their fiber technology portfolio. Nedap SourceSecurity.com also attended a seminar at the Nedap stand about their collaboration with EE. EE has selected Nedap's AEOS security management platform as part of their plan to expand their business throughout the UK. Since the AEOS system is completely web-based, EE employees can access it from anywhere. Traka At the Traka stand, Tanveer Choudhry, Global Marketing Manager at Traka, gave us a demonstration of their new Traka 21 - a plug and play key management system designed for small to medium size businesses. The system is very user-friendly and easy to use, as Tanveer showed us. Furthermore, a PC connection isn't necessary as the Traka 21 can operate as a stand-alone. However, the system features a USB port, which allows employees to extract user data. The Traka 21 will be available later this year.
Ever wish your smart phone could see in the dark? Sure you have, and FLIR Systems has just the gadget to make it possible. It’s the FLIR One, the “first personal thermal imaging device for consumers,” introduced earlier this year. Now available for the iPhone, with a version for select Android models coming soon, the product sells for less than $350. It allows its users to “see what the naked eye can’t.” According to the manufacturer, FLIR One “provides a visual image of minute temperature differences, giving users the power to see in the dark, observe invisible heat sources, compare relative temperatures, [and] see through smoke.” FLIR One made a big splash at the Consumer Electronics Show (CES) in January and has been widely featured in the technology media since then. FLIR One is part of the company’s strategy of promoting greater use of thermal imaging in a variety of markets, including security, by increasing overall consumer awareness of the power of the technology. The new camera for the consumer market uses technology that will also be coming soon to a security camera near you, expanding the capabilities of video surveillance and combining the benefits of thermal and visible imaging into a single video stream. FLIR’s Multi-Spectral Dynamic Imaging (MSX) capability – used in the FLIR One and soon to be incorporated into security cameras – involves extracting the details of a visible image and “embossing” them onto a thermal image, says Andy Teich, FLIR CEO. The FLIR One uses both a thermal image sensor and the smart phone’s visible camera; there are two apertures. The compact device combines both of the images using MSX algorithms running in the background to calibrate and perfectly align the two images into one. The smart phone then displays a single video image that is richer in content than either one individually. The resulting thermal image includes some of the visible details – the most important ones at any rate. “[The technology] blends high-fidelity detail from a visible image with thermal for an image this is quite rich in detail,” Teich says. In the security market, for example, the image can combine a thermal image of a car in a parking lot with the ability to read the license plate number, which would be captured by a visible sensor. The “edges” created by color changes in a visible image provide detail that is combined with a thermal image. (FLIR has provided both visible and thermal cameras since its acquisition of Lorex Technology in 2012.) Teich says the MSX technology was developed for the company’s thermography business, which involves the use of hand-held cameras for temperature detection. The FLIR One is the first camera introduced outside the thermography segment. “Ultimately it will find its way into the security business,” says Teich, probably “within the next year.”
Frank De Fina put Samsung on the map related to video surveillance in the United States market. Five years ago, before the longtime Panasonic executive signed on, the Samsung brand had little traction in the U.S. surveillance market, although the Korean giant was already well known in the broader electronics market. Back then Samsung surveillance cameras were thought of as inferior to Panasonic, Sony or the other brands – if they were thought of at all. Five years later, Samsung is climbing up the market share rankings. A lot of the success can be attributed to Samsung’s technological advances and the innovation of new products they are bringing to market. The products have gotten better, true, but De Fina gets the credit for building a solid management infrastructure and expanding the distribution channels over the last five years. Now, those elements will be continuing without him. “I’m leaving the company in better shape than I found it,” said De Fina, Samsung’s executive vice-president, North America. He emphasizes that his parting with Samsung at the end of May is “amicable” and “based on personal reasons,” among them a grueling 106-mile-a-day commute. “I want the industry to know I’m taking a breather,” he said. “I want to adjust my life to better suit some of the issues I have.” “Building the Samsung brand and credibility were the main focus early on,” De Fina said. “You have to have great products, great people and success stories by customers who were willing to take a chance.” His only regret is that it took five years to accomplish the turnaround. “I wish I could have done it in two years instead of five,” he said. “Five years ago, it was literally a shell,” De Fina remembers. “There were no processes and no team. I am pleased to say I organized and built a great team. The credit for building the business goes to that team.” The success has been notable as Samsung has increased its market share in the United States and is on track to increase U.S. video surveillance sales by more than 75 percent this year over last. ”The team at Samsung is great, and I don’t want them to suffer from this (departure) being misunderstood,” said De Fina in a telephone conference call with a dozen or so security industry journalists. In the call, he deferred any mention of his possible successor to “the management at Samsung.” What’s next for Frank De Fina? One possibility is to work as a consultant, he said. “I’d like to be a business professor at Princeton (near my home), but I don’t have a degree in physics, and they would probably check,” he joked.