Business security systems
ACRE, renowned global provider of state-of-the-art security systems, has announced that it has entered into a definitive agreement to acquire RS2 Technologies in Munster, Indiana. This purchase will enhance ACRE’s strategic expansion plans for strengthening its access control business and product portfolio. Following on from the recent acquisition of Open Options in December of 2018, ACRE continues to build its access control strength and reach in the North American market. ACRE’...
ADT, a provider of monitored security and interactive home and business automation solutions in the United States and Canada, unveils its new ADT Commercial brand and positioning video, as part of its multi-year expansion plans. Since the merger with Protection 1, ADT has built upon its commercial capabilities and customer focused approach combining more than ten strategic acquisitions, bringing decades of experience to commercial and national account customers. ADT’s announcement is part...
Nortek Security & Control LLC, a provider of wireless security, home automation, access control and health and wellness technology, introduced the 2GIG eSeries, the next generation of the 2GIG security and control ecosystem that includes two all-new GC2e and GC3e panels and a new line of encrypted sensors. The introduction was made at ISC West 2019 in Nortek Security & Control Booth #20015 in Las Vegas, Nevada. According to Nortek Security & Control Vice President of Products Quinto...
Security and Safety Things (SAST) - A Bosch IoT startup, hosts the first-ever live hackathon at ISC West on the 10th and 11th of April in the Sands Expo Center, Las Vegas. The two-day event featured three teams racing against the clock to create the most deployable application for an American football stadium using the new Security and Safety things system, SAST OS (Operating system). Teams were provided with Google pixel phones, reference cameras and appropriate APIs and development kits, incl...
Johnson Controls expands its PowerG technology portfolio to include the addition of several new detectors and sensors offering installers a greater variety of devices that harness the power of PowerG. Wireless Security Technology Enhancements to the PowerG portfolio include a 360-degree ceiling mount PIR detector, commercial magnetic contact, carbon monoxide detection and vanishing door / window magnetic contact, just to name a few. With the absence of wires, PowerG is able to securely perform...
Johnson Controls has introduced a simplified approach to enterprise video management with its improved exacqVision Enterprise edition video management solution. Enterprise Manager, which was formerly sold separately as the Enterprise System Manager, is now an integrated part of the exacqVision Enterprise edition VMS, giving users ready access to enhanced health monitoring, user management, update management and high-availability capabilities at no additional cost. exacqVision EM-Series Server...
Dahua Technology, a global video-centric smart IoT solution and service provider, has announced a new integration with Control4, a global provider of automation and networking systems for homes and businesses, at ISC West. Dahua Technology’s North American models of IP cameras, Pro and Lite series NVRs and HDCVI XVRs are fully integrated with the Control4 Composer HE 2.9.0 automation system. This marks the first full integration between Dahua Technology and a home control and automation platform. Alerting Users Of Suspicious Activity Dahua NVRs support motion detection to trigger events on the Control4 system’s watch menu and alert a user of suspicious activityDahua NVRs support motion detection, if enabled on the camera, to trigger events on the Control4 system’s watch menu and alert a user of suspicious activity. The Dahua NVR driver also provides MJPEG and H.264 video feeds, allows selection stream quality, and more. Integrations with home automation platforms cater to industry demands for a single portal to control security and household features in users’ homes and businesses. These steps towards simplification and system unification will make interactions with smart homes easier and more convenient for Dahua Technology and Control4 customers. “This product integration furthers our commitment to provide smart home and security integrators with a complete platform for home control,” said Tim Wang, President and CEO at Dahua Technology USA. “We are excited to offer solutions that shape how businesses and homeowners can use, access and control their security systems.”
Pulse Secure, the provider of software-defined Secure Access solutions, announces that it has teamed up with Dynamic Worldwide Training Consultants (DWWTC) and Westcon Americas, A Division of SYNNEX, to deliver the new Pulse Secure Authorized Training program to its reseller partners and customers. As Pulse Secure Authorized Education Partners, DWWTC and Westcon Americas, A Division of SYNNEX, will deliver Pulse Secure’s new program of Authorized Education Training Courses, designed to prepare users to pass the Pulse Secure Certified Technical Expert Certification exams. The instructor-led training program is open to Pulse Secure customers and reseller partners and is available globally in both virtual and classroom environments. Secure Access Offerings Joe Pittillo, vice president of services, SYNNEX Corporation, said, “By providing customers access to Pulse Secure products, services, and now education, our team can further enable their success in the channel around Secure Access offerings. Our goal here, as well as with all of our education and training programs, is to help increase partner profitability and the value they bring to their customers – all from a single, trusted source.” The certification program will uniquely benefit both Pulse Secure reseller partners and customers Dave Warren, CEO, DWWTC, commented, “We’re delighted to come on board as a Pulse Secure Authorized Education Partner to help companies gain that extra level of knowledge to help them stand out from their competitors and grow their businesses.” Authorized Education Partners The certification program will uniquely benefit both Pulse Secure reseller partners and customers, allowing each to maximize their Pulse Secure deployments and businesses. Customers will gain the expertise to implement and manage the Pulse Secure product suite more effectively while partners will be enabled to promote and deliver Pulse Secure solutions with confidence and to further differentiate their service offerings. Sudhakar Ramakrishna, CEO of Pulse Secure, said, “Pulse Secure recognises that an empowered and enabled partner and sales community is better able to deliver customer and business success. To this end, training and certification, and our partnership with our Authorized Education Partners, is a key business imperative for Pulse Secure. Attendees of the training delivered by our Authorized Education Partners will leave with the skills and the confidence needed to successfully implement and maintain Pulse Secure products and solutions.”
ShotSpotter, Inc., the provider of gunshot detection solutions that help law enforcement officials identify, locate and deter gun violence, announces a new technology innovation unit – ShotSpotter Labs – to expand the company’s current efforts supporting innovative uses of its technology to help protect wildlife and the environment. ShotSpotter Labs is launching with an initial focus on helping combat rhino poaching in South Africa. Later this year, the unit intends to explore other applications for global wildlife protection such as combatting illegal blast fishing in Malaysia with underwater sensors. Multiple Poacher Apprehensions In 2014, ShotSpotter began a pilot of its gunshot detection technology in the Intensified Protection Zone of Kruger National Park in South Africa, home to 60% of the last remaining rhinos. Given the vast expanse of the park, most poaching incidents went undetected with carcasses found days or weeks after the fact. With the introduction of ShotSpotter to detect, locate and alert park rangers to gunfire incidents in under 60 seconds, there have been multiple poacher apprehensions within the coverage area since its debut. The resulting speed and accuracy of the response not only increases our chances of making contact and effecting an arrest" “ShotSpotter changes the game by giving our rangers the exact location of the shot within seconds,” said Glenn Phillips, Managing Executive of Kruger National Park. “The resulting speed and accuracy of the response not only increases our chances of making contact and effecting an arrest, but over time we hope will send a powerful message to poachers to stay away.” Unmanned Aerial Vehicles In addition to significantly expanding coverage area in the park, ShotSpotter Labs plans to integrate with unmanned aerial vehicles (UAVs) for automated dispatch to the precise latitudinal and longitudinal coordinates of the gunfire. The UAVs will provide a video stream to rangers so that they can track the poachers. ShotSpotter has had to adapt its sensors and software for use in the sprawling expanse of Kruger National Park with no electricity available to power sensors. These types of system innovations required for anti-poaching are already being applied in other applications such as solar-powered sensors in freeway deployments with limited access to electricity. “I’ve seen the devastation to the rhino population firsthand in South Africa and it’s meaningful that ShotSpotter can make a difference to help these amazing animals survive for future generations,” said Ralph A. Clark, president and CEO of ShotSpotter. “This kind of engagement is not only the right thing to do, but it’s also an opportunity for us to develop innovative technology that can ultimately be incorporated back into core products across our business.”
March Networks, a global video security and video-based business intelligence pioneer, is pleased to introduce March Networks Insight. The new, hosted service provides March Networks customers with unmatched video network visibility, asset control, system health, and service level agreement (SLA) performance management. It offers a visual overview of an organization’s entire video network, and valuable reporting capabilities accessible via a secure, cloud-based platform. Leveraging the proven expertise of March Networks’ dedicated Network Operations Center (NOC) team, which already provides daily managed services to more than 35,000 sites across North America, Insight leaves customers free to focus on their business while ensuring optimum video system performance. Recurring Revenue Stream For March Networks certified solution partners (CSPs), Insight delivers the tools needed to serve customers more efficiently For March Networks certified solution partners (CSPs), Insight delivers the tools needed to serve customers more efficiently. It reduces costly truck rolls, and enables partners to easily document and track product warranty status, software versions and other information. The service is also an opportunity for CSPs to build a new recurring revenue stream, working together with March Networks’ professional services team. With Insight, customers enjoy complete, end-to-end support – from system monitoring, performance optimization and issue diagnosis, to remote resolution where possible. When onsite service is required, the NOC team generates a service ticket for customers or their certified partner along with valuable information on the likely issue, for faster, more efficient resolution. Cloud-Based Management Platform That complete support is just one of the benefits enabled by this industry-first service. Insight offers unique features and reporting capabilities that save customers time and costs, including: Easy, self-service access to the cloud-based management platform via a web browser, enabling customers and/or their certified partner to securely access critical video network information, create customized reports, and generate and track their own service tickets. Comprehensive health reporting, for at-a-glance views of a customer’s video network health, problematic areas and more. Closed-loop field service workflows so customers know that escalated issues have been resolved successfully. SLA reporting on items including outstanding service tickets and time to resolution, validating that SLA commitments are being met. Scheduled software upgrades, ensuring timely updates that help protect the video network from possible security vulnerabilities and enable feature enhancements. Inventory and product warranty reporting, providing an invaluable audit of a customer’s entire video network, including device configuration, model number, firmware version and warranty status. Optional, third-party device health monitoring employing Simple Network Management Protocol (SNMP) scanning tools, leaving customers worry-free even when it comes to non-March Networks IP devices in the video network. Optional Field of View (FOV) reports, so customers and/or their certified partner can move quickly to fix any camera FOV that’s been changed or obstructed. Geographical and network topology views, for a more intuitive overview of a customer’s video deployment, as well as the ability to quickly spot trends by region or area. Physical Access Controls To ensure customer data is well protected, March Networks enforces strict security and management controls To ensure customer data is well protected, March Networks enforces strict security and management controls. The NOC runs on a dedicated network, has its own firewall, and uses sophisticated visibility rules to segregate customer data at multiple levels. It also incorporates state-of-the art physical access controls and restrictions, including a retinal scanner and 24/7 video monitoring. March Networks conducts cybersecurity audits and penetration tests regularly, and mandates regular employee training so NOC staff are always current on cybersecurity best practices. In addition, the company backs up NOC data frequently and systematically, and has an established disaster recovery process and redundant power sources in place to mitigate power and system downtime. March Networks Insight is currently available in the U.S. and Canada, with flexible one, three or five-year service terms, and monthly, quarterly or annual invoicing options. The company is demonstrating the new, hosted service in Booth 26041 at the International Security Conference & Exposition (ISC West), April 10-12, 2019 in Las Vegas, NV.
Thailand’s leading business hub for security solutions, Secutech Thailand, is set to return from 28 – 31 October 2019 alongside Thailand Lighting Fair, Thailand Building Fair, and Digital Thailand Big Bang. Under the banner of ‘Smart City Solution Week 2019’, the four fairs together will serve as a one stop shop for smart city professionals to source all of the latest security, building automation, lighting and digital infrastructure solutions. “The Thai government aims to establish 100 smart cities over the next two decades,” said Ms Regina Tsai, the Deputy General Manager of Messe Frankfurt New Era Business Media Ltd. “Within this context, ‘Smart City Solution Week’ delivers a win-win for Thailand’s smart city stakeholders. The arrangement will not only create visitor synergies amongst the four fairs, but it will also help to build even more momentum for Thailand’s smart city sector.” Secutech Thailand – Security + AI Ms Tsai said that she expects to see an increase on last year’s visitor numbers during Smart City Solution Week 2019 Secutech Thailand has embraced the smart city concept since the first edition in 2011, and under its new theme of ‘Secutech Thailand – Security + AI – Empowers Sustainable City Development’, the fair will deliver all of the latest AI and IoT security innovations for the smart city sector. The 2018 edition of the fair featured a record 250 exhibitors (2017: 150) and attracted 8,420 visitors to 7,000 sqm of exhibition space. Ms Tsai said that she expects to see an increase on last year’s visitor numbers during Smart City Solution Week 2019: “Many of the distributors and system integrators that visit Secutech Thailand also have business interests in the lighting, building automation and digital infrastructure sectors. By running Secutech Thailand alongside Thailand lighting Fair, Thailand Building Fair, and Digital Thailand Big Bang, we will create a convenient one-stop sourcing platform that will draw in even more buyers to Secutech Thailand.” Sustainability, The Key Theme At Smart City Week 2019 All four fairs will be held at the Bangkok International Trade and Exhibition Center, and in keeping with the modern push towards sustainable living, each fair offers a unique sustainability theme. The Thailand Lighting Fair is set to be held under the theme of ‘IoT + City: A Sustainable and Livable Future’ The Thailand Lighting Fair, for example, is set to be held under the theme of ‘IoT + City: A Sustainable and Livable Future’. Jointly organized by Messe Frankfurt New Era Business Media Ltd and The ExhibiZ Co., Ltd, the fair is a home for exhibitors to showcase their unique lighting accessories and electronic components; as well as smart and sustainable lighting solutions for cities and commercial environments. Sustainable Solutions Sustainable solutions will also be on display throughout the halls of the Thailand Building Fair. Run by the same organizers as the Thailand Lighting Fair, the show is a regional hub for building automation and electrical engineering solutions which include products that promote energy efficiency and facilitate smart living. Meanwhile, established in 2017, Digital Thailand Big Bang is a B2C platform that receives government backing to promote digital technologies. The fair is organized by the Digital Economy Promotion Agency (DEPA) to showcase the ways that big data can be used to transform society and improve urban living standards. Just a few of the solutions that can be found at the fair include city management systems, cloud computing, fintech products, and digital infrastructure such as submarine cables and satellites. Smart Police And Smart Transportation Zones In line with the smart city theme, the 2019 edition of Secutech Thailand will feature four zones, each of which will display products for different smart city sectors. A key element of smart cities – smart transportation, will be served at the ‘Smart Transportation zone’ The ‘Smart Police zone’, will host IoT technologies that assist smart policing, such as real-time crime mapping systems, body-worn cameras, crowd management systems, gunshot detection systems, predictive policing systems and more. Another key element of smart cities – smart transportation, will be served at the ‘Smart Transportation zone’. Here, trade visitors will find smart surveillance systems, vehicle monitoring systems, as well as traffic and security control centers. Safe Factory And Smart Campus Zones Elsewhere, the ‘Safe Factory’ and ‘Smart Campus’ zones will deliver the latest early warning disaster systems, emergency response systems, personal alert applications, and products capable of providing real-time air quality information. In addition to this, Thailand’s fire safety fraternity will be able to locate all of the latest fire extinguishers, alarms and emergency equipment at the concurrent ‘Fire & Safety Thailand’ event; while three further events: ‘SMALiving’, ‘SMACity Solution’, and ‘Info Security Thailand’, will host all of the latest advances in their related sectors.
Maxxess Systems, the innovator in security solutions that empower total situational awareness for security enterprises, is demonstrating the company’s powerful eFusion Security Management Software here at ISC West 2019 (booth #6065). eFusion embraces the advancements of today’s leading PSIM, VMS, access control and numerous other technologies on a single platform to provide a new level of systems intelligence for enterprise-wide security and business intelligence applications. “Maxxess eFusion aggregates data from previously disparate surveillance, security and operations systems on a unified management and control platform, dramatically improving overall situational awareness, safety and security,” said Nancy Islas, President of Maxxess Systems. “Already integrated with over 50 industry leading manufacturers’ solutions, eFusion eliminates the need to rip and replace legacy systems and infrastructure which increases users’ Return on Investment (ROI) for existing capital expenditures.” The powerful eFusion platform provides video, access system management and control capabilities along with alarm monitoringVideo And Access System Management Field-proven worldwide, eFusion Security Management Software correlates data from surveillance, access control and facility systems such as HVAC onto a comprehensive monitoring and reporting dashboard. In addition, the powerful eFusion platform provides video and access system management and control capabilities along with alarm monitoring; remote access credentials tracking; authorization and de-authorization; door/access status and more. New enhancements to eFusion include new Flow Control with Auto Expiration, and Advanced Data Processing. Flow Control allows users to configure the specific door(s) that must be used first to gain primary access to a facility with programmable timer setting. Advanced Data Processing correlates databases to accommodate complex relationship rules between the authoritative database and the Maxxess database. System-Wide Lockdown, VMS Integration To further simplify user engagement with eFusion, Maxxess Systems’ MX+ Web Dashboard has also been further enhanced with new features including: System-wide lockdown; Video Management System (VMS) integration; mobile cardholder management operations with badge printing; access control status indication in an easy-to-read graphical format; and schedule configuration. eFusion can be deployed as a stand-alone management and control platform or supplemented with the unique capabilities of Maxxess Ambit Event Management Communications Software. Both Ambit and eFusion are core components of Maxxess Insite Awareness and Response Coordination System.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organizations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organizations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using Smartphone Apps To Open Doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognize people and use deep learning analytics to customize their office environment, the workplace is undergoing dramatic change. Improved Fingerprint Solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defense and other public section use cases where higher security is needed. Flexible Subscription Models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimization solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating Valuable Insights With Machine Learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focused on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organizations incorporate this type of analytics engine into their access control systems, they will improve security and personalize the user experience while driving better business decisions.
With the coming of a New Year, we know these things to be certain: death, taxes, and… security breaches. No doubt, some of you are making personal resolutions to improve your physical and financial health. But what about your organization’s web and mobile application security? Any set of New Year’s resolutions is incomplete without plans for protecting some of the most important customer touch points you have — web and mobile apps. Every year, data breaches grow in scope and impact. Security professionals have largely accepted the inevitability of a breach and are shifting their defense-in-depth strategy by including a goal to reduce their time-to-detect and time-to-respond to an attack. Despite these efforts, we haven’t seen the end of headline-grabbing data breaches like recent ones affecting brands such as Marriott, Air Canada, British Airways and Ticketmaster. App-Level Threats The apps that control or drive these new innovations have become today’s endpoint The truth of the matter is that the complexity of an organization’s IT environment is dynamic and growing. As new technologies and products go from production into the real world, there will invariably be some areas that are less protected than others. The apps that control or drive these new innovations have become today’s endpoint — they are the first customer touch point for many organizations. Bad actors have realized that apps contain a treasure trove of information, and because they are often left unprotected, offer attackers easier access to data directly from the app or via attacks directed at back office systems. That’s why it’s imperative that security organizations protect their apps and ensure they are capable of detecting and responding to app-level threats as quickly as they arise. It’s imperative that security organizations protect their apps and ensure they are capable of detecting and responding to app-level threats as quickly as they arise In-Progress Attack Detection Unfortunately, the capability to detect in-progress attacks at the app level is an area that IT and security teams have yet to address. This became painfully obvious in light of the recent Magecart attacks leveraged against British Airways and Ticketmaster, among others. Thanks to research by RiskIQ and Volexity, we know that the Magecart attacks target the web app client-side. During a Magecart attack, the transaction processes are otherwise undisturbed Attackers gained write access to app code, either by compromising or using stolen credentials, and then inserted a digital card skimmer into the web app. When customers visited the infected web sites and completed a payment form, the digital card skimmer was activated where it intercepted payment card data and transmitted it to the attacker(s). Data Exfiltration Detection During a Magecart attack, the transaction processes are otherwise undisturbed. The target companies receive payment, and customers receive the services or goods they purchased. As a result, no one is wise to a breach — until some 380,000 customers are impacted, as in the case of the attack against British Airways. The target companies’ web application firewalls and data loss prevention systems didn’t detect the data exfiltration because those controls don’t monitor or protect front-end code. Instead, they watch traffic going to and from servers. In the case of the Magecart attacks, the organization was compromised and data was stolen before it even got to the network or servers. Today’s proven obfuscation techniques can help prevent application reverse engineering, deter tampering, and protect personal identifiable information and API communications Best Practice Resolutions The Magecart attacks highlight the need to apply the same vigilance and best practices to web and mobile application source code that organizations apply to their networks—which brings us to this year’s New Year’s resolutions for protecting your app source code in 2019: Alert The key to success is quickly understanding when and how an app is being attacked First, organizations must obtain real-time visibility into their application threat landscape given they are operating in a zero-trust environment. Similar to how your organization monitors the network and the systems connected to it, you must be able to monitor your apps. This will allow you to see what users are doing with your code so that you can customize protection to counter attacks your app faces. Throughout the app’s lifecycle, you can respond to malicious behavior early, quarantine suspicious accounts, and make continuous code modifications to stay a step ahead of new attacks. Protect Next, informed by threat analytics, adapt your application source code protection. Deter attackers from analyzing or reverse engineering application code through obfuscation. Today’s proven obfuscation techniques can help prevent application reverse engineering, deter tampering, and protect personal identifiable information and API communications. If an attacker tries to understand app operation though the use of a debugger or in the unlikely event an attacker manages to get past obfuscation, threat analytics will alert you to the malicious activity while your app begins to self-repair attacked source code or disable portions of the affected web app. The key to success is quickly understanding when and how an app is being attacked and taking rapid action to limit the risk of data theft and exfiltration. Protecting encryption keys is often overlooked but should be considered a best practice as you forge into the new year with a renewed commitment to app security to ensure your organization’s health and well-being in 2019 Encrypt Finally, access to local digital content and data, as well as communications with back office systems, should be protected by encryption as a second line of defense, after implementing app protection to guard against piracy and theft. However, the single point of failure remains the instance at which the decryption key is used. Effective encryption requires a sophisticated implementation of White-Box Cryptography This point is easily identifiable through signature patterns and cryptographic routines. Once found, an attacker can easily navigate to where the keys are constructed in memory and exploit them. Effective encryption requires a sophisticated implementation of White-Box Cryptography. One that combines a mathematical algorithm with data and code obfuscation techniques transforming cryptographic keys and related operations into indecipherable text strings. Protecting encryption keys is often overlooked but should be considered a best practice as you forge into the new year with a renewed commitment to app security to ensure your organization’s health and well-being in 2019. Protecting Applications Against Data Breach According to the most recent Cost of a Data Breach Study by the Ponemon Institute, a single breach costs an average of $3.86 million, not to mention the disruption to productivity across the organization. In 2019, we can count on seeing more breaches and ever-escalating costs. It seems that setting—and fulfilling—New Year’s resolutions to protect your applications has the potential to impact more than just your risk of a data breach. It can protect your company’s financial and corporate health as well. So, what are you waiting for?
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organizations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anything like the 5.4 billion user IDs on haveibeenpwned.com, their login has already been compromised. If it's not listed, it could be soon. Recent estimates state that 8 million more credentials are compromised every day. Ensuring Safe Access Data breaches, ransomware and phishing campaigns are increasingly easy to pull off. Cyber criminals can easily find the tools they need on Google with little to no technical knowledge. Breached passwords are readily available to cyber criminals on the internet. Those that haven’t been breached can also be guessed, phished or cracked using one of the many “brute-force” tools available on the internet. It's becoming clear that login credentials are no longer enough to secure your users' accounts. Meanwhile, organizations have a responsibility and an ever-stricter legal obligation to protect their users’ sensitive data. This makes ensuring safe access to the services they need challenging, particularly when trying to provide a user experience that won’t cause frustration – or worse, lose your customers’ interest. After GDPR was implemented across the European Union, organizations could face a fine of up to €20 million, or 4% annual global turnover Importance Of Data Protection So how can businesses ensure their users can safely and simply access the services they need while keeping intruders out, and why is it so important to strike that balance? After GDPR was implemented across the European Union, organizations could face a fine of up to €20 million, or 4% annual global turnover – whichever is higher, should they seriously fail to comply with their data protection obligations. This alone was enough to prompt many organizations to get serious about their user’s security. Still, not every business followed suit. Cloud Security Risks Breaches were most commonly identified in organizations using cloud computing or where staff use personal devices According to a recent survey conducted at Infosecurity Europe, more than a quarter of organizations did not feel ready to comply with GDPR in August 2018 – three months after the compliance deadline. Meanwhile, according to the UK Government’s 2018 Cyber Security Breaches survey, 45% of businesses reported breaches or attacks in the last 12 months. According to the report, logins are less secure when accessing services in the cloud where they aren't protected by enterprise firewalls and security systems. Moreover, breaches were most commonly identified in organizations using cloud computing or where staff use personal devices (known as BYOD). According to the survey, 61% of UK organizations use cloud-based services. The figure is higher in banking and finance (74%), IT and communications (81%) and education (75%). Additionally, 45% of businesses have BYOD. This indicates a precarious situation. The majority of businesses hold personal data on users electronically and may be placing users at risk if their IT environments are not adequately protected. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine Hacking Methodology In a recent exposé on LifeHacker, Internet standards expert John Pozadzides revealed multiple methods hackers use to bypass even the most secure passwords. According to John’s revelations, 20% of passwords are simple enough to guess using easily accessible information. But that doesn’t leave the remaining 80% safe. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine. Brute force attacks are one of the easiest methods, but criminals also use increasingly sophisticated phishing campaigns to fool users into handing over their passwords. Users expect organizations to protect their passwords and keep intruders out of their accounts Once a threat actor has access to one password, they can easily gain access to multiple accounts. This is because, according to Mashable, 87% of users aged 18-30 and 81% of users aged 31+ reuse the same passwords across multiple accounts. It’s becoming clear that passwords are no longer enough to keep online accounts secure. Securing Data With Simplicity Users expect organizations to protect their passwords and keep intruders out of their accounts. As a result of a data breach, companies will of course suffer financial losses through fines and remediation costs. Beyond the immediate financial repercussions, however, the reputational damage can be seriously costly. A recent Gemalto study showed that 44% of consumers would leave their bank in the event of a security breach, and 38% would switch to a competitor offering a better service. Simplicity is equally important, however. For example, if it’s not delivered in ecommerce, one in three customers will abandon their purchase – as a recent report by Magnetic North revealed. If a login process is confusing, staff may be tempted to help themselves access the information they need by slipping out of secure habits. They may write their passwords down, share them with other members of staff, and may be more susceptible to social engineering attacks. So how do organizations strike the right balance? For many, Identity and Access Management solutions help to deliver secure access across the entire estate. It’s important though that these enable simplicity for the organization, as well as users. Organizations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so Flexible IAM While IAM is highly recommended, organizations should seek solutions that offer the flexibility to define their own balance between a seamless end-user journey and the need for a high level of identity assurance. organizations’ identity management requirements will change over time. So too will their IT environments. organizations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so. Importantly, the best solutions will be those that enable this flexibility without spending significant time and resource each time adaptations need to be made. Those that do will provide the best return on investment for organizations looking to keep intruders at bay, while enabling users to log in safely and simply.
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm Biometrics Integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative Security Technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro Intrusion Portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping To Cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalize on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight Hosted Managed Service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarize system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 Security Technologies for Security and Public Safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems And Video Surveillance As A Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video And Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organize and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organize and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimize operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realize other operational and performance efficiencies. Topic: Robotics And Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organizations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place In Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics In Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realize a more secure future. Topic: Voice Control In The Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
As digital transformation accelerates and touches more aspects of business operations, ASIS International is working to provide educational opportunities that security practitioners need to stay on top of those rapid developments. It’s a mission that will drive the ASIS Europe 2019 meeting, ‘From Risk to Resilience,’ this month (March 27-29) in Rotterdam. “What makes the event special is how it covers the full spectrum of security risks that organizations face, and in particular, looks at the human factors and management challenges involved,” says Eduard Emde, CPP, ASIS Europe 2019 Conference Chair, Head of the Health, Safety and Security Section, ESA (European Space Agency), the Netherlands. Examining Technology-Driven Risk When we look at technology-driven risk, only a part of that can be addressed by new technology" “When we look at technology-driven risk, only a part of that can be addressed by new technology. Much of the work is helping people adapt and find new ways of working and managing – that is where I think this event excels.” The opening keynote on ‘Amsterdam: From Smart City to Smart Society’ will be delivered by Theo Veltman, Innovation Rainmaker at the Municipality of Amsterdam. The keynote will set the tone for the three-day event by showing practically how cities are evolving and why – from the perspective of society, business and government. “This a great way to challenge us to understand what is driving change outside the ‘security bubble’ so that we can be better prepared for what is coming,” says Emde. The growing exhibition at ASIS Europe in Rotterdam will feature 45 exhibitors, including Johnson Controls, Nedap, Securitas and Stratfor Mobile Device Security In addition, the show will cover some of the most relevant and challenging topics in emerging technology such as artificial intelligence (AI), drones, mobile device security and industrial control systems. Given the seniority of the audience, a lot of time will be devoted to management and leadership topics such as soft skills and building teams with diversity and inclusion in mind. In addition, Nick Lovrien, CPP, Chief Global Security Officer at Facebook, will speak about securing an innovation culture. Scenario-based training sessions will provide a hands-on experience to work through challenges such as a chem-bio attack, a fake news crisis, travel risk planning, practical ways to effectively engage business executives and red teaming on cyber-physical risk. The growing exhibition at ASIS Europe in Rotterdam will feature 45 exhibitors, including Johnson Controls, Nedap, Securitas and Stratfor. Advanced Learning Experience We have a large number of global CSOs, regional leaders, and specialists from key companies across a whole range of sectors" Online registration will be open until March 26. There is a Free Show Pass that provides access to the exhibition and to the education in the Innovation Track and Career Centre, plus two networking drinks and refreshments throughout the day in the exhibition hall. For a more advanced learning experience, the Professional Pass and Leadership Pass offer more sessions, training and networking functions. There are plenty of options aimed at all budgets, learning needs and schedules, says Emde. Last year there were 775 registrants in total. “This year is looking good. We already surpassed last year’s total number of conference delegates, and registrations are coming in steadily,” says Emde. “For me, the numbers only tell a small part of the story,” he adds. “We have a large number of global CSOs, regional leaders, and specialists from key companies across a whole range of sectors. That quality, diversity and expertise onsite is what really makes the networking experience so valuable.”
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announces that the Bradley Business Center, located in Chicago, has installed a 3xLOGIC infinias CLOUD access control system throughout the redevelopment project. HTML Global, an IT Managed Services Provider (MSP), oversaw system installation and continues to provide remote system management. Bradley Business Center (BBC) is the largest redevelopment project on Chicago’s north side, comprising over 500,000 square feet, spread over 22 acres. The BBC offers a unique shared office environment for entrepreneurs and professionals and boasts a wide array of features and amenities. Controlling Common Areas Both organizations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions At present, the 3xLOGIC infinias system manages a total of 43 internal doors throughout the complex, split between BBC-managed doors and those for a tenant company, Compass Health Center. The two organizations manage their own access separately but use some of the same network and PoE switches. BBC doors managed are mainly those controlling common areas and shared amenities— parking, fitness facility, rooftop terrace, and others—but also data rooms and other sensitive areas within the office space. Both organizations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions when requested. “When we started with BBC, they were looking to us for our knowledge base, and we installed a few doors at that time. Then, we built out the system as they added new offices and common areas to be managed,” explained William Hunt, Managing Director, HTML Global. Cloud-Based System “The distributed Ethernet network can easily handle all the doors and that simplified installation and on-going management. The BBC property management staff don’t want a server onsite, so a cloud solution nicely fits their needs. Another advantage for BBC is our RMR services and the fact that a cloud-based system is mainly operating expenses, not hardware capital expenses—that’s economically advantageous for a property management business.” “There are so many other advantages to a cloud-based system, especially our ability to add doors when any of the resident companies want to join the system, or to expand the number of doors for existing customers—we can add one door or hundreds of doors upon request,” said Hunt. “Compass likes the system functionality and ease-of-use so much, they recently expanded it to their Northbrook location, too. That way, when staff move between the two facilities, they only need one set of credentials.” Access Control System Such high-level control and ease of use is accomplished with minimal hardware on site BBC controls access by zone and/or amenity for each credential holder, administrators can add zones and close access to other zones with a few keystrokes. Door control is granular, making it easy to provide all-areas access to senior staff and highly-limited access, for example, for contractors and temporary workers. Such high-level control and ease of use is accomplished with minimal hardware on site. Many administrators were up and running on the infinias system with very little training, if any. With a cloud-based access control system, new tenants can join the system with ease, or a tenant can be removed from the system in a matter of minutes. Fix Things Remotely Hunt again, “As an MSP, we are overseeing a system that updates itself automatically, and because BBC management doesn’t have a full-time IT person, that’s where we come in.” The future looks bright for HTML Global with the Bradley Business Center. Current office space is nearing fully-leased status, and BBC management is looking to expand their property offerings into additional buildings located on the same parcel. Hunt is impressed with another feature of the cloud-based system, “The network is set up on PoE switches, so if a door isn’t acting properly, we can fix things remotely, we don’t need to roll a truck—that’s very cost-effective.”
The retail industry is constantly looking to find new ways to be relevant in the ever-increasing shadow of online shopping. Researchers have predicted a 17.5 percent growth in the ecommerce share of global retail sales in 2021, rising from 13.7% in 2019. When designer brand Miniso opened new shops in Poland, they used Hikvision technology to give them the edge. The management team at Miniso had a number of specific questions they needed answers to in order to make the stores successful in the cut-throat high street environment. Best-Selling Products They resorted to sending people to individual stores to manually count the people – a very time-consuming and costly exercise How do we know if our marketing strategy is working? What is the conversion rate of purchases? What are the ‘hot areas’ of the store, and do these actually represent best-selling products? Originally, with no access to significant information, they relied on experience and conversation with staff. But there was no way to verify these findings. They also needed to be able to get this information remotely – i.e. management in their HQ in Warsaw wanted to be able to see the situation in the other four stores without having to visit them separately. Sometimes, they resorted to sending people to individual stores to manually count the people – a very time-consuming and costly exercise. Tailor-Made Solution Miniso turned to Hikvision AI products, with a solution built by Polish reseller Volta, including people counting cameras, fisheye cameras and NVRs. These were all coordinated using the HikCentral software platform. A people counting camera in each store counts people passing by, while another counts people entering and leaving. With this tailor-made solution management could calculate how many people were passing by to see a purchasing conversion rate. This also helps them to know whether marketing strategy is working. They can analyze the information further to see whether the rate of people entering the store is dropping, and whether that relates to the number of those passing outside. Miniso’s management can then look into the causes of these numbers, along with sales figures, to form a picture. For example, whether there is an external factor affecting shoppers either to pass by, or to enter. Video Management Platform The professional video management platform allows managers to access the information from different offices and mobile applications anywhere Because Miniso have the same technology set up in all the stores in Poland, they can compare different locations. This also comes in useful when it’s time to negotiate rent with shopping malls. Using ceiling installation of several fisheye cameras, the system can generate heat maps. This helps managers to see where ‘hot areas’ are, helping them to allocate products in the optimal place for promotion. Hot areas can also be compared with sales figures to provide further insights into shopping patterns. All the information provided by the system is coordinated, and business information on both layout and original image can be overlaid in Miniso’s HQ in Warsaw. The professional video management platform allows managers to access the information from different offices and mobile applications anywhere. This makes life a lot easier for the operations team as they need to check the situation in all stores. Fiercely Competitive Environment It also means that everything can be viewed simultaneously, so they can identify trends throughout the network of stores. Byron Zeng, Vice President of Miniso Poland, says: “The high accuracy of conversion rate the solutions provides really solves a number of our management issues. We can now easily see what’s going on in the other stores, including heat mapping, which makes management of the whole networks so much more efficient.” This is a great example of how AI surveillance products can change the landscape of business decision-making. In a fiercely competitive environment, like a shopping mall or high street, shopping trend data can help a retailer to survive. In fact, this worked so well for Miniso, they decided to use the solution in their stores across the whole of Europe – potentially about 200 stores in the next year.
Manufacturer ROCKWOOL International A.S. has chosen Nedap’s Global Client Programme to secure its offices and factories worldwide. AEOS, the physical security platform by Nedap, installed during the program, enables ROCKWOOL to establish a truly global security policy and unified work processes. An advanced project rollout, the Global Client Programme is developed for large multinationals and offers several benefits, including standardization across sites, shorter implementation times and cost efficiencies. Standardizing Company’s Security Measures The Global Client Programme connects all of ROCKWOOL’s factories and office premises, and standardises the company’s security measuresROCKWOOL has 28 factories across the world. The Global Client Programme connects all of these factories and ROCKWOOL’s office premises, and standardizes the company’s security measures throughout the world. Fokko van der Zee, managing director at Nedap Security Management, says: “The implementation of a standardized security solution across the world is a complex process. It involves a large project spanning many years and involving many stakeholders, and demands a high level of project management. In the absence of a structured program with defined guidelines, a global security rollout is likely to be a stressful execution. That’s why we set up our carefully designed Global Client Programme.” ROCKWOOL Digital Service Lead, Matthew Thorne, agrees: “We’ve worked with Nedap over the past few years and recently became a member of their Global Client Programme. Now we’re equipped with the people and tools we needed to standardize our physical security solution. The Global Client Programme also minimizes risk and guarantees compliance. It really meets our needs in every possible way.” Central Security Platform Saves Money The program helps achieve cost savings by avoiding initial setup costs per site and having one central security platform instead of severalThe Global Client Programme is designed to ensure monitoring and control during every step of the rollout process. Timon Padberg, responsible for business development at Nedap Security Management, explains: “The repetitive nature of local site deployments allows us to work with models and templates, such as standard proposal and calculation documents. We can therefore produce a scalable process that ensures uniformity and a consistently high quality of implementation across each site.” By using the Global Client Programme, ROCKWOOL is aiming for uniformity and alignment across all sites. The program also helps achieve cost savings by avoiding initial setup costs per site and having one central security platform instead of several. Moreover, there are significant savings on operational and maintenance costs due to shared services and economies of scale.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions announces that the South Grand Community Improvement District (CID) in St. Louis, Missouri is using the Genetec Stratocast cloud-based video monitoring system to deter license plate theft in its parking lot and provide video access to the local police department to help reinforce security. License Plate Theft One of the services offered by the South Grand CID is free parking. At any time of the day, drivers can park in a central parking lot to visit businesses or residents. While this lot has always been convenient and safe, license plate theft was troubling nearby areas. Video recordings are sent over a wireless network which connects to the South Grand CID main office To deter license plate theft in their own community, the South Grand CID board decided to add video surveillance to the lot. Currently, three cameras monitor the entire 90-space parking lot. Video recordings are sent over a wireless network which connects to the South Grand CID main office, just a few blocks away from the lot. With this cloud-based video monitoring system, Rachel Witt, Executive Director at South Grand CID, can quickly and easily view video from anywhere, at any time. Cloud Video System “Using the cloud video system, I am able to find and view the video in seconds. I can narrow down my search based on dates and time and watch the event unfold with all camera feeds up on the monitor. It’s really that simple,” commented Witt. Only two weeks after installing the Stratocast video monitoring system, a visitor reported that their license plates had been stolen. “The visitor provided a description of the car, and a timeframe in which the incident likely happened. Using the Stratocast system, I was able to find and view the video in seconds. I could clearly see the suspect enter the lot, remove the plates and leave in his own car. Since the police are very busy here, I was able to bookmark the video recording and then notify them that the video was ready,” said Witt. View Video Recordings Stratocast has made it easy for the South Grand CID to give video access to local police so that when a crime is reported in the district, officers can immediately begin to conduct investigations without leaving their desks. While the South Grand CID manages and owns the Stratocast solution, officers can log into the system and view video recordings when required While the South Grand CID manages and owns the Stratocast solution, officers can log into the system and view video recordings when required. This is enabled by the Genetec Federation feature, which gives an organization access to manage multiple independent Genetec systems as one. A memorandum of understanding was signed so each parties’ responsibilities are clear. Better Sense Of Safety “Instead of driving over and picking up a DVD, officers can directly access video from our cameras to see what happened. Not only does it help speed up investigations, it saves officers’ valuable time,” continued Witt. The installation of Stratocast is not only helping to reduce license plate theft but it is also helping residents and visitors feel safer than ever. “Business owners, residents, and visitors have a better sense of safety when they know cameras are up. But they also need to know that we’re equipped to respond quickly to any disturbance. And that’s what Stratocast helps us achieve. With the addition of Stratocast, we’re able to show everyone that we have strengthened the security in our community,” concluded Witt.
Exabeam, the next-gen SIEM company, announces that NTT DATA Corporation (NTT DATA), its partner and one of the providers of technology and services for government and business, has chosen to secure its global operations using Exabeam’s Security Management Platform (SMP), which provides unlimited data collection, machine learning and analytics for modern cyber threat detection and response. NTT DATA’s internal system is used throughout more than 50 countries and regions, 210 cities and by 34,500 employees in Japan and 75,500 employees overseas. It is a fast-moving company that has acquired many businesses over the last five to 10 years, resulting in the inheritance of a number of different legacy SIEM platforms. However, these solutions were lacking, and NTT Data wasn’t obtaining the visibility it needed to keep pace with modern cyberthreats. Disparate Legacy Systems Exabeam was already our valued partner, and we were so confident in the company’s security solution" “Exabeam was already our valued partner, and we were so confident in the company’s security solution, we decided to use it ourselves, to remove complexity and unify our disparate legacy systems that were ineffective at protecting against modern threats,” said Hiroshi Honjo, head of Cyber Security and Governance at NTT DATA. “Having Exabeam’s unlimited data lake and attractive pricing model made the difference for our large organization.” Exabeam’s SMP provides NTT DATA with scalable, behavioral modeling, machine learning, and advanced analytics for comprehensive insider and entity threat detection throughout Japan, APAC, North America, and Europe. This functionality was vital to the NTT DATA team because they required greater visibility into potential cyberthreats throughout the organization and in all locations around the world. Automated Incident Response “NTT DATA’s journey was a unique one, since they had multiple legacy logging platforms in use globally. Exabeam was able to replace or consolidate each system using our next generation platform, and we accomplished the initial rollout in a matter of months,” said Nir Polak, CEO, Exabeam. “The swiftness of that transition is critical to maintaining secure operations, especially when dealing with such a geographically dispersed enterprise.” Automated incident response allows teams to respond to security incidents rapidly and with less effort Automated incident response allows teams to respond to security incidents rapidly and with less effort. At the SMP’s foundation is the Exabeam security data lake, designed to store all event logs at a predictable and flat price. This frees the NTT DATA security team from manually analyzing data logs – and instead they can focus on quickly identifying and responding to security threats. SIEM Solution According to Honjo, “The second phase of our project will be to look at use cases and fine tune the SIEM solution to work for our business needs. Overall, we are very happy with how well Exabeam met our stated deadlines and how quickly we are able to realize value from the product. We look forward to introducing Exabeam to our global customers.” Recently, Exabeam was identified by Gartner, Inc. in the 2018 Magic Quadrant for Security Information and Event Management. The company was positioned as a Leader based on completeness of vision and ability to execute.
STANLEY Security, one of the most trusted names in the world of security, has installed an intruder alarm system at Wraps & Tints’ new premises, which houses high value vehicles. The system not only protects the contents but also meets the insurance company’s needs, keeping everyone happy! Based in Leyland, Lancashire, Wraps & Tints is the North West’s Paint Protection Film, Vehicle Wrapping and Window Tinting installers. The company has gone from strength to strength and recently moved into larger premises to meet customer demand and to better represent the quality of the service with a smarter, more professional working environment. Provide Certification With supercars and high-end vehicles occasionally stored, and to meet insurance requirements, an intruder alarm system was requisite within the new premises. After initially employing a small, local security company to undertake the job who were unable to provide the certification needed by Wraps & Tints’ insurance company, Jonathan Burke, Director of Wraps & Tints, approached STANLEY Security. The system incorporates dual technology detectors, door contacts and roller shutter contacts, interconnected and fed back to a control panel Following a risk assessment of the building content and the building’s fabric and structure, STANLEY Security installed a hard wired Texecom intruder alarm system to Grade 2 (low to medium risk). The system incorporates dual technology detectors, door contacts and roller shutter contacts, interconnected and fed back to a control panel. A maintenance contract is in place with STANLEY Security to ensure the system remains fully functional. Highly Skilled Technicians Jonathan is pleased with the outcome, finding the system easy to use. He’s also happy with the service he received, which was ‘straight forward and efficient’. Ultimately, the new intruder alarm system has enabled him to cost-effectively meet his insurer’s requirements and to focus on his business with the peace of mind that comes from knowing his property and its contents are well protected. STANLEY Security provides security services to a wide range of organizations. Its SME division offers high-quality business security systems regardless of the size of office, building, store or facility. All installation work is handled by a team of highly skilled technicians, each of whom is locally based across offices located across the UK.
Round table discussion
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
In today’s global economy, goods are manufactured all over the world and shipped to customers thousands of miles away. Where goods are manufactured thus becomes a mere detail. However, in the case of “Made in China”, the location of a manufacturer has become more high-profile and possibly more urgent. The U.S. government recently banned the use in government installations of video system components from two Chinese manufacturers, presumably because of cybersecurity concerns. A simmering trade war between China and the United States also emphasizes other concerns related to Chinese manufacturing. We asked this week’s Expert Panel Roundtable: Should "Made in China" be seen as a negative in the video surveillance marketplace? Why or why not?