DVV Solutions, specialists in Third-Party Risk Management (TPRM), embarked on a strategic managed service provider relationship with BitSight, the Standard in Security Ratings. DVV Solutions and BitSight announced a new channel partnership agreement that will enable DVV Solutions to provide BitSight’s Security Ratings Service and add significant value to DVV’s Third-Party Risk Management and continuous monitoring offerings. Identifying and mitigating risk By integrating the BitSig...
Digital Defense, Inc. has announced the availability of its Frontline.Cloud integration with Attivo Networks, the award-winning leader in deception for cybersecurity threat detection. Digital Defense’s Frontline.Cloud vulnerability management and threat assessment platform identifies high-risk/critical assets with business context that are highly vulnerable to exploits, remain unpatched, are unpatchable or have already been infected in real-time. Integration with Attivo Networks Frontlin...
The Canadian technology company Genetec offers a broad solutions portfolio that encompasses security, intelligence, and operations. With the integration of the Dallmeier Panomera systems in Genetec Security Center, the proven Panomera functionality is now available to the users of one of the most widely used unified security platform for the first time. This gives users completely new possibilities for observing and monitoring expansive areas and large spatial contexts. The Panomera multifocal...
The Z-Wave Alliance, a global membership organization dedicated to advancing the popular Z-Wave wireless smart home protocol, will host the Z-Wave Pavilion at ISC West 2019 in Las Vegas, with Alliance members introducing and demonstrating their latest Z-Wave solutions. The Z-Wave Alliance offers security dealers and integrators the opportunity to interact with the latest Z-Wave technology in one central location as well as network with manufacturers that are leading the global smart home and IoT...
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 Security Technologies for Security and Public Safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highligh...
ISC West in Las Vegas is the first of several major security trade shows planned for 2019 as part of the Reed Exhibitions ISC Security Events portfolio. Next up will be Expo Seguridad México in May in Mexico City, followed in June by ISC Brasil in Sao Paolo, and ISC East this fall in New York. Expo Seguridad México, May 7-9, will serve the important Mexican market for security goods and services. In Mexico City alone, a large population translates into plenty of buildings and fac...
ReconaSense announces the latest release of its A.I. powered security platform for life safety and physical security, featuring risk adaptive access control and new IoT and building automation integrations that enable the secure flow of people, processes and information while keeping risks at bay. Digital transformation has increased the volume, variety and velocity of physical security event data being collected and stored, increasing the complexity of potential security risk factors as well as the time and talent required to identify and manage them. Physical Security Systems Data is aggregated and evaluated based on acquired and saved knowledge, then compared to user-defined policies ReconaSense features one-of a-kind, A.I. powered Neural Networking technology that helps campuses, commercial enterprises, government organizations and critical infrastructure identify anomalous events and automate risk adjustments and responses in real time. Unlike legacy physical security systems, ReconaSense can do this on a mass scale while filtering-out irrelevant ‘noise’ and avoiding false positives. A key component of the platform, ReconAccess is a risk-adaptive physical access control solution that adjusts permissions based on dynamic risk scores of personnel, assets, environments and facilities. Data is aggregated and evaluated based on acquired and saved knowledge, then compared to user-defined policies and procedures to determine what is permissible vs. what is not, and when and where to take action. Building Automation Systems The solution runs on Mercury hardware and integrates data from third-party systems, authentication solutions and building automation systems, enabling modern enterprises to proactively manage risk across countless dynamic and interacting components. ReconaSense facilitates intelligent access as much as it controls it. The solution can direct people to temporary safe shelter in the event of a natural disaster like a hurricane (correlating weather data with building occupancy information) or activate the lights and HVAC system when someone enters a building during off-hours. ReconaSense can also take preventive safety and security measures as in the case of a chemical spill ReconaSense can also take preventive safety and security measures as in the case of a chemical spill, identifying the presence of dangerous air-borne toxins, closing-off access to affected areas, and alerting operations teams to take emergency actions. Pre-configured risk thresholds and relationships between personnel attributes and facility resources help to facilitate a more automated, consistent and continuous approach to risk management, compliance, security enforcement and business continuity. Building Temperature Sensors A complete list of ReconaSense platform features includes: AI-Assisted Risk Scoring – monitors and compares data inputs over time to identify pattern abnormalities in physical, logical or human behavior and proactively alert to potential risks; examples include open/closed doors, building temperature sensors, NOAA National Weather Service updates, etc. Autonomous Guard Away – similar to an autopilot function, allows security teams to pass operations to one another as needed, or can automatically take over in emergency situations that require immediate response. Intelligent On-boarding & Access Provisioning – replace cumbersome paper-based processes with automated workflows, enabling security owners to easily authorize and regulate access to restricted areas based on roles, responsibilities and requests. ‘ORCA’ (Operational Response Command Application) – enables mobile access to critical operational information and the ability to act on real-time risks and threats while on-the-go. Web Services Integrations – provide the ability to integrate third-party APIs and pull information such as critical infrastructure data (nuclear facilities, airport operations, etc.) into Recon, the A.I. unification platform. Open Systems Compliance – provides out of the box integration with Z-Wave for IoT devices and BACnet for building automation systems for enhanced security and life safety monitoring. Avert Potential Threats ReconaSense with ReconAccess is the first intelligent access control solution that measures the real-time evolving risk of individuals" “In typical physical security systems, alerts are based on responses to breaches or events that have likely already taken place, putting lives and resources in harm’s way,” said John Carter, co-founder, president and CTO of ReconaSense. “ReconaSense with ReconAccess is the first intelligent access control solution that measures the real-time evolving risk of individuals, assets and environments while automatically adjusting access permissions and step-by-step processes to avert potential threats or disasters.” To learn more, register to attend the webinar Finding Your Physical Security Blind Spots with Artificial Intelligence (A.I.) on Thursday, March 7 at 2pm ET. Following the webinar, ReconaSense will host the grand opening of its new Technology Center on Fifth Avenue in New York City, from 3-7pm ET. New York-area architects, engineers, system integrators, security consultants and facilities managers are invited to attend.
Maxxess Systems continues to drive the virtualization of the physical security industry with the development and implementation of the industry’s most advanced enterprise level situational awareness and response coordination solutions. Enhancing Maxxess Systems’ momentum is the recent introduction of Maxxess InSite Awareness and Response Coordination System which meshes ‘system intelligence’ and ‘human intelligence’ to deliver an entirely new category of physical security and communications solution on a unified, easy to operate platform. Maxxess InSite joins the company’s highly touted eFusion Security Management Software and Ambit Communications Software, which are presently installed in thousands of facilities around the globe by many of the world’s leading brands. Developing Sophisticated Software Solutions The solutions aren’t just evolutionary in nature, they’re revolutionary with new benchmarks in situational awareness, communications and personnel coordination"“Over the last decade, our focus has been on developing highly intuitive, integrated solutions for high-profile clients,” said Nancy Islas, President of Maxxess Systems, Inc. “This has allowed us to develop highly sophisticated software solutions based on the needs of high-profile users around the world. The resulting solutions we’ve developed aren’t just evolutionary in nature, they’re revolutionary with new benchmarks in situational awareness, communications and personnel coordination.” High-profile users of Maxxess Systems’ solutions include: the Alshaya Group, an international franchise operator with over 90 globally recognized brands; CAE, the pioneer in training for the aviation, defense, security and healthcare industries; Meraas, a developer of residential and commercial space in Dubai; Banco Central de Reserva del Peru, which mints and issues metal and paper money in Peru. Coppel, one of the largest retailers of clothing and household goods across Mexico; Regus, one of the world’s largest providers of flexible workspace; UDR, a real estate investment trust company in the US; the highly prestigious London School of Economics, and more than 50 companies in the renowned Emirates Group, among many others. Core Software Platforms Maxxess InSite combines ‘system intelligence’ and ‘human intelligence’ to detect and respond to unfolding events in real-timeThe Maxxess Systems portfolio is built on the following core software platforms: Maxxess InSite Awareness and Response Coordination System combines ‘system intelligence’ and ‘human intelligence’ to detect and respond to unfolding events in real-time – all of which is queued, organized and displayed on a highly-intuitive user interface. In doing so, Maxxess InSite truly enables early action, allowing IT, Operational Technology and Physical Security departments within organizations to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. Maxxess InSite features an open-architecture framework to accommodate virtually any security or business intelligence application with comprehensive functionality. Over 50 different leading manufacturers are already integrated into Maxxess InSite, providing more combined capabilities and functionality than any other cross-platform solution available. This allows Maxxess InSite to be configured for virtually all applications, employing any combination of software modules and hardware to deliver each user with a highly-customized solution and unparalleled efficiency. eFusion provides video and access system management and control capabilities along with alarm monitoringeFusion Security Management Software is a ‘system intelligence’ solution that integrates and correlates data from surveillance, access control and various other physical security related inputs onto a comprehensive monitoring and reporting dashboard. eFusion provides video and access system management and control capabilities along with alarm monitoring, access credentials tracking/authorization/de-authorization remotely, door status and more. eFusion can be deployed as a stand-alone control platform, or as a core component of Maxxess InSite. Ambit Communications Software is a ‘human intelligence’ solution that provides security managers communication and location knowledge for remote personnel through their personal devices for alerts, notifications, status assessment and access management. Ambit can be deployed as a stand-alone communications platform, or as a core component of Maxxess InSite. “The recent release of Maxxess InSite is the result of many years of software development and is based on the proven performance of our security and communications solutions,” continued Ms. Islas. “With the introduction of InSite, Maxxess Systems is bringing a completely new and unparalleled security and communications enterprise solution to the security marketplace.”
National Monitoring Center, NMC, a renowned brand in the alarm monitoring industry, and member of the Netwatch group, announced the appointment of industry veteran Norm Barton as Regional Sales Manager West, Proactive Video Monitoring services in NMC. The appointment supports the growing industry demand for Proactive Video Monitoring services. Proactive Video Monitoring Services Norm has extensive industry experience as well as a passion for the market and will be responsible for executing sales strategies in the western United States region" Barton will report to Nicola Oakie, Director of National Sales. Oakie commented on the appointment, “We are delighted to welcome Norm as we continue to expand our team to support this important growth segment. Norm has extensive industry experience as well as a passion for the market and will be responsible for executing sales strategies in the western region of the United States.” Barton comes to NMC with over 28 years of increasingly responsible Team Leadership experience in management and operations including having been President and CEO of FDS Integration, Inc. for several years. Video Monitoring Services Expert “Norm’s outstanding leadership skills, deep industry knowledge, and impressive record of building long-term customer partnerships make him a perfect fit for this pivotal role,” Oakie added. Barton is pleased to be joining the NMC team and has enthusiastically taken on this role. “It is a pleasure to be joining such a well-respected organization, and one that builds its reputation on truly serving its dealers with forward-thinking services and support. This is an incredibly dynamic, focused, and competitive industry in which dealers can thrive. I am excited to be working with our current customers to support their growth and equally excited to cultivate new relationships throughout the western region.”
Ava Group (AVA), global provider of security risk management services and technology will be presenting its portfolio of security solutions at International Security Expo, stand E74. The expo also hosts a range of certified conferences and workshops covering every major sector of the security industry. Taking place over two days at London Olympia, the event focuses on the needs of government and CNI amongst other key sectors. Fiber Optic Intrusion Detection Ava Group will be showcasing the latest solutions from its technology division - incorporating Future Fibre Technologies and BQT Solutions. The Ava Group is a market leader of risk management services and technologies, offering a portfolio of complementary solutions encompassing both fiber optic intrusion detection and high security access control and locking. Mark Horton, Global Sales & Marketing Director – Future Fibre Technologies commented, “Our brands have a strong pedigree in some of the expo’s key sectors including government and CNI, and we’re very much looking forward to discussing with visitors how Ava’s solutions can be applied to protect their organizations. Ava Group has had some major project wins in recent months including a major military closed data network, who have selected our data network infrastructure protection solution to secure its network against tapping and tampering. It is projects such as this that demonstrate Ava Group’s expertise in security risk management and protection of client’s assets and infrastructure.” Perimeter Security Technology New ultra-low noise optical detection electronics ensure a single controller can cover a distance up to 110 kilometres Ava Group’s CTO – Technology, Dr Jim Katsifolis will be presenting in the Perimeter Security & Intrusion Detection Technology Workshop on ‘Security within security in a converged perimeter intrusion detection solution’ on the first morning of the exhibition. An accomplished R&D professional, Jim will explore the latest generation of PIDS technologies, the convergence of intrusion detection and cybersecurity as well as addressing some common myths in this field. Featured on the stand will be the enhanced Aura Ai-2 controller from Future Fibre Technologies. This market-leading product offers unrivalled high-sensitivity detection, location accuracy, cut resilience capability and the industry’s longest linear range. New ultra-low noise optical detection electronics ensure a single controller can cover a distance up to 110 kilometres and can accurately detect, locate and report multiple disturbances to +/- 2 metres. Security Management Solution Ava Group is also previewing its Small Site Assurance range, which is designed to protect remote unmanned locations through a holistic security management solution. The solution incorporates intrusion detection, access control and locking as well as environmental monitoring - all controlled remotely from a simple graphical user interface. The Small Site Assurance range is particularly suited for utilities, telecoms, energy, oil & gas and data centers that are at risk from threats such as vandalism, opportunistic and targeted theft, terrorist attack, trespass, system failure, accident or injury. Orca Locking Security Solution The Orca lock is a high-strength lock designed for securing gates, roller doors, shipping containers, and any other large door or entryway From BQT Solutions, Ava Group will be demonstrating the Orca lock. Building on the success of the award winning YG10, the Orca lock is a high-strength lock designed for securing gates, roller doors, shipping containers, and any other large door or entryway. Alongside the Orca’s impressive physical attributes, its ability to integrate into an access control system is what elevates it beyond anything available in the market. Fully monitored, weatherproof, and user configurable, the Orca is the perfect indoor and outdoor locking solution. BQT will also demonstrate the latest software integration between its miPASS Access TMS software and Paxton’s Net2 access control software. The integration enables the seamless addition of BQT biometric readers to new or existing Net2 systems, facilitating a smooth transition from less secure card technologies to more robust options like fingerprint biometrics and BQT’s own miPASS credentials.
AlgoSec, a provider of business-driven security policy management solutions, announced it has signed a technology collaboration agreement with Microsoft to offer interoperability between the AlgoSec Security Management Suite and Microsoft Azure Firewall to support central security management. AlgoSec’s new solution will allow an intuitive and effective central management capability for Azure Firewall, Microsoft's new cloud-native, firewall-as-a-service. Azure Firewall customers will be able to consistently manage multiple instances of Azure Firewalls across different regions and multiple Azure accounts. Unified Security Policy Management AlgoSec customers can already manage Azure security controls, enabling unified security policy managementAlgoSec customers can already manage Azure security controls, enabling unified security policy management. The collaboration will extend this capability to a fully integrated solution that offers central management of Azure Firewall alongside Network Security Groups and 3rd party security devices such as virtual firewalls deployed in Azure, security controls of other clouds, and on-premises firewalls and SDN solutions. “As enterprises accelerate their Microsoft Azure adoption strategies, they require a greater ability to manage all the security controls and devices that protect their deployments,” said Anner Kushnir, VP Technology at AlgoSec. “The collaboration will enable enterprises to accelerate their Azure deployments, safe in the knowledge that they have full visibility and control over the security devices that protect their cloud estates.” Monitoring Security Vulnerabilities The collaboration between AlgoSec and Microsoft will provide customers with end-to-end visibility into their cloud estatesThe collaboration between AlgoSec and Microsoft will provide customers with end-to-end visibility into their cloud estates, pinpointing security risks and misconfigurations while facilitating connectivity troubleshooting and comprehensive security policy management. Prasetha Warrier, Principal Product Manager, Azure Networking at Microsoft Corp. said, “Security, and how it is managed on a continual basis, is a key concern for migrating business applications to the cloud. We are pleased to work with Algosec to provide a central management experience for the Microsoft Azure Firewall alongside all other security controls in our customers’ environments. This enables them to confidently accelerate their Azure deployments and enforce and monitor security vulnerabilities.” The AlgoSec cloud security management solution for Azure Firewall will be available for select customers this quarter and will be publicly available in Q1 ‘19.
Pulse Secure, global provider of Secure Access solutions to both enterprises and service providers, has announced the launch of new packaging of its award-winning Pulse Access Suite for Managed Security Service Providers (MSSPs). The solution offers service providers an accelerated, cost-effective means to differentiate and build out their service portfolio to meet the massive demand for protected connectivity to cloud applications and hybrid IT resources. Pulse Secure Pulse Secure offers a comprehensive, integrated and highly interoperable set of Secure Access solutions spanning remote, mobile and cloud access security; network visibility and access control; and application delivery. The suite allows service providers to extend lucrative access protection, endpoint compliance, threat response and availability services for the data center, hosted in the cloud or running as SaaS. The service provider packaging optimizes capital expenditure through an on-demand, pay-per-use model. MSSPs can spin up or spin down virtual Secure Access instances and licenses at a cost based on the number of concurrent monthly users. On-demand provisioning and tiered, user-based pricing gives service providers needed flexibility for customer onboarding, growth spurts and business downturns. Managed Security Services (MSS) The Managed Security Services (MSS) market 'constitutes approximately 60 percent of the overall security outsourcing market' According to a recent Gartner report1, the Managed Security Services (MSS) market 'constitutes approximately 60 percent of the overall security outsourcing market , generating $18.7 billion in revenue in 2017 and growing at a CAGR of 11 percent through 2021. It is important to view MSS in the context of broader security outsourcing, because large enterprises are increasingly looking for hybrid engagements that include a mix of shared and dedicated service delivery components.' Key market trends in that report include: Moving beyond monitoring of only network-based security technologies, particularly the network perimeter, with increasing focus on the endpoint (e.g. managed EDR services) Increasing movement toward more customized outcomes for buyers Buyer demand for capabilities to monitor popular SaaS applications, and public cloud service providers and IaaS Enterprise Mobile Management (EMM) And Network Access Control (NAC) As enterprises are seeking more complete offerings from fewer managed security service providers, MSSPs in turn are seeking to expand service scope while reducing business risk and operational complexity. In comparison to working with point solutions that are limited due to custom integration, disparate management and licensing constraints, Pulse Secure uniquely offers MSSPs integrated Virtual Private Network (VPN), Enterprise Mobile Management (EMM), Network Access Control (NAC) and virtual Application Delivery Controller (ADC) solutions within a unified management framework for data center and hybrid IT implementation. Pulse Secure Access Suite For MSSPs MSSP packaging, including user-based licensing, will be available to authorized channel partners at the end of November through Pulse Secure’s global distributors MSSP packaging, including user-based licensing, will be available to authorized channel partners at the end of November through Pulse Secure’s global distributors. The Pulse Secure Access Suite for MSSPs’ list price starts at $6 USD MSRP per concurrent user per month for the first 500 users with higher discounts available for larger user counts. The solution includes a multi-tenant, centralized management system and licensing server that gives MSSPs operational oversight while also providing clients with dashboard visibility. The solution includes virtual appliance form factors for VMware, KVM and Hyper-V, and supports deployment in hosted cloud environments such as Microsoft Azure and Amazon AWS. “Ensuring secure access is more challenging than ever given the dynamics of cyber threats, IT consumerisation and software-defined data centers. Enterprises of all sizes are overwhelmed and increasingly looking to MSSPs for expertise and capacity,” said Scott Gordon, chief marketing officer at Pulse Secure. “Pulse Secure gives MSSP leaders an easy, proven and no-risk path to extend services and increase revenues for hybrid IT secure access. More importantly, our new MSSP packaging enables our service provider partners and their customers to deliver ubiquitous access productivity while ensuring compliance.” Managed Access Services “Pulse Secure has been a key vendor for our managed access services. In my team’s experience, Pulse is the only one that has reliably delivered as-advertised stability, performance and manageability, as well as new feature sets that satisfy our highly demanding clients,” said Nicholas Klein, SOC supervisor at GTT Managed Secure Access Group. “With Pulse Secure, our services are backed by a rock-solid, flexible platform paired with a responsive support team, allowing us to focus on the value-add aspects of our managed service for our customers.” “As business, government and educational institutions are building out their cloud-enabled infrastructure, enterprises must consider how to enforce appropriate resource and data access while delivering high usability for their users. indevis offers enterprises the benefit of expertise, resources, and experience to design and implement an integrated data center and cloud access strategy,” said Wolfgang Kurz, founder and CTO at indevis. “We believe Pulse Secure offers a breadth of Secure Access capabilities and interoperability that give our customers greater freedom to optimize and defend their mobile and cloud computing initiatives. We appreciate the operational and licensing advantages that the Pulse Secure packaging provides our customers and us.” Internet Of Enterprises Orange Business Services is a leader in the Internet of Enterprises, the emerging digital business ecosystem powered by data" “Orange Business Services is a leader in the Internet of Enterprises, the emerging digital business ecosystem powered by data. We are at the core of our customers’ data journey,” said Nicolas Drogou, head of Orange Cyberdefense APAC. “Ensuring the security of the data and its journey end to end is paramount to us being the trusted partner for their Digital Transformation. Pulse Secure is a cornerstone solution within our managed security services suite. The features and scalability of its Secure Access suite enable us to tackle the complex Secure Access challenges that organizations face in an increasingly volatile threat landscape.” “RKON’s customers are building out significant mobile and cloud investments where potential exposure to cyberattacks, compliance and visibility gaps are top of mind,” said Jeff Mullarkey, CEO of RKON, a leading-edge MSSP based in Chicago. He further added, “Ensuring always-on and protected access to resources is foundational to their businesses. We support enterprises across all verticals with a specific emphasis in the mergers and acquisitions space. Our Managed Secure Access practice leverages the Pulse Secure platform's reliability and broad capabilities.”
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood Management Assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental Control Assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway Management And Parking Assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper Experience Assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognize and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing Business Intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A Natural Cross-Over Technology This trend towards integration has forever changed how organizations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyze what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalize on that connection is only limited by our imagination.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban On Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes A Splash With Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact Of Data-Driven Smart Cities On Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing The Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends For 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How To Prevent ATM Jackpotting With Physical And Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need To Look Beyond Technology For Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organization. 10. The Evolution Of Facial Recognition From Body-Cams To Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
Security is arguably at the heart of the United States partial government shutdown: President Trump’s demand for $5.6 billion to start building a wall along the southern border with Mexico is the major bone of contention as gridlock in Washington prevents passage of a spending bill to keep the government in full operation. The partial government shutdown has affected security in other ways, too, and some of the impact could continue long after the impasse is settled. Some 800,000 federal employees are impacted, some on full or partial leave as a result of the shutdown and others working without knowing when they will get paid. Cybersecurity Initiatives Delayed Furloughed federal employees tasked with cybersecurity are not on hand to address the constant threat to government IT systems from possible hackers and other bad actors. In fact, hackers may decide the government shutdown is a vulnerable time to launch an attack. Data capture form to appear here! Hackers may decide the government shutdown is a vulnerable time to launch an attack Specifically, the new Cybersecurity Infrastructure Security Agency, launched last fall, is operating with a skeleton staff. If the shutdown encourages cybersecurity experts to seek other employment, the resulting drain of “knowledge capital” could be a lasting detriment. New cybersecurity initiatives are also being delayed, such as the 21st Century Integrated Digital Experience Act, aimed at creating a baseline of security defense across government web sites. Some government websites have had their Transport Layer Security (TLS) encryption certificates expire during the shutdown. Impact On TSA Agents Although Transportation Security Administration (TSA) agents remain on the job at major airports, they will not be paid again until after the shutdown is over. The resulting negative impact on morale has arguably slowed down airport security operations, although airports have not reported any major problems. In addition, some agents have called in “sick” and/or sought other employment to provide income during the shutdown. In the Dallas-Fort Worth airport, the number of agents calling out sick reportedly increased by 200% to 300%. The absences can aggravate existing TSA staffing shortages. Impact On Border Protection Agents Customs and border protection agents are also on the job with no assurance of when they will be paid. Other immigration agents in the Department of Homeland Security are also currently without pay. Hearings on immigration cases are being canceled, which can result in a large backlog to be addressed after the shutdown ends. Customs and border protection agents are also on the job with no assurance of when they will be paid What About Worker Documentation? A consequence of the shutdown is unavailability of the government’s E-Verify system, which is used to verify a worker’s immigration status prior to being hired by an employer. During the lapse in government appropriations, employers will not be able to access their E-Verify accounts, create an E-Verify case, edit company information, terminate accounts, run reports, etc. Long-Term Impact On Government Employment The longer the shutdown continues, the more employees will be encouraged to seek work elsewhere The shutdown may lead federal employees to seek work in the private sector, where their paycheck is not likely to be delayed because of a political impasse. The longer the shutdown continues, the more employees will be encouraged to seek work elsewhere, whether on a temporary basis or as a permanent alternative. Manpower shortages can translate into security risks. Trump has argued for funding of the border wall on security and humanitarian grounds and has sought to put pressure on newly empowered Democrats. However, adding physical barriers at the border is only part of the solution to border security, says the conservative Heritage Foundation. Also needed are improved technology to monitor the border and appropriately equipped border patrol agents. Holistic Approach To Border Security This holistic approach of combining barriers, technology, and people is the cost-effective way to secure the border, says Heritage Foundation. It’s also important to enforce immigration laws, and border security does nothing to stop visa overstays, another source of illegal immigration. The Democratic opposition has said Trump’s urgent call to build the wall is a “manufactured crisis,” and the wall would be “immoral” and “ineffective.” Weeks into the impasse, there is no end in sight.
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality, smart homes, smart cities, and machine intelligence. Video is an important element at CES. This year, the focus is on intelligent video. For example, Eyecloud.ai, Santa Clara, Calif., is displaying a home security camera with on-device face recognition that uses AI. Powered by a 12-core Intel Movidius VPU (video processing unit), the camera combines AI-on-the-edge with easy setup and wirefree operation for up to six months per battery charge. On-Device Artificial Intelligence On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation SimCam, an Intel partner, demonstrates how the Intel Movidius VPU can turn a security camera into ‘the ultimate vision-based sensor’. On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation. A variety of other residential video systems are also on display at CES. For example, Swann Security is displaying 4K wired security systems featuring Google integration, a wireless smart security camera with True Detect heat-based PIR (photo infrared) motion detection, a video doorbell and chime with two-way talk, and indoor and outdoor wi-fi cameras with Alexa integrations. Intelligent Automotive Solutions Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES. It combines advanced image processing, high-resolution video encoding and CVflow computer vision (video analytics) processing in a single, extremely low-power design. The CVflow architecture provides Deep Neural Network (DNN) processing required for a new generation of affordable and intelligent home monitoring, professional surveillance and aftermarket automotive solutions. CV25 offers half the performance of Ambarella’s previously released CV22 chip, but the new chip’s lower cost will bring intelligent cameras to a price point desirable for home systems. All Ambarella’s chips have hardware-based cybersecurity. A suite of advanced cybersecurity features protects against hacking, including secure boot, TrustZone, and I/O virtualization. Based on 10nm ultra-low power processing technology, the CV25 chip is optimized for wirefree cameras applications that require long battery life and small form factors. Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES Virtual Security Guards Elsewhere, the Deep Sentinel home security system applies video and AI to predict residential break-ins ‘before they happen’. The Pleasanton, Calif.-based tech startup uses ‘AI-infused security cameras’ to keep an eye on your home. Three wireless 1080p full HD cameras provide night vision and PIR motion sensing, connected by a smart hub. Using proprietary artificial intelligence, the cameras act as virtual guards, watching activity around a house and providing alerts to situations that may lead to burglaries, break-ins, package thefts and other dangers. My Safe Patrol is an AI-driven platform that analyses data aggregated from security personnel, citizen alert systems and IoT smart devices, and responds with geolocated alerts in real-time. My Safe Patrol effectively supports the security/safety ecosystem of a building, a campus, a city or a district through a dynamic dashboard that helps command and control operations manage and deploy security plans. AI-Integrated Devices Showcased solutions include Smart Living integration of video surveillance applications to enable real-time two-way audio and video streaming simultaneously MicroVision, Redmond, Wash., showcases an interactive display engine for AI-connected devices, providing an integrated solution for projected display and interactivity through multi-point touch and air gestures. MicroVision’s new consumer 3D LiDAR engine provides high-fidelity spatial awareness to smart home hubs, for input to smart devices such as lighting, security, entertainment, and thermostats. The Internet of Things (IoT) is another big topic at CES, and ThroughTek Co., Ltd., Taiwan, demonstrates IoT developments to transmit voice, video and data over both wide- and narrow-band channels in smart home applications. Showcased solutions include Smart Living integration of video surveillance applications combined with voice assistant to companion robots, wireless doorbells, and battery cameras to enable real-time two-way audio and video streaming simultaneously. Advanced Capacitive Touchscreen Decayeux Group, a European manufacturer of mailboxes and high security doors, is displaying MyColisBox, a secure and connected parcel box delivery system designed to provide online shoppers a secure pickup point accessible by a PIN code sent via SMS message to a smartphone. Walter is the new mobile app for MyColisBox. Kwikset, a division of Spectrum Brands, showcases its smart lock portfolio – including three new smart locks – in the CES Smart Home Marketplace. Kwikset is showing the SmartCode 888, Kwikset Convert, Obsidian, and new designs of the SmartCode 914 and SmartCode 916, as well as a new wi-fi lock. Baldwin, Kwikset’s ‘luxury lock’ sister company, is offering a preview of its new TouchScreen Collection, launching this summer, available in five styles and featuring Advanced Capacitive Touchscreen technology. The Internet of Things (IoT) is another big topic at CES, with many companies demonstrating IoT developments Cyber Security Standards Privacy is increasingly a concern in the consumer space, and Private Discuss, from PIMAN Security, is a premium, secure, white label communication solution. Their active AI-powered defense architecture provides encrypted audio and video calls, messaging and file sharing. It renders a confidential, secure messaging platform that adheres to the highest standards of cybersecurity. FLIR provides virtual reality demonstrations at their CES booth, allowing attendees to put on a virtual fire helmet and try out a FLIR camera in a real-world residential fire response scenario. Participants may also use a FLIR optical gas imaging camera virtually to stop fugitive emissions in a natural gas refinery. Booth visitors may also take “thermal selfies” to post on social media.
The U.S. House of Representatives has voted 351-61 to ban federal agencies from buying Chinese-made surveillance cameras. The measure was passed May 24 as an amendment to House Bill 5515, the Fiscal Year 2019 National Defense Authorization Act (NDAA), which is the funding plan for the military that also maps out a variety of policy priorities. The bill is at least several months away from becoming law, and it must still be considered by the Senate and then by a House-Senate conference committee before final passage. Changes can be made at each stage. It would also have to be signed by President Trump. The amendment targeting video surveillance cameras was offered by Congresswoman Vicky Hartzler, a Missouri Republican. “Video surveillance and security equipment sold by Chinese companies exposes the U.S. government to significant vulnerabilities and my amendment will ensure that China cannot create a video surveillance network within federal agencies,” says Hartzler in a press release. Companies Affected By The Ban The proposed ban appears to lump our industry’s familiar video surveillance players together with other companies that the U.S. government has targeted for security concerns. Also mentioned in the amendment are Hytera Communications, a Chinese digital mobile radio manufacturer previously charged with patent infringement; and ZTE Corp., a Chinese telecommunications company accused of violating trade-sanction agreements and posing a threat to U.S. national security. The bill also mentions Huawei Technologies Co. Ltd., a Chinese telecommunications manufacturer previously investigated as a national security threat.The proposed ban appears to lump our industry’s familiar video surveillance players together with other companies that the U.S. government has targeted for security concerns Two familiar companies in our industry – Hikvision and Dahua – are mentioned in the bill by their full names, Hangzhou Hikvision Digital Technology Co. and Zhejiang Dahua Technology Co. In addition to their branded video lines, the two companies also are the largest providers of OEM/'white label' cameras and video systems that are sold under other brand names, such as Honeywell, Stanley and UTC. The bill specifically mentions the inclusion of white label technology in the ban. Addressing Concerns In the case of Hikvision, one concern is whether the company is owned by the Chinese government. Hikvision has previously addressed this issue, emphasizing its ownership by “a diverse set of private and public entities” with the largest share belonging to a Chinese state-owned enterprise (SOE). Hikvision declined to comment for this article. However, the company has published a statement (“Special Bulletin”): “We are actively working to assure our North American stakeholders that Hikvision strictly abides by the laws and regulations of each country in which it operates. We also affirm the fact that we hold our products to the industry’s global cybersecurity standards, including North America.” The Hikvision statement continues: “As we continue to monitor and further deploy the necessary resources to address this matter over the coming weeks and months, please know that we will vigorously defend Hikvision from dangerous and unproven accusations about the cybersecurity of our products and solutions.” If SIA decides to take a position based on member feedback, it will occur during the normal legislative process" Commitment To Compliance Dahua answered our requests for a comment with the following official response: “Dahua Technology is a commercial enterprise with a high level of business integrity. The international company [is] committed to compliance with all applicable laws and regulations in the countries in which it does business.” The company’s response continues: “Dahua Technology dedicates 10 percent of its revenue to research and development annually. Dahua has designated cybersecurity as a top priority and takes a comprehensive and systemic approach, with complementary and redundant safeguards built into its technology, services and organizational practices. Dahua Technology is positioning itself as a cybersecurity leader within the video surveillance industry.” The Security Industry Association (SIA) has submitted the House amendment to its government relations committee for review and consideration. “Any recommended position by the government relations committee will be referred to the SIA Executive Committee for their consideration and approval,” says Don Erickson, CEO of SIA. “If SIA decides to take a position based on member feedback, it will occur during the normal legislative process as the bill is considered by the Senate, and then ultimately by a House-Senate conference committee.” Impact On Global Video Camera Supply Congresswoman Hartzler’s amendment is aimed at “ensur[ing] federal agencies do not purchase Chinese-made surveillance cameras,” according to the press release from her office. Obviously, there are more than just the two mentioned companies manufacturing surveillance cameras in China, so the question becomes whether the intent is to ban all Chinese cameras from government use. Such a proposal would create an even larger issue, given that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, according to one industry source.60 to 65 percent of the global supply of commercial video cameras are manufactured in China, according to one industry source The bill does not address the possible use of Chinese-made components in cameras that are assembled elsewhere in the world (but technically are not 'made in China'). “Those types of issues are commonly explained in implementation guidelines that would be created afterwards if the proposed language becomes law,” says Erickson. The NDAA is unlikely to become law for several months. A version previously passed by the Senate Armed Services committee must be presented to the full Senate, where it can also be amended. Then the House and Senate bills must be reconciled.
One of the fastest growing districts in the upper Midwest of the United States, Harrisburg in South Dakota educates almost 4000 students across eight schools. Gallagher Command Centre was selected as the only solution that could meet the district’s security requirements, and in October 2015, these security measures were put to the test when the local high school was the target of a shooting. The incident resulted in one staff member being injured but was prevented from escalating further due to Gallagher’s central management platform, Command Centre, being activated by staff. Logs from the incident confirm that from the time the emergency button was pressed, it took just four seconds for Command Centre to lock all outside doors, notify district authorities, and limit building access to emergency responders only. Physical barriers for students’ security Gallagher Command Centre was involved with placing physical barriers between an active gunman and high school students"James Straatmeyer, Chief Executive Officer of Integrated Technology & Security, partnered with Gallagher for the installation of Harrisburg districts security solution. James says, “Gallagher Command Centre was directly involved with placing physical barriers between an active gunman and hundreds of high school students filling 37 classrooms. As far as I’m aware, there’s no other product on the market that has the capabilities and integration solutions for protecting students and staff to the extent of Gallagher Command Centre.” This type of security alert is of increasing concern for many educational institutions, prompting renewed focus on daily security protocols. Integrated and scalable security system Essential to providing an optimum learning environment for students is ensuring their safety and security – a responsibility the district of Harrisburg takes extremely seriously. Key to this was partnering with a security solutions provider that understood the specific needs of educational institutions, with the flexibility to employ customized features that could be tailored to Harrisburg’s particular requirements. The system needed to be fully integrated, scalable and expandable, digitally based, user-friendly The system needed to be fully integrated, scalable and expandable, digitally based, user-friendly and crucially, to assist and not replace, existing manual security procedures. Gallagher and South Dakota based Integrated Technology & Security completed the initial installation within three weeks. Since its introduction, the system has been under continual expansion. Features of updated security solution The access control system originally installed in 2013, fulfilled the region’s initial security requirements; however, a period of growth prompted the need for an enhanced system that could protect the increasing number of students. Some of the features of Harrisburg’s upgraded security solution included: Outlook calendar integration, to enable scheduling of access for special events Intercom / phone integration, to control doors from a desktop icon or smartphone Strobe light control to provide lockdown notifications in hearing impaired areas such as deaf education, shops and the gym Intercom integration for lockdown announcements Command Centre provides enterprise level lockdown controls which limit access to buildings, control fire doors, and send notifications, while providing an audit trail and video alerts. Lockdown access to all staff members An understanding of the benefits of an advanced, interactive security network is essential, and in some cases, lifesavingUsability is a highlight of Command Centre, offering access for all levels of personnel. Initially, only office and administrative staff were trained in the use of lockdown systems, but as the Command Centre’s lockdown features have developed, all staff members can now control access in individual school buildings. Once a lockdown has been activated, a notification is automatically issued to district authorities, immediately alerting emergency services if required. The security incident in 2015 strongly supported Harrisburg district’s decision to install a sophisticated access control system to protect its faculty, staff and students. At a time when concern over campus security is rising, an understanding of the benefits of an advanced, interactive security network is essential, and in some cases, lifesaving. Gallagher’s security solution offers educational institutions around the world a combination of enhanced operational efficiency and cost savings. Command Centre’s software provides a powerful and versatile feature set, enabling system operators to configure, monitor and control their unique security system.
Senstar, global provider of video management solutions and perimeter intrusion detection systems, has published a case study detailing how its Senstar Symphony video management system (VMS) and video analytics are helping Ferretería Ochoa secure spaces and gather business intelligence. Senstar Symphony vMS Ferretería Ochoa is a hardware and home improvement retail chain that has been operating in the Dominican Republic for over 45 years. Symphony was first installed at one of its retail stores in 2013 and is now being used at six locations, including a storage facility and a manufacturing facility. Ferretería Ochoa also uses several of Senstar’s video analytics to better understand customer and employee behavior. One of the main benefits Symphony has provided Ferretería Ochoa is increased inventory control One of the main benefits Symphony has provided Ferretería Ochoa is increased inventory control. This not only refers to shoplifting by customers, but also to errors – accidental or intentional – made during shipping and receiving. Employees are aware they are being monitored at all times and understand the system’s ability to capture incidents and provide proof. Central video monitoring “It dissuades deceitful and malicious situations such as shipping more items than ordered or a more expensive item,” said Mr. Gomez. “The deterrence factor Symphony provides is probably the most important result we have achieved.” Symphony has also enabled Ferretería Ochoa to utilize security personnel more efficiently and has reduced costs by having video from all sites managed from one central location. Retail security “Senstar Symphony and analytics are ideal for retailers looking to deter theft, protect staff and customers and improve the overall customer experience,” said Senstar’s Director, North America Business Development Anthony Hackett. “We are happy to be helping Ferretería Ochoa achieve such results.”
LOCKEN has been selected to modernise access management for half of all substations in Enedis’ national network. Following a test phase it has opted for the latest-generation intelligent key by Iseo, which uses contactless induction technology to guarantee instant access. The EDF subsidiary supplies electricity to consumer meters, through extremely high-voltage lines, located at its many substations. The solution is currently being introduced and full deployment across 1,100 substations will take place throughout 2019. Effective Solution The construction principles for this type of structure require wide open spaces to keep people and equipment safe Substations transform the power from very high-voltage lines (90,000 V or 225,000 V) to high-voltage (20,000 V most often) and through to private homes (230V). Some sites may be located in urban settings. In this case, the substations are installed in underground infrastructure, like in Paris and its inner suburbs. But most are found in rural or semi-urban areas, covering a half or full hectare. The construction principles for this type of structure require wide open spaces to keep people and equipment safe. With perimeter security accessible through an outside gate, substations comprise a technical room and a number of transformers, which may be outside or under shelter. These facilities have many access points which must be secured. Without an effective solution, key management is complex and operational efficiency is reduced. Centralized Management Software Substations are sensitive sites with strictly controlled access. Given the exposure to electrical risk, intrusions present potentially lethal consequences. This is where the LOCKEN solution comes in: a single key with associated rights allows employees to open any area they require (and are authorized to access) as part of their job. A lost key is easily disabled within the centralized management software. The solution is particularly appropriate given the number of maintenance officers required by substations. Users are not all Enedis employees, explains Maxime Leboeuf, Project Manager at Enedis. “Although site workers are mostly Enedis employees, the sites must also be accessible to subcontractors for extension and renewal work and a number of maintenance operations, by employees of RTE, the electricity transmission system operator responsible for the very high-voltage lines which end at substations.” Electronic Access Management “Electronic access management drastically reduces the risk of intrusion associated with mechanical keys. With the Locken system, we can now authorize subcontractor access for a specified period and location. In the Enedis setup, the access rights memorised by the electronic keys must be updated daily by the key's user using the dedicated devices.” Keys are deactivated almost immediately once the process is initiated in the Locken Smart Access (LSA) central management software" “Keys are deactivated almost immediately once the process is initiated in the Locken Smart Access (LSA) central management software. This also provides a reliable crisis management tool.” At Enedis, LOCKEN has fitted outdoor access points in often isolated, rural areas. The key supplies the energy to open the cylinder so no wires are needed for doors. Extending Electronic Key The cylinder is approved to resist extreme weather conditions, especially the effects of water. Contactless technology also shields it from dust and oxidation. Enedis is considering the possibility of extending electronic key use to the most sensitive parts of its technical rooms, especially access to control and command rooms, the nerve centres of the substations. Enedis also plans to replace all substation cylinders to minimize the risks associated with joint activity, meaning a number of operations carried out by different engineers can take place simultaneously at the same substation.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, working alongside Sonitrol of Fort Lauderdale, is pleased to announce the completion of a highly-anticipated security system upgrade for Junior Achievement of South Florida (JASF) at the organization’s JA World Huizenga Center at the Lillian S. Wells Pavilion (JA World). JA World is located on the Broward College North Campus in Coconut Creek, Florida. With over 60,000 square feet of learning areas, rentable meetings rooms, and the Huizenga Catering Kitchen, JA World is the largest Junior Achievement facility in the world. Each year, more than 21,000 5th grade and 20,000 8th grade students from Broward and south Palm Beach counties visit the facility. The 5th graders learn basic economic concepts, workplace skills, and personal and business finances in a simulated city built for young students; the 8th graders focus on how their educational choices will impact their future earning potential, managing a budget and learn about high growth industries to help spark their career exploration. The initial security system included remotely managed access control, verified audio intrusion detection, and analog camerasRequirement Of IP Camera Technology “Each day, 450 students participate in JA BizTown and JA Finance Park simulations at JA World. Their safety and the safety of our volunteers, staff, and guests is of the utmost concern to us,” said Laurie Sallarulo, President & CEO, JASF. Sonitrol of Fort Lauderdale started working with JASF in 2008, in the early design/build phase of the facility, and through its completion in 2009. The initial security system included remotely managed access control, verified audio intrusion detection, and analog cameras. At the time, IP cameras were considered too expensive. “Previously, we had 18 analog cameras on the system,” explained Leni Smith, Director of Operations for JASF. “As time went on, it was clear that we needed to bring more areas inside and outside the building under surveillance, we wanted to access more cutting-edge IP camera technology, and we wanted to have all our surveillance under one Video Management System (VMS).” Installation Of 3xLogic Hybrid NVR Sonitrol of Fort Lauderdale installed a 3xLOGIC hybrid NVR, enabling JASF to protect their analog camera investmentWorking in tandem, Sonitrol of Fort Lauderdale and 3xLOGIC designed a system upgrade that, through a combination of discounts and donations, JASF could afford. It also helped that John Ray, President of Sonitrol Fort Lauderdale, is a long-time, active JASF Board member. In order to fit JASF’s budget, Sonitrol of Fort Lauderdale installed a 3xLOGIC hybrid NVR, enabling JASF to protect their analog camera investment, while adding in higher-resolution IP cameras for expanded coverage. The hybrid solution also creates a migration path, allowing JASF to continue improving visibility with new IP cameras over time as their budget allows. “As part of ongoing security and safety improvements, our staff participates in an annual active shooter training,” explained Monica McNerney, VP Operations, “and during those trainings, two things became clear. We needed to cover more areas with surveillance, and we needed to partner more closely with local law enforcement to give them real-time access to our system in case of an emergency.” Viewing Discrete Areas With VIGIL Software JASF has a number of discrete areas under surveillance and manages to view them through use of the 3xLOGIC VIGIL server softwareJASF has a number of discrete areas under surveillance and manages to view them through use of the 3xLOGIC VIGIL server software. These include the reception area, two loading dock areas, other exterior doors, their large meeting rooms, and the student areas, known as JA BizTown and JA Finance Park, where 450 young people spend most of their time each day at JA World. The receptionist controls public access to the building by viewing who is requesting entry, and buzzing that person in. The receptionist also monitors the loading dock area and notifies the appropriate staff member when a delivery has arrived. Leni Smith, who manages day-to-day security matters, reviews video after an incident is reported to her. “I really like how with the upgraded system, I can use motion detection alarms to hone in on exactly the video I need to review—I bet we’ve cut the time for review easily in half, if not more. I also really value how I can draw a box in a camera view and zoom into that area easily and quickly to find out exactly what happened.” Working With Community Partners We work very closely with our community partners to help them understand and access our facility and security system"Monica McNerney expanded on how the upgraded system is positively impacting another aspect of the JASF security program. “We work very closely with our community partners like Broward College security and local law enforcement to help them understand and access our facility and security system. We also routinely ask for their expert feedback on whether we’re managing our security effectively. “So far, they’ve told us we’re doing exactly what we need to be doing, and they’re excited about the expanded access they have to our camera views, although we hope that no event ever warrants that need.” TotalGuard Solution For Emergency Situations Jennifer Thomas, Vice President of Operations for Sonitrol of Fort Lauderdale, also discussed continued improvements that are planned for JA World. “We are actively designing phase II of the camera upgrade, which will include improved coverage and image clarity for camera views outside the front doors. TotalGuard allows JASF personnel to alert the Sonitrol central station and transmit real-time audio and video to the monitoring center “We are also ready to deploy our latest technology for the main lobby area—TotalGuard. TotalGuard is a great solution for emergency situations, it allows JASF personnel to alert the Sonitrol central station and transmit real-time audio and video to the monitoring center, for prioritized verified police response.” Sallarulo had a final thought on how things have been going with the system upgrade, “As for Sonitrol of Fort Lauderdale, they always provide us an amazing response. As a non-profit, we could not do what we do without the help of partners like Sonitrol. We are very grateful for their support and service.”
Manufacturer ROCKWOOL International A.S. has chosen Nedap’s Global Client Programme to secure its offices and factories worldwide. AEOS, the physical security platform by Nedap, installed during the program, enables ROCKWOOL to establish a truly global security policy and unified work processes. An advanced project rollout, the Global Client Programme is developed for large multinationals and offers several benefits, including standardization across sites, shorter implementation times and cost efficiencies. Standardizing Company’s Security Measures The Global Client Programme connects all of ROCKWOOL’s factories and office premises, and standardises the company’s security measuresROCKWOOL has 28 factories across the world. The Global Client Programme connects all of these factories and ROCKWOOL’s office premises, and standardizes the company’s security measures throughout the world. Fokko van der Zee, managing director at Nedap Security Management, says: “The implementation of a standardized security solution across the world is a complex process. It involves a large project spanning many years and involving many stakeholders, and demands a high level of project management. In the absence of a structured program with defined guidelines, a global security rollout is likely to be a stressful execution. That’s why we set up our carefully designed Global Client Programme.” ROCKWOOL Digital Service Lead, Matthew Thorne, agrees: “We’ve worked with Nedap over the past few years and recently became a member of their Global Client Programme. Now we’re equipped with the people and tools we needed to standardize our physical security solution. The Global Client Programme also minimizes risk and guarantees compliance. It really meets our needs in every possible way.” Central Security Platform Saves Money The program helps achieve cost savings by avoiding initial setup costs per site and having one central security platform instead of severalThe Global Client Programme is designed to ensure monitoring and control during every step of the rollout process. Timon Padberg, responsible for business development at Nedap Security Management, explains: “The repetitive nature of local site deployments allows us to work with models and templates, such as standard proposal and calculation documents. We can therefore produce a scalable process that ensures uniformity and a consistently high quality of implementation across each site.” By using the Global Client Programme, ROCKWOOL is aiming for uniformity and alignment across all sites. The program also helps achieve cost savings by avoiding initial setup costs per site and having one central security platform instead of several. Moreover, there are significant savings on operational and maintenance costs due to shared services and economies of scale.
A manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialization in some of the towns in Maharashtra while preserving their rich heritage. Wide Area Monitoring The company is spread across a wide area, employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing high resolution images and covering a greater area for monitoring was the primary requirement. The company is divided into various branches that are located at various places in Satara, Maharashtra. This gave rise to the need for a centralized solution at a centralized location from where all other sites can be monitored at a time. Matrix IP Bullet And Dome Cameras To cover the large monitoring area, Matrix provided IP bullet and dome cameras that have greater field of view when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images that aid in night time surveillance and provide enhanced security. For storing the streamed videos, Matrix offered network video recorders. These NVRs have features such as adaptive recording which aids in storing more data in a defined space. Moreover, it has intelligent video analytics such as intrusion detection and motion detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
You could say concerns about privacy are “trending” in our increasingly data-driven world. Unease about how Facebook and other high-tech companies use and share data dominates the news, and the full impact of new European Union (EU) regulations is about to be felt around the world. By May 25, companies that collect data on EU citizens will need to comply with strict new rules around protecting customer data, as enumerated in the General Data Protection Regulation (GDPR). But how do the new regulations, and broader concerns about privacy, affect the physical security market? We asked this week’s Expert Panel Roundtable: How do privacy issues and regulations, such as GDPR, impact physical security systems and how they are managed?
Companies in fast-moving industries tend to want half or more of their revenue to come from products released in the last three or so years. The logical extension of that philosophy is the demise of product "cash cows" that remain in a company's portfolio for many years. Where better to witness the shortening life cycles of technology products than in the smart phone market, where most of us buy into the hype of the "latest and greatest?" But does acceleration of new product introductions translate into shorter product life cycles in the field? We asked this week's Expert Panel Roundtable: What is an acceptable life cycle for a physical security system? Is there a trend toward systems being replaced more, or less, often?