Round table contributions
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?
Social media is part of our everyday lives, and increasingly it is also part of the security marketplace. Social media can be used for effective marketing and to communicate with customers, and it can be leveraged as a tool to make us all more secure. Communicating information in a crisis is another role social media can play to promote security. To elaborate on social media’s increasingly vital presence in the security marketplace, we asked this week’s Expert Panel Roundtable: What role can social media play in security?
Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this week’s Expert Panel Roundtable: What features of Cloud-based software-as-a-service (SaaS) are the most valuable to the average user?
There’s a huge cloud hanging over the physical security market, but in a good way. Cloud-based systems, whether for video, access control or another category, are on the verge of taking the industry by storm. The benefits of that mythical “cloud” are well-known, or certainly well-touted, in the market. It’s almost as if the word “cloud” has become a buzzword that can mean different things, or at least whatever the customer wants it to mean (as long as they buy!). We asked this week’s Expert Panel Roundtable to define the term more specifically, and to comment on the industry’s understanding of the terminology. Specifically, we asked: Define what we mean by “the cloud.” Is the definition universally understood in the market?
Open systems are great at providing freedom for end user customers. But does the term “open system” mean the same thing throughout the industry? In the bad old days before the introduction and broad acceptance of open systems, security vendors produced proprietary systems that used only their own hardware and software. This locked in a customer to a specific vendor’s product line, and if another vendor offered a better product, the only way to get it was to switch to that vendor’s total solution. Open systems changed all that, in theory allowing the selection of best-in-class hardware, software and other components to meet customer requirements. But is the term “open” understood consistently in the market? We asked this week’s Expert Panel Roundtable: What is an open system? Is there a consensus in the marketplace of the definition of “open?” Although there is mostly a consensus in the panel’s answers, we did notice some variables.
Cloud platforms and applications are becoming prevalent across security solutions. In the simplest terms, cloud systems store and access data and programs over the Internet instead of using an on-premises computer server. The cloud is a metaphor for the Internet. This technology helps security integrators provide managed services and the advantages of off-site systems and services to customers, which is why cloud computing is often mentioned among the 'megatrends' in the physical security industry. Here is part one of our Cloud Security series. Cloud Computing The way users purchase services and products is changing in all walks of life, including the physical security market. The traditional concept of buying and owning a product is giving way to the idea that it is possible to purchase the services it offers instead. Data capture form to appear here! This approach has come from the consumer realization that the outcome is more important than the tools to achieve it. For example, this approach is evident with the rise of music streaming services as opposed to downloads or physical products. And it coincides with a rise in cloud computing. The cloud is a metaphor for the Internet and the way users purchase services and products is changing in all walks of life, including the physical security market With the physical security industry becoming ever more integrated – and truly open systems now a reality – there is every reason to assume this service-led trend will come to dominate the way our industry interacts with its clients as well. Customer choice equates to a change of focus and interest, with physical products being eclipsed by the benefits of the overall solution. Cloud-based services put the onus on the result rather than which device the user chooses. There are benefits for security providers too. Rather than simply 'shifting boxes' and enduring the inevitable sales peaks and troughs this creates; Security as a Service (SaaS) sales allow manufacturers and installers to enjoy a more stable business model. Cloud-Based Solutions Will Have Large Impact “Cloud-based solutions will continue to have a large impact across the security industry in 2019,” says Fawzia Atcha, Vice President, Imron Corp., one of our Expert Panelists. “We saw this trend dominate product offerings in the home security market throughout 2018. We expect the commercial and industrial markets to move in this direction as well, thanks to customer demand." More and more businesses are realising that leveraging the cloud is the most efficient way to solve emerging challenges" "End users are looking for more streamlined experiences, opting for applications that can be accessed remotely from mobile devices as opposed to desktop software or through a server. Dealers and integrators are seeking to increase recurring monthly revenue through managed services to drive their bottom line. These are just some of the factors driving strong adoption of hosted and web-based cloud solutions.” “More and more businesses are realizing that leveraging the cloud is the most efficient way to solve emerging challenges,” says Ron Virden, Chief Operating Officer, ACRE, LLC, another Expert Panelist. “Cloud-based applications offer significant financial savings by enabling more cost-effective scaling, as well as a reduction in hardware maintenance and management costs, more resilience, ease of mobile support, flexibility, and greater user experience.” Integrators are adjusting business models to leverage cloud-based solutions and there has been a rise of cloud-based products and offerings Accessibility, Infrastructure And Management Wayne Jared, VP Engineering of 3XLOGIC, Inc., another Expert Panelist, lists three features of cloud-based SaaS that are the most valuable: Eliminating the need for internal infrastructure, and thus upfront costs and long-term maintenance issues; Allowing “experts” to manage the environment and take the burden off stretched or non-existent IT staff; Accessibility from anywhere for ease of use with higher-level security. There has been a rise of cloud-based products and service offerings that security integrators have access to. While a few key players have offered cloud-based solutions for a couple of years, on the video side in particular, now the cloud is really picking up steam across all other security and life safety solutions. As a result, integrators are adjusting their business models to leverage these cloud-based solutions into recurring revenue models as managed security service providers (MSSP). Part two, coming soon.
The security marketplace is talking about a lot of different subjects. Our website’s Expert Panel Roundtable discussions in 2018 reflected some of the “hot topics” in the industry. The very most-clicked-on Expert Panel Roundtable discussion in 2018 was about privacy issues and GDPR’s impact on physical security systems. Other hot topics that made the Top-10 list of roundtable discussions included obstacles to adoption of mobile credentials, what’s new “on the edge,” and the value of physical security data. Here is a listing of the Top 10 Expert Panel Roundtable discussions posted in 2018, along with a “sound bite” from each discussion, and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2018 (including the quotable panelists named and linked below). 1. How do privacy issues and GDPR impact physical security systems? "GDPR specifically restricts the capture and use of EU residents’ personal data and is in direct conflict with the adoption of artificial intelligence (AI) platforms to track individual activities. The challenge for manufacturers will be to design solutions capable of capturing valuable information for security or business intelligence purposes while simultaneously anonymizing retained data.” - Peter Strom, March Networks 2. What are the security challenges of the hospitality market? "The primary challenge the hospitality industry faces is the fine balance between the delivery of exceptional customer service and maintaining a safe and secure environment. The industry sees a range of threats, including theft, terrorism and natural disasters, and more modern risks, such as those related to cybersecurity, liability and compliance." - Jumbi Edulbehram, Oncam 3. Where is it inappropriate to install video cameras? "The most obvious examples would be in bathrooms or bedrooms, but the more interesting cases are those that are not so obvious – such as religious institutions like a church or a mosque. An increase in the boldness of would-be thieves has led to a recent rise in surveillance outside of houses of worship." - Stuart Rawling, Pelco by Schneider Electric 4. What technology will impact security most in the rest of 2018? "The hottest trend we are currently seeing in 2018 is the continued adoption of intelligent devices and automation into the security framework. We have embraced a model where our software and hardware components continually get smarter and easier for security and IT teams to manage and deploy." - Stuart Tucker, AMAG Technology 5. What are the obstacles to adoption of mobile credentials for access control? "Mobile credentials have been slow to take off because legacy readers traditionally did not have Bluetooth or NFC capacity. However, upgrade kits will soon be available from some access control vendors, and customers will be able to easily upgrade their readers." - Derek Arcuri, Genetec 6. What’s new “on the edge” of security and video surveillance systems? "As more powerful in-camera chipsets are developed, edge devices are capable of even more powerful analytics that can inform operators in real-time of events requiring attention. Part of this significant evolution is from a form of artificial intelligence (AI) called deep learning." - Paul Kong, Hanwha Techwin America 7. Are integrators and end users overwhelmed by too many choices? "Being proactive in tracking new developments and networking with like-minded professionals are critical. Find out what your colleagues are using or testing, and get their feedback on what is working well, especially if their organization is similar to yours. Join local groups, attend industry conferences, and connect on social media to compare notes on emerging technologies." - Brandon Reich, Pivot3 8. What role does social media play in promoting security? "Social media can help us reduce false police dispatches by drawing in a personal circle of people that can validate an alarm, whether it be a neighbour looking out their window to see what’s going on, or a family member that knows your travel plans and is taking care of your house." - Wayne Jared, 3xLOGIC 9. How should your security company measure total cost of ownership (TCO)? “When looking at TCO you need to consider the obvious initial capital cost – compared to alternatives – and also the operational costs across the lifespan of the systems, across one, three and five years. On top of this, though, security can add additional value through integration.” - John Davies, TDSi 10. What is the value of physical security data? "While active protection is the primary job of a security system, the data generated by today’s networked solutions can provide a wealth of intelligence to help organisations optimize both their security strategies and their business operations.” - Mark Perkins, Boon Edam
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500™ winner, announced the availability of its portfolio of solutions including infinias access control, VIGIL video management system and TRENDS business intelligence platform into the European market through its sister company, PAC, located in Stockport in the UK. While 3xLOGIC’s solutions have been trusted for many years in North America and beyond, the launch of infinias, VIGIL and TRENDS in the UK represents the first time that the cost-effective, easy-to-use solutions have been made available in Europe, a key new market for 3xLOGIC. Commercial-Grade Features The launch of the 3xLOGIC solutions meets a fast-growing demand in the European market Whether leveraging cloud or server-based options, 3xLOGIC’s infinias, VIGIL and TRENDS solutions are easy to manage, simple to install and simple to scale, to meet an organization’s changing needs. “infinias is the original IoT access control system, and it now serves thousands of installations ranging from one to thousands of doors,” said Wayne Jared, VP of Engineering for 3xLOGIC. “Its market-leading design, simplicity, scalability and integration with video have resulted in exponential adoption across all vertical markets including delivering commercial-grade features at a price point for the small-to-medium business market.” Demand In The European market The launch of the 3xLOGIC solutions meets a fast-growing demand in the European market for a solution which is internet-facing with a cloud back-end. These solutions will be available in the UK from November 2018, followed by other European markets in due course, and will be supplied by existing PAC partners who possess the necessary skill set and business model to leverage this exciting technology. Infinias access control is available in four versions: cloud, essentials, professional and corporate, each tailored to specific end user needs and capabilities. Training Facility For End-Users With an Easy Set-up Wizard to guide users through installation, the application has users up and running in minutes The VIGIL Software Suite provides a powerful, enterprise-grade video management system (VMS) with unrivaled ease of set-up and use. VIGIL Server software is the core program upon which all other 3xLOGIC applications are built. With an Easy Set-up Wizard to guide users through installation, the application has users up and running in minutes. Designed with bandwidth limitations in mind, VIGIL Server utilizes 3xLOGIC proprietary RapidStream technology and Substream Motion Detection capabilities to provide high resolution over low bandwidth networks. To support 3xLOGIC’s solutions—infinias, VIGIL and TRENDS—PAC will offer robust after-sales support through telephone and field support engineers based in the UK. In addition, a series of online training courses have been developed to ensure customers can take full advantage of all the features and benefits infinias offers. A dedicated training facility in Manchester will offer hands-on training for end users, while they can also schedule on-site and/or online training to supplement their needs.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announced the successful integration of the company’s infinias access control software with Allegion’s Engage platform of wireless locks. Residential Or Commercial Door Wireless locks are the controller, reader, power, door contact, and lock hardware all bundled together in one easy-to-install device. Allegion Wireless Locksets integrated with infinias are modular and customized for either mortise or cylinder locks. These wireless locks also offer custom lever styles and finishes, making them versatile for almost any residential or commercial door. The integrated wireless locks are a great answer for facilities that want to add access control to less active doors at a reasonable cost “This is a solution that’s perfect for any interior door application that requires complex access control wiring installations,” said Wayne Jared, 3xLOGIC VP of Engineering. “These wireless locks are also a great solution for doors where you would not normally put access control due to high cost.” Building Access Management These integrated wireless locks are a great answer for facilities that want to add access control to less active doors at a reasonable cost, thereby effectively extending access management to larger areas of their buildings. Jared continued, “These integrated locks significantly reduce installation cost per door, bringing many more doors onto the existing system that would usually be left out and unprotected.” Allegion’s Engage platform comprises both NDE cylindrical and LE mortise-type locks. Customers will be able to use the Allegion Configurator to build their custom lockset and to get list price. Users will get a wireless lockset, gateway, and license. The gateways are licensed by each device added to infinias and are supported by all infinias platforms, including infinias CLOUD. The wireless lock integration will be available through 3xLOGIC’s distribution channels, with General Availability commencing 18 October.
3xLOGIC, Inc., global provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500™ winner, announced the release of the latest version of the company’s access control solution, infinias 6.3. infinias 6.3 Access Control Solution The infinias 6.3 software is loaded with multiple powerful features: Advanced Mobile Credential - Alert some or all credential holders to sensitive information quickly and easily. New Responsive User Interface - Designed to deliver a superior user experience on all devices and platforms. Infinias CLOUD’s Elevator Control - Configuring for elevator control has never been easier for any number of elevator banks and cabs, and with support for up to 64 floors per bank/cab. Integrated Wireless Locks - Integrated with Allegion’s Engage NDE Series Wireless Locks. Location Services - Administrators can configure how close a user must be to a door to gain access, to ensure phone (credential) is present. The next generation of mobile credential is one of the most exciting features of this new release. 3xLOGIC’s mobile credential adds push notification, location services, Multi-factor authentication (MFA) and upgrades to the default door page. Multi-factor Authentication Use push notification to alert all your credential holders of any events of significance, such as school opening delays or lockdowns. Notifications can be sent ad hoc to a single person or group or use the industry-leading infinias Rules Engine for preconfigured notifications based on events. For example, receive a notification when a door is forced between 6 pm and 6 am. Location services add two new capabilities: when a user brings up the app, the three nearest doors are shown automatically on the home page, making the app more convenient, and administrators can also configure how close a user has to be to a door to gain access, to ensure the phone is present. Privileges can now be configured to require MFA and if so, a user will have to either already have or establish an unlock passcode/biometric/gesture/pin, thus adding ‘something you are’ or ‘something you know’ authentication forms to the existing ‘something you have’ (the credential) for increased security. “Unlike other offerings that require expensive proprietary readers, our mobile credential application is agnostic to any reader on the infinias server and can even work in a reader-less environment, because the application communicates directly to the server to trigger logic,” said Wayne Jared, 3xLOGIC VP of Engineering. Come see all of 3xLOGIC’s industry-leading solutions at the ISC West tradeshow in Las Vegas, 11-13 April, booth #26099.
3xLOGIC, Inc., provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announced that a new, no-cost feature has been added to their infinias access control software: push notifications. “Customers today understand the value of being able to receive a push notification based on an event. In the security world, instantly viewing recorded and live video of an access control event, and potentially taking action, for example unlock the door associated with the event, is a clear win,” explained Wayne Jared, 3xLOGIC’s VP of Engineering. “The primary customer benefit is that anyone who is responsible for monitoring a system will be proactively notified when an access control alarm takes place, and they will receive real-time information they can use to manage the event. This unique feature greatly improves the efficiency of managing and securing their facility.” Proactive mobile access control management Users receive push notifications directly to their mobile device using 3xLOGIC’s Site Access mobile app available for both iOS and android devices. infinias Push Notification feature allows users to proactively manage their access control system, instead of just reacting to a problem. With infinias Push Notification, users can be notified when a door is propped open, left open, or in an override state, such as Lockdown. Users are also notified when there is any activity before or after normal work hours. Business owners, security guards, office administrators, receptionists and many others will save time and get the specific information they need to be more effective, increase overall security, and improve productivity. “The infinias rules engine, which generates the notifications, allows the user to program who to notify, what hours of the day to notify them, defines which doors for which to receive notifications, and defines the specific events which trigger notification. The end user is in full control and can modify how the notifications are generated and communicated,” said Jared.
infinias is pleased to introduce Intelli-M Access software integration with Milestone XProtect ® video management software ( VMS ) solutions to deliver a unified access control and video monitoring environment. Using the XProtect ® Access Control Module (ACM), Intelli-M Access software adds access control management functionality to the Milestone XProtect ® Smart Client for a truly integrated solution. Included are dedicated functions such as lock, unlock, momentary unlock, control doors from the Milestone XProtect interface, and view access control events in the Milestone XProtect interface, including person and card information. “Intelli-M Access is 100% IP based, which is one of the main reasons we were interested in working with Milestone. The expanded integration greatly improves the speed and efficiency of incident investigation and video verification for associated access and video events. The XProtect ACM integration capabilities are the best we’ve seen to date and deliver the seamless integrated monitoring environment our customers have been requesting,” says Wayne Jared, President, infinias. “Milest one customers now have the option to work from the interface of Intelli-M Access and from the XProtect Smart Client. Such flexibility allows different operators to do what is most efficient and preferential for their responsibilities and skills,” says Trine Voss, Head of Solution Partner Program, Milestone Systems. “Video verification of access control events can provide critical information needed for optimal response to incidents, and resolution thereafter.” Effective Jan 1, 2015, the infinias ACM integration module will be subject to licensing fees.
infinias, an industry-leading manufacturer and provider of IP-based access control software and hardware, announces release of a newly integrated access control and video management system – Intelli-M Access NVR. Initially launched this year at ISC West, the Intelli-M Access NVR can support up to 300 eIDC32 doors and up to 32 channels of IP video recording. The product is outfitted in an industrial 2U rack mount chassis and comes equipped with an Intel i5 processor and 8GB of RAM to manage access control and video operations. Internal storage configurations in 2, 5 and 8TB provide weeks of video storage. The units come pre-loaded with Intelli-M Access NVR software. The software utilizes the same easy navigation and intuitive design that our customers have come to appreciate and now includes a video integration tab. This gives users the ability to manage their cameras and settings, as well as configure camera groups and tours. Through the new infinias Connect client software, a user is provided a unique dashboard that incorporates both video and access control events. infinias Connect provides many of the standard video capabilities, as well as momentary unlock functionality, live display of door events, and integration with a cardholder’s badge photos. From a video retrieval perspective, customers are able to utilize access control events to find the associated recorded video. “We developed the IA NVR specifically for the 80% of the market that is less than 32 doors and cameras,” said Wayne Jared, President of infinias. “In one cost effective solution, the IA NVR delivers one web interface for configuration of both access control and video, making management a snap.” The infinias Intelli-M Access NVR provides an all-in-one video and access control management solution for monitoring your business around-the-clock. The network video recorder enables you to monitor your locations, manage video and control access – and offers a flexible, cost-effective security solution for a range of industries, including healthcare, banking, education and small to large enterprises.
How To Ramp Up Perimeter Security With License Plate Reader TechnologyDownload
Solve Access Control Challenges in the Healthcare SectorDownload
Getting the Most Value From Software Subscription AgreementsDownload
Shifting Trends in Operation Centers and Control Rooms for 2021Download