The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
PAC & GDX, providers of access control and door entry solutions, are showcasing the range and depth of their innovative technology on Stand IF2930 at IFSEC International 2019. From a single door installation to a fully integrated network based system, the company’s extensive portfolio provides unbeatable reliability and robust functionality, at a price point that enables installation in a diverse range of residential and commercial buildings. In order to provide integrators and end us...
ELATEC introduced the TCP3 authentication/release station, a small network appliance that enables devices without a USB port to incorporate an RFID or biometric reader, PIN pad or other form of user authentication and access control, and which supports USB 3.0 and gigabit Ethernet networks. Most organizations extend the use of their employee ID badge or card to authenticate for applications beyond building access. This includes most multi-function printers. However, not all printers and devices...
The Canadian technology company Genetec offers a broad solutions portfolio that encompasses security, intelligence, and operations. With the integration of the Dallmeier Panomera systems in Genetec Security Center, the proven Panomera functionality is now available to the users of one of the most widely used unified security platform for the first time. This gives users completely new possibilities for observing and monitoring expansive areas and large spatial contexts. The Panomera multifocal...
The focus of the global security industry will shift to London this month for IFSEC International, Europe’s ‘integrated’ security event focusing on the latest technologies and the opportunity to learn from the industry’s top leaders and experts. IFSEC will be held from 18-20 June, 2019, at ExCel London, welcoming 27,000 security directors and managers, installers, integrators and distributors. The exhibition at IFSEC may not be as large as previous years, and several bi...
Delivering another high-value benefit to users, the Maxxess eFusion security management platform now integrates off-the-shelf and seamlessly with the widely used range of deister electronic key management systems. With this latest off-the-shelf integration, eFusion users can now manage all their keys from their centralized security management platform, reducing the risk of security breaches and streamlining their day-to-day operations. Modular and scalable, the deister electronic systems encom...
3xLOGIC, PAC/GDX and PACOM, providers of security and access control solutions, have announced they will be exhibiting on stand IF2930 at IFSEC International 2019, which takes place on 18th-20th June at ExCeL, London. For over 15 years as one of the USA’s most respected innovators in server, cloud and artificial intelligence-based solutions, 3xLOGIC has an enviable track record in redefining what’s possible with security technology. After successfully launching into the European market earlier this year, 3xLOGIC will exhibit its diverse range of cutting-edge products as well as demonstrate their integration capabilities. Leading the way is the integration of 3xLOGIC’s NVRs and standalone cameras into PACOM’s GMS and Unison product lines. VIGIL Enterprise Grade VMS 3xLOGIC’s VIGIL enterprise grade VMS is the driving force behind the VIGIL range of NVRs, DVRs and PoE cameras3xLOGIC’s VIGIL enterprise grade VMS is the driving force behind the VIGIL range of network video recorders (NVRs), digital video recorders (DVRs) and Power over Ethernet (PoE) cameras. To further enhance VIGIL’s suitability for multi-site environments, it has been integrated with the PACOM Graphical Management System (GMS). Engineered to communicate over an IP network, the PACOM GMS allows for full integration of access control, alarm monitoring, video surveillance and many other security functions. 3xLOGIC’s Visix Facial Recognition camera is making its European debut at IFSEC 2019. This special purpose, low cost, dual lens 2MP device is designed for instant face detection, and the identification and notification of persons of interest. Using camera-based analytics and 3xLOGIC’s exclusive facial recognition software and mobile app, users can review images and choose which individuals to place on a watch list. Unison Security Management Furthermore, 3xLOGIC’s Facial Recognition camera has recently been integrated into PACOM’s Unison security management platform. An open security solution designed specifically for campus-based organizations, Unison is the solution of choice for organizations within vertical sectors such as healthcare, universities, commercial buildings, public facilities, municipalities, airports, shipping ports and data centers. The combination of Facial Recognition capabilities with Unison improves operational efficiency by quickly and accurately identifying persons of interest, and streamlining processes to use this information to meet the organization’s security and marketing goals. TRENDS empowers the user to interpret vast amounts of disparate data more effectively and efficiently than ever before For those looking to optimize organizational efficiency, 3xLOGIC’s TRENDS cloud-based business intelligence tool incorporates exception-based reporting, video data and third-party applications into an easy to use dashboard that provides a simple visual snapshot of business operations. TRENDS empowers the user to interpret vast amounts of disparate data more effectively and efficiently than ever before, offering unrivalled levels of visibility to quickly spot issues and liabilities that can seriously impact a company’s bottom line. Bluetooth-Based Card Reader Last, but certainly not least, visitors will have the chance to get hands on with the new PAC GDX Bluetooth-based card reader technology, which has been specifically designed to meet the requirements of companies of all sizes that want the most secure access control solution possible. Experts from the company will be available for product demonstrations and to discuss a new online training program that has been developed to enable installers and end users to get the very best out of their PAC GDX solution. “It has been a tremendously exciting year, and we are looking forward to discussing our activities with those attending IFSEC,” commented Matt Kushner, Global President, Stanley Products and Solutions. “With a combined legacy of over 100 years in the security industry, 3xLOGIC, PAC GDX and PACOM lead the way in the design and manufacture of video surveillance, access control, and business intelligence solutions. By visiting Stand IF2930 and talking to our experts, visitors have a fantastic opportunity to find out how our technology can enhance security provision in a diverse range of built environments and how we can help them achieve their operational and security objectives.”
Farpointe Data, the access control industry's OEM for RFID credentials and readers, announces that its Conekt mobile smart phone access control identification solution now integrates advantages that Apple iOS 12 delivers, such as 3-D touch, Widget and Auto-Unlock, into the Conekt Wallet App, version 1.1.0. All new improvements create increased user convenience. “These improved Wallet App features let access control system manufacturers, integrators and dealers provide their customers with the simplest to use mobile access credentials in the market,” explains Scott Lindley, general manager of Farpointe Data. Mobile Access Control “Our Conekt solution provides the easiest way to distribute mobile credentials with features that include allowing the user to register only once and requires only the handset's phone number. We need no portal accounts or activation features. By removing these and additional information disclosures, we've also addressed privacy concerns that have been slowing adoption of this technology.” The newly improved Widget lets the user make up to three mobile access control credentials as widgets For instance, the newly improved Widget lets the user make up to three mobile access control credentials as widgets. This saves time by allowing quicker access to credentials supporting divergent building systems such as payroll, parking and cafeteria systems, directly from the smartphone's home screen. Biometric Defences With 3-D Touch, a new pressure-sensitive feature, the user simply pushes on the Wallet App to select from up to three of the most commonly used mobile credentials. Each user can choose their own combination. For example, a delivery driver may gain entrance to the van parking area while the vice president gets access to the boardroom. Lastly, Auto-Unlock lets a user select a MAC as their favorite. Once designated, a little star appears in the upper right corner of the mobile access credential. As the favorite, it is transmitted immediately whenever the Wallet App is selected. All new Wallet App features are available immediately and will continue to operate securely behind the smart phone's PIN code and biometric defences.
S.A.F.E., the Safety Alerts for Education Foundation, announced that it is donating the Safety Alerts for Education (S.A.F.E.) emergency mobile alerts platform to all schools, colleges and Universities across the US for free and in perpetuity. This is the exact same, fully featured system that has been in use by The Department of Homeland Security (DHS) and The Massachusetts Emergency Management Agency (MEMA) and other Federal, state and local agencies, and police departments across the country for the past seven years. S.A.F.E may save lives in situations where a few extra seconds of warning can be the difference between life and death. Ping4Alerts Emergency Communications Technology Ping4 invented and developed the Ping4Alerts emergency communications technology that the S.A.F.E. Foundation usesThe S.A.F.E. Foundation is a non-profit 501c3 organization founded by the principals of Ping4 Inc., of Nashua, NH. Ping4 invented and developed the Ping4Alerts emergency communications technology that the S.A.F.E. Foundation uses. This S.A.F.E. system is currently offered and being implemented in New Hampshire and Massachusetts Schools. This same system, developed by Ping4, was used during the Boston Marathon bomber manhunt and in the aftermath of Hurricane Sandy. At a New Hampshire launch press conference Governor Sununu lauded “the opportunity that schools now have to create a first class, world class, security and communications system for their students.” Ensuring Safety Of Students “The wellbeing of our students, and the safety of our schools, matter to all of us,” said Jim Bender, CEO of Ping4. “This issue of school safety goes well beyond making sure that our children make it home safely from school each day. It is also about creating a positive school environment which is more conducive to learning, and more conducive to teaching. We are excited to expand our New Hampshire S.A.F.E. initiative to Massachusetts. “The Columbine High School massacre was nearly 20 years ago and not much has changed since then. In the first five months of 2018, more people were killed in American public schools than in US military operations globally. This impactful step toward improving school safety can be implemented immediately, without getting held up in contentious debates over gun laws or mental health issues.” Precise And Real-Time Emergency Alerts S.A.F.E. provides real-time instructions to those inside school buildings to better protect themselves and get out of harm's way quickerS.A.F.E. enables schools to send geographically precise emergency alerts, anonymously, and in real-time, to nearly any smartphone in any school building or on any campus. A favorite of law enforcement agencies and first responders, S.A.F.E. provides real-time instructions to those inside school buildings to better protect themselves and get out of harm's way quicker. First responders outside can also receive valuable information in real-time from inside a building, even before they arrive on the scene, reducing response times and giving greater situational awareness of a shooter or other emergency. Smartphone Application For School Safety “We are pleased to be among one of the first educational institutions in the country to encourage usage of this important and meaningful smartphone application, in an effort to keep our schools safe,” said Frank Edelblut, commissioner of the New Hampshire Department of Education. “As more schools opt-in, everyone connected to the school community – educators, parents, and students – will be able to stay informed during an emergency.” “When we reviewed every after-action report of school shootings across the country, communication was always an issue,” said Perry Plummer, Director of the Division of Homeland Security and Emergency Management for the state of NH. “How do we let the people know what they should do to protect themselves and how do we let parents know that their child is safe and where to pick them up.” Administrative Alert Dashboard S.A.F.E. provides an administrative alert dashboard for school administrators to send secure life-saving alertsA free download for school students and staff on iOS or Android, S.A.F.E. provides an administrative alert dashboard for school administrators to send secure life-saving alerts. S.A.F.E. delivers 2-way rich media messages in real-time, with any combination of audio, video, pictures and text, which can be very helpful to police, school administrators, and first responders in assessing situations, saving lives, and solving crimes. S.A.F.E. is completely anonymous and collects no personal data from users of the app. Parents of children in the school can preset ‘watched locations’ on their own phone, so that they will receive all alerts sent to their children at school, as well as designated, safe child pick-up locations, regardless of where the parents are at the time. S.A.F.E. messages can originate either from the school administration itself, or from local law enforcement, or both. S.A.F.E. can be implemented locally within weeks. Each school or school system can customize, manage and send out their own alerts via an easy to use web-based portal. S.A.F.E. can isolate a school building or campus on a map and only those in the designated areas will receive the alerts. S.A.F.E.’s ability to pinpoint locations with geographic accuracy is second to none.
Johnson Controls announces that its PowerSeries Pro is the first ever commercial grade security system to harness the long-range communication technology of PowerG and is designed to handle large-scale installations. The system offers the highest level of cyber protection features and encryption technology without the need for a wired communication path. PowerSeries Pro is developed for commercial use and can support up to 248 zones, making it an ideal solution for warehouses, office buildings, factories, and healthcare facilities. Intrusion Security Panel “In the past, we have had systems that support commercial applications, but PowerSeries Pro is our first commercial intrusion security panel that can handle large commercial installations while eliminating the need for wires on sensors or keypads,” said Jennifer Doctor, senior director of Product Management, Tyco Security Solutions. “We are excited to provide this new product to the commercial sector, and hope the increase in zones, coupled with secure encryption, will provide end users with the flexibility and reliability they need.” Tyco security solutions’ PowerSeries Pro includes built-in 128-bit AES encryption technology, supports multiple third-party integrations, including Building Management Software (BMS), as well as video and access control solutions to offer a versatile platform for holistic commercial security. Commercial Installations In addition, Frequency Hopping Spread Spectrum technology repeatedly switches frequencies to minimize interference of radio signals and prevent interception and obstruction during transmission. This is especially useful in commercial integrations, where transmissions take place over longer distances, and in turn require more planning to combat potential interferences security threats. Requiring no drills, wires or repeaters, both residential and commercial installations are hassle-free and provide all the power and security of a wired connection, without the wires.
Dahua Technology, a video-centric smart IoT solution and service provider, showcases a wide range of competitive product portfolios and smart solutions to top security professionals during the International Security Conference and Expo (ISC West) at booth #14039 from April 10th to 12th. Dahua will also celebrate the fifth anniversary of its USA subsidiary on Wednesday evening, showing strong commitment to the local markets. Running with the theme ‘Empowering through Technology’, the Dahua products and technologies exhibited during ISC West are comprehensive from every aspect covering major surveillance market demands with the most advanced technologies. Competitive Product Portfolios Facial Recognition - Dahua Facial Recognition technology integrates face recognition, blacklist alarm, stranger alarm, VIP recognition, face tracking, face search, metadata search and other functions to offer a series of smart products including the exhibited AI Smart Capture Camera, 4MP Starlight Face Recognition IR Dome AI Network Camera and IVSS series for various scenarios and customer demands. Low - light Technology - Featuring advanced Starlight technology, Dahua starlight+ products are able to provide excellent colorful image and rich details even at night, solving the problem of poor color reproduction of images under low illumination environment with image color reproduction, large aperture, ultra-high sensor, white light and other technologies. Dahua Smart Thermal Series Cameras can be widely used for security monitoring, fire prevention and temperature measurementThermal Technology - Through a new integration of visible-light and thermal-light and a variety of AI-enabled intelligent functions, Dahua Smart Thermal Series Cameras can be widely used for security monitoring, fire prevention and temperature measurement. Combined with the back-end storage NVR and DSS PRO, Dahua Technology can provide an all-in-one system with front-ends, storages, and intelligent analytics to meet the requirements of customers. Smart Tracking - Dahua radar system consists of radar and speed dome camera (PTZ). On the basis of traditional CCTV security system, it combines the accurate target tracking performance of the radar products to provide a complete solution with front-end data acquisition, edge computing and back-end storage for a wide range of applications such as prison perimeter, airport runway, industrial park, energy pipeline and other important protection areas. Wide Area Security - The Dahua Multi-sensor Series Cameras can be used for large scene monitoring, target tracking, simple management and multi-service convergence. The Dahua 4x2MP Multi-sensor Cameras possess ground-breaking flexibility that can simultaneously move each sensor module around the internal track for a 180-, 270-, or 360-degree panorama, minimizing blind spots for an improved situational awareness, which is ideal for parking lots, supermarkets and intersections, etc. HDCVI 5.0 - The recently launched Dahua HDCVI 5.0 brings five core values: Perimeter Protection, Face Recognition, Metadata Search, Active Deterrence and Starlight & Full Color. Perimeter protection can identify humans and vehicles while filtering less important objects, face recognition let authorized persons to pass freely and can do immediate action to strangers, with the latest AI technology we make video surveillance more efficient and easy to use. AI-enabled Intelligent Solutions Featuring the above technologies, Dahua Technology also presented integrated solutions for a variety of vertical markets at the Expo. Intelligent Retail Solution - Dahua Smart Retail Solution applies video intelligence technology to specific retail business scenarios. According to the scenarios of large chain supermarkets, we have developed five smart application scenarios including smart entrance and exit, shelf advertising, cashier loss prevention, operation analysis and remote shop patrol to help retailers optimize store layout and product display, improve storage efficiency as well as attract traffic flow. Intelligent Logistics Solution - Dahua Intelligent Logistics Solution takes Dahua video technology as the cornerstone, combine intelligent analysis technology, machine vision technology, big data technology, etc. to further divide into five sub-solutions including machine vision DWS solution, video tracking solution, vehicle entrance solution, park surveillance solution and logistics vehicle solution for different application scenarios. Intelligent Residential Solution - Dahua Intelligent Residential Solution provides an integrated and economic solution with multi-level protection including personal entrance, vehicle entrance, public area, unit security, home protection and control center to make people’s life more convenient, safer and smarter while improving operation efficient and saving energy for property owners. Intelligent Critical Infrastructure Solution - Dahua Intelligent Critical Infrastructure Solution offers an end-to-end solution featuring perimeter protection, thermal measurement, access control, video surveillance and auto-tracking system for electric power stations, oil and gas industries to ensure the safety of their daily operations, timely detection of terrorist threats and fire, quickly and easily viewing station status. Intelligent Education Solution - Dahua Intelligent Education Solution brings a new concept of pre-warning for campus administrators. The solution incorporates important scenario applications empowered by AI technology such as perimeter, entrance, public area, building and classroom to realize threat prediction, effective management of people and vehicles, establishing a secured and smart system for students and teachers while improving operation efficiency. Reliable security solutions Dahua Technology empowers our dealers and integrators to stay at the top of their field by providing the latest security solutions to their end-users" Empowering signifies Dahua Technology’s dedication to promoting customer satisfaction and partner development. While market demands are constantly evolving, Dahua Technology’s offering is also evolving to meet current and future needs, giving partners and end-users the assurance that they’ve selected competitive and reliable security solutions on the market. “Dahua Technology empowers our dealers and integrators to stay at the top of their field by providing the latest security solutions to their end-users,” Tim Shen, Director of Marketing at Dahua Technology USA, explained. “In addition, the resources we make available to our dealers ensure that they are up-to-speed on their knowledge of our technology and fully trained on the products.” To further address Dahua Technology’s social commitment locally, a group of the staff from Dahua Technology USA will participate in The Security 5KRun / 2K Walk organized by charity group Mission 500 on the morning of April 11th. With a mission of ‘Enabling a Safer Society and Smarter Living’, Dahua Technology will continue to focus on ‘Innovation, Quality, and Service’, to serve partners and customers around the world.
LenelS2, a provider in advanced security systems, and Milestone Systems, an international open platform developer of networked video management software (VMS), announces a 10-year agreement for LenelS2 to distribute Milestone products globally. The companies had a previous agreement for North America. LenelS2 is a part of Carrier, a global provider of innovative heating, ventilating and air conditioning (HVAC), refrigeration, fire, security and building automation technologies. Founded in 1998, Milestone is a stand-alone company in the Canon Group. Seamless User Experience The joint offering of LenelS2 OnGuard access control and Milestone XProtect video management software through the LenelS2 channel lowers the total cost of ownership for end users and integrators by offering reduced licensing fees and efficient pre- and post-sales support. This integration, which has been successful through the LenelS2 OpenAccess Alliance Program (OAAP) and Milestone Certified Solution, provides customers with tight, efficient interoperability between the OnGuard and Milestone XProtect systems. We’re excited to expand this proven, integrated access-video offering to customers globally" “We’re excited to expand this proven, integrated access-video offering to customers globally,” said Jeff Stanek, president, LenelS2. “This strategic integration will provide our partners the benefit of an offering from the VMS and access control solution providers in the global security industry. This integration includes a seamless user experience and specific interface enhancements across our systems, a direct outcome of the collaborative effort.” Leverage The Momentum “Customers have reacted very well to our collaboration,” said Kenneth Hune Petersen, chief sales & marketing officer, Milestone Systems. “Rather than being locked into a single provider, customers can work with two companies that have real synergies. As security threats become more sophisticated, continuous innovations with strong interfaces between industry pioneers are in demand. That’s what this alliance delivers.” “We are excited that this agreement has been expanded into a global partnership,” said Stephane Baudena, managing director, Fire & Security Products, EMEA, LenelS2. “This will allow us to leverage the momentum and proven success achieved by the North American team.” LenelS2 and Milestone Systems have a combined 40 years of industry experience in providing customers with proven security solution technologies. Both companies offer open platform solutions that provide customers flexibility to select the optimal security systems to meet their needs. Milestone Systems has been a member of the LenelS2 OAAP since 2012.
Johnson Controls recently unveiled the findings of its 2018 Energy Efficiency Indicator (EEI) survey that examined the current and planned investments and key drivers to improve energy efficiency and building systems integration in facilities. Systems integration was identified as one of the top technologies expected to have the biggest impact on the implementation in smart buildings over the next five years, with respondents planning to invest in security, fire and life-safety integrations more so than any other systems integration in the next year. As advanced, connected technologies drive the evolution of smart buildings, security and safety technologies are at the center of more intelligent strategies as they attribute to overall building operations and efficiencies. SecurityInformed.com spoke with Johnson Controls, Building Solutions, North America, VP of Marketing, Hank Monaco, and Senior National Director of Municipal Infrastructure and Smart Cities, Lisa Brown, about the results of the study, smart technology investments and the benefits of a holistic building strategy that integrates security and fire and life-safety systems with core building systems. Q: What is the most striking result from the survey, and what does it mean in the context of a building’s safety and security systems? The results show an increased understanding about the value of integrating safety and security systems with other building systems Hank Monaco: Investment in building system integration increased 23 percent in 2019 compared to 2018, the largest increase of any measure in the survey. When respondents were asked more specifically what systems they we planning to invest in over the next year, fire and life safety integration (61%) and security system integration (58%) were the top two priorities for organizations. The results show an increased understanding about the value of integrating safety and security systems with other building systems to improve overall operations and bolster capabilities beyond the intended function of an individual system. Q: The survey covers integration of fire, life safety and security systems as part of "smart building" systems. How do smarter buildings increase the effectiveness of security and life safety systems? Hank Monaco: A true “smart building” integrates all building systems – security, fire and life-safety, HVAC, lighting etc. – to create a connected, digital infrastructure that enables individual technologies to be more intelligent and perform more advanced functions beyond what they can do on their own. For example, when sensors and video surveillance are integrated with lighting systems, if abnormal activity is detected on the building premise, key stakeholders can be automatically alerted to increase emergency response time. With integrated video surveillance, they also gain the ability to access surveillance footage remotely to assess the situation. When sensors and video surveillance are integrated with lighting systems abnormal activity on the premise can automatically be detected Q: How can integrated security and life safety systems contribute to greater energy efficiency in a smart building environment? Hank Monaco: Security, fire and life-safety systems can help to inform other building systems about how a facility is used, high-trafficked areas and the flow of occupants within a building. Integrated building solutions produce a myriad of data that can be leveraged to increase operational efficiencies. From an energy efficiency standpoint, actionable insights are particularly useful for areas that are not frequently occupied or off-peak hours as you wouldn’t want to heat or cool an entire building for just one person coming in on the weekend. When video surveillance is integrated with HVAC and lighting systems, it can monitor occupancy in a room or hallway. The video analytics can then control the dimming of lights and the temperature depending on occupant levels in a specific vicinity. Similarly, when access control systems are integrated with these same systems, once a card is presented to the reader, it can signal the lights or HVAC system to turn on. In this example, systems integration can ultimately help enable energy savings in the long run. Security and life safety systems contribute to help enable greater energy efficiency and energy savings in the long run Q: What other benefits of integration are there (beyond the core security and life safety functions)? Hank Monaco: Beyond increased security, fire and life-safety functions, the benefits of systems integration include: Increased data and analytics to garner a holistic, streamlined understanding of how systems function and how to improve productivity Ability to track usage to increase efficiency and reduce operational costs Enhanced occupant experience and comfort Increased productivity and workflow to support business objectives Smart-ready, connected environment that can support future technology advancements Q: What lesson or action point should a building owner/operator take from the survey? How can the owner of an existing building leverage the benefits of the smart building environment incrementally and absent a complete overhaul? Lisa Brown: Johnson Controls Energy Efficiency Indicator found that 77% of organizations plan to make investments in energy efficiency and smarter building technology this year. This percentage demonstrates an increased understanding of the benefits of smart buildings and highlights the proactive efforts building owners are taking to adopt advanced technologies. There is an increased understanding that buildings operate more effectively when different building systems are connected As smart buildings continue to evolve, more facilities are beginning to explore opportunities to advance their own spaces. A complete overhaul of legacy systems is not necessary as small investments today can help position a facility to more easily adopt technologies at scale in the future. As a first step, it’s important for building owners to conduct an assessment and establish a strategy that defines a comprehensive set of requirements and prioritizes use-cases and implementations. From there, incremental investments and updates can be made over a realistic timeline. Q: What is the ROI of smart buildings? Lisa Brown: As demonstrated by our survey, there is an increased understanding that buildings operate more effectively when different building systems are connected. The advanced analytics and more streamlined data that is gathered through systems integration can provide the building-performance metrics to help better understand the return on investment (ROI) of the building systems. This data is used to better understand the environment and make assessments and improvements overtime to increase efficiencies. Moreover, analytics and data provide valuable insights into where action is needed and what type of return can be expected from key investments.
In the wake of 9/11, the Federal Government’s secure-the-fort, big idea was to create an identity credential for all federal employees and contractors. Homeland Security Presidential Directive (HSPD)-12 set it all in motion. Today, we know the smartcard-based credential that arose from HSPD-12 as the Personal Identity Verification (PIV) card. The PIV card is meant to give employees/contractors physical access to federal facilities and logical access to federal information systems. While using a PIV card for logical access has been largely successful and compliant with HSPD-12, implementing PIV-based, physical access control systems (PACS) has been much more difficult to conquer. As a result, HSPD-12 compliance for PACS has largely eluded the Federal Government. The noncompliance reasons are many, but there is now hope for fully achieving HSPD-12’s mandates. Interoperability With Any Agency’s PIV Beyond Passports, PIV cards represent the only other open-standards-based, multi-vendor-supported, identity credential program on the planetAll Executive Branch employees and long-term contractors, including the entire Department of Defense, have been issued PIV cards. This has been true since 2013. Beyond Passports, PIV cards represent the only other open-standards-based, multi-vendor-supported, identity credential program on the planet. It seems so simple, where employees/contractors previously used their proximity card to open a federal facility door or go through a turnstile, they should now be able to use their PIV card. However, HSPD-12 took the PIV requirement one step further – compliant PACS must be interoperable with any agency’s PIV. This introduced an entire magnitude of additional complexity. A compliant, interoperable, PIV-based PACS should work like this: an authorized employee (or contractor) presents a PIV card (contact or contactless) to a card reader to enter whichever federal agency building they have reason to be. Over the last 14 years, in all but a very few cases, the lack of PACS’ HSPD-12 compliance has prevented this from happening. Secure Credential Policy Today, less than 1% of the Federal Government’s PACS are HSPD-12-compliant. At most federal facilities, especially those outside the National Capitol Region, a noncompliant PACS works like this: an authorized employee (or contractor) presents a proximity (‘prox’) badge to a proximity card reader to enter his or her agency’s facility. At the fraction of federal facilities with upgraded PACS that work with PIV cards, virtually all such PACS fail to properly use a minimum number of PIV security features before granting access – let alone interoperate with a PIV card from any other agency. Active government solicitations are issued for new, non-compliant, proximity-based systems that perpetuate the delay to HSPD-12 complianceNew federal initiatives frequently suffer from having no policy to enforce their roll-out. That isn’t the case with PACS compliance. Policies have been in place for so long that newer policies like Office of Management and Budget (OMB) M-11-11 (February 3, 2011) remind everyone what the policies said in 2004 and 2006. This year, OMB publicized its proposed OMB M-18-XX (Draft), which will replace M-11-11. OMB M-18-XX’s (Draft) main PACS thrust is, once again, to ensure that everyone understands what the Federal Government’s secure credential policy is. It hasn’t changed since 2004. It would be tempting to say that PACS technology isn’t mature, but that isn’t the case. In 2013, the Federal Government revamped the PACS portion of the FIPS 201 Evaluation Program and, since that time, all PACS on the General Services Administration’s (GSA) Approved Products List are 100% compliant and interoperable. Yet, on any given day, active government solicitations are issued for new, non-compliant, proximity-based systems that perpetuate the delay to HSPD-12 compliance. The usual suspects, policy and technology, are not the culprits for this epic delay. An authorized employee presents a PIV card to a card reader to enter whichever federal agency building they have reason to be Difficulties In Adopting HPSP-12 Compliance For PACS Standards – The Federal Government’s approach to standards is to avoid a great deal of specificity. It’s an unspoken tenet that federal standards must be flexible, promote innovation and avoid disadvantaging any participating market segment. The opposite is true if your goal is interoperability: nearly every detail must be specified. Consider the standards-based success story of chip-based credit cards. When was the last time you used a credit card and it didn’t work? Interoperability failures are nearly unheard of. If you look at the hundreds of volumes of technical specifications that cover minute aspects of every component in credit cards and payment terminals, you quickly realize why it works so well. Nothing is left to chance, nothing is a variable, and there is no optionality. The Good News: Work to increase viability through deep scrutiny has progressed in recent years. The GSA APL PACS Testing Lab, set up in 2013, annually tests credentials from all PIV issuers against all GSA-approved PACS. This testing has significantly reduced interoperability failures at federal facilities. Collaboration – In the past, physical access practitioners from federal agencies rarely collaborated, unlike their logical access counterparts. This is also true for PACS procurement decision-makers across agencies and facilities. The Good News: In 2018, an agency trend has emerged where finally physical access, physical security and IT practitioners have begun sitting down to discuss their shared responsibilities. We have already begun to see coordinated budget requests between IT and Security with enterprise architectures positioning PACS as an enterprise service on the network Scale – The Federal Government owns so many buildings that they can’t be counted. Google doesn’t know how many there are and neither does any one government official. Variability – A significant percentage of facilities have unique aspects making a one-size-fits-all approach infeasible. The Good News: Mature consulting services can now help agencies marry federal requirements with their unique environments to develop robust PACS enterprise architectures. As we see this occurring more and more frequently, a repeatable, achievable, systems-based upgrade of all PACS may be on the horizon. The GSA APL PACS Testing Lab annually tests credentials from all PIV issuers against all GSA-approved PACS Provenance – In many cases, different groups own different parts of a single facility, not all of whom might be subject to, or wish to interoperate with, a high-assurance compliant PACS. For example, GSA manages facilities for Legislative and Judicial tenants who aren’t subject to HSPD-12. Policy dictates that GSA manage the PACS for the front doors of these facilities should be HSPD-12-compliant, despite the fact that these tenants likely don’t have credentials that work with this technology. Sure, these tenants could commercially obtain a PIV-I credential, but almost none have. Economics – It’s difficult for agencies to create their annual security budget requests when HPSD-12 PACS upgrades are in scope, because so many unknowns exist at each facility. To assess the cost, the time to complete, and the facility’s existing equipment inventory, it would be logical for an agency to hire a contractor with PACS expertise to perform a site assessment. Having to do capital planning for an assessment phase in advance of making the annual budget request for the PACS upgrade creates a never-ending cycle of delay. Especially at agencies with multi-year capital planning requirements. Many agencies, trying to avoid this delay cycle, have fallen prey to doing site assessments themselves. This results in their integrators doing their walk-throughs after the contract is awarded. This is the leading cause of PACS upgrade cost overruns. Dependence on the agency’s IT department – Historically, PACS have been deployed on dedicated networks and are rarely ever connected to the enterprise, let alone the Internet. High-assurance PACS that validate credentials from other agencies must now communicate with many different systems on an enterprise network and over the Internet – so much so that the Federal Government reclassified PACS as IT systems. The Good News: With collaboration increasing between Physical Security Officers (PSOs) and Chief Information Officer (CIOs), we expect this to improve in due course. Resistance to change – This is a classic human factors challenge, and it’s a big one. PSOs have spent decades achieving their positions. PIV-based PACS could not be more different from the technologies that proceeded it, and such radical change is often resisted. When the value proposition is clear, change is adopted more readily. But security value isn’t easily measured or observed. It is often said that the best performance review for a PSO is to note that nothing happened. And when something does happen, it is necessarily kept quiet so the risk can be remediated without calling attention to the vulnerability in the interim. To date, the value proposition of moving to PIV-based PACS has been entirely based on policy (without corresponding funding in most cases) and through the shock value of white hat hackers, showing how easily most proximity badges can be cloned. This is not the stuff of change agents. PIV-based PACS could not be more different from the technologies that proceeded it, and such radical change is often resisted Are These Challenges A Unique Situation? No, these PACS challenges are not unique. Cybersecurity initially faced many of the same challenges that federal PACS face today. By 2000, the Federal Government recognized its urgent need to improve cybersecurity practices across its computing infrastructure and issued many policies that required agencies to improve. Improvement was sparse and inconsistent. GSA Schedules were set up to help agencies buy approved products and services to assist them, but this too produced lacklustre results. The Federal Government found that the best cybersecurity results occurred when enforced at the time an agency commissioned a system Congress enacted the Federal Information Security Management Act of 2002 (FISMA) (now amended by the Federal Information Security Modernization Action of 2014). FISMA mandates an Authority To Operate (ATO) accreditation process for all information systems. The Federal Government found that the best cybersecurity results occurred when enforced at the time an agency commissioned (vs. purchased) a system. FISMA and ATO accreditation has been highly successful when implementing new systems. These cybersecurity requirements are the closest thing that the Federal Government has to the ‘PIV Police’ today. However, the PIV requirements in FISMA and ATOs currently apply to only logical access for information systems. The proposed OMB M-18-XX (Draft) mentions that a FISMA PACS overlay to NIST SP 800-53 is forthcoming. The intent of the PACS overlay is to use the army of ATO accrediting officials in the Federal Government and enable them to assess implemented PACS as fit for purpose. This is the first time an enforcement approach has been brought forward that could reasonably succeed. How Long For HSPD-12 Compliance? We know that it won’t take another 14 years to achieve HSPD-12 compliance. Pockets of compliance are popping up. Compliant procurements do exist, and the state of PACS across the Federal Government is better in 2018 than in any previous year. Progress to date has been at a constant rate. The question is: what would take for progress to occur at an exponential rate instead? A major attack or compromise involving PACS would certainly hasten upgrades, but let’s hope that’s not the solution. The energy distribution sector has been riding a wave of security upgrade demands to retrofit their facilities across the U.S. The energy distribution sector, under nearly constant Advanced Persistent Threat attacks, has been riding a wave of security upgrade demands to retrofit their facilities across the U.S. The potential threat exists for Federal Government facilities as well. Looking into the federal PACS-compliance crystal ball, we’re beginning to see the faint outline of a multi-faceted campaign of education, budgetary oversight and accreditation of PACS that will ultimately see us past the tipping point. Consider though, at the current rate of PACS enablement, a 50% compliance rate is still far in the future. When that day arrives, the PIV card form factor may no longer be the key that fits that future lock. (Are you already using a mobile device’s Bluetooth interface to open the door to your office building?) Taking decades to perform a technology upgrade is the aging elephant in the room no one talks about. By the time critical mass is achieved with an upgrade facing these many challenges, there are typically compelling reasons to start over again with the next generation of technology. That cycle may well prove to be the Federal Government’s biggest PACS challenge of all.
As the world continues to become more connected, it’s becoming increasingly important to adjust security and safety procedures in the workplace. But today’s ever-evolving office environment can present unique safety and preparedness challenges. No two businesses are exactly alike, with some located in numerous buildings or spread out across campuses, while others have employees that frequently journey from different locations, work remotely or travel internationally. With this shifting environment, Rave Mobile Safety’s recent Workplace Safety and Preparedness survey asked over 500 full-time employees in various industries across the United States about their views on safety at work and emergency preparedness. Preferred Safety Measures Only 57 percent of respondents indicated that their workplace currently had preparedness drills in place for critical situationsThe survey looked at how employees and companies respond to various workplace emergencies: workplace violence, active shooter, medical emergency, fire, hazmat incidents, weather events and cyberattacks/system outages. Respondents provided insight on the current state of safety in their workplace, as well as how they want to be contacted when an emergency occurs. Though opinions on the preferred safety measures differed between generations and also between on-site and offsite workers, one fact remains consistent: there is much to be done to instill a better sense of safety in the workplace. While the findings show that employees feel safe in their workplace, only 57 percent of respondents indicated that their workplace currently had preparedness drills in place for critical situations. Quick Thinking Of the plans currently in place, excluding fire, 57 percent of the other major emergency plans were rarely or never tested. With so few drills in place, employees are left not knowing the best ways to respond to emergencies like weather events or hazmat incidents or if their employer recommends a certain response to situations like medical emergencies. Testing these plans is essential so that all employees, whether they are new to the company or not Even if plans are in place to begin with, not ensuring your employees understand and are comfortable with how to react to certain situations, can put the organization in harm’s way. Testing these plans is essential so that all employees, whether they are new to the company or not, have the appropriate response top of mind and their actions become second nature during a situation that will likely require quick thinking. Workplace Violence Instilling regular practices will only further ensure that responses will happen seamlessly, regardless of the emergency. Beyond the general awareness of drills and practices, most surprising in the responses was the fact that 34 percent of female respondents were unaware of workplace violence emergency plans. This is particularly shocking because workplace violence is the second leading cause of death for women in the workplace, according to the U.S. Bureau of Labor Statistics. This shows an obvious lack of preparedness from organizations. It’s immensely important that employees to understand the relevant dangers of the workplace, especially when alternative could have a fatal result. The differences between baby boomers and millennials in the workplace is a common barometer showing how the workplace is continuing to change. Emergency Plans Workplace violence is the second leading cause of death for women in the workplace, according to the U.S. Bureau of Labour StatisticsWhat may have worked for previous generations must be reworked and adjusted so every generation is made aware of and understands the plans and procedures in place. These changes can help make workplace safety plans fresh and continuously relevant. With that in mind, millennials currently represent the largest segment of employees unaware of emergency plans for major workplace emergencies. 38 percent of this age group are unaware of existing emergency plans, compared to just a 28 percent average of employees over the age of 35. This could be associated with the fact that some organizations are not communicating plans with newer employees or even that organizations that employ a significant number of millennials might not have plans in place at all. Affecting Everyday Work If the newest generation is unaware of these plans, then it is only a matter of time before Generation Z enters the workforce and is in even worse position when it comes to emergency awareness. The survey results showed that on average, workplaces use two methods of communication for emergencies Feeling safe and secure at work should not be something that workers need to focus on, however more than a quarter of respondents that work remotely said that worrying about safety is exactly what is affecting their everyday work. With that in mind, it’s even more concerning to see that there seems to be a clear divide between current methods and preferred methods of communication during an emergency. The survey results showed that on average, workplaces use two methods of communication for emergencies, with the top two being intercom system announcement/building alarm (27 percent) and email (22 percent). Mass Text Messages At first, these methods seem to cover both remote and in-office employees, but survey results actually showed that both groups preferred and would be better reached during other methods. While email is the second most common emergency method currently in place by organizations, it actually ranks as the fourth most preferred method at a mere 11 percent. Even with a clear preference towards communication via mass text messages by respondents (39 percent of remote workers prefer this method), less than 20 percent of companies actually take advantage of this technology. This clear disconnect shows that organizations must find what works best for their employees instead of using methods that were previously established or that are just currently being used. Preparedness Plans What remains important for organizations, regardless of size or industry, is to keep emergency preparedness plans ever evolving Communication can not only be essential to alert employees to everyday situations, like office closures, but it is also imperative in preventing emergencies to escalate when they do occur. Although this survey discusses the current state of safety in the workplace, it’s that the disconnect between employee perceptions and employer polices that’s the most concerning. Companies need to take steps to understand how their employees would like to be reached during an emergency, as well as how employees would also like to reach out to management to report their own concerns. What remains important for organizations, regardless of size or industry, is to keep emergency preparedness plans ever evolving and well communicated, so your employees are confident in the emergency plans in place. By proactively planning and practicing for emergency events through table top exercises and drills, employers can demonstrate their commitment to employee safety and preparedness and build employee confidence.
Coming off a successful ISC West show, Honeywell is sharply focused on product development, with an emphasis on advanced software. “We have a strong new product pipeline this year – more than two times the number of products than we’ve released in the past several years,” says Luis Rodriguez, Director of Product Marketing, Honeywell Commercial Security. “At ISC West, we received a lot of interest in how AI and new security systems are changing the market.” Although uses for AI are still emerging in security, Honeywell sees an important role for AI in building a connected system to ensure the safety and security of a building, and more importantly, its occupants. AI allows end users to go beyond monitoring activity on a surface level to really understand the scene – from who exactly is in the area to what they might be doing. As more data is processed over time, AI will continue to build on its learnings to help deliver a more accurate assessment of potential threats each time. Machine Learning-Based Analytics End users should explore the use of machine learning-based analytics as machine learning is more advanced than AI-based systems, says Rodriguez. “When speaking to dealers and integrators, end users should also inquire about the detection accuracy of systems that use AI or machine learning technology, particularly around false positives and negatives.” Honeywell seeks to develop integrated security systems that provide the earliest detection “Additionally, end users should always ask to conduct site testing so to understand how well-suited the machine learning-based system is to the particular user’s native environment,” adds Rodriguez. “The testing will help identify the exact needs of their site.” Honeywell is reinvesting in its video portfolio, both in hardware and software innovation, as well as partnering with the top experts in the IT and education industries to stay ahead of customer demand. Honeywell seeks to develop integrated security systems that provide the earliest detection, enable the fastest response, centralize decision making, and allow customers to manage it all from anywhere. Solutions For Vertical Markets Honeywell Commercial Security is focused on supporting vertical markets that have specific security needs such as education, banking and finance, and pharma. Each has unique nuances that call for tailored security approaches. “As Honeywell continues to develop its suite of security solutions for the future and identify personalized systems for each vertical, AI such as analytics, deep learning and facial recognition will play an integral role during research and testing,” says Rodriguez. Honeywell is developing video and audio analytics technology capable of studying crowd behaviour as well as detecting guns, gunshots An example is the education market, where eliminating human delay in reporting potential threats to law enforcement and creating faster systems that help omit single-point failures are key to protecting schools and ensuring students’ safety. To address those challenges, Honeywell is developing video and audio analytics technology capable of studying crowd behavior as well as detecting guns, gunshots and fights, says Bruce Montgomery, Business Development Manager, Honeywell Commercial Security. Testing Technology For Sports Security The software is able to visualize, automate planning, design and efficiency analysis of a video surveillance system"A partnership with University of Southern Mississippi’s National Center for Spectator Sports Safety and Security (NCS4) is testing technology such as MaxPro Video, Pro-Watch Access Control and UNP Mass Notification in the National Sport Security Laboratory and in connected real-world environments. “The analytics data gathered from these environments will help inform future security innovations,” says Montgomery. Another Honeywell partnership is with JVSG, whose CCTV Design Software offers a new way to design more affordable and higher quality video surveillance systems. Integrators and distributors are now able to add a range of models from Honeywell’s portfolio of Performance Series IP Cameras into their system design from the software’s database. “The software is able to visualize, automate planning, design and efficiency analysis of a video surveillance system,” says Jeremy Kimber, Director of Enterprise Global Product Management, Honeywell Security and Fire. The program is used by more than 7,000 CCTV designers in more than 130 countries around the world and is downloaded more than 60,000 times every year.
Virtualization offers multiple benefits to video surveillance systems, but the technology has been slow to adapt to the needs of video. However, the tide is turning. At ISC West, BCDVideo introduced a hyperconverged infrastructure tailored to video surveillance (HCI-VS) that answers the demand for higher and more efficient operating performance while also lowering the total cost of ownership for the integrator and end user. Hyperconverged Infrastructure Solution “ISC West attendees were able to get their hands on our hyperconverged solution and immediately see how easy it is to use and the benefit of adding virtual machines,” says BCDVideo’s Chief Technology Officer Tom Larson. Security integrators were impressed that BCDVideo continues to adapt technologies" Virtualization was just one of the innovations in BCDVideo’s demo room. Many integrators and end users found their way to the conference room, located not far from the exhibition hall, and BCDVideo was also featured at partners’ booths on the show floor. “Security integrators were impressed that BCDVideo continues to adapt technologies to the video surveillance space,” says Larson. “BCDVideo ‘gets’ them, but often IT does not. The HCI solution is purpose-built for video, and it works.” Server, Storage And Networking BCDVideo’s HCI-VS is a virtualized, video-optimized and highly available infrastructure. It combines the server, storage and networking into one platform. Powered by Scale Computing’s HC3 software, BCDVideo’s HCI is a scalable, node/cluster-based infrastructure that enables integrators to virtualize their physical security appliances and software, meaning fewer devices need to be deployed and maintained. Physical security integrators can create an infrastructure that provides high availability to the VMS" “More importantly, our HCI makes it easier than ever before both to quickly create and deploy virtual machines, and to manage video surveillance infrastructure,” says Larson. Some of the unique needs that HCI-VS serves are those of multi-faceted projects involving video recording, access control, building management, etc. With HCI-VS, separate appliances are not needed for each of these tasks, which enables better use of hardware, reduces overall rack space and power/cooling costs. Essentially, this solution eliminates the “pizza box” model and serves the need in the marketplace where always-on video and high availability are necessary, and especially in situations where loss of video data cannot be tolerated, says Larson. Simplified graphical user interface (GUI) makes it easy for integrators to implement systems that use hyperconverged technology Tolerant To Hardware Failure “By leveraging the concepts of hyperconvergence, physical security integrators can create an infrastructure that provides high availability to the video management system,” he says. “When components within a video management system are tolerant to hardware failure, it results in less loss of data and continual access to the data from the failed component. You always have access to the video data even if the hard drive fails.” Defining Virtualization Virtualization is the act of creating virtual copies of physical resources, including, but not limited to, compute, memory, storage, and network resources. This is achieved by employing software to manage all physical resources, known as a hypervisor. As servers become more powerful, the discrepancy between software and hardware capabilities result in inefficient use of resources. “By partitioning the hardware resources into smaller virtual environments, we can create multiple virtualized servers that share a common set of resources,” says Larson. “By sharing this common set of resources, the virtualized servers utilize the resources more efficiently with less waste.” Integrators and end users flocked to BCDVideo's demo room at ISC West to try out the new hyperconverged solution Education And Physical Security Learning about the benefits of why to virtualize and applications will be a first step” A challenge to greater adoption of virtualization in the physical security industry is education. “Some security integrators will need to step out of their comfort zone,” says Larson. “Virtualization for video has been slow to adapt, and other solutions are complicated. IT technology applications traditionally have not worked in the space either. Learning about the benefits of why to virtualize and applications will be a first step.” HCI-VS In New Verticals While HCI-VS is vertical-market-agnostic, the solution is suitable for school districts looking to consolidate their hardware, for hospitals and the healthcare industry in general, for the rapidly growing cannabis industry, any mass transit system, as well as for Fortune 1000 companies, to name a few. “Our virtualized solution especially appeals to these verticals because of the number of cameras, the need for 24/7/365 video recording and extensive data retention requirements, and where loss of video data cannot be afforded,” says Larson. Purpose-Built Solutions BCDVideo’s HCI-VS is the latest example of products BCDVideo is creating for the physical security industry. “We purpose-build and engineer our solutions specifically for video surveillance with the ability to scale-out as needed,” says Kelly Kellen, BCDVideo’s Director of Marketing. “We engineer new products to address problems in the marketplace. Our CTO is really looking at the market and studying the security integrator’s pain points. Then we engineer solutions to best serve them.”
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 Security Technologies for Security and Public Safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems And Video Surveillance As A Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video And Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organize and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organize and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimize operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realize other operational and performance efficiencies. Topic: Robotics And Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organizations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place In Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics In Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realize a more secure future. Topic: Voice Control In The Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
Village Roadshow Theme Parks (VRTP), Australia’s largest theme park operator, provides some of the most thrilling entertainment rides and slides available anywhere in the world. With its headquarters located on the Gold Coast, Australia’s holiday playground, it operates: Warner Bros. Movie World Wet ‘n’ Wild Water World Australian Outback Spectacular Sea World Paradise Country Sea World Resort and Water Park Over 5 million visitors per year, from families to thrill seekers, flock to this world of fun with action-packed shows and rides, marine and animal attractions, and adventure across seven large scale properties. Monitoring from Command Centre This enables monitoring from the Command Centre in the Gold Coast over all seven sites streamlining operationsWhen it comes to security, VRTP have always chosen access control and perimeter solutions supplier Gallagher as their long-term partner. A relationship that began in the mid-1980s, has grown to meet the expanding demands of each park. VRTP recently opened a new Wet ‘n’ Wild in Sydney, New South Wales, in December 2013. Two new parks based on Sea World and Wet ‘n’ Wild are currently under construction in Hainan, China. Wet ‘n’ Wild Sydney, opened to the public in December 2013, demonstrates Gallagher’s ability to extend security coverage across States, with its scalable and flexible solution. This enables monitoring from the main Command Centre in the Gold Coast over all seven sites streamlining operations. In the event of power loss from the main controller in the Gold Coast, Sydney sites have their own server backups to continue operations as normal. RFID wrists bands for staff access The model that VRTP and Gallagher have designed enables various operator levels to have separate divisions for creating cardholders. Different operator levels have authorized access to develop card holders for their sections. There are approximately 3,000 cardholders at all parks and growing. Wet ‘n’ Wild Sydney is the first Village Roadshow park to deploy staff RFID wrists bands that give them access to areas restricted by the public. Command Centre technology has given VRTP total site security across all parks VRTP’s guard workforce has been complimented by the Gallagher system working seamlessly together. Command Centre technology has also given VRTP total site security across all parks; within a year saving park operations approximately 20 hours a day in labor costs. Better visibility of services Gallagher delivers building automation and control through a high-level interface that provides strong communication between Gallagher Command Centre and the theme parks’ building systems. This has enabled integration to seven main panels and sub panels across the group giving security staff better visibility of all services, at all times. Efficiencies in alarm generation have improved with automatic escalation to the necessary staff member in a timely manner. Key industry challenges Health, safety, risk mitigation, and public relations Preserving assets and ambience Using integration to save costs and improve security efficiencies Gallagher technology used Gallagher Command Centre Gallagher T-Series Access Control Readers Gallagher high level video integration – more than 250 cameras Protection of marine animals Gallagher’s integrated security solution provides continuous surveillance across the parksAnimal safety and care is critical. Sea World is Australia’s premier marine park, with over 25 hectares (55 acres) of land. With a range of dolphins, seals, sharks, polar bears, and other marine life – their safety, and the reputation of Sea World, must be preserved. This also includes protecting Australian Outback Spectacular and Paradise Country animals and wildlife. Alongside video and alarm integration, Gallagher manages all primary entry points into parks. Once inside the parks, it manages restricted zones which include secured enclosures, particularly important for Sea World. Gallagher’s integrated security solution provides continuous surveillance across the parks, capturing any incidents which may occur on site. This is particularly important for Wet ‘n’ Wild water park which faces increased risk due to the nature of the environment. Wet ‘n’ Wild has been one of the group’s most successful theme parks with a growing attendance of approximately 1 million visitors every year. Investing in robust integrated system The VRTP security team has the ability to monitor and control from one locationVRTP are continually looking for ways to improve park operations, infrastructure, and processes to meet the needs of visitors and staff. With security taking a precedence in the last five years, VRTP made the decision to invest in a robust integrated system that to the public eye would go unseen. Gallagher’s strong history of service and the scope of their integrated security solutions gave VRTP confidence in selecting Gallagher for their upcoming internal infrastructure developments. With 250 cameras located discretely around all seven of VRTP’s properties, integrated back to the central control platform Gallagher Command Centre, the VRTP security team has the ability to monitor and control from one location. Intruder alarm management solution The integrated system plays an important role in securing the site overnight from would-be intrudersIn the Village Roadshow Studios, much importance is placed on securing assets, and protecting the privacy of high-profile guests. The Studios have attracted projects with a combined budget of around 2.5 billion dollars. There are eight large sound stages covering 10,844m2 (116,727 sq. ft), confirming it as one of the largest studios in the Southern Hemisphere. With intellectual property and assets that must be protected, the Gallagher 24-hour camera integration and intruder alarm management solution play a key role in protecting staff, visitors, and monitoring employee cash handling and service. The integrated system also plays an important role in securing the site overnight from would-be intruders. Duress alarm monitoring is a central integration used by security staff with 70 alarm zones across all parks. In the event of an emergency, a wireless help-call system can identify back to the Command Centre the name, description, and location via a detailed site plan for each park. This is a vital security element for protecting captive mammals and animals, and IT infrastructure.
Located in the buzzing heart of England’s capital city, University College London is one of the top ranking establishments for higher education in the world. Founded in 1826, London’s first university institution, the College now has an estimated 28,600 enrolled students and 14,600 members of staff. Including agency staff, academic associates, and other visitors, UCL currently has a system of over 48,000 valid cardholders. Based primarily in the Bloomsbury area, UCL’s main campus is situated on Gower Street and includes departments such as biology, chemistry, economics, engineering, geography, history, languages, mathematics, philosophy, politics, physics, architecture and the Slade School of Fine Art, as well as the preclinical facilities of the UCL Medical School and the London Centre for Nanotechnology. Electronic access control UCL has been used as a location for a number of high profile film and television productions While the UCL Cancer Institute and Faculty of Laws are also nearby, notable College buildings include the original Wilkins Building and Gower Street’s Cruciform Building, previously home to University College Hospital. The University has further sites based elsewhere in and around London, such as the UCL Institute of Ophthalmology, the UCL Institute of Orthopaedics and Musculoskeletal Science, The Royal Free Hospital Medical School, and also the UK’s largest university-based space research group, the Mullard Space Science Laboratory, and UCL’s own astronomical observatory at Mill Hill. Due to its position within London and the historical nature of its buildings, UCL has been used as a location for a number of high profile film and television productions, including Gladiator, The Mummy Returns, The Dark Knight and Inception. The sheer scale of the University’s operations, with thousands of occupants fluctuating between its numerous facilities, has dictated the need for a comprehensive electronic access control security system – one which has evolved over many years. Physical locking controls UCL’s Security Systems Manager, Mike Dawe explains that while adhering to the University’s culture of ‘general openness’ on campus, Gallagher systems have been introduced as “a progressive response to the need for more security control on site.” Security throughout the University is managed by the Security Department of the Estates Division, which has responsibility for all the physical locking controls and electronic systems, as well as the provision of the security guarding service. By and large an open campus, a number of university buildings are free to visitors from the general public, while others are controlled by turnstiles accessible by valid cardholders only. Many other research areas are available only to those with specific security passes. Gallagher’s systems have been in place with the University since 1993 and were originally chosen for the Gallagher Commander Hardware’s ability to communicate effectively over long distances between buildings. Key industry challenges Following were the key industry challenges involved: Ensuring appropriate access to students/staff onsite Implementation of lockdown and evacuation procedures Controlling access to key University areas Protecting University property Providing unobtrusive but robust security Control and management of multiple systems Visitor time and access management Central records systems Full data integration was achieved in 2006 when the system was linked to UCL’s central HR Recognized by Mike as the ‘next important direction for the University’, the subsequent introduction of the Gallagher Access Control system (formally Cardax FT) in 2003 enabled Gallagher’s main security system to be integrated with UCL’s other data systems. Additionally, Mike highlights how “Gallagher’s ‘building blocks’ approach to programming the software also provided greater flexibility when using the system, while the network infrastructure enabled us to move away from our own discrete wiring.” Full data integration was achieved in 2006 when the system was linked to UCL’s central HR, student records and visitor records databases. Combining the regular ID card with a single access control card then followed, and validity is kept fully updated by the University’s central records systems. Currently the University has 101 buildings on the Gallagher system, which controls 939 doors, 32 turnstiles and 15 lifts. General perimeter control Typically, Gallagher security is used for the general perimeter control of the buildings, such as those with both turnstile access and a reception at the entrance, as well as additional control within College buildings to divide public and semi-public areas from departmental spaces. Gallagher systems also control UCL’s top security areas such as high risk research space and data centers. Describing UCL’s security operation, Mike explains how the Gallagher solution has been integrated with the inhouse HR, student and visitor records systems and filters duplications to ensure a single identity. This information is then fed through the Gallagher system to update cardholder records using an ‘import/export’ function. The Gallagher technology is also used to automatically send barcode information to the Library systems and update the student records system with student photos. Scheduled email notification reports are also sent regularly which, according to Mike, “has proved very useful for UCL’s high value areas.” Security operations team We routinely use reports and produce these in response to departmental concerns and requests" “We routinely use reports and produce these in response to departmental concerns and requests”, he explains. “Typically this is done by the security operations team, which analyses the information, along with CCTV data to investigate suspected crimes.” UCL is planning to integrate the Gallagher Security system with its existing CCTV system and will use this, in addition to the new Command Centre Premier client, to improve the provision of site information to the Security Control room staff. The University is also currently developing its import/ export process to automatically provide access levels based on person-type information, such as department, course etc. Gallagher would like to thank Mike Dawe, UCL’s Security Systems Manager, for his support with the production of this site profile. We would also like to acknowledge the support of our security partner, Reach Active Limited who has contributed significantly to the successful implementation of the Gallagher system at University College London.
With a large campus comprising historic and modern buildings and significant research facilities and equipment, the University of Otago has assets in excess of $1.4 billion (NZD). In 2006, an internal security review of campus facilities identified that a number of critical areas – including laboratories where medical research is conducted on animals and human cadavers – could attain an increased level of security and achieve greater cost efficiency through the installation of Gallagher systems. A key priority of the security upgrade was to replace the traditional lock and key system in place in facilities across campus with Gallagher’s electronic access control solution. By moving to an entirely electronic system, the University has mitigated the risks associated with lost keys and unauthorized access. Lost and misplaced cards are reported and immediately deactivated ensuring complete control is maintained over facility access. Comprehensive alarm monitoring The team at the University of Otago needed an auditable system, capable of identifying access by people, place, and timeThe electronic system also allows for comprehensive alarm monitoring per door and per freezer, ensuring campus security is immediately notified if a door or freezer has been left open. Gallagher’s Mobile Client, available with the Command Centre v7.30 security management platform, means these alarm notifications can be communicated directly to security personnel’s Apple iPhone devices providing valuable information in real-time, to those outside of the control room. More than simply managing the access permissions across campus, the team at the University of Otago needed an auditable system, capable of identifying access by people, place, and time. Gallagher’s Command Centre application provides this high-level of traceability and enables the University to quickly and easily extract the exact information required both for internal use and for the regulatory audits required of research facilities. Identifying who accessed which areas “Due to the nature and value of our assets, it’s critical not just to control who has access to facilities but to be able to identify exactly when areas were accessed and to know who was there,” said Deputy Proctor at the University of Otago, Andrew Ferguson. Key industry challenges Eliminate the security threat that comes with lost keys Enhance the level of security for critical areas including Medical Research laboratories Procure a solution capable of producing comprehensive audit trails Introduce a secure, automated facilities management system Gallagher security products installed Command Centre Electronic card readers Syllabus Plus integration Syllabus Plus integration Syllabus Plus enables automation in the scheduling and booking of resources and equipment Founded in 1869, the University of Otago is New Zealand’s oldest university. Ranked in the top 200 universities worldwide, the University of Otago is New Zealand’s primary medical tertiary institute and is considered the top research university in New Zealand. The Gallagher system installed at the University of Otago includes a Syllabus Plus integration. Syllabus Plus enables automation in the scheduling and booking of resources and equipment through Command Centre. The University of Otago team were quick to see value in the opportunity to synchronize their access control system with class time-tables, and subsequently manage room resources by automatically unlocking doors. Easily search and book resources A key benefit for the University was a move away from the manual process of entering room bookings into Command Centre. In addition to removing the labor associated with this manual process, the university also found a reduction in the number of booking inaccuracies caused when people changed their plans, as staff can now quickly and independently reschedule their resource and room bookings if their requirements change. “Smart scheduling gives authorized users in our wider team the ability to quickly and easily search and book resources,” said Ferguson. “It’s a genuine time-saver for us and ensures our facilities are managed efficiently.” The university has implemented an ongoing software maintenance agreement with Gallagher To ensure the University of Otago’s security system remains at the forefront of technology, the university has implemented an ongoing software maintenance agreement with Gallagher to ensure they receive the latest system developments as they are released. “We would never go without software maintenance, it’s imperative that our high-end security be the best it can possibly be,” said Ferguson. Training for system operators In addition to ensuring their security products and systems are up-to-date, the University of Otago also ensures their system operators undergo regular training. According to Ferguson, “We arrange annual training with Gallagher for our Campus Watch security team. The training teaches the team valuable tips and tricks on how to utilize the system to its fullest.” During the years since the initial installation of Gallagher security systems, the University of Otago has experienced significant savings associated with not needing to re-key facilities or replace locks when traditional keys have been lost or not returned – maintenance that the University estimates used to cost tens of thousands of dollars each year.
Zayed University is the newest of three government sponsored higher education institutes in the United Arab Emirates. The campus is located on the mainland of the Emirate of Abu Dhabi, near the Abu Dhabi International Airport and Masdar. The 229,000m campus houses six colleges across 28 separate buildings, including faculty and administration buildings, a childcare facility, residence halls, classrooms, science and computer labs, cafeterias and a sports complex, all equipped with the latest technology. Future development plans will see the student population increase to 7,500 and the campus grow to cover a net area of 269,000m. Access to and from the campus is an important concern for Zayed University and is carefully managed around the clock to keep the 6,000 strong student body safe. Managing gate barriers and doors Banner sends a command directly to the Gallagher Door Controller to open that specific gate if entry or exit is allowedThe university employs Serco to implement and manage their security requirements. Serco partnered with Gallagher, selecting the Command Centre security platform to manage gate barriers and access controlled doors with just under 650 MIFARE readers and 130 controllers across the site. Zayed University implements a policy to provide students with a secure campus environment. This includes managing the entry and exit of the students based on their scheduled classes. To achieve this, Zayed University runs an interface between Command Centre and its Banner system. Banner is a comprehensive computer information system that contains information on courses, students, faculty, staff and alumni, including financial aid, finance and human resource components. Entry and exit requests for students to pass through the campus gates are sent from Command Centre to the Banner system for approval, using the Command Centre OPC Alarms and Events interface. Based on the time of the entry or exit and the student’s schedule, the Banner system decides whether the request is accepted or denied. Banner then sends a command directly to the Gallagher Door Controller to open that specific gate if entry or exit is allowed. Safe and secure environment for students Its intuitive user interface provides flexibility and easy management of operations"Gallagher security solutions provide the assurance and the knowledge that movement throughout campus is managed simply and efficiently to ensure a safe, secure environment. “Keeping students safe is of utmost importance to us,” says Mukesh Karsan, Serco IT Manager at Zayed University. “The Gallagher system helps us honor this commitment. Its intuitive user interface provides flexibility and easy management of operations.” He adds that he’s been “impressed with the reliability and robustness the system offers; it’s powerful, versatile and allows security personnel to carry out their day-to-day responsibilities with efficiency.” Gallagher solutions are trusted by education providers worldwide to: issue student and faculty access cards manage individual access rights control campus and dormitory access secure computer labs, science labs and other high-value assets integrate with scheduling and resource booking systems evacuate or lock down sites in case of an emergency Time and money saving solutions From intelligent integration with building management systems, to people and time efficiencies gained through automation and smart use of resources, Gallagher designs solutions that save time and money. Whether it’s across multiple zones within a single campus, or over multiple campuses, Gallagher solutions offer an intelligent, powerful way to ensure business continuity, protection of assets and keeping people safe.
As a major transportation hub in Northeastern China, Changchun Longjia International Airport processes a huge amount of passengers every year. In response to massive economic growth in the region, the airport – with a total volume of almost 13 million passengers in 2018 – needed an additional terminal. Built over the course of three years, the state-of-the-art Terminal 2 building covers a total area of 55,600 square meters. Since its opening in October 2018, the expansive Terminal 2 building has been serving all domestic flights from 22 airlines including Air China, Shenzhen Airlines and Shandong Airlines while international flights are now concentrated in Terminal 1. Meeting airport security guidelines Bosch received the contract based on a proven track record of large-scale airport security installationsLooking to safeguard this vital new infrastructure, the airport security managers wanted to integrate video security, intrusion detection, public address and access control for staff within one platform while meeting current government security guidelines for airports. Since 2017, these laws include mandatory storage of all video data for a 90-day period, which puts a premium on adequate data storage in a space covered by over 1,000 cameras around the clock. Given the project’s massive scale, managers wanted to work with a one-stop provider to ensure seamless integration of all solutions and delivery according to stringent timelines with end-to-end security intact on opening day. After diligent market research, Bosch received the contract based on a proven track record of large-scale airport security installations and the ability to connect all components – video security, intrusion alarms, access control and public address systems – on the Building Integration System (BIS). Installation of IP dome cameras Outdoor cameras are able to withstand temperatures down to -40 °C during Changchun’s harsh wintersFor video security, Bosch experts installed nearly 1,500 cameras inside and outside Terminal 2, including moving cameras such as the AUTODOME IP 4000i and IP 5000i and FLEXIDOME IP 6000 VR series. All IP-based cameras are centrally managed on the Bosch Video Management System (BVMS) and support security personnel by detecting threats and triggering automated alerts via built-in Essential Video Analytics. Outdoor cameras are able to withstand temperatures down to -40 °C during Changchun’s harsh winters. And to maintain a small data footprint while meeting the legal obligation for 90-day data storage, the cameras use efficient H.265 compression technology, thereby reducing bandwidth to a low 2 Mbps and storage space by up to 50 percent compared to other cameras. As a direct result, security managers in Changchun have been able to achieve savings in the number of networked storage units as well as energy consumption and cooling cost for the server room. Unified management of access control “The reduced bandwidth leading to a fewer number of storage cabinets in the server room was a major reason why our client opted for the Bosch solution,” said Mustaine Hu, Technical Support Manager at Bosch Building Technologies. The Building Integration System supports unified management of access control for airport personnel at 350 doorsMeeting another key customer requirement, the Building Integration System (BIS) from Bosch supports unified management of access control for airport personnel at nearly 350 doors. A combination of card reader and video security eliminates the risk of non-employees accessing critical areas with a stolen card and creates a seamless passage for authorized staff without additional screening. Bringing security full circle, the installed public address system allows security personnel to broadcast real-time announcements via more than 1,200 ceiling loudspeakers. The system ensures controlled evacuation in emergency situations and also sounds alarms triggered by connected intrusion sensors to alert personnel. Security for travelers and personnel Fully operative since the grand opening of Terminal 2, the Bosch system now provides end-to-end security for travelers, personnel and property at Changchun Longjia International Airport. As a scalable and IP-based system, it is future-proof to accommodate further expansions and has delivered cost savings on video storage and power consumption since day one. In face of China’s rapid economic growth, about 200 of the country’s 497 airports will require similar expansions over the coming years, making Changchun an important reference for Bosch Building Technologies in the region.
Boon Edam Inc., globally renowned security entrances and architectural revolving doors manufacturer, has announced that a multi-story office building in London was recently refurbished to upgrade its existing Boon Edam revolving doors and optical turnstiles. Now adorning the entrance are two all-glass Crystal TQ revolving doors, accompanied by an array of slim Lifeline Speedlane Swing optical turnstiles in the lobby. Revolving doors, optical turnstiles Originally opened in 1980, Riverscape is a 63,000 square foot, multi-story office space located at 10 Queen Street Place. The modern development sits on the sought-after area of the River Thames, just minutes from the bustling area of Cannon Street Station. Recently, the building owners decided to upgrade the look and feel of Riverscape, incorporating the current trends of open atriums, flexible floor space and usable rooftop space. Project also included the replacement of legacy Boon Edam revolving doors and optical turnstiles with updated solutions The refurbishment project also included the replacement of legacy Boon Edam revolving doors and optical turnstiles with updated solutions. Leading the design of the renovation were architect Aukett Swanke; interior designer Barr Gazetas; and Overbury as main contractors. High-tech security entrances As is common with older entrance installations, Riverscape decided to renew its revolving doors and optical turnstiles to achieve a more modern look and feel, and to upgrade the associated technology. The client returned to Boon Edam when selecting their new entrance solutions. At the main entrance to the office space, the existing TQM manual doors were replaced with two, tall Crystal TQ revolving doors. Constructed virtually completely from glass with minimal stainless steel accents, the Crystal TQ accentuates Riverscape’s all-glass façade, providing an elegant and timeless entry experience for all employees and guests. Lifeline Speedlane Swing In the main atrium space, the original Speedlane 900 optical turnstiles were upgraded to the new Lifeline Speedlane Swings. The Speedlane Swing combines security with aesthetics and is particularly popular because it features the slimmest cabinets in the industry – only four inches wide. To enhance security at the facility, Riverscape wanted a solution for monitoring and managing visitors to the office space. To enhance security at the facility, Riverscape wanted a solution for monitoring and managing visitors to the office space To achieve this, they decided to integrate the Lifeline Boost access control pedestal with their Speedlane Swing optical turnstiles. The Boost attaches to the end of the Swing and allows for integration with a variety of access control technologies, such as biometric devices, card collectors and barcode scanners. Integrated technology Employees enter the work area by scanning their credentials at the turnstile itself, while guests are issued a temporary access card with a special barcode that is scanned at the Boost pedestal. The Boost retains the card, enabling the reception staff to eventually reuse that card for future guests. “Using our barcode scanners, visitors can book in with reception, receive an entrance card and badge in and out conveniently through the lanes,” says Boon Edam Limited’s Field service Sales Executive, Graham Coulter.
Round table discussion
When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this week’s Expert Panel Roundtable: Good news or bad news? How do news reports and/or current events influence the general public’s opinion of physical security?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Employee turnover is a problem for many companies, especially among younger employees who have not developed the philosophy of employer loyalty that was common in previous generations. Nowadays, changing jobs is the norm. The idea of spending decades working for a single employer seems almost quaint in today’s economy. However, excessive employee turnover can be expensive for employers, who are looking for ways to keep their brightest and best employees happily toiling away as long as possible. We asked this week’s Expert Panel Roundtable: How can the physical security market promote better employee retention in a competitive employment environment?