ReconaSense announces the latest release of its A.I. powered security platform for life safety and physical security, featuring risk adaptive access control and new IoT and building automation integrations that enable the secure flow of people, processes and information while keeping risks at bay. Digital transformation has increased the volume, variety and velocity of physical security event data being collected and stored, increasing the complexity of potential security risk factors as well a...
Maxxess Systems continues to drive the virtualization of the physical security industry with the development and implementation of the industry’s most advanced enterprise level situational awareness and response coordination solutions. Enhancing Maxxess Systems’ momentum is the recent introduction of Maxxess InSite Awareness and Response Coordination System which meshes ‘system intelligence’ and ‘human intelligence’ to deliver an entirely new category of physi...
Security is arguably at the heart of the United States partial government shutdown: President Trump’s demand for $5.6 billion to start building a wall along the southern border with Mexico is the major bone of contention as gridlock in Washington prevents passage of a spending bill to keep the government in full operation. The partial government shutdown has affected security in other ways, too, and some of the impact could continue long after the impasse is settled. Some 800,000 federal...
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality...
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for...
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 article...
National Monitoring Center, NMC, a renowned brand in the alarm monitoring industry, and member of the Netwatch group, announced the appointment of industry veteran Norm Barton as Regional Sales Manager West, Proactive Video Monitoring services in NMC. The appointment supports the growing industry demand for Proactive Video Monitoring services. Proactive Video Monitoring Services Norm has extensive industry experience as well as a passion for the market and will be responsible for executing sales strategies in the western United States region" Barton will report to Nicola Oakie, Director of National Sales. Oakie commented on the appointment, “We are delighted to welcome Norm as we continue to expand our team to support this important growth segment. Norm has extensive industry experience as well as a passion for the market and will be responsible for executing sales strategies in the western region of the United States.” Barton comes to NMC with over 28 years of increasingly responsible Team Leadership experience in management and operations including having been President and CEO of FDS Integration, Inc. for several years. Video Monitoring Services Expert “Norm’s outstanding leadership skills, deep industry knowledge, and impressive record of building long-term customer partnerships make him a perfect fit for this pivotal role,” Oakie added. Barton is pleased to be joining the NMC team and has enthusiastically taken on this role. “It is a pleasure to be joining such a well-respected organization, and one that builds its reputation on truly serving its dealers with forward-thinking services and support. This is an incredibly dynamic, focused, and competitive industry in which dealers can thrive. I am excited to be working with our current customers to support their growth and equally excited to cultivate new relationships throughout the western region.”
Ava Group (AVA), global provider of security risk management services and technology will be presenting its portfolio of security solutions at International Security Expo, stand E74. The expo also hosts a range of certified conferences and workshops covering every major sector of the security industry. Taking place over two days at London Olympia, the event focuses on the needs of government and CNI amongst other key sectors. Fiber Optic Intrusion Detection Ava Group will be showcasing the latest solutions from its technology division - incorporating Future Fibre Technologies and BQT Solutions. The Ava Group is a market leader of risk management services and technologies, offering a portfolio of complementary solutions encompassing both fiber optic intrusion detection and high security access control and locking. Mark Horton, Global Sales & Marketing Director – Future Fibre Technologies commented, “Our brands have a strong pedigree in some of the expo’s key sectors including government and CNI, and we’re very much looking forward to discussing with visitors how Ava’s solutions can be applied to protect their organizations. Ava Group has had some major project wins in recent months including a major military closed data network, who have selected our data network infrastructure protection solution to secure its network against tapping and tampering. It is projects such as this that demonstrate Ava Group’s expertise in security risk management and protection of client’s assets and infrastructure.” Perimeter Security Technology New ultra-low noise optical detection electronics ensure a single controller can cover a distance up to 110 kilometres Ava Group’s CTO – Technology, Dr Jim Katsifolis will be presenting in the Perimeter Security & Intrusion Detection Technology Workshop on ‘Security within security in a converged perimeter intrusion detection solution’ on the first morning of the exhibition. An accomplished R&D professional, Jim will explore the latest generation of PIDS technologies, the convergence of intrusion detection and cybersecurity as well as addressing some common myths in this field. Featured on the stand will be the enhanced Aura Ai-2 controller from Future Fibre Technologies. This market-leading product offers unrivalled high-sensitivity detection, location accuracy, cut resilience capability and the industry’s longest linear range. New ultra-low noise optical detection electronics ensure a single controller can cover a distance up to 110 kilometres and can accurately detect, locate and report multiple disturbances to +/- 2 metres. Security Management Solution Ava Group is also previewing its Small Site Assurance range, which is designed to protect remote unmanned locations through a holistic security management solution. The solution incorporates intrusion detection, access control and locking as well as environmental monitoring - all controlled remotely from a simple graphical user interface. The Small Site Assurance range is particularly suited for utilities, telecoms, energy, oil & gas and data centers that are at risk from threats such as vandalism, opportunistic and targeted theft, terrorist attack, trespass, system failure, accident or injury. Orca Locking Security Solution The Orca lock is a high-strength lock designed for securing gates, roller doors, shipping containers, and any other large door or entryway From BQT Solutions, Ava Group will be demonstrating the Orca lock. Building on the success of the award winning YG10, the Orca lock is a high-strength lock designed for securing gates, roller doors, shipping containers, and any other large door or entryway. Alongside the Orca’s impressive physical attributes, its ability to integrate into an access control system is what elevates it beyond anything available in the market. Fully monitored, weatherproof, and user configurable, the Orca is the perfect indoor and outdoor locking solution. BQT will also demonstrate the latest software integration between its miPASS Access TMS software and Paxton’s Net2 access control software. The integration enables the seamless addition of BQT biometric readers to new or existing Net2 systems, facilitating a smooth transition from less secure card technologies to more robust options like fingerprint biometrics and BQT’s own miPASS credentials.
AlgoSec, a provider of business-driven security policy management solutions, announced it has signed a technology collaboration agreement with Microsoft to offer interoperability between the AlgoSec Security Management Suite and Microsoft Azure Firewall to support central security management. AlgoSec’s new solution will allow an intuitive and effective central management capability for Azure Firewall, Microsoft's new cloud-native, firewall-as-a-service. Azure Firewall customers will be able to consistently manage multiple instances of Azure Firewalls across different regions and multiple Azure accounts. Unified Security Policy Management AlgoSec customers can already manage Azure security controls, enabling unified security policy managementAlgoSec customers can already manage Azure security controls, enabling unified security policy management. The collaboration will extend this capability to a fully integrated solution that offers central management of Azure Firewall alongside Network Security Groups and 3rd party security devices such as virtual firewalls deployed in Azure, security controls of other clouds, and on-premises firewalls and SDN solutions. “As enterprises accelerate their Microsoft Azure adoption strategies, they require a greater ability to manage all the security controls and devices that protect their deployments,” said Anner Kushnir, VP Technology at AlgoSec. “The collaboration will enable enterprises to accelerate their Azure deployments, safe in the knowledge that they have full visibility and control over the security devices that protect their cloud estates.” Monitoring Security Vulnerabilities The collaboration between AlgoSec and Microsoft will provide customers with end-to-end visibility into their cloud estatesThe collaboration between AlgoSec and Microsoft will provide customers with end-to-end visibility into their cloud estates, pinpointing security risks and misconfigurations while facilitating connectivity troubleshooting and comprehensive security policy management. Prasetha Warrier, Principal Product Manager, Azure Networking at Microsoft Corp. said, “Security, and how it is managed on a continual basis, is a key concern for migrating business applications to the cloud. We are pleased to work with Algosec to provide a central management experience for the Microsoft Azure Firewall alongside all other security controls in our customers’ environments. This enables them to confidently accelerate their Azure deployments and enforce and monitor security vulnerabilities.” The AlgoSec cloud security management solution for Azure Firewall will be available for select customers this quarter and will be publicly available in Q1 ‘19.
Pulse Secure, global provider of Secure Access solutions to both enterprises and service providers, has announced the launch of new packaging of its award-winning Pulse Access Suite for Managed Security Service Providers (MSSPs). The solution offers service providers an accelerated, cost-effective means to differentiate and build out their service portfolio to meet the massive demand for protected connectivity to cloud applications and hybrid IT resources. Pulse Secure Pulse Secure offers a comprehensive, integrated and highly interoperable set of Secure Access solutions spanning remote, mobile and cloud access security; network visibility and access control; and application delivery. The suite allows service providers to extend lucrative access protection, endpoint compliance, threat response and availability services for the data center, hosted in the cloud or running as SaaS. The service provider packaging optimizes capital expenditure through an on-demand, pay-per-use model. MSSPs can spin up or spin down virtual Secure Access instances and licenses at a cost based on the number of concurrent monthly users. On-demand provisioning and tiered, user-based pricing gives service providers needed flexibility for customer onboarding, growth spurts and business downturns. Managed Security Services (MSS) The Managed Security Services (MSS) market 'constitutes approximately 60 percent of the overall security outsourcing market' According to a recent Gartner report1, the Managed Security Services (MSS) market 'constitutes approximately 60 percent of the overall security outsourcing market , generating $18.7 billion in revenue in 2017 and growing at a CAGR of 11 percent through 2021. It is important to view MSS in the context of broader security outsourcing, because large enterprises are increasingly looking for hybrid engagements that include a mix of shared and dedicated service delivery components.' Key market trends in that report include: Moving beyond monitoring of only network-based security technologies, particularly the network perimeter, with increasing focus on the endpoint (e.g. managed EDR services) Increasing movement toward more customized outcomes for buyers Buyer demand for capabilities to monitor popular SaaS applications, and public cloud service providers and IaaS Enterprise Mobile Management (EMM) And Network Access Control (NAC) As enterprises are seeking more complete offerings from fewer managed security service providers, MSSPs in turn are seeking to expand service scope while reducing business risk and operational complexity. In comparison to working with point solutions that are limited due to custom integration, disparate management and licensing constraints, Pulse Secure uniquely offers MSSPs integrated Virtual Private Network (VPN), Enterprise Mobile Management (EMM), Network Access Control (NAC) and virtual Application Delivery Controller (ADC) solutions within a unified management framework for data center and hybrid IT implementation. Pulse Secure Access Suite For MSSPs MSSP packaging, including user-based licensing, will be available to authorized channel partners at the end of November through Pulse Secure’s global distributors MSSP packaging, including user-based licensing, will be available to authorized channel partners at the end of November through Pulse Secure’s global distributors. The Pulse Secure Access Suite for MSSPs’ list price starts at $6 USD MSRP per concurrent user per month for the first 500 users with higher discounts available for larger user counts. The solution includes a multi-tenant, centralized management system and licensing server that gives MSSPs operational oversight while also providing clients with dashboard visibility. The solution includes virtual appliance form factors for VMware, KVM and Hyper-V, and supports deployment in hosted cloud environments such as Microsoft Azure and Amazon AWS. “Ensuring secure access is more challenging than ever given the dynamics of cyber threats, IT consumerisation and software-defined data centers. Enterprises of all sizes are overwhelmed and increasingly looking to MSSPs for expertise and capacity,” said Scott Gordon, chief marketing officer at Pulse Secure. “Pulse Secure gives MSSP leaders an easy, proven and no-risk path to extend services and increase revenues for hybrid IT secure access. More importantly, our new MSSP packaging enables our service provider partners and their customers to deliver ubiquitous access productivity while ensuring compliance.” Managed Access Services “Pulse Secure has been a key vendor for our managed access services. In my team’s experience, Pulse is the only one that has reliably delivered as-advertised stability, performance and manageability, as well as new feature sets that satisfy our highly demanding clients,” said Nicholas Klein, SOC supervisor at GTT Managed Secure Access Group. “With Pulse Secure, our services are backed by a rock-solid, flexible platform paired with a responsive support team, allowing us to focus on the value-add aspects of our managed service for our customers.” “As business, government and educational institutions are building out their cloud-enabled infrastructure, enterprises must consider how to enforce appropriate resource and data access while delivering high usability for their users. indevis offers enterprises the benefit of expertise, resources, and experience to design and implement an integrated data center and cloud access strategy,” said Wolfgang Kurz, founder and CTO at indevis. “We believe Pulse Secure offers a breadth of Secure Access capabilities and interoperability that give our customers greater freedom to optimize and defend their mobile and cloud computing initiatives. We appreciate the operational and licensing advantages that the Pulse Secure packaging provides our customers and us.” Internet Of Enterprises Orange Business Services is a leader in the Internet of Enterprises, the emerging digital business ecosystem powered by data" “Orange Business Services is a leader in the Internet of Enterprises, the emerging digital business ecosystem powered by data. We are at the core of our customers’ data journey,” said Nicolas Drogou, head of Orange Cyberdefense APAC. “Ensuring the security of the data and its journey end to end is paramount to us being the trusted partner for their Digital Transformation. Pulse Secure is a cornerstone solution within our managed security services suite. The features and scalability of its Secure Access suite enable us to tackle the complex Secure Access challenges that organizations face in an increasingly volatile threat landscape.” “RKON’s customers are building out significant mobile and cloud investments where potential exposure to cyberattacks, compliance and visibility gaps are top of mind,” said Jeff Mullarkey, CEO of RKON, a leading-edge MSSP based in Chicago. He further added, “Ensuring always-on and protected access to resources is foundational to their businesses. We support enterprises across all verticals with a specific emphasis in the mergers and acquisitions space. Our Managed Secure Access practice leverages the Pulse Secure platform's reliability and broad capabilities.”
SentryNet, a wholesale central station monitoring service founded in 1987, is pleased to announce they will be expanding their monitoring footprint by adding a monitoring center in Lacey, Washington. Currently, SentryNet has two UL/FM/NISPOM listed hot redundant monitoring centers in Memphis, Tennessee and Pensacola, Florida, and provides monitoring for more than 650 independent alarm dealers, primarily based in the Southeast. Over the years, SentryNet has continued to expand their dealer footprint in the west and will be opening a monitoring facility in Lacey, Washington, to ensure they are able to provide the best service to dealers coast-to-coast. As part of the expansion, SentryNet will consolidate the Pensacola, Florida, monitoring center to Memphis, Tennessee. A Pensacola, Florida, office will remain and act as the primary sales and dealer relations location. Monitoring Software Platform “2018 has been a transformational year for SentryNet. We have made significant investments in upgrading our monitoring platform and now opening a new monitoring facility,” said Vice President of Dealer Sales Julie Beach. “In the coming months, we will also be launching a complete dealer program that will round out our vision of truly being a full business life cycle partner to security dealers across the nation.” In January 2018, SentryNet upgraded their monitoring software platform to MASterMind, a fully integrated, enterprise solution for monitored security service providers and proprietary central stations, to provide its dealers with best-in-class monitoring services and expanded integration opportunities. The Lacey, Washington, facility is expected to begin monitoring SentryNet dealers in late November 2018.
Hikvision USA Inc., the global supplier of video surveillance products and solutions, will showcase new technology and its extensive integration capabilities at the GSX 2018. Central Management System To highlight unique features and demonstrate how products can be combined to address the specific needs of end users, HikCentral—Hikvision's Central Management System (CMS)—will be the centerpiece of the Hikvision showroom. "End users and integrators come to GSX to figure out how to solve security problems and run businesses more efficiently. For integrators, building a solution that addresses customers' specific pain points has never been easier," said Eric Chen, general manager, Hikvision North America. "Our video wall display will provide a live demo including remote monitoring outside of the conference center, showing how HikCentral provides a totally integrated solution for all Hikvision and partner products." TurboHD 4.0 Cameras Well suited for complex projects in a variety of vertical markets, HikCentral is easy to use and configure. New products in several categories will be on display including: Value Express Series entry level IP and Turbo cameras, access control with UL294 certification, residential two-wire intercom and multiple PanoVu cameras including the new 32 MP 180° Panoramic, PanoVu 180°/360° IR PTZ, and PanoVu mini cameras. TurboHD 4.0 cameras enhanced with power-over-coax (PoC), panoramic view camera, and higher 5MP/8MP image resolution will be showcased, along with Hikvision's PTZs, ranging from 1” or 2.5” mini DE series to the advanced DF series. In addition to cameras, Hikvision’s access control product line will be demoed with HikCentral. The Hikvision showroom is located at the Westgate Las Vegas Pavilion #9 and will be open during exhibit hall hours.
Governments and corporations face crisis events every day. An active shooter terrorizes a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective Response Plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyze. Assessing Threats For Prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualize all this intelligence data within the context of an organization’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social Media Monitoring Free tools like Google Maps or satellite imagery from organizations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis. Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating A Threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualized on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organizations or communities they are protecting Acting And Automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organizations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon Security Guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralized within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis Of A Threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate Emergency Response Virtually every organization has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyze. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimize the impact by improving visibility, collaboration and response.
By 2020, video surveillance using fixed, body and mobile cameras is expected to capture an astounding 859 PB of video daily. Increasing retention regulations and higher resolution cameras, are forcing the video surveillance industry to reassess its approach to data storage. Large capacity primary storage tends to be expensive to procure and costly to implement – especially without a sound architecture that can balance storage performance levels with the speed of access needed to recall video footage. Active Archive Strategy These challenges are thrusting storage tiers to the forefront of system design. Storage tiers in video surveillance had previously meant simply using a separate archive or attaching add-on capacity directly to network video recorders. Many of the new storage options designed for video surveillance are pulling together different storage tiers into a single storage architecture Many of the new storage options designed for video surveillance are pulling together different storage tiers (and in some cases storage media) into a single storage architecture, such as an active archive solution. This balance can be achieved with an active archive strategy that automates migration of data between different storage types, to ensure the data is on the correct storage type at the correct time to meet performance and retention requirements without blowing the budget. This approach also ensures ease of access while automatically moving content from more expensive tiers of storage to more cost-effective long-term tiers of storage. This allows for greater efficiencies in how recorded footage is treated throughout its lifecycle. In some cases, it includes moving data from edge devices to centralized storage, and then to the public cloud. Scalable Video Storage Solutions As storage demands have increased, video management vendors have turned to storage specialists for solutions that can accommodate large numbers of high-resolution video files, metadata associated with the footage for easy searching, along with much needed scalable solutions. In terms of video management software, this means the integration of video content from different storage types, tiers and physical locations is required, and which considers the performance profile of each storage type. With an active archive solution, video content is searchable and accessible directly by the end users regardless of where it is stored. Deploying an active archive solution enables surveillance users to reduce the complexity and costs of managing data for long term retention As seen in many product categories, camera and storage vendors continue to provide extremely competitive offerings. But, storage-specific solutions for video surveillance have lagged behind the roadmaps for video equipment and, as more and more cameras have entered the market, less attention has been placed on video storage capacities. Tiered Storage Strategy The surveillance industry has evolved considerably from the days of the 8mm video recorder; however, enterprise storage solutions will be forced to evolve further to cope with changing storage retention requirements. Video storage is quickly becoming one of the most expensive parts in a surveillance solution, but there is hope. Deploying an active archive solution will enable surveillance users to reduce the complexity and costs of managing from terabytes to petabytes of data for long term retention. By finding a storage solution that delivers the ability to implement a tiered storage strategy, users can adhere to regulation requirements to retain video footage and meet their safety and security objectives, while also significantly reducing storage costs and operational expenses.
The rise to prominence of smart cities should not go unnoticed. To the untrained eye, you might not realise just how connected your city is and how it’s helping your everyday life. From crossing the road to monitoring water levels, technology is allowing cities to think quicker and act smarter. Data-Driven Decisions A recent whitepaper by ABI Research has revealed that the total global cost-saving potential offered by smart cities stands at more than $5 trillion. This shows how technological improvements to the places we live offer a significant opportunity to not only improve our personal lives and wellbeing, but to also ensure our cities are able to continue contributing to the wider economy. One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting eventsThe IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. In an IDC study sponsored by Seagate, Data Age 2025 estimates that by 2025, nearly 20% of data will be critical to our daily lives and nearly 10% of that will be hypercritical. Data is no longer just going to provide simple insights and recommendations, it is going to be making decisions that impact the fabric and quality of everyday life. Analysis And Application The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilizing data in order to ensure it keeps people safe and mobile. A prime example of this is in the Dutch city of Almere, where the local police force and parking management teams are using surveillance technology to improve congestion and manage traffic flow. This is hugely important when 20% of city traffic is caused by drivers circling around trying to find a parking space, according to Stuart Higgins, Strategic Lead - Cisco Impact. While older cities such as London may not be as equipped with new technology like modern cities, such as Dubai, an appreciation of the different ways individual cities can adopt technology is vital. For those that have the right infrastructure, one key benefit will be the ability to use video surveillance to analyze data on road congestion, or even large crowds at sporting events or national ceremonies. Using this data to spot patterns of behaviour will enable city planners to develop long term solutions to ensure city life runs smoothly. Instant Access To Connected Devices By 2025, an average connected person anywhere in the world will interact with connected devices nearly 4,800 times per day — that’s one interaction approximately every 18 seconds. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever It isn’t just new-paradigm services such as Uber that are causing this. Increasingly, the ability to instantly access data relevant to many aspects of our lives will drive our interactions with these devices, and industries around the world are undergoing a digital transformation motivated by these evolving requirements. The benefits of data access is best shown through Project Green Light in the US city of Detroit, where the police department has partnered with gas stations across the city and the community to improve the quality of life within the neighborhood. The result is a strengthened relationship between public services and private businesses operating in the area. As access to data becomes the central component to a functioning smart city, the way data is stored has become more important than ever. When it comes to surveillance in our cities, the need for not only the technology but the hardware to analyze this data is of imperative importance. Real Time Data Storage Availability The growth of real-time data will cause a shift in the type of storage needed in the future – with fast, uncompromised access to data being non-negotiable. Data Age 2025 predicts that by 2025 the global datasphere will grow to 163 zettabytes. The security of our data and how it is stored will be the foundation to any future smart city strategy That’s ten times the 16.1ZB of data generated in 2016. This increase in data will propel the need for data to be available in real-time to heighten the focus on low-latency responsiveness from enterprise edge storage, as well as from the endpoints themselves. The rise in edge computing exemplifies how this demand is already present. The stakes are rising and with them, the critical importance of our data’s veracity and timeliness. It is important to identify city-wide data partnerships, architecture, and standards for effective and safe data sharing when developing a data strategy. Securing Stored Data It’s important to note that the security of our data and how it is stored will be the foundation to any future smart city strategy, ensuring that safety, regulatory, speed and access requirements are all met. Securing the data that underpins life as we know it is circular, not linear. Every company that creates, uses or touches data has to have a role in keeping it secure and should be the backbone of any smart city. What’s evident however is that digital transformation is shaping the surveillance industry and in turn how our cities operate. As a result, data is the fuel that will ensure the impact is a positive one. People, government and businesses all contribute to the cities of today, so no one can afford to ignore the shift we are seeing. The cities that utilize surveillance data when considering any changes to their infrastructure will ultimately become the cities of tomorrow, not only future-proofing, but prospering in the data-driven age.
The U.S. House of Representatives has voted 351-61 to ban federal agencies from buying Chinese-made surveillance cameras. The measure was passed May 24 as an amendment to House Bill 5515, the Fiscal Year 2019 National Defense Authorization Act (NDAA), which is the funding plan for the military that also maps out a variety of policy priorities. The bill is at least several months away from becoming law, and it must still be considered by the Senate and then by a House-Senate conference committee before final passage. Changes can be made at each stage. It would also have to be signed by President Trump. The amendment targeting video surveillance cameras was offered by Congresswoman Vicky Hartzler, a Missouri Republican. “Video surveillance and security equipment sold by Chinese companies exposes the U.S. government to significant vulnerabilities and my amendment will ensure that China cannot create a video surveillance network within federal agencies,” says Hartzler in a press release. Companies Affected By The Ban The proposed ban appears to lump our industry’s familiar video surveillance players together with other companies that the U.S. government has targeted for security concerns. Also mentioned in the amendment are Hytera Communications, a Chinese digital mobile radio manufacturer previously charged with patent infringement; and ZTE Corp., a Chinese telecommunications company accused of violating trade-sanction agreements and posing a threat to U.S. national security. The bill also mentions Huawei Technologies Co. Ltd., a Chinese telecommunications manufacturer previously investigated as a national security threat.The proposed ban appears to lump our industry’s familiar video surveillance players together with other companies that the U.S. government has targeted for security concerns Two familiar companies in our industry – Hikvision and Dahua – are mentioned in the bill by their full names, Hangzhou Hikvision Digital Technology Co. and Zhejiang Dahua Technology Co. In addition to their branded video lines, the two companies also are the largest providers of OEM/'white label' cameras and video systems that are sold under other brand names, such as Honeywell, Stanley and UTC. The bill specifically mentions the inclusion of white label technology in the ban. Addressing Concerns In the case of Hikvision, one concern is whether the company is owned by the Chinese government. Hikvision has previously addressed this issue, emphasizing its ownership by “a diverse set of private and public entities” with the largest share belonging to a Chinese state-owned enterprise (SOE). Hikvision declined to comment for this article. However, the company has published a statement (“Special Bulletin”): “We are actively working to assure our North American stakeholders that Hikvision strictly abides by the laws and regulations of each country in which it operates. We also affirm the fact that we hold our products to the industry’s global cybersecurity standards, including North America.” The Hikvision statement continues: “As we continue to monitor and further deploy the necessary resources to address this matter over the coming weeks and months, please know that we will vigorously defend Hikvision from dangerous and unproven accusations about the cybersecurity of our products and solutions.” If SIA decides to take a position based on member feedback, it will occur during the normal legislative process" Commitment To Compliance Dahua answered our requests for a comment with the following official response: “Dahua Technology is a commercial enterprise with a high level of business integrity. The international company [is] committed to compliance with all applicable laws and regulations in the countries in which it does business.” The company’s response continues: “Dahua Technology dedicates 10 percent of its revenue to research and development annually. Dahua has designated cybersecurity as a top priority and takes a comprehensive and systemic approach, with complementary and redundant safeguards built into its technology, services and organizational practices. Dahua Technology is positioning itself as a cybersecurity leader within the video surveillance industry.” The Security Industry Association (SIA) has submitted the House amendment to its government relations committee for review and consideration. “Any recommended position by the government relations committee will be referred to the SIA Executive Committee for their consideration and approval,” says Don Erickson, CEO of SIA. “If SIA decides to take a position based on member feedback, it will occur during the normal legislative process as the bill is considered by the Senate, and then ultimately by a House-Senate conference committee.” Impact On Global Video Camera Supply Congresswoman Hartzler’s amendment is aimed at “ensur[ing] federal agencies do not purchase Chinese-made surveillance cameras,” according to the press release from her office. Obviously, there are more than just the two mentioned companies manufacturing surveillance cameras in China, so the question becomes whether the intent is to ban all Chinese cameras from government use. Such a proposal would create an even larger issue, given that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, according to one industry source.60 to 65 percent of the global supply of commercial video cameras are manufactured in China, according to one industry source The bill does not address the possible use of Chinese-made components in cameras that are assembled elsewhere in the world (but technically are not 'made in China'). “Those types of issues are commonly explained in implementation guidelines that would be created afterwards if the proposed language becomes law,” says Erickson. The NDAA is unlikely to become law for several months. A version previously passed by the Senate Armed Services committee must be presented to the full Senate, where it can also be amended. Then the House and Senate bills must be reconciled.
Cybersecurity is a growing concern for manufacturers of life safety and security products, and Underwriters Laboratories (UL) wants to help solve the problem. Specifically, UL seeks to work with manufacturers to up their game on cybersecurity and to certify compliance to a minimum level of cybersecurity “hygiene.” UL Cybersecurity Certification UL is a familiar brand in consumer goods and in the security and life safety markets. UL certification is sought by manufacturers in a range of product lines, from electrical goods and smoke alarms to access control and central monitoring stations. Approximately 22 billion UL marks appeared on products in 2016. In the physical security industry alone, products are certified to around 20 different standards covering access control, intrusion detection, locks, safes and vaults, software and other categories. Now UL is working to increase the prominence of their brand in cybersecurity with the UL Cybersecurity Assurance Program (CAP). The UL 2900-1 standard, the standard that offers General Requirements for Software Cybersecurity for Network-Connectable Products, was published in 2016 and in July 2017 was published as an ANSI (American National Standards Institute) standard. The standard was developed with cooperation from end users such as the Department of Homeland Security (DHS), U.S. National Laboratories, and other industry stakeholders. UL 2900-2-3 – the standard that focuses on electronic physical security/Life Safety & Security industry, was published in September 2017. Testing For Cybersecurity Weaknesses The UL 2900 standard encompasses three main areas related to cybersecurity – software weaknesses, known vulnerabilities and risk control such as encryption, access control, passwords, remote communications, and software patches and updates. UL conducts structured penetration, fuzz testing and other tests to establish a reasonable level of confidence that a product or system has addressed cybersecurity concerns. “Certification to the standard means that a product or system has been evaluated to a minimum level of cyber hygiene,” says Neil Lakomiak, Director of Business Development and Innovation, Building and Life Safety Technologies, for UL LLC. “It covers the ‘blocking and tackling’ that you would expect manufacturers to do. It doesn’t provide absolute assurance, but rather a level of confidence that a product has been vetted.” The certification is good for one year, and changes in products require recertification. UL has written more than 1,600 standards defining safety, security, quality and sustainability Lakomiak says applying the standard will: “create an environment where companies are starting to incorporate cybersecurity into their development processes; creating security by design. It will elevate the industry to consider cybersecurity earlier in the development process.” An overall goal of UL is to “give people peace of mind around the products and systems they use.” Underwriters Laboratories At ASIS 2017 Companies that achieve certification can promote it as a point of differentiation in the market, although not a guarantee that a product is cybersecure. UL’s independent evaluations carry weight in the market, as reflected by the ubiquity of the UL brand, and Lakomiak contends the industry can benefit from applying the same level of testing and certification to the area of cybersecurity. He sees UL’s cybersecurity initiative as complementary to other cybersecurity measures, such as “white hat” hacking. From a standards perspective, UL’s efforts seek to complement industry efforts such as SIA, ASIS International, PSA and ONVIF. Lakomiak was at the ASIS 2017 show in Dallas, where he met with existing manufacturer customers and potential future clients – including large and small companies in the industry – to discuss cybersecurity and the road to certification. He says many manufacturers are not yet ready for certification, in which case UL provides consultancy and advisory services to help them get there. “A lot of companies just need help understanding what their current processes and cybersecurity posture are,” says Lakomiak. “They want help to create a roadmap to get certification. A variety of manufacturers are on the path to certification.” Underwriters Laboratories Security Mission The cybersecurity element is an extension of UL’s mission to help companies demonstrate safety, confirm compliance, deliver quality and performance, and build excellence. Lakomiak says many people mistakenly perceive UL as a quasi-governmental organization, perhaps because UL standards are sometimes incorporated into regulations. However, the organization is a business and wants to operate like one by serving the needs of its manufacturer customers. “We want to have the service we provide be market-driven. We understand the pain points of manufacturers, integrators and others as they interface with technology. We want to devise programs to help them be successful in the market. Our focus is to make our customers succeed by providing objective certification.” To the extent that cybersecurity is a growing pain point for the physical security industry, there is a large potential role to be played by UL and many others.
The largest global event of 2016 – and the year’s biggest security challenge – will no doubt be the Games of the XXXI Olympiad in Rio de Janeiro, Brazil. Around 15,000 athletes from 206 countries are expected to compete at the Olympic games, August 5-21, 2016, and about 7.5 million tickets will be issued. In our age of terrorism, organizers of any event on the scale of the Rio Olympics must consider the possibility of an attack or other security breach during the more than two weeks of the event. Ever since the 1972 Munich massacre, in which 11 Israeli Olympic team members were taken hostage and eventually killed (along with a German police officer), organizers of Olympic games have been keenly aware of the possibility of violence. The threat of terrorism raises the stakes even more. Recent events aggravate concerns about the safety of the Olympics, including the deadly Paris terrorism attacks in November of 2015 and the Brussels bombings earlier in 2016. The big stage of the Olympics would provide a temptingly high profile to any group wishing to foment terror by attacking the game venues, facilities nearby, or the 500,000 tourists expected to attend. Devoted to avoiding such a catastrophe will be a huge security effort at the Rio Olympics, including more than 85,000 forces – 47,000 Brazilian security professionals and 38,000 members of the armed services. An Anti-Terrorism Center will promote sharing of information, training and knowledge among police, law enforcement and intelligence. Officials from more than 90 countries will work together on the effort. It will be the largest security operation in Brazilian history. In contrast, only 40,000 agents were used at the London Olympics in 2012. Several Additional Factors Could Impact Security In Rio In August. They Include: Devoted to avoiding a catastrophewill be a huge security effort at theRio Olympics, including more than85,000 forces – In contrast, only40,000 agents were used at theLondon Olympics in 2012 Need for awareness/ preparedness. Brazil has a history as a peaceful country, has no declared enemies, and has previously faced little threat of terrorism. It also has little intelligence expertise. Only recently did Brazil legislate to make terrorism a crime punishable by up to 24 years in prison. Might the South American country therefore be complacent to the possibility of an attack? Border security. Geographically, Brazil has more than 14,000 miles (23,000 kilometers) of borders that are difficult to control, much of them through Amazon jungles. The largest country in South America, Brazil shares borders with 10 other countries, and lack of controls in unpopulated regions is one factor in Brazil’s historic struggles to combat drug and arms trafficking. A 90-day visa waiver during the games, approved by Brazil’s congress, will help to attract more tourists, but at what cost to security? (Waivers are limited to visitors from nations seen as low-risk, including the United States, Canada, Australia and Japan.) Securing areas surrounding Olympic venues. Just steps from some of the largest Olympic venues are areas of Rio de Janeiro plagued by poverty and crime. Slums, or “favelas,” are within half a mile (less than 800 meters) of Maracana stadium, where opening ceremonies will kick off the games. Slums are also located near popular beaches and expensive hotels. Other problems of poverty – open sewage, destroyed houses and violence – are also concerns. Slums are controlled by drug traffickers and armed gangs, and police are few and inadequately armed. Many places are unsafe to walk at night. Violent crime. Protecting the Olympics includes keeping the entire city safe. Brazil has about 52,000 murders a year, and there are around three per day in Rio. Crowd violence is often a problem at Brazilian soccer matches. Budget cuts. In March, the government in Brazil decreased its security budget by 30 percent (about 550 million US dollars), with much of it targeting future investment. However, concern is that the cuts might undermine plans such as creation of an Urban Pacification Police in slum areas near the airport. Brazil’s political climate. Brazil's president is facing possible impeachment, and the nation's economy is in a recession freefall; might additional security risks result from the crisis? The Zika virus. Brazil has been hardest hit of any nation by the Zika virus, which is spread by mosquitoes and has particular risks for pregnant women and their unborn children. If the outbreak persists, might it cast a negative shadow over the Olympic games (or add another risk factor)? To Prepare To Meet The Security Challenges Of The Olympics, Rio Officials Have Undertaken Several Initiatives, Including: Applying lessons they learned from hosting other big events. Large international events are not new to Brazil, which hosted the 2014 FIFA World Cup, the 2014 Va’a World Sprint Canoeing Championships, and the 2012 Rio+20 United Nations Conference on Sustainable Development. Brazil also has experience managing the large annual Carnival celebrations in Rio and elsewhere. Technology to secure the RioOlympics includes a largesecurity command and controlcenter in downtown Rio.Dozens of screens will displayviews from thousands ofcameras installed throughoutcity and in Olympic venues Surveying best practices by visiting other locales where large events were held. Brazilian officials will use past Olympics games as models. Officials have also visited other locations that sponsored big events, such as the Tour de France and the Boston Marathon, to see what they can learn. Hundreds of Brazilian police visited the Pan-Am Games in Toronto last summer to learn newer techniques. They are also implementing best practices from other international events such as the IAAF World Athletics Championships in Beijing and the Baku 2015 European games. The Rio Olympics’ head of security traveled to Washington to increase cooperation with the Department of Homeland Security and other US agencies. Creating a huge command and control center. Technology to secure the Rio Olympics includes a large security command and control center in downtown Rio, featuring walls covered with dozens of screens displaying views from thousands of cameras installed throughout city and in Olympic venues. Soldiers will control access to stadiums, X-ray machines and metal detectors. Screening visitors as they arrive. Officials will receive real-time data about airport passengers as they check in from their country of origin. As the days count down to the Rio Olympics, officials appear to be leaving very little to chance. However, with all attention focused on Rio during the Olympics, might the event be too tempting for a terrorist to resist? Given global threats and general security vulnerabilities, organizers of the Rio Olympics may need more than preparation to protect the games. They might need some luck, too.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, working alongside Sonitrol of Fort Lauderdale, is pleased to announce the completion of a highly-anticipated security system upgrade for Junior Achievement of South Florida (JASF) at the organization’s JA World Huizenga Center at the Lillian S. Wells Pavilion (JA World). JA World is located on the Broward College North Campus in Coconut Creek, Florida. With over 60,000 square feet of learning areas, rentable meetings rooms, and the Huizenga Catering Kitchen, JA World is the largest Junior Achievement facility in the world. Each year, more than 21,000 5th grade and 20,000 8th grade students from Broward and south Palm Beach counties visit the facility. The 5th graders learn basic economic concepts, workplace skills, and personal and business finances in a simulated city built for young students; the 8th graders focus on how their educational choices will impact their future earning potential, managing a budget and learn about high growth industries to help spark their career exploration. The initial security system included remotely managed access control, verified audio intrusion detection, and analog camerasRequirement Of IP Camera Technology “Each day, 450 students participate in JA BizTown and JA Finance Park simulations at JA World. Their safety and the safety of our volunteers, staff, and guests is of the utmost concern to us,” said Laurie Sallarulo, President & CEO, JASF. Sonitrol of Fort Lauderdale started working with JASF in 2008, in the early design/build phase of the facility, and through its completion in 2009. The initial security system included remotely managed access control, verified audio intrusion detection, and analog cameras. At the time, IP cameras were considered too expensive. “Previously, we had 18 analog cameras on the system,” explained Leni Smith, Director of Operations for JASF. “As time went on, it was clear that we needed to bring more areas inside and outside the building under surveillance, we wanted to access more cutting-edge IP camera technology, and we wanted to have all our surveillance under one Video Management System (VMS).” Installation Of 3xLogic Hybrid NVR Sonitrol of Fort Lauderdale installed a 3xLOGIC hybrid NVR, enabling JASF to protect their analog camera investmentWorking in tandem, Sonitrol of Fort Lauderdale and 3xLOGIC designed a system upgrade that, through a combination of discounts and donations, JASF could afford. It also helped that John Ray, President of Sonitrol Fort Lauderdale, is a long-time, active JASF Board member. In order to fit JASF’s budget, Sonitrol of Fort Lauderdale installed a 3xLOGIC hybrid NVR, enabling JASF to protect their analog camera investment, while adding in higher-resolution IP cameras for expanded coverage. The hybrid solution also creates a migration path, allowing JASF to continue improving visibility with new IP cameras over time as their budget allows. “As part of ongoing security and safety improvements, our staff participates in an annual active shooter training,” explained Monica McNerney, VP Operations, “and during those trainings, two things became clear. We needed to cover more areas with surveillance, and we needed to partner more closely with local law enforcement to give them real-time access to our system in case of an emergency.” Viewing Discrete Areas With VIGIL Software JASF has a number of discrete areas under surveillance and manages to view them through use of the 3xLOGIC VIGIL server softwareJASF has a number of discrete areas under surveillance and manages to view them through use of the 3xLOGIC VIGIL server software. These include the reception area, two loading dock areas, other exterior doors, their large meeting rooms, and the student areas, known as JA BizTown and JA Finance Park, where 450 young people spend most of their time each day at JA World. The receptionist controls public access to the building by viewing who is requesting entry, and buzzing that person in. The receptionist also monitors the loading dock area and notifies the appropriate staff member when a delivery has arrived. Leni Smith, who manages day-to-day security matters, reviews video after an incident is reported to her. “I really like how with the upgraded system, I can use motion detection alarms to hone in on exactly the video I need to review—I bet we’ve cut the time for review easily in half, if not more. I also really value how I can draw a box in a camera view and zoom into that area easily and quickly to find out exactly what happened.” Working With Community Partners We work very closely with our community partners to help them understand and access our facility and security system"Monica McNerney expanded on how the upgraded system is positively impacting another aspect of the JASF security program. “We work very closely with our community partners like Broward College security and local law enforcement to help them understand and access our facility and security system. We also routinely ask for their expert feedback on whether we’re managing our security effectively. “So far, they’ve told us we’re doing exactly what we need to be doing, and they’re excited about the expanded access they have to our camera views, although we hope that no event ever warrants that need.” TotalGuard Solution For Emergency Situations Jennifer Thomas, Vice President of Operations for Sonitrol of Fort Lauderdale, also discussed continued improvements that are planned for JA World. “We are actively designing phase II of the camera upgrade, which will include improved coverage and image clarity for camera views outside the front doors. TotalGuard allows JASF personnel to alert the Sonitrol central station and transmit real-time audio and video to the monitoring center “We are also ready to deploy our latest technology for the main lobby area—TotalGuard. TotalGuard is a great solution for emergency situations, it allows JASF personnel to alert the Sonitrol central station and transmit real-time audio and video to the monitoring center, for prioritized verified police response.” Sallarulo had a final thought on how things have been going with the system upgrade, “As for Sonitrol of Fort Lauderdale, they always provide us an amazing response. As a non-profit, we could not do what we do without the help of partners like Sonitrol. We are very grateful for their support and service.”
Manufacturer ROCKWOOL International A.S. has chosen Nedap’s Global Client Programme to secure its offices and factories worldwide. AEOS, the physical security platform by Nedap, installed during the program, enables ROCKWOOL to establish a truly global security policy and unified work processes. An advanced project rollout, the Global Client Programme is developed for large multinationals and offers several benefits, including standardization across sites, shorter implementation times and cost efficiencies. Standardizing Company’s Security Measures The Global Client Programme connects all of ROCKWOOL’s factories and office premises, and standardises the company’s security measuresROCKWOOL has 28 factories across the world. The Global Client Programme connects all of these factories and ROCKWOOL’s office premises, and standardizes the company’s security measures throughout the world. Fokko van der Zee, managing director at Nedap Security Management, says: “The implementation of a standardized security solution across the world is a complex process. It involves a large project spanning many years and involving many stakeholders, and demands a high level of project management. In the absence of a structured program with defined guidelines, a global security rollout is likely to be a stressful execution. That’s why we set up our carefully designed Global Client Programme.” ROCKWOOL Digital Service Lead, Matthew Thorne, agrees: “We’ve worked with Nedap over the past few years and recently became a member of their Global Client Programme. Now we’re equipped with the people and tools we needed to standardize our physical security solution. The Global Client Programme also minimizes risk and guarantees compliance. It really meets our needs in every possible way.” Central Security Platform Saves Money The program helps achieve cost savings by avoiding initial setup costs per site and having one central security platform instead of severalThe Global Client Programme is designed to ensure monitoring and control during every step of the rollout process. Timon Padberg, responsible for business development at Nedap Security Management, explains: “The repetitive nature of local site deployments allows us to work with models and templates, such as standard proposal and calculation documents. We can therefore produce a scalable process that ensures uniformity and a consistently high quality of implementation across each site.” By using the Global Client Programme, ROCKWOOL is aiming for uniformity and alignment across all sites. The program also helps achieve cost savings by avoiding initial setup costs per site and having one central security platform instead of several. Moreover, there are significant savings on operational and maintenance costs due to shared services and economies of scale.
A manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialization in some of the towns in Maharashtra while preserving their rich heritage. Wide Area Monitoring The company is spread across a wide area, employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing high resolution images and covering a greater area for monitoring was the primary requirement. The company is divided into various branches that are located at various places in Satara, Maharashtra. This gave rise to the need for a centralized solution at a centralized location from where all other sites can be monitored at a time. Matrix IP Bullet And Dome Cameras To cover the large monitoring area, Matrix provided IP bullet and dome cameras that have greater field of view when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images that aid in night time surveillance and provide enhanced security. For storing the streamed videos, Matrix offered network video recorders. These NVRs have features such as adaptive recording which aids in storing more data in a defined space. Moreover, it has intelligent video analytics such as intrusion detection and motion detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
A Manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialization in some of the towns in Maharashtra while preserving their rich heritage. Centralized Surveillance Solution Large area to monitor - The company is spread across a wide area employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing good quality image and can cover a greater area for monitoring was the requirement. Matrix provided IP Bullet and Dome cameras that have greater Field of View when compared to other brands Centralized control - The company is divided into various branches which are located at various places in Satara. This gave rise to the need for a centralized solution at a centralized location from where all other sites can be monitored at a time. Low Light Images For Enhanced Security To cover the large monitoring area, Matrix provided IP Bullet and Dome cameras that have greater Field of View when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images which aid in providing high-class security. For storing the streamed videos, Matrix offered Network Video Recorders. These NVRs have features such as Adaptive Recording which aid in storing more data in a defined space. Moreover, it has Intelligent Video Analytics such as Intrusion Detection and Motion Detection which were also applied. Instant notifications and alerts ensured real-time security of the premises. Results: Centralized Control 24x7 Real-time Surveillance Higher Security with Intelligent Video Analytics
Majmaah University is based in Al Majmaah, a city of 130,000 people located approximately 180km north of Riyadh. The university was founded in 2009 as part of a state-sponsored Ministry of Education initiative to expand university education and the number of graduates in the Kingdom of Saudi Arabia, particularly outside the biggest cities. Key aims of the university include more provision for higher education, high quality scientific research and development, support for the regional economy and meeting the needs of local communities. The university serves a wide area including Majmaah city, Zulfi, Remah, Ghat and Hawtat Sudair. The main campus is situated in the southern part of Majmaah city, with teaching and research delivered through 13 academic schools. The university has around 20 buildings across its multiple sites which provide accommodation for the colleges, administration, deanships and medical services. Enhanced Student And Staff Safety Today’s higher education sector is major business and maximizing student safety is central to any university’s duty of care and reputation. With this in mind, the security team at Majmaah University wanted to upgrade protection for students, staff and visitors. To achieve this, they needed to identify a cost-effective HD surveillance system combining robust performance with state-of-the-art functionality. The team needed a solution to provide centralized control, reliable remote monitoring and full redundancy for key university facilities at multiple campus sites located almost 50km apart. Digital Media installed a comprehensive mix of networked systems at campus sites in Majmaah, Hawtat Sudair and Alghat Additional requirements included innovative features guaranteed to deliver excellent image quality, rapid video retrieval and optimized use of network bandwidth. Other key priorities included compatibility of all surveillance systems; simple plug-and-play deployment; video management software; ease of use; live and simultaneous video playback; simultaneous map monitoring; minimal maintenance; plus, user-friendly diagnostic, administration and reporting capabilities. Integrated IP-Enabled HD Surveillance Assisted by expert regional security systems integrator Digital Media, Majmaah University chose a complete, integrated IDIS DirectIP solution that offered superior performance, dynamic multi-stream control and multi-view functionality to minimize bandwidth usage-all at a low total cost of ownership. Digital Media installed a comprehensive mix of networked systems at campus sites in Majmaah, Hawtat Sudair and Alghat. Equipment included: 336 pan-tilt-zoom (PTZ), box, dome and infra-red bullet cameras; 18 network video recorders (NVRs); a suite of ISS Expert servers and clients; and 16 DAS systems. The new command center at Majmaah was fully equipped with control systems including an IDIS Software Solution (ISS) Video Wall and 512CH Federation server to provide centralized monitoring across multiple campus sites. Following a smooth, swift installation by Digital Media, IDIS DirectIPTM is providing cost-effective surveillance to improve campus safety and protection.
Grafisch Lyceum Utrecht (GLU) is a creative and safe school that specializes in various multi-media disciplines as well as communications, media management and marketing. With approximately 2,100 students, GLU is located in Utrecht, The Netherlands and as at any education establishment the protection of its staff and students is of paramount importance, which saw the school first implement a surveillance system in its new main building in 1998. Unobtrusive Video Surveillance In 2004, following several burglaries over the previous four years, Sead Hafizovic, GLU’s Safety and Security Supervisor identified the need to upgrade security provisions. The current surveillance systems consisted of five analog cameras connected to a video recorder that required the changing of video tapes daily, and Hafizovic recognized this was no longer fit for purpose. Located across two facilities in Utrecht, GLU’s the main building in Vondellaan features glass walls and multiple access points giving the school an open and creative feel that Hafizovic wanted to maintain, making the need for unobtrusive security measures an important factor. Following a thorough assessment by both GLU and Trigion, a mix of 30 IDIS analog cameras together with motion detectors were implemented Hafizovic turned to trusted partner Trigion, a systems integrator responsible for all the school’s security measures encompassing intruder, access control and video surveillance. Acting as an advisor, Trigion was tasked to find the most effective surveillance solution that would meet the security and performance needs of the school, while having the flexibility to scale and adapt as security and operational requirements changed. Migration From Analog To HD IP Surveillance Following a thorough assessment by both GLU and Trigion, a mix of 30 IDIS analog cameras together with motion detectors were implemented. The new security system proved incredibly effective in reducing crime as well as health and safety incidents and was gradually extended over the next ten years to include cameras in all strategic locations. In 2013, the GLU went about updating the school’s security policy to include the use of cameras and their related images. While working alongside Trigion to develop the policy, Trigion advised GLU to make the move from analog to high-definition IP to vastly improve performance and thereby further increase safety and security. Since the existing IDIS system was still reliably operating, GLU needed to be convinced of the investment. IDIS HD IP Cameras And NVRs GLU was operating a mix of IDIS analogue and HD networked cameras connected to IDIS NVRs all seamlessly managed through IDIS Center Trigion first installed two networked HD cameras next to the existing surveillance system. Both systems could be viewed easily through IDIS Center, totally cost-free video management software (VMS). The improved performance in terms of crisp picture quality, fast retrieval of footage and the easy and rapid installation quickly convinced GLU to implement a phased upgrade from analog to IP. By 2014, GLU was operating a mix of IDIS analog and HD networked cameras connected to IDIS network video recorders (NVRs) all seamlessly managed through IDIS Center, providing a high performance, centralized monitoring capability. Since implementation the number incidents of internal theft, harassment, fighting and drug taking has reduced to almost zero—a measurable result Hafizovic is very proud of. The security policy has been shared with students and they fully understand their rights and obligations when it comes to the use of surveillance in the school and the importance of personal safety. Adapting To Safety And Security Provisions The innate flexibility and backward compatibility of the IDIS solution allows GLU to continuously improve and adapt safety and security provisions, effectively enabling the school to upgrade to next generation IDIS technology when it comes online and integrate with other systems as required. In 2015, GLU was voted the third best school in a nationwide survey, in which GLU scored top in the areas of safety and security. Later the same year, the King of The Netherlands, Willem Alexander and Jet Bussemaker, the Dutch Minister of Education, Culture and Science visited GLU to witness its achievements for themselves, proving a proud day for GLU staff and students.
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
You could say concerns about privacy are “trending” in our increasingly data-driven world. Unease about how Facebook and other high-tech companies use and share data dominates the news, and the full impact of new European Union (EU) regulations is about to be felt around the world. By May 25, companies that collect data on EU citizens will need to comply with strict new rules around protecting customer data, as enumerated in the General Data Protection Regulation (GDPR). But how do the new regulations, and broader concerns about privacy, affect the physical security market? We asked this week’s Expert Panel Roundtable: How do privacy issues and regulations, such as GDPR, impact physical security systems and how they are managed?
Companies in fast-moving industries tend to want half or more of their revenue to come from products released in the last three or so years. The logical extension of that philosophy is the demise of product "cash cows" that remain in a company's portfolio for many years. Where better to witness the shortening life cycles of technology products than in the smart phone market, where most of us buy into the hype of the "latest and greatest?" But does acceleration of new product introductions translate into shorter product life cycles in the field? We asked this week's Expert Panel Roundtable: What is an acceptable life cycle for a physical security system? Is there a trend toward systems being replaced more, or less, often?