LifeSafety Power Inc. understands the challenges of today’s security integrator and end user. It knows that labor savings, standardization and being able to generate real-time data and status on the health and viability of locks, access control, batteries and other connected components is critical to system reliability and resiliency. Minimize Errors During Installation With those principals as its guide, LifeSafety Power will feature its award-winning networked power management solution...
Matrix Comsec, a manufacturer and provider of security and telecom solutions, is participating in ISC WEST 2019, Las Vegas, USA on 10th April 2019. Matrix will be showcasing its comprehensive range of IP video surveillance, people mobility management - an innovative range of access control and time-attendance solutions at the event. Both these solutions are specifically designed for large and multi-location enterprises, SME and SMB organizations. Matrix is known for offering technology driven,...
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will...
Today’s security industry technology standards create a common framework for achieving predictable performance. Systems are made more secure and easier to install, use and integrate with other devices. Standards are also intended to be living documents, open to continual refinements to benefit manufacturers, integrators and end users. An excellent example is the Open Supervised Data Protocol (OSDP), which is now the industry’s gold standard for physical access control installations....
CDVI, global access control manufacturer firm, announced new innovative products to its extensive range of access control solutions. From Bluetooth keypads and stylish DESFire readers to their ATRIUM Online Access Control, this one-stop-shop offers its UK and Irish customers cutting-edge and efficient solutions for private and public buildings. “Our experience as an access control manufacturer truly makes CDVI the installer’s choice. Thanks to innovative products answeri...
Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announces the global launch of their new Access Now Partner Program. Designed to offer partners the opportunity to establish themselves as a go-to source with a solution in Secure Access, Access Now provides an enhanced opportunity for top line revenue and bottom line profit growth while setting them apart from the competition. “Enterprises are looking to fortify cyber defences, be more respon...
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announced continued expansion of the company’s staff to align with its new global growth strategy. As previously announced, 3xLOGIC, PACOM, and PAC/GDX have joined forces to build the strongest and most innovative security manufacturer in the industry. The businesses will continue to operate under their own branding as usual and will report to a global management team, as Stanley Products and Solutions (SPS), under the leadership of CEO Matthew Kushner. Jason Bryan has joined the company as the Director of Sales, North America. Jason will assume responsibility for field sales of 3xLOGIC and PACOM products in the US and 3xLOGIC’s expanded regional sales team will report to him. Jason has worked for parent company Stanley Black & Decker (SBD) almost since graduation from Purdue University and most recently has been managing a large part of the Sonitrol business in Indianapolis. Jason brings a wealth of knowledge to the team about the Security industry in general. In-depth product knowledge Andrew is working with his base of Sales Engineers to enhance the SE organization and its ability to support the sales teamAndrew Griffith has joined 3xLOGIC as the Global Director of Sales Engineering. Andrew worked for sister company, PACOM, for 16 years. He brings an in-depth knowledge of the PACOM product and has a long history of managing a global technical team. Andrew is working with his base of Sales Engineers to enhance the SE organization and its ability to support the sales team. Andrew is also recruiting personnel to expand the SE organization globally. 3xLOGIC is quickly moving to a global organizational structure and that expansion requires building out the company’s leadership team in various regions to properly support the sales and support functions. To that end, 3xLOGIC has introduced the role of Country Manager in each region where the company is now operating. Currently, Erik Boudier (France and MEA) and Neil Goward (UK and Baltics) will also report to Andrew Griffith as Country Managers in their respective regions. In the near future, additional leaders will be announced in other key regions. Country Managers are responsible for the smooth operation of the business in that region, as well as providing the top-tier product and customer support our partners and end users have come to expect. Managing electronic security business in LATAM Cesar will remain active in his 3xLOGIC Key Account position, supporting the Stanley Global electronic security business Cesar Gonzalez will assume management of the LATAM region for both PACOM and 3xLOGIC. Cesar will remain active in his 3xLOGIC Key Account position, supporting the Stanley Global electronic security business and the company will provide additional support to him in his expanded role. The existing LATAM team in Mexico and Colombia will report directly to Cesar. Additional Regional Sales Managers and other staff to expand the global sales team will be announced over the coming weeks. “These are exciting times in the SPS business and new opportunities will continue to multiply. We are perfectly positioned to continue our explosive growth in 2019, and I am proud to be a part of this team,” said Bill Hobbs, VP of Sales. Expanding to best serve partners and customers Hobbs further stated “As we continue to integrate the 3xLOGIC, PACOM, and PAC businesses under the SPS umbrella, the entire sales team will be well positioned to represent our expanded global product line and presence. We will maintain our product Subject Matter Experts in the support roles in the business and continue to look for ways to expand to best serve our partners and their customers. “Our number one goal is to provide customers and partners with the best solutions and support for the security issues we face today—today’s announcement and coming personnel additions will enable us to meet and exceed that goal.”
Matrix Comsec, global manufacturer and provider of Security and Telecom solutions, is participating in IT EXPO 2019 at Fort Lauderdale, Florida to be held from 30th Jan to 1st Feb 2019. Matrix will be showcasing its comprehensive range of people mobility management, IP video surveillance and unified communication solutions at the event. Matrix is known for its customer centric, innovative range of solutions for unified communications, IP video surveillance, access control and time-attendance applications catering to diverse and complex deployments especially for the SMB, SME and large enterprises. SPARSH VP710 Video And COSEC ARGO Door Controller Enterprise video collaboration solution, SPARSH VP710 that sets a new benchmark by offering enhanced video and voice capabilities. SMB IP-PBX, SPARK100, an all-in-one communication solution with enterprise-grade unified communication and collaboration. Next generation door controller, COSEC ARGO for the access control market. The new door controller is equipped with features like 3.5” IPS touchscreen LCD with Gorilla Glass, powerful processor for ultra-fast user identification, intuitive user experience, vandal resistant (IK08). Matrix IP Video - Access Control Integration Matrix will also be demonstrating seamless integration between Matrix IP video surveillance, access control and unified communications solutions, along with Matrix video management and device management software suite. Additionally, at this event, Matrix will exhibit its range of Gateways. These gateways allow easy integration with most of IP-PBX, TDM PBX, Softswitch and hosted solutions. Award-winning series of Matrix Gateways are perfect for enterprise and carrier-class solutions for multi-site connectivity and remote survivability while offering superior voice quality and state of the art routing features.
Honeywell announced the launch of Pro-Watch 4.5, the latest iteration of its flagship connected security platform for enterprise and critical infrastructure markets, is available beginning January 2019. Incorporating new features as well as program updates, Pro-Watch 4.5 meets the latest industry compliance requirements, reduces total cost of ownership and increases operator productivity with improved flexibility and scalability from single site to global deployment. Pro-Watch 4.5 Security Platform It comes with latest key features, such as: Web-Based Alarm and Event Handling: Improves operator efficiency, enhances user experience and reduces installation costs through an easily deployable thin client; Access and Vendor Management Portals: Provides functionality unavailable from other physical access control systems and allows operators to accomplish more with fewer dollars by reducing workloads by 20 percent or more; and New Enterprise Tools: Simplifies setup and maintenance of Pro-Watch Enterprise deployments to further reduce operating costs. Pro-Watch 4.5 also includes program updates to its current vendor and access management portals, installation process and overall performance. Connected Ecosystem Pro-Watch 4.5 serves as the center of a connected ecosystem that integrates both Honeywell and third-party solutions to provide a comprehensive connected security platform that meets the unique security needs of each user. Its unmatched compliance offers regulated industries the tools needed to adhere to the most stringent requirements for any industry. It is well suited for enterprise and critical infrastructure environments across a variety of industries including education, pharmaceutical, utilities and financial.
Viking Electronics, Inc., a USA-based manufacturer of over 500 security and communication products, will be spotlighted in the nationally recognized production called Manufacturing Marvels, on January 31, 2019 on The FOX Business Network. Manufacturing Marvels Created by award winning producers Bob and Jerry May of Marvel Production Group, LLC and narrated by acclaimed former FOX and ABC anchor John Criswell, the segment spotlights Viking’s roll as a leader in the security and communications industry. The segment showcases Viking’s innovative designs, expansive product line, and USA-based manufacturing operation. Viewers get an inside look at Viking’s manufacturing facility located in Hudson, Wisconsin. The 2-minute production provides information about the cutting-edge technological innovations, tough-as-nails craftsmanship, and best-in-class customer support services that have been the hallmark of Viking for over 50 years. Viking Electronics can be seen on January 31, 2019 during the Manufacturing Marvels broadcast at approximately 10:30pm Eastern Standard Time (EST) (9:30pm Central Standard Time) on The FOX Business Network.
Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announces the launch of a new Community Edition of its powerful software-based virtual Application Delivery Controller (vADC) to help application developers create innovative application solutions with dramatically lower costs and time to market. Pulse vADC Community Edition integrates easily with common DevOps tools for automated provisioning and orchestration, such as Kubernetes, Terraform, Puppet and Chef, making it easy to start building secure and scalable applications from day one. Launching New Applications Pulse Secure is setting the benchmark for try before you buy that competitors will have to follow" “Pulse Secure vADC Community Edition is a free, full-featured application delivery controller that can be used in production scenarios which allows developers and enterprises to accelerate cloud application deployment by removing the hurdle of procurement and tooling. Pulse Secure is setting the benchmark for try before you buy that competitors will have to follow,” said Mike Fratto, senior analyst at 451 Research. Developers can use the Community Edition for commercial applications up to a limit of 10 Mbps, and up to four nodes can be clustered together for high availability, for a maximum aggregate bandwidth of 40 Mbps. The Community Edition is ideal for building and launching new applications, and offers easy in-line upgrades for 24x7 support options and higher throughput to support global-scale applications. Powerful Graphical Analytics In addition, customers can upgrade seamlessly to Pulse Services Director for flexible capacity-based licensing, and centralized enterprise management features, including powerful graphical analytics with actionable insights, to help understand application behavior and to diagnose application problems on the network. “Our new Pulse Secure vADC Community Edition is a free-to-download, free-to-use, full-featured virtual application delivery controller (vADC) solution, which developers can use immediately to build smarter applications,” says Prakash Mana, vice president of product management for Pulse Secure. “Customers starting with the Community Edition can then upgrade to Pulse Services Director for enterprise management tools, flexible licensing, technical support and graphical analytics for on-demand applications.” Fully-Supported Platform Pulse Secure vADC Community Edition offers all the capabilities of the full product with the only limitations being those of scale and support" “Unlike other platforms that have a restriction on certain features within the ‘Free Edition’ – Pulse Secure vADC Community Edition offers all the capabilities of the full product with the only limitations being those of scale and support. Community Edition users still benefit from access to full documentation via the Pulse Community, and the option to migrate to a fully-supported platform or to scale up to higher throughput without the need for downtime,” Prakash adds. Pulse Secure vADC Community Edition is available in three ways. For container deployments, the software can be installed from the Docker Hub without a need to register, giving frictionless access for container and microservices deployment. Transparent Pricing Models Developers can use one-click access to the Community Edition via cloud marketplaces, such as Amazon AWS, Google Cloud and Microsoft Azure. Alternatively, downloads of the Community Edition are available from the Pulse Secure website, which offers the latest virtual appliance software images and access to full documentation. Our approach is to offer a low-friction option that is truly cloud-portable, allowing customers to migrate policies across multiple virtual and cloud platforms" “Our approach is to offer a low-friction option that is truly cloud-portable, allowing customers to migrate policies across multiple virtual and cloud platforms, so they are no longer tied to a specific cloud architecture,” says Prakash. “And unlike open source or other entry-level solutions, the Pulse vADC Community Edition includes full enterprise-grade capabilities such as an easy-to-use graphical user interface, global load balancing and web application firewall as an integrated part of the solution, with transparent pricing models for upgrades and flexible licensing.” Orchestration Platforms Also highlighting the benefits for Pulse Secure partners, Prakash commented: “Our Community Edition makes it easier for our channel to offer new types of solutions to application developers that can combine with additional tools and orchestration platforms such as Terraform and Kubernetes to streamline proof of concept projects which can move seamlessly to full scale production deployments.” “As online applications become more complex, more distributed and more virtualized, organizations need a broader set of tools to solve performance problems for their web-based services. With Pulse Secure vADC Community Edition, organizations have a simpler way to explore the potential of the software without compromising on the critical features that have become an important part of modern application platform development processes,” Prakash concludes.
Johnson Controls announces the release of CEM Systems AC2000 v10.1, which contains a number of new features that improve functionality and the user experience and help to mitigate health and safety risks. Support for a range of new third-party products that increase the performance and scope of the CEM Systems AC2000 access control system has also been added. The Health and Safety (H&S) Induction Check application for CEM Systems emerald intelligent access terminals allows cardholders to self-certify with a card swipe on the emerald terminal once they have completed H&S induction training and before they are provided access to a site. The application automatically records induction completed date on the CEM Systems AC2000 system, helping mitigate the risk of H&S incidents and report on who has and hasn’t completed training. CEM Systems AC2000 v10 Functionality at the edge has been improved with enhancements to the Local Access Remote application on the CEM Systems emerald terminal Another H&S feature now available with AC2000 v10.1 is the Emergency Responder Remote application which helps improve emergency response times during incidents. This application allows system users to quickly find emergency responders (Fire Marshalls, First Aiders and/or First Responders) via CEM Systems emerald terminals. Functionality at the edge has been improved with enhancements to the Local Access Remote application on the CEM Systems emerald terminal. This allows ‘Extra Access’ to be added, amended and removed via the app on the CEM Systems emerald terminal and provides potential cost savings for remote sites where a workstation client may not be feasible. MorphoWave Compact Biometric Access Reader Support has been added for the MorphoWave Compact frictionless biometric access reader, SimonsVoss SmartIntego wireless locking solutions and STid Architect range of RFID readers. This builds on the range of biometric, wireless lock solutions and RFID reader options that available to CEM Systems AC2000 system users.
With the coming of a New Year, we know these things to be certain: death, taxes, and… security breaches. No doubt, some of you are making personal resolutions to improve your physical and financial health. But what about your organization’s web and mobile application security? Any set of New Year’s resolutions is incomplete without plans for protecting some of the most important customer touch points you have — web and mobile apps. Every year, data breaches grow in scope and impact. Security professionals have largely accepted the inevitability of a breach and are shifting their defense-in-depth strategy by including a goal to reduce their time-to-detect and time-to-respond to an attack. Despite these efforts, we haven’t seen the end of headline-grabbing data breaches like recent ones affecting brands such as Marriott, Air Canada, British Airways and Ticketmaster. App-Level Threats The apps that control or drive these new innovations have become today’s endpoint The truth of the matter is that the complexity of an organization’s IT environment is dynamic and growing. As new technologies and products go from production into the real world, there will invariably be some areas that are less protected than others. The apps that control or drive these new innovations have become today’s endpoint — they are the first customer touch point for many organizations. Bad actors have realized that apps contain a treasure trove of information, and because they are often left unprotected, offer attackers easier access to data directly from the app or via attacks directed at back office systems. That’s why it’s imperative that security organizations protect their apps and ensure they are capable of detecting and responding to app-level threats as quickly as they arise. It’s imperative that security organizations protect their apps and ensure they are capable of detecting and responding to app-level threats as quickly as they arise In-Progress Attack Detection Unfortunately, the capability to detect in-progress attacks at the app level is an area that IT and security teams have yet to address. This became painfully obvious in light of the recent Magecart attacks leveraged against British Airways and Ticketmaster, among others. Thanks to research by RiskIQ and Volexity, we know that the Magecart attacks target the web app client-side. During a Magecart attack, the transaction processes are otherwise undisturbed Attackers gained write access to app code, either by compromising or using stolen credentials, and then inserted a digital card skimmer into the web app. When customers visited the infected web sites and completed a payment form, the digital card skimmer was activated where it intercepted payment card data and transmitted it to the attacker(s). Data Exfiltration Detection During a Magecart attack, the transaction processes are otherwise undisturbed. The target companies receive payment, and customers receive the services or goods they purchased. As a result, no one is wise to a breach — until some 380,000 customers are impacted, as in the case of the attack against British Airways. The target companies’ web application firewalls and data loss prevention systems didn’t detect the data exfiltration because those controls don’t monitor or protect front-end code. Instead, they watch traffic going to and from servers. In the case of the Magecart attacks, the organization was compromised and data was stolen before it even got to the network or servers. Today’s proven obfuscation techniques can help prevent application reverse engineering, deter tampering, and protect personal identifiable information and API communications Best Practice Resolutions The Magecart attacks highlight the need to apply the same vigilance and best practices to web and mobile application source code that organizations apply to their networks—which brings us to this year’s New Year’s resolutions for protecting your app source code in 2019: Alert The key to success is quickly understanding when and how an app is being attacked First, organizations must obtain real-time visibility into their application threat landscape given they are operating in a zero-trust environment. Similar to how your organization monitors the network and the systems connected to it, you must be able to monitor your apps. This will allow you to see what users are doing with your code so that you can customize protection to counter attacks your app faces. Throughout the app’s lifecycle, you can respond to malicious behavior early, quarantine suspicious accounts, and make continuous code modifications to stay a step ahead of new attacks. Protect Next, informed by threat analytics, adapt your application source code protection. Deter attackers from analyzing or reverse engineering application code through obfuscation. Today’s proven obfuscation techniques can help prevent application reverse engineering, deter tampering, and protect personal identifiable information and API communications. If an attacker tries to understand app operation though the use of a debugger or in the unlikely event an attacker manages to get past obfuscation, threat analytics will alert you to the malicious activity while your app begins to self-repair attacked source code or disable portions of the affected web app. The key to success is quickly understanding when and how an app is being attacked and taking rapid action to limit the risk of data theft and exfiltration. Protecting encryption keys is often overlooked but should be considered a best practice as you forge into the new year with a renewed commitment to app security to ensure your organization’s health and well-being in 2019 Encrypt Finally, access to local digital content and data, as well as communications with back office systems, should be protected by encryption as a second line of defense, after implementing app protection to guard against piracy and theft. However, the single point of failure remains the instance at which the decryption key is used. Effective encryption requires a sophisticated implementation of White-Box Cryptography This point is easily identifiable through signature patterns and cryptographic routines. Once found, an attacker can easily navigate to where the keys are constructed in memory and exploit them. Effective encryption requires a sophisticated implementation of White-Box Cryptography. One that combines a mathematical algorithm with data and code obfuscation techniques transforming cryptographic keys and related operations into indecipherable text strings. Protecting encryption keys is often overlooked but should be considered a best practice as you forge into the new year with a renewed commitment to app security to ensure your organization’s health and well-being in 2019. Protecting Applications Against Data Breach According to the most recent Cost of a Data Breach Study by the Ponemon Institute, a single breach costs an average of $3.86 million, not to mention the disruption to productivity across the organization. In 2019, we can count on seeing more breaches and ever-escalating costs. It seems that setting—and fulfilling—New Year’s resolutions to protect your applications has the potential to impact more than just your risk of a data breach. It can protect your company’s financial and corporate health as well. So, what are you waiting for?
As buildings become more complex and smarter, the age-old traditional maintenance methods that are based mostly on hands-on human monitoring are becoming more and more inadequate. Instead, the world is fast adopting building automation as a key component of smarter and more proactive maintenance strategies. The aim is to free up maintenance staff and give them time to focus on other tasks while machines monitor the different systems that work together to make the facility functional. Specifically, Internet of Things - or, IoT - enablement appears set to transform the way facility managers deliver service to building occupants. The trends are many and the possibilities are almost mind-boggling, from inventory management, to work scheduling and energy efficiency, the list goes on and on. Below, we look at a few ways in which IoT is being used for Facility Management and Security. Revolutionize Maintenance Through Condition-Based Maintenance For years now, the norm among maintenance professionals has been a time-based approach, or in simpler terms, performing maintenance operations after a set period of time. But a major flaw of this system is that components were being replaced periodically whether the parts were actually worn out or not. Of course, that meant some of these maintenance activities simply weren’t cost-effective. To avoid this waste from continuing, a subset of IoT known as IIoT can now be used to optimize the maintenance process. IIoT works as a centralized network of connected systems and devices that can talk to one another and generate and relay data Rather than changing parts on a time-based schedule, IIoT works as a centralized network of connected systems and devices that can talk to one another and generate and relay data. Selected equipment are fitted with sensors that monitor specific operational parameters and let maintenance professionals know how the machines under supervision are working, understand their current condition, and then pinpoint the optimum time they need to be maintained. The information generated this way is vital as it allows maintenance staff to intervene just in time to avoid costly downtime and other associated inconveniences. This is, in a nutshell, the basics of predictive maintenance and condition-based maintenance. These days, by implementing condition-based maintenance, IIoT is being used to effectively monitor a wide range of systems such as lighting, HVAC, fire suppression, security, etc. The applications are numerous and so are the benefits. On page 52 of this guide by the US Department of Energy, they state that a functional predictive maintenance program could yield up to 10 times ROI, reduce maintenance costs by 25% to 30%, and reduce downtime by 35% to 45% Along with fire suppression, IIoT is effectively monitoring a wide range of systems such as lighting, HVAC and security Remote Monitoring Of Facilities Physical inspections have been a critical condition for the success of conventional maintenance programs, even in hazardous environments. But, with the increasing emphasis on personnel safety, organizations want alternative solutions that allow staff to examine assets without being physically present. Facility managers and their team working in industries like manufacturing, oil and gas, and mining can relate with these constraints. And these industries can benefit greatly from deploying predictive maintenance solutions. For example, in the oil and gas industry, IIoT sensors can be used to monitor remote and highly critical assets. These sensors can be used on pipelines to detect anomalies (especially corrosion) and pass that information to supervisors for necessary action. By doing this, potential failures are quickly predicted to avoid often disastrous incidents. Managing Energy Consumption Sensors are also being embedded in building components and devices like HVAC systems, lights, doors, windows to understand energy consumption and proactively manage it. Facilities that use this technology could achieve substantial energy savings. In a press release by IT research and advisory company, Gartner, they stated that IoT can help reduce the cost of energy - as well as spatial management and building maintenance - by up to 30%. Looking at HVAC systems very closely, we see that they are a major source of energy usage in any building These sensors work by monitoring different conditions in the building and causing a power-saving action based on the data received. For instance, occupancy sensors can order lights to turn on when it senses motion in a room and then turn off the same lights when there is no presence there. That way, there is no need to wait for someone to remember to switch off the lights when they are not needed. Another very common use is in HVAC monitoring. Looking at HVAC systems very closely, we see that they are a major source of energy usage in any building. So, the issue is how can one use IIoT to manage HVAC and possibly reduce their energy usage? Well, in its most common form, IoT-enabled HVAC works as a connection of sensors and thermostats that monitor factors like indoor air quality, temperature, and environmental changes then communicate with the rest of the HVAC equipment and make needed adjustments for occupants’ comfort. Not only that. IoT-enabled HVAC works as a connection of sensors and thermostats that monitor factors like indoor air quality, temperature, and environmental changes The Technology Can Be Configured To: Track energy consumption at different distribution points throughout the building. Track usage from the power source right down to the consumption point. Detect sudden voltage drops or spikes (usually an indication of some fault). These are essential benefits because HVAC units are notorious for consuming large amounts of energy when they are working inefficiently. Security And Access Control Smart surveillance is another important area of application for IoT in facilities management. It takes several forms such as the monitoring of life-saving systems like intruder or fire alarms, invisible barriers, and other safety installations. Facility managers are using IoT across different industries to obtain live information about potential emergency situations with a view to responding before the issue escalates. In such cases, quick detection of any strange activity is key because many of these installations have tangible negative effects when they fail or when they are intentionally sabotaged.Smart surveillance is another important area of application for IoT in facilities management Fortunately, the surveillance equipment can also be setup to send alerts to cellphones to aid emergency response or evacuation as the case may be. Smart surveillance is also priceless for monitoring the situation in partially or fully automated remote facilities (especially oil and gas installations and mines), and in hostile environments with critical equipment where humans cannot work for extended periods of time. If you are not yet using IoT in your facility, you may be wondering where to start from. To avoid getting overwhelmed, a good place to start would be to try a small-scale deployment of this technology then review its ROI and impact on your operations before adopting a more widespread IoT implementation. This way you can gradually scale up as you and your staff come to understand and adapt and to this new way of doing things.
The term Internet of Things (IoT) has almost been beaten to death at this point, as more and more security integrators, manufacturers and customers take advantage of the ability to increase connectivity between devices (and therefore take on the dangers this introduces). But the methods by which we interact with the IoT and protect its devices are still catching up, which means security manufacturers must take part in shifting their focus toward safeguarding data, engaging in vulnerability testing of products and incorporating stringent protections at every stage of the product development process. One small leak or breach on a single connected device can potentially cause significant damage across an organization Who Is Responsible For IoT Security? One small leak or breach on a single connected device can potentially cause significant damage across an organization, creating a disruption within a company, affecting its assets, employees and customers. The continued question seems to be: Who is ultimately responsible for the security of IoT devices? In a recent survey from Radware, a provider of application delivery and cybersecurity solutions, there was no clear consensus among security executives when asked this question. Thirty-five percent of respondents placed responsibility on the organization managing the network, 34 percent said the manufacturer and 21 percent chose the consumers using the devices as being primarily responsible. Several schools of thought Exist For Each: The Organization It's not surprising that most people see the organization as the main stakeholder for IoT security responsibility; after all, if a company is managing a network, one would expect it to protect the network as well. One way that the organization can embrace this responsibility is by adopting a user-centric design with scalability, tactical data storage and access with appropriate identification and security features (for example, the use of multilevel authentication through biometrics in access control). Organizations must also use their IT team to strengthen the overall cybersecurity of the IoT by keeping up with the latest software updates, following proper data safety protocols and practicing vulnerability testing. The Manufacturer Manufacturers that provide IoT-enabled devices as part of a security system must be fully knowledgeable of the risks involved and effectively communicate them to the integrator or end user. Providing the education necessary and dedication to protecting users of its equipment makes a manufacturer more trustworthy and understanding in the eyes of an end user. Ensuring encryption between devices is a key step that manufacturers can take to work toward achieving complete protection in the IoT. The User Despite the protection delivered by the organization and manufacturer, there's always the option for IoT security to be enhanced or possibly even diminished by the individual user. It's critical that best practices for data protection are in place every time an individual uses a device that is connected to the network. These include disabling default credentials, proper password etiquette, safe sharing of sensitive information and the instinct to avoid any suspicious activity or requests. Manufacturers that provide IoT-enabled devices as part of a security system must be fully knowledgeable of the risks involved The short answer to the responsibility question is this: everyone. Each sector has a responsibility to contribute to the protections needed for IoT-enabled devices. However, as a manufacturer, it is imperative that our teams think about each level of protection when developing products for public consumption, including how the organization implements the technology and how the integrator engages in training with users. Organizations must also use their IT team to strengthen the overall cybersecurity of the IoT by keeping up with the latest software updates Manufacturer Vulnerability Testing One way that manufacturers can implement added protections against outside threats is by boosting their attention to security protocols in the product development stage. For some, this requires a different approach in the design and development of security systems. Identifying vulnerabilities is at the core of this. A security vulnerability in a product is a pattern of conditions in the design of a system that is unable to prevent an attack, resulting in weaknesses of the system such as mishandling, deleting, altering or extracting data. Increased connectivity makes these vulnerabilities more of a liability, as IP-enabled (or networked) devices are more likely to be breached by outsiders looking to permeate an organization and collect valuable data. A security vulberability in a product is a pattern of conditions in the design of a system that is unable to prevent an attack, resulting in weaknesses of the systemWhile some of these hacks are a little more “simple” in nature — such as outsiders trying to guess a password using manufacturer-set passwords — others are more complex, such as a denial-of-service, where attackers attempt to overload the system by flooding the target with excessive demands and preventing legitimate requests from being carried out. This makes it virtually impossible to stop the attack by blocking a single source. As a result of these potential threats — and to help manufacturers deliver best-in-class products — it's imperative that vulnerability testing is done throughout a product's development, starting at phase one in the process. This includes analysis of the type of cyberattacks that can potentially attach, breach and disable a system. Many manufacturers attempt to hack their own products from within the organization — or even go as far as hiring a third-party professional group to do it for them. Success In A Volatile Technology Landscape This kind of development puts a product through rigorous levels of testing, and once weaknesses are exposed, they can be patched up and the cycle of attack-and-defense can take place until the product is protected fully and ready for market. Skipping this step in the development process can open manufacturers up to significant liability, so it's important for this testing to take place and corrective actions be taken to rectify gaps in security. The more extensive an organization's security testing approaches are, the better are its chances of succeeding in an increasingly volatile technology landscape. But the testing doesn't stop in the development stage. Attacks on a system continue long after the product has been introduced to market, requiring continued updates to be made available in an effort to protect customers. Manufacturers are tasked with implementing further firmware updates to keep a product in the field readily prepared to revoke the latest critical bugs that can affect the market. What End Users Demand From Security We're seeing a significant shift in the education and demand from a customer perspective. In the past, consumers took the advice of integrators and consultants as far as the “right” security systems to install for their needs. Today, the self-education of end users is on the rise as more and more IT departments become involved in the selection and investment of physical access control systems. We're seeing a significant shift in the education and demand from a customer perspective A larger number of end users are demanding security products that meet IT standards of network protection, and they take these considerations into account when working with integrator partners on the selection of systems to meet their needs. As a result, manufacturers are tasked with not only developing robust IoT-centric products, but also continuing to be involved on a regular basis in an effort to continuously keep organizations safe. A comprehensive security strategy from manufacturers must involve multiple levels of product selection, testing and integration — centered on the team-based approach to implementing training and protocols within an organization. While manufacturers are stepping up their game in the development of robust products, this remains a team effort that must be addressed every week — not something you implement, then forget about. The safety of data — and the entire organization — depends on it.
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numerous factors that play into the decline of trade shows in general and not something that is limited to the security industry. Those events that are suffering are no longer serving their target market or have failed to adapt to the changes in the industry they serve.However, what we are seeing now is the rise of focused, more “evolved” trade events which fulfill a gap in the industry event calendar and provide something new and fresh to a disillusioned audience. Q: What will be unique about The Security Event, and what role will it serve in bringing together buyers and sellers in the market? Where (geographically) will attendees come from?What we are seeing is a rise of trade events which provide something fresh to a disillusioned audience Norman: The driving ethos behind The Security Event is that we are “designed by the industry, for the industry.” We were able to start with a blank canvas and take on board all the feedback from stakeholders throughout the security buying chain and create an event that is sustainable and fit for purpose. We see the role of the event as a very important one – to truly reconnect the currently fragmented UK commercial security industry, back at the NEC in Birmingham. We had originally anticipated that this would be an almost-exclusively UK event in year one. However, we have seen significant interest from potential visitors from across the wider EMEA region who are keen to do business in the UK. We formed a strategic alliance with Security Essen to help facilitate and strengthen our reach in these regions through additional marketing and PR activities. Consequently, early registrations indicate that it will be approximately an 80% UK and 20% international split. Q: What conference programming is being planned to augment the trade show event? Norman: Content will be delivered across three focused theaters, serving the needs of our audience throughout the buying chain. Emphasis will be placed on the latest technology innovations impacting the industry, practical advice on the most pressing issues facing security technicians, and important industry updates and insights. All sessions are focused on delivering tangible benefits to ensure professionals are equipped to stay relevant and to grow their business and we’re excited to be working with key industry bodies, innovators and experts to deliver the program. We look forward to announcing those in coming weeks. Exhibitors want to re-engage with the thousands of industry colleagues who no longer attend other events on offer Q: Comparisons to IFSEC are inevitable. How will The Security Event be different than the IFSEC Security and Fire shows? What are the advantages of locating at Birmingham NEC? Norman: Both The Security Event and The Fire Safety Event, based at the NEC are completely different to any other trade show in the UK. We pride ourselves in creating a business platform that puts the exhibitors’ needs first, by limiting the size of stands and total number of exhibitors as well as creating a comprehensive CPD accredited educational program for the visitors. Q: Which big industry players are supporting the launch of The Security Event, and what feedback are you hearing in terms of why they signed up at the show's inception? If a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally Norman: Our founding partners are Assa Abloy, Avigilon, Anixter, Comelit, Dahua, Honeywell, TDSi, Texecom, Tyco and Videcon. The full list of exhibitors and supporting partners can be found on our website. The reasons why they have signed up are very simple. They all see the exact same gap in the industry event landscape as we do. We believe there is a need for a 3-day channel focused commercial security exhibition based at The NEC in Birmingham. Our exhibitors want to re-engage with the thousands of industry colleagues who no longer attend the other events on offer. Q: Your 2019 show will be the same week as ISC West in Las Vegas. Do you think the competitive calendar will be a factor? Norman: In terms of our both our audience and our exhibiting base there is very little overlap with ISC West. Generally, if a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally so we haven’t observed any issues so far. We do acknowledge that having two shows at the same time globally isn’t ideal and we have moved our dates in 2020 to the 28-30 April to mitigate this going forward. The Security Event 2020 will not clash with Las Vegas' ISC West 2020 as it will in 2019, says Norman Q: How will you measure success in the first year of the show? What measurements (show size, number of attendees, exhibitor feedback, etc.) will constitute a "successful" first year for the show?The Security Event will continue to evolve year after year, but will intent to stay true to the event's original concept Norman: Great question – the most important barometer of success for me and the team next April is the general industry reaction, after all, this show was created for them. Furthermore, it is vital to us that our exhibitors feel they have achieved their objectives for the show, whether it be quality, quantity of leads or raising awareness of a new product launch. We’ll also be keen to understand how satisfied visitors are with the event, including their views of the content, access to new products/services, effectiveness of the out of hours networking, etc. We are anticipating 6,000 visitors over the 3 days and I believe if we achieve this goal, we will have a strong rebooking on site, laying a great foundation for our 2020 event. Q: How would you expect/hope the show would continue to evolve in coming years? Norman: I hope over the next few years The Security Event cements itself as the industry’s favorite trade show and that exhibitors and visitors alike look forward to every year for both the business opportunities at the event and the networking outside of it. The Security Event will continue to evolve year after year, but I am determined that we stay true to our original concept and the principles on which the show was founded. After all, it is this formula that has proved to be so popular to date.
The best route to greater adoption of robotics in the field of physical security is intellectual honesty, says Travis Deyle, CEO and co-founder of Cobalt Robotics. “Robots are not a panacea, so we must be clear and honest about capabilities and use cases,” he says. “If you are dishonest, people will lose faith. We must have clear expectations about what’s feasible today and possible tomorrow.” The robotics tide is turning in the security market, which is notoriously slow to embrace new technologies. “The tone has changed at recent security events,” says Deyle. “Previously, robots were thought of as a science experiment. But now, there are big-name users wanting to discuss proof of concept. It has evolved from being a novelty to now it’s time to give it a serious look. They want us to help them sell the concept up the chain of command. It’s helpful to have conversations with other parts of the company because it has an impact on the culture of the company.” The robotics tide is turning in the security market, which is notoriously slow to embrace new technologies Cobalt’s robots are purpose-built for a specific use case: Providing after-hours support and security for corporate locations. Indoor environments, confined and controlled, present fewer navigation challenges for robots, which can quickly become familiar with the surroundings and navigate easily through an office space. Indoor robots can provide benefits beyond security, too, such as facility management, promoting employee health and safety, and emergency response. Cobalt's Human-Centered Design Cobalt’s robots also interact well with people. They are friendly and approachable and make employees feel safe and secure. The human-centred design promotes that interaction, and a real person (located remotely) can enter into any interaction instantly as needed. “We combine machines with people,” says Deyle. “We allow the machine to do what it does best, such as dull and boring activities, and add the flexibility and cultural relevancy of having a person there.” Cobalt’s robots also interact well with people, they are friendly and approachable and make employees feel safe and secure When a robot is deployed, it performs a brief mapping phase (about an hour), in which it moves around and builds up a “map” of its space and develops its patrol route. Over time, it lingers more in areas where it encounters more incidents. There are 60 sensors on the robot, including day/night cameras, high-resolution thermal cameras, a card reader that integrates with the corporate access control system, a microphone, and environmental sensors for temperature and humidity. The robot builds models of what’s normal in its environment in terms of people, sound, motion, open doors and windows, and even leaks and spills. And then it detects anomalies and sends relevant notifications to Cobalt specialists, who respond and manage any events in real time. The machine provides unwavering attention, perfect recall, and accountability. Cobalt robots have been designed to help bridge the problems faced with utilizing guards and cameras Accommodating Various Anomalies The Cobalt robot is designed to blend into a high-end office environment, with flexible fabric and a corporate design aesthetic. It is stable beyond 45-degrees, so it’s hard to topple over. The 5-foot-2-inch robot can see over desks and cubicles. It is designed to bridge the gap between guards, who are expensive and underutilised during uneventful night shifts, and cameras, which are unable to respond to nuanced situations. Cobalt Robotics already has customers in defense, finance and manufacturing, and a handful of Fortune 500 companies are looking at the service Autonomous navigation uses artificial intelligence (AI) and machine learning to avoid static and dynamic obstacles. Over time, the robot accommodates various anomalies such as loud machinery noise, and “semantic mapping” adds intelligence to its map. When the robot figures out that a picture on the wall is not a real person, for example, it stores that information for future reference. The technologies enabling robotics in the indoor environment are mature – there have been variations of security robots in operation for decades. What has changed is the costs of the technologies, which are now inexpensive enough to make a robot affordable to businesses. Cobalt Robotics offers an all-inclusive service providing hardware, software, service and maintenance as well as the remote human interface. All together, the service is a third to half the cost of a man-guard, and it bills monthly, says Deyle. Cobalt Robotics offers an all-inclusive service providing hardware, software, service and maintenance as well as the remote human interface Cobalt Robotics already has customers in defense, finance and manufacturing, and a handful of Fortune 500 companies are looking at the service. They are currently operational in the San Francisco Bay area and Chicago and will be in six other geographies in the next three months (in response to customer needs). Uses include offices, museums, warehouses, technology centers, and innovation centers. A former Google employee, Deyle’s experience in robotics goes back to his Ph.D. studies at Georgia Tech, where he worked on developing a robot to deliver healthcare to homebound patients. Deyle and Cobalt Robotics co-founder Erik Schluntz departed Google in 2016 to form Cobalt Robotics. In just 12 months, Cobalt went from the initial idea to paid robot deployments.
The initials GDPR have become synonymous with the need for companies within the European Union to provide consumers greater transparency and better control over their personal data. The General Data Protection Regulation (GDPR) has also increased awareness of privacy concerns around the world. It’s not the only factor highlighting a need for greater privacy – high-profile privacy breaches by companies such as Facebook are also driving the trend. But GDPR’s global impact cannot be denied. In fact, no company should assume that the need to address “GDPR-style” requirements is limited to the EU. As awareness has extended to the four corners of the globe, it has emboldened a new wave of laws and regulations that physical security companies ignore at their own peril. GDPR has increased awareness of privacy concerns around the world, and encouraged other areas to take notice GDPR also regulates how and if data about EU citizens can be transferred outside EU member states’ borders; the receiving country should have equal or better data protection laws in place. This factor also expands the potential impact of GDPR globally. California's Consumer Privacy Act 2020 California, which has the world’s fifth largest economy, passed a law this year that some have called “GDPR Lite.” The law gives the state’s 40 million residents the right to view private data held by companies, to correct it, to request that it be deleted and to keep it from being sold to third parties. California’s Consumer Privacy Act takes effect in 2020 and could be amended in the interim. The California law was passed quickly – and unanimously – by the state Assembly and Senate and was signed by Gov. Jerry Brown when it became clear that a ballot initiative was being organized to address the issue of privacy. In California, initiatives can be placed on the ballot by collecting signatures to require a direct vote by the electorate. Once passed, ballot initiatives are difficult to amend, requiring a two-thirds vote of state lawmakers. By passing the law, California’s legislature averted a proposed privacy initiative on the fall ballot. GDPR also regulates how and if data about EU citizens can be transferred outside EU member states’ borders There are differences in the California law and the European Union’s GDPR. For example, the California law only applies to companies that have annual gross revenues in excess of $25 million, that hold data on more than 50,000 people or that derive more than 50% of their annual revenues from the sale of personal information. Therefore, most small businesses are immune to the law’s requirements. However, the existence of the California law is a harbinger of more regulations to come, on the state or federal level. In another development related to the physical security industry, California has passed an Information Privacy: Connected Devices bill that requires electronics manufacturers to equip Internet of Things devices with “reasonable” security features – no more passwords such as “admin,” “password,” or “1234.” California’s Consumer Privacy Act is modeled under the General Data Protection Act Expanding The Definition Of Personal Information Other states are also getting involved. All 50 U.S. states have enacted breach notification laws requiring businesses to notify consumers if personal information is compromised. For example, Alabama’s new law, passed in June, applies to “unauthorized acquisition of sensitive personally identifying information in electronic form.” Many state laws are expanding the definitions of personal information and increasing cybersecurity requirements as they relate to that information. Globally, rapidly growing adoption of data protection laws is often modeled on regulations such as GDPR The problem with a “patchwork” of state requirements is the possibility that businesses may be caught unaware when state laws have different specific requirements addressing the same general mandate. At the federal level, there have been calls for a data breach notification bill that would provide a single set of rules for organizations to follow. In general, privacy is seen differently in the U.S. than in the E.U., due in part to history and a U.S. commitment to the First Amendment. The U.S. also tends to address privacy rights based on the category of information being considered; i.e., HIPAA requirements cover health information and the Gramm-Leach-Bliley Act regulates financial information. Globally, rapidly growing adoption of data protection laws is often modeled on regulations such as GDPR or on the Organization for Economic Co-operation and Development (OECD) Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. According to the United National Conference on Trade and Development, more than 100 countries around the world now have data protection legislation in place. Protecting And Managing Data All 50 U.S. states have enacted breach notification laws requiring businesses to notify consumers if personal information is compromisedWhen you consider the impact GDPR has had on the physical security market, the possible new hurdles can boggle the mind as additional privacy requirements take hold in the U.S and around the world. Challenges range from worries about management of access control and video surveillance data to concerns about biometrics. The success of new technologies using artificial intelligence (AI) depend on access to large data sets, so ensuring that data is protected and managed correctly is paramount. The genie is out of the bottle. GDPR may be driving the first wave of privacy concerns, but there is much more to come. Anyone who dismissed GDPR as a “European” factor is missing an opportunity to address issues proactively and to ensure optimum management of data privacy and transparency in the future.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions announces that the South Grand Community Improvement District (CID) in St. Louis, Missouri is using the Genetec Stratocast cloud-based video monitoring system to deter license plate theft in its parking lot and provide video access to the local police department to help reinforce security. License Plate Theft One of the services offered by the South Grand CID is free parking. At any time of the day, drivers can park in a central parking lot to visit businesses or residents. While this lot has always been convenient and safe, license plate theft was troubling nearby areas. Video recordings are sent over a wireless network which connects to the South Grand CID main office To deter license plate theft in their own community, the South Grand CID board decided to add video surveillance to the lot. Currently, three cameras monitor the entire 90-space parking lot. Video recordings are sent over a wireless network which connects to the South Grand CID main office, just a few blocks away from the lot. With this cloud-based video monitoring system, Rachel Witt, Executive Director at South Grand CID, can quickly and easily view video from anywhere, at any time. Cloud Video System “Using the cloud video system, I am able to find and view the video in seconds. I can narrow down my search based on dates and time and watch the event unfold with all camera feeds up on the monitor. It’s really that simple,” commented Witt. Only two weeks after installing the Stratocast video monitoring system, a visitor reported that their license plates had been stolen. “The visitor provided a description of the car, and a timeframe in which the incident likely happened. Using the Stratocast system, I was able to find and view the video in seconds. I could clearly see the suspect enter the lot, remove the plates and leave in his own car. Since the police are very busy here, I was able to bookmark the video recording and then notify them that the video was ready,” said Witt. View Video Recordings Stratocast has made it easy for the South Grand CID to give video access to local police so that when a crime is reported in the district, officers can immediately begin to conduct investigations without leaving their desks. While the South Grand CID manages and owns the Stratocast solution, officers can log into the system and view video recordings when required While the South Grand CID manages and owns the Stratocast solution, officers can log into the system and view video recordings when required. This is enabled by the Genetec Federation feature, which gives an organization access to manage multiple independent Genetec systems as one. A memorandum of understanding was signed so each parties’ responsibilities are clear. Better Sense Of Safety “Instead of driving over and picking up a DVD, officers can directly access video from our cameras to see what happened. Not only does it help speed up investigations, it saves officers’ valuable time,” continued Witt. The installation of Stratocast is not only helping to reduce license plate theft but it is also helping residents and visitors feel safer than ever. “Business owners, residents, and visitors have a better sense of safety when they know cameras are up. But they also need to know that we’re equipped to respond quickly to any disturbance. And that’s what Stratocast helps us achieve. With the addition of Stratocast, we’re able to show everyone that we have strengthened the security in our community,” concluded Witt.
An integrated security system that includes new IP cameras and two-way audio technology has seen the rate of injuries as a result of attacks on Post Office staff decline by 36% in just three years. This follows the deployment of a sophisticated monitoring and intelligent threat detection platform from Morphean, a Video Surveillance-as-a-Service (VSaaS) innovator, which has not only helped to keep staff safe but has also protected ATMs from attack, helping to keep Post Office doors open. Post Office is responsible for the safety and well-being of 14,500 workers in 11,600 branches. The very nature of their combined service offering and the fact they are often located in rural areas, means branches are prime targets for thieves. Threat Intelligence Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon. In rural communities, attacks on equipment can leave branches out of operation for long periods. In the last year alone, there were 13,437 violent attacks on convenience store workers, 27% of which involved a weapon and 39% led to injury, according to The Association of Convenience Stores (ACS) annual Crime Report. The Post Office security team wanted to build on its existing threat intelligence and response system, Grapevine, with a network of IP cameras and two-way audio into branches. Axis Communications cameras, microphones and speakers, connected to the Morphean Platform and hosted in the cloud, were installed in pilot branches by Kings Secure Technologies. Security Automation Now that trial implementations have been completed successfully, the security team plans to expand coverage rapidly. In addition to the cameras, the networked speakers enable control centre staff to speak directly to customers and suspected criminals, alerting them to the fact they are under surveillance. The solution is also optimised to use low bandwidth dataFurther integrations are under way to bring security automation to other branches, such as providing the ability for remote agents to lock on-site safes in the event of an attack. Because of the challenges around connectivity in the areas where the most vulnerable branches are situated, the solution is also optimized to use low bandwidth data and is capable of streaming video over a 3G mobile network. Built-In Intelligence The built-in intelligence of the Morphean Platform means staff are able to monitor footage for suspicious behavior, such as individuals loitering near an ATM, and issue an alert to security teams who can then decide on the appropriate course of action. If it’s someone trying to find their wallet, no action is taken; if a crime is in progress, police will be notified along with video footage. In addition, staff are able to trigger an alert manually using an under-the-counter activation button, which can be investigated immediately by control center staff at the alarm receiving centre (ARC). “The safety of our staff is our number one priority,” says Physical Security Manager for Post Office, Mark Dinsdale. Make Significant Differences Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end"“We’ll never completely eliminate crime in our branches, but we are also not powerless against it and we are able to make significant differences to the safety of our people, as demonstrated by the new technology we are deploying.” “Post Officers, particularly those in remote areas without access to a nearby police station, value the easy access to help and now report feeling much safer at work,” he concludes. Paul Ottley, Account Director at Kings Secure Technologies, says there are more subtle benefits to the Morphean Platform. “Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end. This means that even if criminals attempt to destroy cameras or on-site storage appliances, recordings of any incidents are secured in a manner that is admissible as evidence. This eliminates the challenge of sending out an engineer to collect footage. It’s a simple solution that is flexible and fully compliant with regulations such as the GDPR.”
Maxxess eFusion technology is being used to provide seamless integration and easy management of security, safety and site management systems at Bluewaters Island, Dubai. Maxxess eFusion Technology The region’s newest tourism hotspot, Bluewaters opened in November 2018 and is expected to attract more than 3 million visitors every year. The US$ 1.6bn project was completed by Meraas Holdings over five years and comprises four luxury residential complexes, a landmark Caesars Palace hotel, a shopping mall and the world’s largest observation wheel, Ain Dubai, as its centerpiece. Security And Safety Integration Bluewaters’ management wanted to find the most efficient way to integrate all security, safety and building management functions into one easy operating system Bluewaters’ management wanted to find the most efficient way to integrate all security, safety and building management functions into one easy operating system, with particular emphasis on a solution that would be efficient to use, inexpensive to maintain and robust going forwards Following a sector comparison, Maxxess eFusion technology was identified as providing the best fit. Security Management Platform The eFusion security management platform was chosen instead of a more costly or complex conventional PSIM solution, because it uses versatile, open-technology software. Omnix International, one of the leading integrators brought in for the project, says eFusion proved particularly straightforward to work with, offering the advantages of a modular, building block approach and allowing maximum freedom to integrate, customize and adapt to future needs. “Thanks to its compatibility with leading surveillance, intruder, access and fire detection systems, eFusion proved to be a highly efficient integration technology for the Bluewater project,” says Mr. Henry Azoury, Senior Security Design and Engineering Manager at Omnix International. ASSA ABLOY Hospitality System The eFusion platform at Bluewaters includes full integration with an ASSA ABLOY Hospitality system The eFusion platform at Bluewaters includes full integration with an ASSA ABLOY Hospitality system. It allows a unified system approach, with a single enrolment protocol for both front- and back-of-house access. The solution enables centralized management of room safes, mini-bars and cupboards, and for control of all alarm transactions. eFusion integration with the Zenitel Stantaphone IP Intercom System ensures that video and transaction data is called-up automatically in the Bluewaters control room as soon as any user press a call button. For maximum efficiency, the system allows the operator to unlock doors and communicate with the user remotely, with full activity logs kept for audit. With easy integration to the SeeTec Video Management System, eFusion also allows seamless control of all cameras. In addition, cameras are linked to the door access system, with video pop-up triggered by pre-defined events. The solution also gives the operators complete PTZ control, playback and video functionality. ID badging Integration ID badging and building management systems are also fully integrated, allowing easy operation and control of a wide range of functions including heating, ventilation and air conditioning. The eFusion platform is based on technology that delivers robust, reliable performance" “For maximum efficiency there is no need to switch between different management systems and the eFusion platform is easy to work with, allowing full benefit from integration with individual systems,” says Lee Copland, Managing Director EMEA, Maxxess. eFusion At Intersec 2019 “The eFusion platform is based on technology that delivers robust, reliable performance, as well as being fully scalable as needs change the future. We look forward to our continued work with Omnix International, which is providing the world-class specialist engineering services combined with local, customized support that customers value.” To see Maxxess solutions in action come to Intersec 2019 on stand SA-H12.
Abloy UK and security company Barry Brothers have supplied and installed a CLIQ Go electronic cylinder solution to a communal garden in Kensington, London to provide its subscribers with reliable and secure access. The garden’s previous access control system had proven to be unreliable, at times allowing members of the public unauthorized access which often resulted in damage in the area. Also, previous subscribers had maintained ingress and egress to the garden by retaining their key after their subscription had lapsed. Multiple Access Requirements Located in an enclosed area, the garden is secured with an external gate that is fully exposed to the elements. The resident committee required a durable locking solution to cope with such conditions, with the technology to control multiple access requirements; to allow subscribing resident’s access to the gardens, and a team of contractors and committee members with higher access permission to enter the internal compound to enable maintenance of the gardens. The new CLIQ Go electronic cylinder solution from Abloy as the ideal technology to cope with the ever-changing access control requirements Sam Moxey, technical sales and project manager at Barry Brothers, London’s longest serving security company, specified the new CLIQ Go electronic cylinder solution from Abloy as the ideal technology to cope with the ever-changing access control requirements. Excellent Feedback The CLIQ Go App moves security to a new dimension, enabling controlled security from a mobile device and the ability to easily revoke access permission of non-subscribed individuals. Features include the ability to schedule access to areas and to provide contractors with time-limited access. If a key is lost, access can also be revoked using the CLIQ Go App, all managed from a cloud-based system. The system has been installed for six months with excellent feedback from the committee and subscribers. Membership subscriptions have increased and savings have also been achieved because of the reduced number of locksmith callouts. Sam Moxey, Barry Brothers, Said, “I wanted to ensure that the solution we specified would perform as required and finally resolve what had become an ongoing issue for the committee. Having worked with Abloy UK for a number of years, I had no hesitation in recommending CLIQ Go. It was very easy to set up and the programming of the CLIQ Go locks and keys was achieved easily, fitting with my busy workload.”
With a century-long tradition for trade and commerce, the Hala Koszyki market hall was opened in 1908 on Koszykowa Street in Warsaw, Poland. Known as the ‘People’s Bazaar’, the Art Noveau-style building endured numerous social and political changes throughout its storied history. Between 2009 and 2016, Hala Koszyki was remodeled entirely according to a design by Polish star architects JEMS Architekci. Since its grand reopening in autumn 2016, Hala Koszyki has emerged as a major attraction for food connoisseurs in the Polish capital. The remodeled building retains some of the architectural layout of the historic original while offering international flavors in a variety of restaurants, bars, and food shops, plus several office spaces in a premium ambiance. Retail Solutions Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions Providing integrated security for Hala Koszyki called for a vendor that could solve three key challenges: First, the security system needed to blend in with the market’s stylish interior without attracting attention. Second, shop and restaurant personnel as well as office workers required specific access privileges to otherwise restricted areas. And third, building operators wanted a customisable system to meet the specific demands of Hala Koszyki’s shops, cafes, offices, parking spaces and other areas. Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions, also including the high-profile New Union Square shopping center and office tower in Downtown Warsaw. The experts equipped Hala Koszyki with video security, intrusion alarm, and access control systems. Intelligent Video Analytics The market hall’s video security system features moving and fixed IP-based cameras from Bosch throughout the premises. Integrated on the Bosch Video Management System (BVMS), the cameras are monitored by security staff in an on-site control room. For added security, cameras in critical areas feature Intelligent Video Analytics to recognize threats, unauthorized access, and suspicious behaviors automatically. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorized visitors, Bosch installed access control readers Aside from greatly reducing the manpower needed to monitor video screens, the system also offers forensic search functionality for evidence in a user-friendly interface. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorized visitors, Bosch installed access control readers. Answering a key requirement, the access control system also logs the entry and exit times of employees, while keeping track of the current number of employees in the building. Complete Security Solution Safeguarding the Hala Koszyki against intruders, the integrated security solution features Professional Series intrusion detectors equipped with PIR (passive infrared) sensors. Combining these detectors with the intrusion panel Modular Alarm Platform MAP 5000 ensures continued operation in events such as short circuits or interruption of the power supply in a scalable system that can grow with customer requirements. The complete security solution for Hala Koszyki is managed by the Building Integration System (BIS). Overall, the integrated Bosch solution achieves the feat of accommodating Hala Koszyki’s various security and access requirements ‘under one roof’ while blending into the architecture, so end consumers are free to enjoy their shopping and dining experience undisturbed.
Comelit has worked sensitively on site at Rathview Mental Health Facility, to supply door entry solutions to ensure a therapeutic and safe environment is created for the benefit of residents, staff and visitors. Comelit Door Entry Solutions Situated on a rural greenfield site on the outskirts of Omagh, Rathview Mental Health Facility is a new c£2.8 million, 1169m² site that contains a twelve-bed Discharge Unit and a six-bed Recovery Unit, arranged around two central courtyards. With its innovative design, the unit aims to increase the range of community-based mental health services available in Northern Ireland. Owned by The Western Health and Social Care Trust and designed by award winning Todd Architects, Comelit worked sensitively with electrical consultants on site, WYG Belfast, from the tender process to project completion, understanding the full specification requirements from the entrance through staff stations and concierge resources. Healthcare Security And Safety Comelit was specified through evidence of its understanding of the site requirements, along with the system being IP based, hence highly flexible and configurable" Says Gary Hewitt, Consultant at Chubb NI Ltd, who worked on Rathview Mental Health Facility: “This was an incredibly sensitive works program, where the design of the building was not just important from an aesthetic perspective, but also to ensure a positive impact on the recovery process for residents; and for staff to operate in an environment where they feel safe and secure.” “Comelit was specified through experience and evidence of its understanding of requirements on site, together with the system being IP based, hence highly flexible and configurable. These elements came together to allow for residents to experience independence in a domestic environment, with autonomous access to their accommodation.” 316 Sense Panels In total, Comelit was specified for the door entry systems for all four entrance points to the facility, and a total of four 316 Sense panels installed, along with two staff stations and a concierge unit. Each of the twelve apartments were fitted with a pull cord and emergency response button, cabled into Comelit’s Mini handsfree monitors. Designed to operate through Comelit’s innovative VIP system, it utilizes the Security Systems Network and allows a priority call to the concierge in case of emergency. Patients, Staff And Visitors’ Safety Mike Campbell, Business Development Manager at Comelit Group UK concluded: “Rathview is an important development in the context of provision of mental health facilities across Northern Ireland, where every part of the site is seen as potentially having therapeutic value. We have worked in partnership with the consultants on site to create a door entry solution that can ensure a balance of a welcoming, encouraging environment, while maintaining the safety and security of residents, visitors and staff.”